Windows 7 reached its end of support deadline quite recently. It clearly means that Windows 7 devices are no longer eligible for technical support and security updates. If you are one of those loyal Windows 7 fans who haven’t upgraded yet, your production machine is prone to serious potential risks.
However, Microsoft recommends its users that they should upgrade to the latest version of Windows as soon as possible. Notably, there are two ways to switch to Windows 10. You can either clean install the operating system or purchase a new system with pre-installed Windows 10 OS.
Speaking of Windows 10, we can not deny the fact that thousands of users are still hesitant to upgrade to Windows 10. Their hesitation is pretty much obvious because of the series of bugs that come along with each update.
This is one of the reasons many people are now looking for a Linux-based operating system. But many of them don’t have any idea about the upgrade process. They are concerned about the hardware incompatibility issues and more.
Canonical today published the first part of a tutorial series designed to help Windows 7 users migrate to Ubuntu Linux after Microsoft's decade-old OS reached end of support this month and stopped receiving security and bug fixes.
"We will provide a series of detailed, step-by-step tutorials that should help less tech-savvy Windows 7 users migrate from their old operating system to Ubuntu," Canonical developer advocate Igor Ljubuncic said.
Today's post covers the steps before the actual migration and the data backup stage, and it will be followed by other tutorials detailing the installation steps as well as the post-install configuration and desktop environment setup process.
While Windows 7 refugees also have the option to upgrade to Windows 10 or to buy a new computer with an operating system under active support such as macOS or Windows 10, Canonical would gladly have them switch to its free Ubuntu Linux distribution.
If you are still using Windows 7 on your computer, you are making a huge mistake. Running an unsupported operating system is pure foolishness -- there will be countless exploits in the future for which you simply won't receive patches. In other words, your data and overall online safety is now at major risk. If you insist on sticking with Microsoft's operating system, you might as well upgrade to Windows 10 -- either by installing the operating system onyour current computer or buying a new PC with the OS pre-loaded.
Understandably, many people are scared of Windows 10 -- Microsoft's data collection through extreme telemetry can make it feel like your own computer is spying on you. In that case, a Linux-based operating system should be considered. Today, Canonical releases an official guide for those thinking of switching to Ubuntu from Windows 7. Not only does the guide address potential hardware incompatibilities, but it provides a handy list of popular Windows software and its comparable Linux alternatives.
A few days ago, Rhys Davies wrote a timely article, titled Why you should upgrade to Ubuntu. In it, he outlined a high-level overview of what the end of support of Windows 7 signifies for the typical user, the consideration – and advantages – of migrating to Ubuntu as an alternative, and the basic steps one should undertake to achieve this.
We’d like to expand on this idea. We will provide a series of detailed, step-by-step tutorials that should help less tech-savvy Windows 7 users migrate from their old operating system to Ubuntu. We will start with considerations for the move, with emphasis on applications and data backup. Then, we will follow up with the installation of the new operating system, and finally cover the Ubuntu desktop tour, post-install configuration and setup.
CompuLab and the Linux Mint project have launched a “MintBox 3” version of CompuLab’s fanless Airtop3” mini-tower loaded with Linux Mint 19.3 and a choice of Intel 9th Gen CPUs: a hexa-core i5-9500 for $1,399 and an octa-core i9-9900K with GeForce GTX 1660 graphics for $2,499.
For years, the Linux Mint project and CompuLab have collaborated on CompuLab mini-PCs pre-loaded with the Mint distro, most recently with its $299-and-up, MintBox Mini 2 based on an Apollo Lake based Fitlet2 mini-PC. Back in 2013 there was a $599-and-up MintBox 2 built around an Intense PC driven by a 3rd Gen Ivy Bridge Core processor. Now, the partners have teamed up on a much more powerful — and expensive — MintBox3 that showcases CompuLab’s recent Airtop3 mini-tower based on Intel’s 9th Gen Core “Coffee Lake Refresh” processors.
I’m not judging but apparently, some Chromebook users have some strange email addresses. And by strange, I mean they don’t allow you to set up the default user when installing Linux in Chrome OS.
I’m joking a little here. However, this is a real issue for certain Gmail addresses because it’s that account that’s used to create the default user.
[...]
Based on the current code merge, when starting the Linux installation process, users will be prompted to supply a username, which is then applied to the Linux container system settings.
A couple of weeks ago, we unearthed work being done that will give users the ability to set a custom size for the allotted amount of disk space used by Crostini Linux on Chrome OS. Still disabled via a flag, the resizing feature was still just a placeholder at that time. Today, after an update to the Canary Channel, it looks like the resizing function is now live. It’s still behind a flag and disabled by default but enabling it and starting Crostini from scratch now gives you the option to pick the amount of disk space you want to use for Linux.
[...]
The renaming feature, like the resizing one, was disabled behind a flag and wasn’t working as of yesterday. With the latest update to Canary, the custom username feature is now working when the flag is enabled and it appears right above the resizing option when you install Crostini for the first time. Some users may like this feature simply because they want to create a unique username for Linux but for others, this will be a crucial update when it hits the Stable Channel in the coming months.
A startup focused on Kubernetes security has released an open source risk assessment tool for the popular container orchestration platform. Cloud-native app security provider Octarine's Kube-Scan is a cluster risk assessment tool for developers that scans Kubernetes configurations and settings to identify and rank potential vulnerabilities in applications in minutes.
The tool's risk score is based on Octarine's own Kubernetes Common Configuration Scoring System (KCCSS), a framework similar to the widely used Common Vulnerability Scoring System (CVSS). The KCCSS is similar to the CVSS, but it focuses on the configurations and security settings themselves.
Catalogic Software has made available the open source KubeDR utility for backing up and recovering Kubernetes cluster configuration, certificates and metadata residing in an etcd repository.
Company COO Sathya Sankaran says Catalogic Software has been working to extend the reach of its backup and recovery software for Kubernetes and that KubeDR represents an effort to give back to the open source community. The company’s backup and recovery software already have been extended to support instances of Red Hat OpenShift, which is based on a distribution of Kubernetes, running in OpenStack environments.
As part of that effort, Catalogic Software, which spun out of Syncsort in 2013, has created Catalogic Labs, committed to developing additional open source data protection technologies.
KubeDR is designed to enable IT organizations to recover Kubernetes configuration, certificates and metadata stored in an S3-compatible object storage system. The idea is to make it easier for IT organizations to recover a Kubernetes cluster in the event of a failure. IT teams still need a separate tool to back and recover any application data that might have been lost as well.
The open source software evolution that garnered a $150 million buyout by software giant RedHat in 2015 is fueling a second venture for return founder Saïd Ziouani, this time focused on securing the containers at the core of app development.
Kubernetes security company Octarine has announced two new open-source projects designed to protect against cloud-native security vulnerabilities. The Kubernetes Common Configuration Scoring System (KCCSS) is a framework for rating security risks, and kube-scan is a workload and assessment tool.
“Our mission is to make the adoption of DevSecOps best practices simple, understandable, and achievable for any organization running Kubernetes,” said Julien Sobrier, head of product at Octarine. “One glaring blindspot is at the configuration level when building and deploying cloud native apps. We hope these two new projects benefit the Kubernetes practitioners industry-wide and look forward to collaborating with the community to make Kubernetes as secure and compliant as possible.”
Today, using serverless means choosing a cloud platform to lock yourself into. The open source project expected to fix that is approaching prime time.
The Cluster Overview dashboard we introduced in Red Hat OpenShift 4.2 was a significant and well-received addition to the Web Console, and our team has greatly enjoyed seeing how OpenShift users (and even our own developers) have been using it to identify and resolve issues they otherwise may not have noticed.
We’ve made a number of changes both big and small to the dashboard based on our user research findings and the feedback we’ve collected from readers like you. This post covers some of the key improvements and introduces a new member of the dashboard family that we think developers in particular are going to love.
Open Virtual Network (OVN) is a project born as a sub-component of Open vSwitch (OVS), which is a performant, programmable, multi-platform virtual switch. OVN allows OVS users to natively create overlay networks by introducing virtual network abstractions such as virtual switches and routers. Moreover, OVN provides methods for setting up Access Control Lists (ACLs) and network services such as DHCP. Many Red Hat products, like Red Hat OpenStack Platform, Red Hat Virtualization, and Red Hat OpenShift Container Platform, rely on OVN to configure network functionalities.
In the words of the National Cyber Security Alliance, Data Privacy Day "is an international effort to empower individuals and encourage businesses to respect privacy, safeguard data and enable trust."
Data privacy should be at the forefront of everyone's mind. Protecting your personal data and understanding your right to privacy is becoming more and more important as we start to understand how valuable personal data is and how we are all accountable for protecting our privacy.
Data privacy day is focused on staying safe online, which is a great opportunity to reflect on privacy in a personal way.
Most Linux distributions – like openSUSE or Fedora – include a syslog-ng package in their official repositories ready to install. Some others – like SLES and RHEL – include it in semi-official repositories, like SLES Backports and EPEL. What is the use case for unofficial repositories?
Unless you use the rolling version of a distribution, like openSUSE Tumbleweed or Fedora Rawhide, you will be using an old version of syslog-ng. In some extreme cases, like RHEL 7, it means a six years old syslog-ng release, missing many features – like multi-threading – which are taken now for granted. Even if the included syslog-ng version is up-to-date, it might miss a few features – like the Java and Kafka destinations – due to missing or too old dependencies in the distribution.
If you are lucky or just have a simple use case, the syslog-ng package included in the distro is sufficient for you. If you need one of the features missing from the distribution package, consider the unofficial syslog-ng repositories.
What “unofficial” means? While I am a Balabit/One Identity employee, these are not official repositories. They are provided as is, with a best effort level of support.
Wouldn’t it be nice if your office started to act more like a team player? For employees, that would mean effortless engagement with workplace services. For facility managers, that would mean more engaged and delighted occupants who provide feedback to keep the workplace not just humming but evolving.
IBM TRIRIGA just announced numerous enhancements to the workplace experience in the latest release. Among these enhancements, the all new TRIRIGA Assistant. The TRIRIGA Assistant is a smart, conversational AI assistant, which is the same frictionless technology that we all have in our homes, and which is another way to meet the ever-growing expectations of the workforce. This AI assistant can help users find and reserve meeting rooms, report maintenance issues correctly, and even locate where a colleague sits. And that is just the beginning.
After reviewing nearly 1,400 nominations, IBM is proud and happy to announce the 2020 class of IBM Champions.
The IBM Champion program recognizes innovative thought leaders in the technical community and rewards these contributors by amplifying their voice and increasing their sphere of influence. The program catalyzes their ongoing contributions by providing education, engagement, and opportunities.
An IBM Champion is a business partner or customer of IBM — an IT professional, business leader, developer, executive, or educator who influences and mentors others to help them innovate with and make the best decisions around IBM software, solutions, and services.
How did we get from shareware to free software? We jump in the Linux powered time machine and revisit software past.
Plus a new Plasma focused laptop, and two powerful command-line picks.
A partnership to keep open-source secure, Flathub gets social, Kali Linux has a new release and Ubuntu’s first in a series of switch guides.
We all know about bits. Quantum computers use a more sophisticated data representation known as a qubit or quantum bit. Each qubit can exist in state 1 or 0, but also in superpositions of 1 and 0, meaning that the qubit simultaneously occupies both states. Such states can be specified by a two-dimensional vector that contains a pair of complex numbers, making for an infinite number of states. Each of the complex numbers is a probability amplitude, basically the odds that the qubit is a 0 or a 1, respectively.
Brent sits down with Peter Adams, professional photographer and former founder and CTO of several internet-technology startups in New York and Silicon Valley. We explore his photography project "Faces of Open Source", his history in the dot-com bubble era, how he came to love open source, and more.
Linux 5.5 arrives with support for the Raspberry Pi 4 among many other improvements, Solus and SQLite both see minor version bumps that pack a punch, and The Qt Company has a major update that is not sitting well with its community.
Welcome to the 322nd installment of Linux in the Ham Shack. In this episode, the hosts and special guest Neil Rapp, WB9VPG, of Ham Talk Live discuss the very future of amateur radio in the form of YOTA (Youth on the Air). A program started in IARU Region 1 as Youngsters on the Air, Neil and a committee of other amateurs and volunteers in the Americas is trying to foster the idea around the rest of the globe. Learn about these projects which aim to let youth teach youth about the direction of amateur radio and breed interest that will last many lifetimes.
A couple of days ago, Linus Torvalds announced that the Linux 5.5 stable version is coming soon. Now, there are reports that the stable version of Linux 5.5 is available. Torvalds pointed out in the release announcement that despite the increase in patches this week and concerns about the possible extension of the Linux 5.5 cycle due to downtime around Christmas and New Year holidays, it chose to release the 5.5 kernel on time.
Codenamed Kleptomaniac Octopus, the new Linux release comes with a series of major improvements, including full Raspberry Pi 4 and Chromebook Wake-On-Voice support.
“Despite the slight worry that the holidays might have affected the schedule, 5.5 ended up with the regular rc cadence and is out now,” Linus Torvalds announced.
Linux Torvalds has released the first stable Linux kernel update of 2020, Linux 5.5 – and it’s on schedule despite the worries that downtime over the holidays would have an impact on its release.
The Linux 5.5 kernel update (dubbed “Kleptomaniac Octopus”) brings a host of performance tweaks as well as support for devices like the Raspberry Pi 4 and Broadcom chip BCM2711.
Depending on your use of Linux the increasing support for Intel processor extensions for its x86-64 line could be of note, as the update includes Intel 5-level paging support as default. This has been done in preparation for the release of Intel servers that will have a significant amount of RAM.
Unfortunately it wasn't a trouble-free experience at launch but with time Raven Ridge APUs have been getting cleaned up on Linux for a pleasant experience, thanks in part to the Google Chromebook play that has also seen these newer AMD APUs seeing HDCP content protection support and PSP / TEE trusted execution functionality.
The latest overdue improvement on the AMD Raven APU front is a fix for a pesky issue during audio playback. If playing audio streams immediately one after another, clicking noises can be heard. That is in the process of being resolved thanks to a new kernel patch.
AMD’s ZEN 3 Architecture, the next-gen evolution of the company’s powerful CPUs, is now officially a part of the Linux Family. Spotted inside the Linux Kernel are direct references to the AMD’s Zen 3 CPU microcode. Given the recent developments about the as-yet-unannounced AMD Architecture that succeeds ZEN 2, it is quite likely the company could release the new CPUs based on ZEN 3 in the coming months. And, if the leaked benchmarks and test scores are to be believed, AMD has truly pushed its processors and managed to achieve a substantial leap in processor power with lesser power draw.
After giving a tough competition to Intel last year, AMD appears to be readying a new lineup of CPUs that are based on the company’s latest Architecture, the ZEN 3. Based on the 7nm Fabrication Node, the Zen 3 is the 3rd iteration of the ZEN microarchitecture, which is built using the EUV (Extreme Ultraviolet) lithography process.
It looks like we are getting more closer to the launch of AMD's Zen 3 CPUs as microcode for the upcoming lineup has been added to the Linux Kernel, as spotted by Komachi. The AMD Zen 3 line of processors are aimed to hit in the coming quarters and it looks like they are going to be a bigger upgrade than we have anticipated as many leaks and official representatives have stated.
[...]
However, this means that in the upcoming months, AMD is definitely bringing us more news as also stated by AMD's CEO, Dr. Lisa Su, in the 'The Bring Up' interview where she states that Zen 3 architecture is doing really well, they are excited about it and that she looks forward to talking more about it later in 2020.
MPV media player released version 0.32.0 today with some new features and various bug-fixes.
MPV 0.32.0 features RAR5 support and initial implementation of bash completion.
MPV 0.32 is out today as the newest update to this open-source video player based on MPlayer.
MPV 0.32 adds support for RAR5 compressed content within its libarchive stream implementation. This latest version of RAR supports multi-threaded compression, other compression and decompression speed improvements, and other design improvements.
If you’re a developer or a system administrator and have to travel more then you might be having trouble keeping up with your work. Program or web development and system administration is kind of work which involves continuous attention and it gets even more difficult when you are travelling or have to work from different places.
Well, for such persons there are some tools called desktop sharing apps which can help to keep up with the work on their computer no matter at which location you are, you can keep track from other computer or smartphone. Many computer manufacturing giants and software developing businesses use these types of tools to troubleshoot problems at customers end.
Secure Email Gateways or Email security gateways are gateways designed to filter mail traffic. Some mail providers and other types of organizations implement this solution to fight attacks like phishing, email-borne attacks, viruses, malwares and more attacks which can be filtered by an email gateway, but it also can prevent information leak by infidel members of the organization, etc. It is a controller of mail content which rules according to the specified rules and policies. Email Secure Gateways are available as a cloud service, as virtual appliance, locally at the mail server and there are both software and hardware solutions but this article focuses on 5 Email Security Gateways: MailScanner, MailCleaner, Proxmox, Hermes Secure Email Gateway and OrangeAssasin, all them include free versions while some offer additional paid versions with extra features.
There are a lot of tools for looking at memory usage on Linux systems. Some are commonly used commands like free and ps while others are tools like top that allow you to display system performance stats in various ways. In this post, we’ll look at some commands that can be most helpful in identifying the users and processes that are using the most memory.
Here are some that address memory usage by process.
Learn how to create a virtual machine and install Linux in it. Then learn how to create a web server and then how to get PHP and MySQL working, etc.
For some vital reason that we need not linger on, you want to share what’s on your desktop with others. What are your options?
These are some of the most prevalent tools on Linux for taking screenshots. If one’s not conveniently available on your distribution of choice, at the very least, you’ll find another in its software center/repositories.
More that than often to explain things quickly, I like to take a screenshot of the (web) application I am talking about, and then circle the corresponding area so that everything is clear. Possibly with a rounded rectangle, as I find it the cutest variant.
There’s no reason to spend $60 on a new AAA release just to bring some variety into your gaming diet when there are many fantastic open source games that are completely free and just as engaging as their big-budget counterparts. It’s true that open source games seldom give you the graphical fidelity you may be used to from the most technically advanced games of this console generation, they give you something many best-selling titles today desperately miss: captivating gameplay.
I adventured far and wide, clicking across page after page of unique and often very weird games on itch.io until a little sparkle caught my eye. That spark was Isleward, a free and open source roguelike MMO.
The developer claims it's "the world's only open source, moddable, roguelike MMO"—a bold claim. There's been a few classic-styled roguelike MMOs before, however being free and open source like this with cross-platform play in your browser (and downloads for Linux, macOS and Windows) is certainly refreshing.
While the state of Virtual/Mixed/Augmented Reality (XR) is constantly in flux and improving all the time, Unity have announced with Unity 2019.3 that their built-in XR support is being deprecated.
Unity 2019.3 is the next upcoming (Edit: now out after we published this) major build of the Unity game engine, currently in Beta and when released they're going to be pushing their newer unified XR plugin framework. It makes sense, giving developers of XR hardware the chance to get updates out a lot quicker, rather than waiting for engine upgrades.
Another big new release of the Unity game engine has today been released with 2019.3, full to the brim with massive tech enhancements.
On the Linux side, which we're most interested in, is finally the inclusion of IL2CPP support (a Unity-developed scripting backend) on Linux builds of games and applications. Linux missing this caused issues for a few developers, so hopefully now publishing Linux builds with Unity might be better. Unity say that x can increase the "performance, security, and platform compatibility" of Unity projects. OpenGL and Vulkan especially saw plenty of bug fixes too.
I'm always on the hunt for new and exciting games, a big fan currently of deck-building strategy games of all kinds. This never-ending search recently led me to the free Nethercard Kingdom and I want more.
Unlike most deck-builders, the combat in Nethercard Kingdom happens in real-time. You have to build a deck of assorted cards, each with their own mana cost. As you battle, your mana constantly refills allowing you to play these cards which form your troops who battle out in real-time, plus you can also use spells.
Cat-astrophe Games are currently developing FoodBall, a game that mixes together car combat and Football with a theme involving all sorts of edible items.
When speaking to their team about it recently, they confirmed that not only is FoodBall coming to Linux but their team "actually work on Linux a lot" and their CTO "loves Linux".
Developer HEY and Japanese publisher Hanaji Games have released Dezatopia, an imaginative and unique feeling multi-directional shoot 'em up with Linux support.
[...]
Managing your weapons is key to victory. You're able to set them to auto fire, however, that doesn't allow their charge to build up. Additionally, you collect Crystals from destroyed objects but you can only collect them automatically when all weapons are off. The more weapons you having firing at once, the slower you move too.
PULSAR: Lost Colony is a fantastic idea for a game, always has been but it lacked a good experience for new players and it was easy to bounce off it. Giving each player a dedicated role on a spaceship, this co-op game can be a lot of fun.
Shouting orders at each other with one playing as the Captain and others as the Pilot, Scientist, Weapons Specialist and Engineer it can be quite a riot. If you've always wanted to be part of a crew and travel the galaxy together, this is a fun choice.
Tonight, Valve will be releasing a documentary of the recent The International 2019 tournament, focused on the Grand Finals.
During the Grand Finals we had a showdown between OG and Team Liquid, with OG making history during the tournament by not only being the first team to win The International two times in a row but also the first team to carve their names into the Aegis (the physical trophy) for a second time. Since then, multiple members of the Team Liquid squad left to form Nigma.
On Thursday, Jan. 23, Psyonix announced it will pull support for the macOS and Linux versions of Rocket League this March. After some frustrated comments from the Rocket League community, the developers launched a post on the game’s subreddit, explaining the refund process and offering new information on why the company decided to pull Mac and Linux support. Following some teething problems, Psyonix is now offering a streamlined method for attaining a refund via Steam:
The officially recognized Kubuntu Focus Linux laptop now has a cheaper version, which makes the powerful machine more affordable to those who want to buy a Linux computer.
Announced earlier this month, the Kubuntu Focus laptop now has new configuration options starting a US $1,795 for the base model, which comes with an Nvidia GeForce RTX 2060 6GB GPU, 16GB RAM, 250GB Samsung EVO Plus NVMe storage, one 180W power supply, and one year limited warranty. Previously, the cheapest version cost US $2,285.
Obvious disclaimer, this is my opinion, not KDE's, not my employer's, not my parents', only mine ;)
Big news today is that Qt Long-term-supported (LTS) releases and the offline installer will become available to commercial licensees only.
Ignoring upcoming switch to Qt6 scenario for now, how bad is that for us?
Let's look at some numbers from our friends at repology.
At this point we have 2 Qt LTS going on, Qt 5.9 (5.9.9 since December) and Qt 5.12 (5.12.6 since November).
How many distros ship Qt 5.9.9? 0. (there's macports and slackbuilds but none of those seem to provide Plasma packages, so I'm ignoring them)
How many distros ship Qt 5.12.6? 5, Adélie Linux, Fedora 30, Mageia 7, OpenSuse Leap 15.2, PCLinux OS (ALT Linux and GNU Guix also do but they don't seem to ship Plasma). Those are some bigger names (I'd say specially Fedora and OpenSuse).
Much is happening around Qt these days: We have just opened the Qt Marketplace, released a new MCU offering as well as Qt 5.14, and the Design Studio is developing rapidly.
[...]
Since the Qt Account was introduced, the amount of registered Qt accounts has been growing steadily up to almost one million, today.
From February onward, everyone, including open-source Qt users, will require valid Qt accounts to download Qt binary packages. We changed this because we think that a Qt account lets you make the best use of our services and contribute to Qt as an open-source user.
We want open-source users to help improve Qt in one form or another, be that through bug reports, forums, code reviews, or similar. These are currently only accessible from a Qt account, which is why having one will become mandatory.
The Qt blog has announced some changes in how the Qt toolkit is offered to consumers. Notably, installation of Qt binaries will require a Qt Account and long-term-supported (LTS) releases and the offline installer will become available to commercial licensees only.
When I read “Qt offering changes 2020” yesterday, my first reaction was to write a pissy blog post. I’m still writing a blog post with my thoughts about the changes, but I’ll be nice. There are three parts to this post: a short recap of my history with Qt and then my thoughts on what this means for KDE, for Krita and for free software.
I started programming using Qt and PyQt when I read about Qt in Linux Journal, which I was subscribing to back in 1996. That means that I’ve been using Qt for about 25 years. I initially wanted to write an application for handling linguistic field data, and I evaluated GTK+, wxWidgets, Qt, Tk, fltk, V and a few others that have been forgotten in the mists of time. I choose Qt because it had great documentation, a consistent API, the most logical (to me…) way of doing things like setting up a window with a menu or handling scrollbars and finally because it made C++ as easy as Java.
That’s an easy one, Which ties in with digital… money. About 2018 I was busy looking for a free art program that I could animate with, since I’m struggling with trying to find a job, so I thought I could do try my hand at making videos for YouTube. And speaking of YouTube, that’s where I found it, from this guy’s video on how to animate, and I was sold so I downloaded it and I’m not going back on it.
Actually, the anniversary of when I found it is next month, February 18th, so I’ll have been using it for two years.
Truthfully a bit intimidating at first, until I got the hang of it and it became my go to art program for everything I do, from simple paintings to comics. Heck, David Revoy even got me inspired to do it… Sure, I could have added him to the “who inspires me” section but come on! He needs a special place as my Krita Rockstar…
Anyhoo, I draw more these days than I play video games.
Still, it was a really interesting operating system which was working under some challenging constraints, and overcame them to offer a rather nice Unix-like environment, with a filesystem, preemptive multiprocessing and multithreading, assembly and C programming environments, and more. The entire system was written in handwritten z80 assembly, almost 50,000 lines of it, on a compiler toolchain we built from scratch.
Zorin, which provides a Linux distro designed to look familiar for migrating Windows and Mac users, has announced a subscription-based management tool for Linux desktops.
Six desktop layouts in Zorin include Windows, macOS, Touch, Ubuntu, and Gnome 3, though the full range is only available in the paid-for Ultimate edition (€39 + VAT). But the free Core edition is fully usable, includes the Windows-like desktop, and most of the software in Ultimate can be added manually. The main reason to purchase Ultimate is for installation support and to help finance the Ireland-based project.
Zorin OS is based on Ubuntu and currently at version 15.1, released in mid-December 2019. There are several variants, including one using the lightweight Xfce desktop for best performance on older hardware. We took a look at version 15 in June last year. New stuff in 15.1 includes version 5.0 of the Linux kernel, the ability to use an Android phone as a remote for presentations, new desktop customisation options, and the inclusion of the Sans Forgetica font, which is deliberately hard to read on the grounds, it is claimed, that you remember things better if the brain puts in more effort.
After last week looking at the AMD/Intel/NVIDIA contributions to the mainline Linux kernel over the past number of years, there were reader requests for seeing how some of the top distributions compare namely Red Hat, SUSE, and Canonical.
These graphs today are looking at the contributions by SUSE, Red Hat, and Canonical to the mainline Linux kernel. Keep in mind this is the Git commits made from using the respective corporate domains for each organization.
Another new addition to the website is the packages page. This is a full listing of each package in the repositories with version and maintainer information.
The page is updated automatically with changes to the repositories. The raw repository data is also available as a simple tsv file.
FerenOS undoubtedly focuses on visual aesthetics, user interface and user experience. The last time I looked at FerenOS, it was built on the Cinnamon Desktop Environment. At the time, the Plasma version was called “Feren Next” and and initially I was disappointed I didn’t use the Plasma version, but now I am very glad I did as I can compare this experience with my last FerenOS experience.
This is my review as an openSUSE User. To say this will be completely objective would essentially be a big giant lie. This will be quite biased as I enjoy openSUSE Tumbleweed with the Plasma desktop, day in and day out on multiple machines, including my daily driver, low end laptops and more powerful workstations and servers. I am happily entrenched but that doesn’t mean I don’t like to look over the fences from time to time to see what other parts of the community are doing. Plus, you can’t go anywhere without bumping in to “FerenOS Dev” on some YouTube chat, Telegram or Discord announcing his enhancements.
Bottom Line Up Front: FerenOS (2020) is simply fantastic. The way you are greeted and guided through your setup is brilliant. I am not keen on every design decision but that matters not as I am never keen on every design decision presented in any other distribution, to include my own. FerenOS is going for a look that is uniquely its own and is not afraid to experiment, cross toolkit boundaries and stray from the normal. I appreciate the design decisions, more than any other “boutique” distribution I have seen in a long while. Do I like all of them? No. Would I choose many of these? Also, No. But I think they do look great make for an enjoyable experience, just not one I would prefer.
The Ultimate Linux System — ExTiX — releases its new version v20.2 with a major shift to the upcoming Ubuntu 20.04. Arne Exton, the ExTiX developer, names the current release as ExTiX 20.2 KDE Plasma Live DVD.
ExTiX 20.2 replaces the previous Desktop Environment GNOME and Codebase Deepin 15.11 with KDE Plasma 4.19 and Ubuntu 20.04 LTS.
We are here to kick off our first release of the decade, with Kali Linux 2020.1! Available for immediate download.
Throughout the history of Kali (and its predecessors BackTrack, WHAX, and Whoppix), the default credentials have been root/toor. This is no more. We are no longer using the superuser account, root, as default in Kali 2020.1. The default user account is now a standard, unprivileged, user.
For more of the reasons behind this switch, please see our previous blog post. As you can imagine, this is a very large change, with years of history behind it. As a result, if you notice any issues with this, please do let us know on the bug tracker.
Offensive Security kicks of 2020 with the first release of their Kali Linux ethical hacking and penetration testing GNU/Linux distribution, Kali Linux 2020.1.
The Kali Linux 2020.1 release is now available for download and it looks like it packs quite some goodies for fans of the Debian-based operating system, including non-root by default. This means that Kali Linux 2020.1 is the first release to use a standard, unprivileged user account (kali/kali) by default instead of the superuser account (root/toor), except for the ARM images.
The second biggest change in Kali Linux 2020.1 is the availability of a single installer image for all supported desktop environments. Therefore, there won’t be separate images of Kali Linux for each desktop environment, which means that, when they want to install Kali Linux, users will have to download a single image and choose their preferred desktop environment.
In this video, we are looking at Solus 4.1 MATE.
OpenMandriva Lx 4.1 is just around the corner. The team is publishing today the last milestone for current release cycle.
OMLx 4.1 RC release is mostly bug fixing and update packages.
Last week I spent 3 days training on how to detect UEFI firmware implants. The training was run by Alex Matrosov via Hardwear.io and was a comprehensive deep-dive into UEFI firmware internals so that we could hunt for known and unknown implants. I’d 100% recommend this kind of training, it was excelent. Although I understood the general concepts of the protection mechanisms like SMM, HP Sure Start and Intel BIOSGuard before doing the training, it was really good to understand how the technologies really worked, with real world examples of where hardware vendors were getting the implementation wrong – giving the bad guys full control of your hardware. The training was superb, and Alex used lots of hands-on lab sessions to avoid PowerPoint overload. My fellow students were a mixture of security professionals and employees from various government departments from all over the world. We talked, a lot.
My personal conclusion quite simply is that we’re failing as an industry. In the pursuit to reduce S3 resume time from 2s to 0.5s we introduce issues like the S3 bootscript vulnerability. With the goal to boot as quickly as possible, we only check the bare minimum certificate chain allowing additional malicious DXEs to be added to an image. OEMs are choosing inexpensive EC hardware from sketchy vendors that are acting as root of trust and also emulating hardware designed 30 years ago, whilst sharing the system SPI chip. By trying to re-use existing power management primitives like SMM as a security boundary the leaky abstractions fail us. Each layer in the security stack is assuming that the lower below it is implemented correctly, and so all it takes is one driver with SMM or CSME access to not check a memory address in a struct correctly and everything on top (e.g. BootGuard, ALSR, SELinux, etc) is broken. Coreboot isn’t the panacea here either as to get that to run you need to turn off various protections like BootGuard, and some techniques like Sure Start mean that Coreboot just isn’t a viable option. The industry seems invested into EDK2, for better or worse. This shouldn’t just be important to the few people just buying stuff from Purism – 10,000x laptops are being sold on Amazon for every laptop sold by vendors that care about this stuff.
Most of the easy-to-exploit issues are just bugs with IBV or ODM-provided code, some of which can be fixed with a firmware update. Worst still, if you allow your “assumed secure” laptop out of sight then all bets are off with security. About a quarter of people at the UEFI training had their “travel laptop” tampered with at some point – with screws missing after “customs inspections” or with tamper seals broken after leaving a laptop in a hotel room. You really don’t need to remove the screws to image a hard drive these days. But, lets back away from the state-sponsored attacker back to reality for a minute.
The brutal truth is that security costs money. Vendors have to choose between saving 10 cents on a bill-of-materials by sharing a SPI chip (so ~$10K over a single batch), or correctly implementing BIOSGuard. What I think the LVFS now needs to do is provide some easy-to-understand market information to people buying hardware. We already know a huge amount of information about the device from signed reports and from analyzing the firmware binaries. What we’re not doing very well is explaining it to the user in a way they can actually understand. I didn’t understand the nuances between BIOSGuard and BootGuard until a few days ago, and I’ve been doing this stuff for years.
Nextcloud is a software suite for storing and syncing your data across multiple devices. You can learn more about Nextcloud Server’s features from https://github.com/nextcloud/server.
This article demonstrates how to build a personal cloud using Fedora and Nextcloud in a few simple steps. For this tutorial you will need a dedicated computer or a virtual machine running Fedora 31 server edition and an internet connection.
If you’re in the market for a powerful new Linux laptop then the 2-in-1 HP Dragonfly Elite (first-gen) might not be your first thought.
This 13.3-inch notebook isn’t sold with Linux, and instead coms preloaded with Windows 10.
But Jim Salter at Ars Technica decide to try out the latest Ubuntu 19.10 release on the Dragonfly Elite to see if a non-Windows experience was up to scratch.
And the result?
Pretty dang encouraging!
Canonical has released today new Linux kernel patches to address the latest security vulnerabilities affecting Intel Graphics Processing Units (GPUs) in all of its supported Ubuntu releases.
Two weeks ago, on January 14th, Intel revealed two new vulnerabilities affecting systems with Intel Graphics Processing Units (GPUs), known as CVE-2020-7053 and CVE-2019-14615. These vulnerabilities were present in the Intel graphics driver (i915) for GNU/Linux systems, and thus having an impact on almost all Linux-based operating systems.
CVE-2019-14615 did not let the Linux kernel to properly clear data structures on context switches for some Intel GPUs, which could allow a local attacker to expose sensitive information. On the other hand, CVE-2020-7053 is a race condition that could lead to a use-after-free, destroying GEM contexts in the i915 graphics driver. This could allow a local attacker to crash the system or execute arbitrary code.
Intel are not having a good time lately are they? More vulnerabilities in their CPUs have been made public.
How many is that Intel have had recently that affect them? Quite a lot. This time, it appears AMD are not affected at least. Still, this is a lot of major security problems to go through with Spectre and Meltdown, Foreshadow and ZombieLoad. Currently, Intel are saying that they're "not aware of any use of these issues outside of a controlled lab environment" so you don't need to go and panic just yet. Just keep an eye on updates for your distribution and motherboard BIOS updates.
Canonical has released today a new Linux kernel security update for the Ubuntu 16.04 LTS (Xenial Xerus) operating system to address several vulnerabilities.
In addition to mitigating the CVE-2019-14615 vulnerability affecting certain Intel graphics processors, the new Linux kernel security update addresses a race condition (CVE-2019-18683) in the Virtual Video Test Driver (VIVID), which could allow an attacker with access to /dev/video0 to gain administrative privileges.
Also patched are multiple memory leaks (CVE-2019-19057) in the Marvell WiFi-Ex driver and a NULL pointer dereference (CVE-2019-18885) in the Btrfs file system.
Talented concept artist Sylvia Ritter unveiled today new artwork inspired by Canonical’s upcoming Ubuntu 20.04 LTS “Focal Fossa” operating system, due for release in April 2020.
Sylvia Ritter is known for her astonishing artwork made for each of the 30 releases of the Ubuntu operating system, and now the artist has published new artwork for the upcoming Ubuntu 20.04 LTS release, dubbed Focal Fossa, which you can download from DeviantArt.
It’s only a single image, which is perfect for use as a wallpaper on your mobile phone, and you don’t even have to be an Ubuntu fan because the ‘Focal Fossa” inspired artwork is nothing but marvelous. I love it!
Welcome to the Ubuntu Weekly Newsletter, Issue 615 for the week of January 19 – 25, 2020. The full version of this issue is available here.
ASUS unveiled Tinker Edge T & CR1S-CM-A SBCs based on Google Coral Edge TPU system-on-module featuring both NXP i.MX 8M processor and Google Edge TPU co-processor for AI acceleration in May 2019...
Asus has launched a $168 “Tinker Edge T” SBC that runs Linux on the same Coral SOM module found on Google’s Coral Dev Board, equipped with an i.MX8M and an Edge TPU. The SBC advances to 3x USB 3.2 ports and offers a second CSI port and a 12-19V input.
Asus has begun selling its Tinker Edge T SBC after previewing the board along with a similar CR1S-CM-A industrial board and RK3399Pro based Tinker Edge R SBC back at Computex in late May. The Tinker Edge T variant of Google’s $150 Coral Dev Board has a similar, Raspberry Pi like layout and uses the same Coral SOM, which combines a quad-core NXP i.MX8M with Google’s Edge TPU AI chip.
The Raspberry Pi is the king of single-board computers because it offers decent performance packed into a convenient form-factor for an attractive price. But its competition hasn’t been asleep while it’s been sitting on the throne.
In 2020, there are several cheap Raspberry Pi alternatives that you should consider for your projects, each offering a unique set of features and capabilities. So, without further ado, here’s our list of the best cheap Raspberry Pi alternatives in 2020.
Open Book is an open source eBook reader that you can tweak to your liking. Free from proprietary stuff, Open Book is a dream come true for open source enthusiasts.
The Open Book Project was born from a contest held by Hackaday and that encouraged hardware hackers to find innovative and practical uses for the Arduino-based Adafruit Feather development board ecosystem. The winner of that contest was the Open Book Project which has been designed and engineered from the ground up to be everything devices like the Amazon Kindle or Rakuten Kobo are not. There are no secrets inside the Open Book, no hidden chips designed to track and share your reading habits and preferences with a faceless corporation. With enough know-how, you could theoretically build and program your own Open Book from scratch, but as a result of winning the Take Flight With Feather contest, Digi-Key will be producing a small manufacturing run of the ereader, with pricing and availability still to be revealed.
[...]
The open source ereader—powered by an ARM Cortex M4 processor—will also include a headphone jack for listening to audio books, a dedicated flash chip for storing language files with specific character sets, and even a microphone that leverages a TensorFlow-trained AI model to intelligently process voice commands so you can quietly mutter “next!” to turn the page instead of reaching for one of the ereader’s physical buttons like a neanderthal. It can also be upgraded with additional functionality such as Bluetooth or wifi using Adafruit Feather expansion boards, but the most important feature is simply a microSD card slot allowing users to load whatever electronic text and ebook files they want. They won’t have to be limited by what a giant corporation approves for its online book store, or be subject to price-fixing schemes which, for some reason, have still resulted in electronic files costing more than printed books.
What remains to be seen is whether or not the Open Book Project can deliver an ereader that’s significantly cheaper than what Amazon or Rakuten has delivered to consumers. Both of those companies benefit from the economy of scale having sold millions of devices to date, and are able to throw their weight around when it comes to manufacturing costs and sourcing hardware. If the Open Book can be churned out for less than $50, it could potentially provide some solid competition to the limited ereader options currently out there.
The Raspberry Pi is an awesome device for the money, but they aren’t exactly known for their raw computing power. Despite that, users have found some remarkable uses for the single-board computer over the years, running everything from arcade emulators to entire home automation systems.
That said, sometimes you need more power than a single Raspberry Pi can provide. Fortunately, it’s relatively easy to make several Raspberry Pi machines work together. This is known as a cluster, and they can be powerful enough to rival some of the world’s best super computers.
Already in early January, Bernardo Rodrigues received a grant from the Ecosystem Development Fund of the IOTA Foundation for the development of an OpenEmbedded Layer for IOTA. The project of an OpenEmbedded Layer for IOTA projects, Meta-iota, is intended to enable an easy and fast integration of IOTA projects into Yocto-based embedded Linux distributions, as CNF reported.
With honeycombOS, Rodrigues recently released another embedded Linux distribution tailored for IOTA nodes, clients and Tangle related tools. It is mainly based on Poky and was created with tools from the Yocto Project and OpenEmbedded. As Rodrigues further explains, honeycombOS is part of Meta-iota, which is supported by the IOTA Ecosystem Development Fund. In detail Rodrigues describes:
IGEL, provider of the next-gen edge OS for cloud workspaces, today announced general availability of Linux client support for Microsoft Windows Virtual Desktop. As part of a limited preview of the Microsoft RD Core software developer's kit (SDK), IGEL is the first to offer a Linux-based client that is validated for use with Windows Virtual Desktop.
The Arduino development team has today announced the availability of a new Arduino IDE in the form of Arduino 1.8.11. The open-source Arduino Software (IDE) makes it easy to write code and upload it to the range of Arduino development boards board. The Arduino IDE can be loaded onto Windows requires Win 8.1 or 10, Mac OS X 10.8 Mountain Lion or newer, and Linux 32 and 64 bit computers and is written in Java and based on Processing and other open-source software.
A contractor is drilling in the office space above ours, and it sounds like we’re under attack by a swarm of very angry, Transformeresque bees. We can’t hear ourselves think. Although we can hear the drills.
When the first thermal cyclers for the polymerase chain reaction came out in the 1980s, they were as expensive as a market driven by grant money could make them. Things haven’t got much better over the years, largely shutting STEM classes and biohackers out of the PCR market. That may be about to change, though, if the €99.00 PocketPCR thermal cycler takes hold.
PCR amplifies DNA in a three-step process: denaturation, which melts double-stranded DNA into single strands; annealing, which lets small pieces of primer DNA bind to either side of the region of interest; and elongation, where the enzyme DNA polymerase zips along the single strands starting at the primer to replicate the DNA. The cycle repeats and copies of the original DNA accumulate exponentially. Like any thermal cycler, [Urs Gaudenz]’s PocketPCR automates those temperature shifts, using a combination of PCB-mounted heating elements and a cooling fan. The coils rapidly heat a reaction block up to the 99€°C denaturation temperature, the fan brings that down to the 68€°C needed for annealing, and then the temperature ramps back up to 72€°C for elongation with thermostable DNA polymerase. PID loops keep the reaction temperature precisely controlled. The whole thing is, as the name suggests, small enough to fit in a pocket, and can either be purchased in kit form or scratch-built from the build files on GitHub.
Since major enterprises started taking blockchain seriously and looking at the technology's potential in their chosen arena, so have a number of popular enterprise-grade blockchain solutions have come to the fore.
Some of these solutions are sold to companies as an all in one solution, slightly deviating from some of the core decentralized and open-sourced pillars of the technology, but the more popular ones are open-sourced and constantly being developed. The likes of Hyperledger Fabric, as well as Sawtooth and Besu, R3 Corda, and Quorum are all open source solutions that have been tracked for developer activity by Blockchain service firm Chainstack.
There’s no shortage of resources and tools for developing machine learning algorithms. But when it comes to putting those algorithms into production for inference, outside of AWS’s popular SageMaker, there’s not a lot to choose from. Now a startup called Cortex Labs is looking to seize the opportunity with an open source tool designed to take the mystery and hassle out of productionalizing machine learning models.
Infrastructure is almost an afterthought in data science today, according to Cortex Labs co-founder and CEO Omer Spillinger. A ton of energy is going into choosing how to attack problems with data – why, use machine learning of course! But when it comes to actually deploying those machine learning models into the real world, it’s relatively quiet.
As discussed in the January blog roadmap, I want to concretely describe a reduced Oil language, and see if we can get it "done" in 2020.
So, to give context to upcoming posts about the language, let's review the project's goals from different perspectives: [...]
In this edition of the Embedded Insiders podcast, Brandon and Rich continue their journey into the world of open source, this time by focusing on Z-Wave that was recently donated to the community by Silicon Labs (who acquired the networking technology from Sigma Designs).
Later, the Embedded Insiders are joined by Laurens Slats from The Things Industries, who continues the discussion of open source networking technologies by outlining the state of LoRa and LoRaWAN. Their upcoming Things Conference in Amsterdam takes place January 30-31st.
The idea that some software developers matter more to coding projects than others is controversial, particularly among open source projects where community cohesion and participation can suffer if contributors are not treated fairly.
Scott Hanselman, partner program manager at Microsoft, argued against the notion of rockstar programmers back in 2013, as have many others. But not everyone agrees and it's a difficult debate to settle because there's no consensus about what to measure, much less about the methods used to make the measurements.
What's more, projects may have different needs at different times – a dominant contributor may help bring projects to life but then become a liability when the project is mature.
The latest entry into this long-running argument comes from a research paper, "Why Software Projects need Heroes (Lessons Learned from 1000+ Projects)," published last year [PDF] and just revised [PDF] with 16 additional pages.
The Nextcloud developers have unleashed one of their most significant upgrades to their on-premises cloud hosting platform: Nextcloud Hub. I was invited to test the pre-release version and never before have I been so impressed with a piece of open source software. Nextcloud has evolved from a tool that can be installed and expanded with a number of applications, to an out-of-the-box, one-stop shop collaboration suite.
Once installed, Nextcloud Hub includes built-in video chat, OnlyOffice integration, and so much more--out of the box. Admins will no longer have to install or connect to a separate OnlyOffice server. That's big news for anyone who's taken the time to add business-grade collaboration to the Nextcloud platform. Open source now has a seriously robust and user-friendly web-based office groupware suite.
This evolution of the hottest on-premises cloud server software will come about with the next release (version 18 is available now) and will bring with it a full-blown, fully-featured cloud-based set of collaboration tools unlike anything you've witnessed in an open source stack.
The strategic integration is the result of a shared vision to unify and further strengthen competencies across key open source solution spaces.
With this merger, LSD hopes to explore new opportunities with their combined superpowers and will continue to deliver market-leading open-source solutions.
More than a month has passed, but the winter holidays allowed me to update, fix, and stream line a lot of corners in SUSI.AI. And above all, work on a desktop version that can easily be installed. Thus, the FOSSASIA Team finally can release a SUSI.AI 2020-01-20 of SUSI.AI, the privacy aware personal assistant.
I’ve always loved train journeys, but with flygskam changing people’s travel preferences across Europe (and possibly worldwide, though probably not that much), I decided to take train to FOSDEM this time.
[...]
As some of my readers may know, my backpack was stolen from me after FOSDEM two years ago, and with it were gone, among other things, my passport and my residence permit card. With my flight home having been planned two and half hours from the moment when I realised my things are gone, I couldn’t get a replacement travel document quickly enough from the embassy, so I had to stay at my friends in Vilvoorde (thanks a lot again, Jurgen!) and travel with the cheapest ground transportation I could find. In my case, it was a night RegioJet coach to Prague with a connection to (again) RegioJet train to Bratislava. (I couldn’t fly even though I already had my temporary travel document since I might need to somehow prove that I’m allowed to be in the Schengen zone, which is difficult to do without a valid residence permit.) Sleeping on a bus isn’t the best way to travel for long distances, and I was knackered when I finally dropped on my sofa in Bratislava next morning. However, what I learnt was that it was possible, and were it a bit more comfortable, I wouldn’t mind something like this again.
As of today, the Thunderbird project will be operating from a new wholly owned subsidiary of the Mozilla Foundation, MZLA Technologies Corporation. This move has been in the works for a while as Thunderbird has grown in donations, staff, and aspirations. This will not impact Thunderbird’s day-to-day activities or mission: Thunderbird will still remain free and open source, with the same release schedule and people driving the project.
There was a time when Thunderbird’s future was uncertain, and it was unclear what was going to happen to the project after it was decided Mozilla Corporation would no longer support it. But in recent years donations from Thunderbird users have allowed the project to grow and flourish organically within the Mozilla Foundation. Now, to ensure future operational success, following months of planning, we are forging a new path forward. Moving to MZLA Technologies Corporation will not only allow the Thunderbird project more flexibility and agility, but will also allow us to explore offering our users products and services that were not possible under the Mozilla Foundation. The move will allow the project to collect revenue through partnerships and non-charitable donations, which in turn can be used to cover the costs of new products and services.
Last year, in a React side-project, I had to replace some content in a string with HTML markup. That is not a trivial thing to do with React, as you can't just put HTML as string in your content, unless you want to use dangerouslySetInnerHtml — which I don't. So, I hacked a little code to smartly split my string into an array of sub-strings and DOM elements.
More recently, while working on Translate.Next — the rewrite of Pontoon's translate page to React — I stumbled upon the same problem. After looking around the Web for a tool that would solve it, and coming up short handed, I decided to write my own and make it a library.
[...]
The first thing to note is that you can pass any number of parsers to the createMarker function, and they will all be called in turn. The order of the parsers is very important though, because content that has already been marked will not be parsed again. Let's look at another example.
Say you have a rule that matches content between brackets: /({.*})/, and a rule that matches content between brackets that contain only capital letters: /({[A-W]+})/. Now let's say you are marking this content: I have {CATCOUNT} cats. Whichever rule you passed first will match the content between brackets, and the second rule will not apply. You thus need to make sure that your rules are ordered so that the most important ones come first. Generally, that means you want to have the more specific rules first.
TenFourFox Feature Parity Release 19 beta 1 is now available (downloads, hashes, release notes). I was originally going to do more iteration on Reader mode in FPR19, but in a possible recurrence of the issue that broke SourceForge downloads temporarily, a user reported on Tenderapp they had a site that was failing in the same way. On the test system I was able to reproduce the problem and it was due to the selected cipher having insufficient cryptographic strength to pass HTTP/2 TLS profile validation. The selected cipher was one I added as a stopgap for FPR7 to fix another site which was still working (and did not use HTTP/2, hence it didn't exhibit the issue). Disabling that cipher restored the new failing site, but caused the site I put the workaround for in FPR7 to fail, so in no situation could I get both sites to be happy with the set available. Although I didn't really want to do this, the only real solution here was to upgrade NSS, the underlying cryptographic library, to add additional more modern ciphers to replace the older one that now needed to be reverted. With this in place and some other fixes, now both sites work, and this probably fixes others.
fx_cast, a tool that enables Chromecast support for Firefox web browser, has been updated to version 0.0.5 with some new features and bug fixes. This release includes support for finding and converting local SubRip (.srt) subtitle files for local media casting, an important fix that gets YouTube casting to work correctly, and more.
fx_cast is made of two parts: a Firefox extension and a companion application that needs to run in the background on the same machine as the extension. This companion bridge application is needed to connect with the receiver devices in order to get around Google's proprietary protocol.
It's important to note that fx_cast is in the pre-beta phase, and is considered "incomplete and likely buggy". It supports casting web apps like Netflix or BBC iPlayer, HTML5 video and screen/tab sharing.
At Mozilla, we often speak of our contributor communities with gratitude, pride and even awe. Our mission and products have been supported by a broad, ever-changing rebel alliance — full of individual volunteers and organizational contributors — since we shipped Firefox 1.0 in 2004. It is this alliance that comes up with new ideas, innovative approaches and alternatives to the ongoing trends towards centralisation and an internet that doesn’t always work in the interests of people.
But we’ve been unable to speak in specifics. And that’s a problem, because the threats to the internet we love have never been greater. Without knowing the strength of the various groups fighting for a healthier internet, it’s hard to predict or achieve success.
We know there are thousands around the globe who help build, localize, test, de-bug, deploy, and support our products and services. They help us advocate for better government regulation and ‘document the web’ through the Mozilla Developer Network. They speak about Mozilla’s mission and privacy-preserving products and technologies at conferences around the globe. They help us host events around the globe too, like this year’s 10th anniversary of MozFest, where participants hacked on how to create a multi-lingual, equitable internet and so much more.
With the publication of the Mozilla and the Rebel Alliance report, we can now speak in specifics. And what we have to say is inspiring. As we rise to the challenges of today’s internet, from the injustices of the surveillance economy to widespread misinformation and the rise of untrustworthy AI, we take heart in how powerful we are as a collective.
The nice aspect of being a physicist and a researcher is the openness of our community. There is a lot of collaboration and sharing of ideas (especially during coffee breaks). We also tend to share the software we write. Since we are very picky about algorithms, we want to modify other people’s code to fix the obvious errors that we find. It feels frustrating when I have to use proprietary tools since I cannot understand their inner workings. Having grown up professionally in such an environment, open source has been my go-to solution for all the software I use.
When I became the regular teacher of the Physics and Biophysics course at the medical school at my university, I decided to use only open source software to prepare my lectures. Here is my experience so far and the solutions I found.
FreeNAS is a free and open-source NAS software based off of FreeBSD and OpenZFS. It runs on commodity x86-64 hardware, as well as iXsystems gear. FreeNAS supports Window, macOS, and Unix as well as virtualization hosts like XenServer and VMware. TrueNAS is aimed at enterprise storage and supports SMB, AFP, NFS, iSCSI, SSH, rsync and FTP/TFTP sharing protocols over Ethernet and Fibre Channel network fabrics. TrueNAS also supports VMware as well as over protocols such as Microsoft CSV, ODX, and VSS, and Veeam.
Part of the 11.3 update sees TrueNAS gain several of the features that were already running in FreeNAS, now fully vetted and ready to go to the enterprise. These features include the modernized web UI as well as the ability to use and manage jails, plugins, and VMs. The new features are available in TrueNAS X-Series and M-Series platforms that scale from 10TB to over 10PB with hybrid or all-flash models.
In the last status report, we stood up our own git server. Since then, we've migrated our entire infrastructure to point to our self-hosted git as the source-of-truth repo.
The organization claims that by open-sourcing Windows 7, Microsoft can allow the community to “study, modify, and share” code in the operating system. This would also allow the company to “respect the freedom and privacy” of users, FSF continues.
“We call on them to release it as free software, and give it to the community to study and improve. As there is already a precedent for releasing some core Windows utilities as free software, Microsoft has nothing to lose by liberating a version of their operating system that they themselves say has ‘reached its end,’” the Free Software Foundation adds.
At the time of writing, the petition has nearly 5,000 supporters.
Of course, Microsoft hasn’t responded to the petition, but it goes without saying that you shouldn’t expect the company to open-source Windows 7. There are many reasons the company won’t do this, including the fact that Windows 7 shares much of the code with Windows 10, and open-sourcing the 2009 OS would obviously expose its successors.
But Microsoft is unlikely to cave into the Windows 7 demands that FSF outlined in a petition launched last week, asking Microsoft to "give it to the community to study and improve".
FSF argues that Microsoft has "nothing to lose by liberating a version of their operating system that they themselves say has reached its end.
The petition was aiming to gather at least 7,777 supporters and today has exceeded that by 1,000.
[...]
Also, as The Register points out, there are still portions of Windows 7 code in Windows 10, so it's probably not in the company's best interests to release a free version of Windows 7.
A free Windows has been a consistent demand of Stallman, who retired from FSF last year. He gave a speech at Microsoft Research last year outlining 10 demands, including that Microsoft "publicly take back Microsoft's attacks on copyleft made in the 2000s" and to release the source code of Windows under the GNU GPL.
The Free Software Foundation wants Microsoft to keep Windows 7 alive as a free operating system. Microsoft stopped providing free security patches and support for Windows 7 earlier this month.
Although the popular operating system reached its 10th birthday last fall, some 200 million PCs around the globe still run it, according to industry estimates. Users include small business owners, some larger companies, government agencies, and hordes of consumers worldwide.
Microsoft expects most Windows 7 users to migrate to Windows 10, but it continues to provide patches and support for Windows 7 Pro and Enterprise, which are eligible for extended security update support for three years, for a fee. Windows 7 Home editions and Ultimate editions are not included in the options to purchase extended support.
The FSF this week launched the "Upcycle Windows 7" petition. The organization is still collecting signatures, though it has surpassed its goal of getting 7,777 people to sign on to make Windows 7 available for free. The current tally is approaching 10,000.
Making the OS free would allow users "the freedom to run, copy, distribute, study, change and improve the software," according to the foundation.
The Free Software Foundation (FSF) is asking Microsoft to 'upcycle' Windows 7 and allow the community to continue to improve it after its end of life.
"On January 14th, Windows 7 reached its official 'end-of-life,' bringing an end to its updates as well as its ten years of poisoning education, invading privacy, and threatening user security," says the FSF in a petition published on its website.
The end of Windows 7's lifecycle gives Microsoft the perfect opportunity to undo past wrongs, and to upcycle it instead."
The non-profit organization, founded by Richard Stallman in 1985 to support and promote the free software movement, wants Redmond to give its EoL OS to the community, to be studied and improved upon.
In support of this demand, the FSF uses the release of the Microsoft Calculator app as open-source on GitHub under MIT license.
We at the Free Software Foundation (FSF) are excited to say that the Dorothy Quincy suite of Boston's very own Back Bay Events Center will be the home of this year's LibrePlanet conference! We've taken the grand tour and couldn't be happier about our choice of location. We're confident that the Events Center will be a great host for the technology and social justice conference we've all come to know and love. It's just the right place for us (and the movement) to take our next steps in freeing the future.
The Events Center is providing LibrePlanet with its own entrance and a dedicated and speedy Internet connection for the livestream, and is close to both public transportation and the FSF headquarters itself. As in past years, we'll have ample space for an exhibit hall and free software workshops, as well as the ever popular "hallway track," where you can engage with other attendees in conversations on contributing to free software projects.
On the Events Center Web site, you will find accommodation and transportation suggestions that will pair nicely with those we've put up on the LibrePlanet 2020 site. The Back Bay Events Center is located at the corner of Berkeley and Stuart Street, and is close by the Back Bay stop of the Orange Line MBTA train and the Arlington stop of the Green Line MBTA train.
The LibrePlanet 2020 conference is coming very soon, on March 14 and 15 at the Back Bay Events Center in Boston, and WE NEED YOU to make the world's premier gathering of free software enthusiasts a success.
Volunteers are needed for several different tasks at LibrePlanet, from an audio/visual crew to point cameras and adjust microphones, to room monitors to introduce speakers, to a set-up and clean-up crew to make our conference appear and disappear at the Event Center, and more! You can volunteer for as much or as little time as you like, whether you choose to help out for an hour or two, or the entirety of both days. Either way, we'll provide you with a VERY handsome LibrePlanet 2020 shirt in your size, in addition to free admission to the entire conference and lunch and our eternal gratitude.
2019 was a difficult year for the Free Software Community with lots of questions about the future of GNU. It is hard to come up with good answers unless you know which shared principles you all value. After a very long discussion we finally have a first GNU Social Contract DRAFT and a new public wiki for GNU maintainers to share public discussion documents like this.
The pre-release recutils-1.8.90.tar.gz is now available at ftp://alpha.gnu.org/gnu/recutils/recutils-1.8.90.tar.gz The NEWS file in the tarball contains a list of the changes since 1.8. The planned date for releasing 1.9 is Saturday 1 February 2020.
bison-3.5.1 gmp-6.2.0 gnuhealth-3.6.2 gnunet-0.12.2 grep-3.4 gsasl-1.8.1 guile-3.0.0 help2man-1.47.12 hyperbole-7.0.8 kawa-3.1.1 libredwg-0.10.1 make-4.3 mes-0.22 parallel-20200122 sed-4.8 unifont-12.1.04
A team of legal advisors and renewable energy experts contributed to an Open Solar Contracts Initiative to accelerate the deployment of solar power worldwide.
The open source project was initiated by the Terrawatt Initiative (TWI) and the International Renewable Energy Agency (IRENA) in 2016.
designer joão leão constantly ran into plastic waste washing ashore on the beaches of porto; he was also constantly running late due to his endless commute on public transportation. so, he created a faster method of personal transportation using recycled thermoplastics as the main manufacturing material — the PET MINI electric skateboard.
[...]
leão took inspiration from the anatomy of an armadillo for the electronics enclosure by designing a series of modular pieces along the bottom of the board. this allows for both the protection of the electronic components, and also maintains the flexibility of the deck — giving it the comfortable ride necessary for the city. other commercial products lose the deck’s flexibility, making it a rough ride through different urban terrains.
StreetComplete is an Android app that makes it fun and easy to contribute to open data by completing quests.
Quests are used to fill in incomplete or inaccurate information on OpenStreetMap, an open data project dedicated to mapping the world through crowdsourcing. Anyone can contribute to the map and, thanks to free culture and open source licenses, that data can then be used by anyone for anything, from video games to custom map applications and artwork.
[...]
Download the app to your phone from F-Droid or Google Play. It’s licensed under GPLv3.
We propose a new vision for scientific publishing that starts with reversing the relationship between authors and publishers. Under this system, authors would be able to make their research freely accessible to everyone immediately. Journal editors would compete to publish it, but publication would not be the end of the story: researchers could continue to update their papers for years afterwards. Nor would publication be the aim of the game: the incentives, recognition and reward systems would not depend on where a paper is published, but rather on its contents and the extent to which it advances knowledge.
This is already starting to happen. The number of preprints is increasing daily, and most journals now facilitate the submission of papers to preprint servers via their own submission systems. Others have appointed preprint editors to screen preprints and solicit submissions, adopting scoop protection policies that commit them to disregarding, in their editorial decisions, any competing papers published after submission of the paper or preprint.
Years ago IBM coined the term First Failure Data Capture (FFDC). Capture enough data about a failure, just as it occurs the first time, so that reproducing the failure is all but unnecessary. An observability framework is a set of tools that enable system administrators to monitor and troubleshoot systems running in production, without interfering with efficient operation. In other words, it captures enough data about any failure that occurs so that a failure can be root-caused and possibly even fixed without the need to reproduce the failure in vitro.
Of course, FFDC is an aspirational goal. There will always be a practical limit to how much data can be collected, managed, and analyzed without impacting normal operation. The key is to identify important exceptional events and place hooks in those areas to record those events as they happen. These exceptional events are hopefully rare enough that the captured data is manageable. And the hooks themselves must introduce little or no overhead to a running system.
The trace point facility
The trace point facility, also known as ftrace, has existed in the Linux kernel for over a decade. Each static trace point is an individually-enabled call out that records a set of data as a structured record into a circular buffer. An area expert determines where each trace point is placed, what data is stored in the structured record, and how the stored record should be displayed (i.e., a print format specifier string). The format of the structured record acts as a kernel API. It is much simpler to parse than string output by printk. User space tools can filter trace data based on values contained in the fields (e.g., show me just trace events where "status != 0").
Each trace point is always available to use, as it is built into the code. When triggered, a trace point can do more than capture the values of a few variables. It also records a timestamp and whether interrupts are enabled, and which CPU, which PID, and which executable is running. It is also able to enable or disable other trace points, or provide a stack trace. Dtrace and eBPF scripts can attach to a trace point, and hist triggers are also possible.
Trace point buffers are allocated per CPU to eliminate memory contention and lock waiting when a trace event is triggered. There is a default set of buffers ready from system boot onward. However, trace point events can be directed into separate buffers. This permits several different tracing operations to occur concurrently without interfering with each other. These buffers can be recorded into files, transmitted over the network, or read from a pipe. If a system crash should occur, captured trace records still reside in these buffers and can be examined using crash dump analysis tools.
My quest is to build beautiful things that help change the world, and I’ve been fortunate to spend the last 15 years in Silicon Valley, working with some of the major players shaping all sorts of technology. Today, I’m super excited to join SiFive - the company I believe is best positioned to transform the silicon industry, to lead the Platform Engineering team. With experience building and leading large-scale production systems that power our industry, I’m looking forward to making the dream of customized chips a reality with SiFive’s amazing team of engineers.
The end of Moore’s Law is a profound time, leading to new accelerators, new demand for custom ASICs, and new opportunities - and I believe that it is time for the semiconductor industry to change its approach to innovation. This industry has been defined by proprietary technologies that are difficult to use, don’t interoperate well, and have poor user experience. I believe that open tooling, world class engineering, and a focus on end-to-end user experience can transform the industry. Similarly, the RISC-V architecture pro-vides unique opportunities for SoC customization at every level. This is only possible with SiFive’s ambi-tious design methodology, which is unmatched in the industry.
My background includes experience creating and leading a number of large-scale technologies, including compiler technologies like the LLVM Compiler Infrastructure project, the Clang C and C++ compiler, the MLIR machine learning infrastructure, and others. I also spearheaded the creation of Swift - a program-ming language that powers Apple’s ecosystem - and led a team at Tesla that applies a wide range of tech in the autonomous driving space. Most recently, I built and managed an array of AI-related compiler, runtime, and programing language teams for Google Brain and TensorFlow.
This move for Chris comes after serving at Apple more than a decade where he led their LLVM-based toolchain efforts as well as developing the Swift programming language, a brief stint at Tesla focusing on their Autopilot software, and then for the past two and a half years has been at Google. At Google is where he was working on TensorFlow and the Machine Learning IR and other compiler-related efforts.
The Django migration system is great for modifying your database schema after a database is live. If you’re like me, you quickly end up with many 10s or 100s of migrations.
Modern day added formatting. Mostly Markdown, sometimes Restructured Text.
Scratch is a visual programming language developed by the Lifelong Kindergarten Group at the MIT Media Lab. Scratch teaches programming concepts to kids, offering a stepping stone to more complicated programming languages. Coding includes dragging and dropping various code blocks and linking them together like jigsaw pieces to form logical scripts. While the MIT Media Lab designed this language for 8-16 year-old children, it’s used by people of all ages.
Scratch has received many plaudits as an ideal way to introduce kids to computer programming and computational thinking. It’s a fantastic beginner’s language. Scratch is often used to make games, interactive stories, and animations, but it can be used for any purpose. The language uses event-driven programming with multiple active objects. The language helps students to think creatively, reason logically, and work together. The language is frequently used in schools, libraries, community centers, and museums.
Scratch is released under an open source license.
In a chilly conference room at the San Francisco's Hyatt Regency on Monday, legal and digital security pros convened at USENIX's Enigma conference to hold forth on security, privacy, and related matters.
Following a discussion panel on encrypted messaging, the talk turned to mitigating the risks that come with using third-party code, external vendors, and crowdsourced advice.
Those risks became more apparent in the security problems spotted in a series of software libraries over the past few years.
In August last year, a Ruby software package called rest-client was found to be sending credentials to a remote server. In November, 2018, the NPM module event-stream was modified to steal cryptocurrency. There were similar incidents in July last year involving the NPM module electron-native-notify and in September, 2017, when the PyPI, the repository for Python software packages, was found to be hosting malicious software libraries.
The problem starts when companies forget to pay off the debt and let it accumulate and pile up. For good software developers, it is totally demoralizing to work on products that have high tech debt. This aspect isn’t often talked about but it’s effects are very real. Simple things like changing a title tag of a webpage page takes up a whole day because the logic was scattered in five different files. At the end of the day, it’s not a great feeling that it took so much time for a small task. It’s even more upsetting when they have to explain it to their managers, colleagues or the product team why it took so long. Troubleshooting a bug is not just difficult but also painful. Jeff Atwood called it a major disincentive to work on a project: [...]
In this post, I want to start sharing some of the design principles I discovered for making these scripts robust, generic and flexible. This is part of a series on building your own 'data mirror', and there are also more posts to follow!
After ~12.5 years at Google and ~10 years working on Go (#golang), it's time for me to do something new. Tomorrow is my last day at Google.
Working at Google and on Go has been a highlight of my career. Go really made programming fun for me again, and I've had fun helping make it. I want to thank Rob Pike for letting me work on Go full time (instead of just as a distraction on painfully long gBus rides) as well as Russ Cox and Ian Lance Taylor and Robert Griesemer and others for all the patience while I learned my way around. I've loved hacking on various packages and systems with the team and members of the community, giving a bunch of talks, hanging out in Denver, Sydney, MTV, NYC, at FOSDEM and other meet-ups, etc. While I've learned a bunch while working on Go, more excitingly I discovered many things that I didn't know I didn't know, and it was a joy watching the whole team and community work their (to me) magic.
The maintainer of the Actix web framework, written in Rust, has quit the project after complaining of a toxic web community - although over 100 Actix users have since signed a letter of support for him.
Actix Web was developed by Nikolay Kim, who is also a senior software engineer at Microsoft, though the Actix project is not an official Microsoft project. Actix Web is based on Actix, a framework for Rust based on the Actor model, also developed by Kim.
The web framework is important to the Rust community partly because it addresses a common use case (development web applications) and partly because of its outstanding performance. For some tests, Acitx tops the Techempower benchmarks.
The project is open source and while it is popular, there has been some unhappiness among users about its use of "unsafe" code. In Rust, there is the concept of safe and unsafe. Safe code is protected from common bugs (and more importantly, security vulnerabilities) arising from issues like variables which point to uninitialized memory, or variables which are used after the memory allocated to them has been freed, or attempting to write data to a variable which exceeds the memory allocated. Code in Rust is safe by default, but the language also supports unsafe code, which can be useful for interoperability or to improve performance.
LANraragi is a web application for archival and reading of manga/doujinshi. It's lightweight and Docker-ready for NAS/servers. There is even a standing offer from the author to send out a free sticker pack for the first person to run the linux/s390x docker image on a real IBM System 390.
Several YAML modules allow loading and dumping objects. When loading untrusted data, this can be a security vulnerability, if this feature is enabled.
Damian Conway is back from sabbatical: in the second week of March, they will be giving some very interesting courses in Switzerland: Presentation Skills courses, redesigned language-neutral versions of the “API Design”, “Better Coding Practices” courses and a free half-day seminar on Raku on 12 March!
This week I’m joined by Kelly Paredes and Sean Tibor, the hosts of the Teaching Python podcast. Join us as we discuss the benefits of learning Python outside of the code itself, and what it’s like to learn Python when you’re not planning to become a professional developer. So, without further ado, let’s meet Kelly and Sean!
We didn’t intend to cut this release but changes in the way the latest OSX works meant that code highlighting didn’t work correctly. We also managed to apply a fix to an annoying bug relating to where Mu set the current working directory for scripts run in Python3 mode.
OSX Catalina has posed a number of problems, from the incorrect rendering mentioned above, to the way the application should be installed and problems with permissions when flashing a BBC micro:bit.
The simple answer to the installation story is, once you’ve installed Mu in your Applications folder, you should first open it with CTRL-click (not a double click) and select the “Open” button in the resulting pop-up. Subsequent runs of Mu can be started in the usual “double click” way. If you don’t do the “CTRL-click” trick you’ll see a pop-up complaining about Mu not being checked for malicious software.
I’m a self-taught programmer, a high school dropout, a core CPython developer, and a former PSF Board Director from Amsterdam, The Netherlands. I’ve been playing with computers for a long time, starting when my parents got a Commodore 64 with a couple books on BASIC, when I was 6 or 7. I learned a lot by just playing around on it. Then in 1994 I discovered the internet, while I was still in high school. This was before the days of the World Wide Web or (most) graphics, but I was sucked in by a programmable MUD, a text-based “adventure” environment, called LambdaMOO. LambdaMOO lets you create your own part of the world by making rooms and objects, and programming their behaviour, in a programming language that was similar to Python (albeit unrelated to it). One thing led to another and I dropped out of high school and got a job at a Dutch ISP (XS4ALL), doing tech support for customers. A year later I moved to the Sysadmin department, where I worked for ten years. I gradually moved from system administration to programming, even before I learned about Python.
Besides working with computers I also like playing computer games of all kinds, and non-computer games like board games or card games. I do kickboxing, and I have a bunch of lovely cats, about whom I sometimes tweet. I’m pretty active on IRC as well, and I’m a channel owner of #python on Freenode. I also keep ending up in administration-adjacent situations, like the PSF Board of Directors and the Python Steering Council, not so much because I like it but because I don’t mind doing it, I’m apparently not bad at it, and it’s important stuff that needs to be done well.
Python is the most reliable and renowned content management system for websites of any kind to create dynamically attractive web resources for their uses.
Python has got everything that developers can ask for to provide reliable user experience to end consumers and develop the business online.
For any website, maintaining the quality of the images becomes challenging because the high-quality image would result in the slow loading speed of the landing pages, which might result in poor user experience.
There are many tools available online that can compress the images and makes them uploadable on the website. However, the resulted images would often lose all the visual appeal after they are compressed through an online tool.
Unless you have been hiding under a rock, you have probably used Google Translate on many occasions in your life. Whenever you try to translate a word or a sentence from a certain language to another, it is the Google Translate API which brings you the desired results in the background. Though you can translate anything by simply going to the Google Translate web page, you can also integrate Google Translate API into your web applications or desktop programs. The best thing about the API is that it is extremely easy to set up and use.
You can actually do a lot of things with the help of the Google Translate API ranging from detecting languages to simple text translation, setting source and destination languages, and translating entire lists of text phrases. In this article, you will see how to work with the Google Translate API in the Python programming language.
In this course, you’ll learn about Python modules and Python packages, two mechanisms that facilitate modular programming.
Modular programming is the process of breaking a large, unwieldy programming task into separate, smaller, more manageable subtasks or modules. Individual modules can then be put together like building blocks to create a larger application.
Learn how to write and import modules so you can optimize the structure of your own programs and make them easier to maintain and grow.
I am using typing at my work project and now trying to use it for my personal or freelance projects only if it is not a one-time script. No sense to invest time in the 15-minute thing. And why you should use it too. Lots of people like Python because it provides a fast way to build software. But on the other hand, after some time of the team development, it can be hard to understand the code for the team members. Especially, for the new ones. I do personally believe that it increases the readability of the code. Seems to me that it is even more about self-documenting the code, not about the type checking. However, yes, it helps to find some obvious bugs. My favorite example is a variable called data. Is it a list? Or maybe a dict? Or maybe something custom? Looks like that you need to invest some time in figuring this out. And probably repeat it one more time in a month or two.
This is the 23rd article in my series of articles on Python for NLP. In the previous article of this series, I explained how to perform neural machine translation using seq2seq architecture with Python's Keras library for deep learning.
In this article we will study BERT, which stands for Bidirectional Encoder Representations from Transformers and its application to text classification. BERT is a text representation technique like Word Embeddings. If you have no idea of how word embeddings work, take a look at my article on word embeddings.
Like word embeddings, BERT is also a text representation technique which is a fusion of variety of state-of-the-art deep learning algorithms, such as bidirectional encoder LSTM and Transformers. BERT was developed by researchers at Google in 2018 and has been proven to be state-of-the-art for a variety of natural language processing tasks such text classification, text summarization, text generation, etc. Just recently, Google announced that BERT is being used as a core part of their search algorithm to better understand queries.
In this article we will not go into the mathematical details of how BERT is implemented, as there are plenty of resources already available online. Rather we will see how to perform text classification using the BERT Tokenizer. In this article you will see how the BERT Tokenizer can be used to create text classification model. In the next article I will explain how the BERT Tokenizer, along with BERT embedding layer, can be used to create even more efficient NLP models.
Note: All the scripts in this article have been tested using Google Colab environment, with Python runtime set to GPU.
There are two types of people in the world: those who can wait to open a package they’ve received, and people like me, who need to see what’s inside this very second.
PyCharm isn’t delivered in the mail though, and that’s why we have something even better for impatient people. The early access program (EAP) shows you what’s in the package a couple months before you get it. Take a sneak peek, and get PyCharm’s first EAP now!
Last week we held a special webinar for “Advanced Debugging in PyCharm”. Special how? In person, in the St. Petersburg office, with the two PyCharm team members in charge of the debugger, and a huge webinar audience. The recording is now available.
The town of Vorkuta, situated in the permafrost belt about 110 miles from the Arctic Ocean, was founded by the Vorkuta River after large coal deposits were discovered in the area. The first detachment of prisoners was dispatched to the spot in the early 1930s, and they soon constructed a workers’ settlement known as Rudnik. By the start of the Stalinist Terror, the area was already home to one of the biggest and harshest camps in the Soviet Gulag: Vorkutlag (which included the Rechlag camp for political prisoners). In 1943, the many settlements around the coal mines, where the high salaries also attracted workers from across the USSR, were reorganized into the town of Vorkuta, now Europe’s easternmost city.
On January 26, Vsevolod Chaplin died in Moscow at age 51. He was among the most publicly visible and controversial members of the Russian Orthodox clergy. Initial reports indicate that Chaplin had a heart attack immediately outside the entrance to the Cathedral of St. Fyodor the Studite, where he had been archpriest since 2016. Between 2009 and 2015, Chaplin essentially served as the spokesperson for the entire Russian Orthodox Church. When he was dismissed from that post, the clergymen threw in his lot with the opposition — specifically, with its most extreme right-wing and left-wing members. Alexey Kovalev asked Biblical Studies scholar Andrey Desnitsky and political analyst Alexey Makarkin, who frequently clashed with Chaplin, to illustrate his often self-contradictory character and the way his views shifted from liberalism to extreme conservatism.
Coroner’s officials worked to recover victims’ remains Monday from the hillside outside Los Angeles where a helicopter carrying former NBA superstar Kobe Bryant and eight others crashed in a wreck that aviation experts said may have been caused by the pilot becoming disoriented in the fog.
Pushing pixel values in either direction is one thing. Merging the corrections so they blend seamlessly together on the whole is another. We’ve seen that Lab or non-linear RGB allow the pixels to be pushed more or less correctly, but that it is always when doing mask blending (aka occlusion) and feathering (aka blurs) that we’re paying the price. It turns out there are a lot of blurs under the hood of darktable, sometimes where you don’t expect them. It’s especially problematic when you’re compositing, e.g. inlaying one image within another, to exchange their background without touching the foreground. And it’s precisely this kind of manipulation that led the movie industry to migrate to a scene-referred linear workflow about twenty years ago.
So darktable is in transition. It’s long, it’s sometimes painful, there are a lot of little bits to change in different places along with grumbling users who are hungry for consistency. At least now you know the why and the how. You also know what you have to win. I hope this helps you move forward.
For new users, limit yourself to the above recommended modules, and venture further when you begin to be comfortable. For older users, the new modules have a lot to offer to you, but old Lab modules are still relevant for moderate creative effects and when used with knowledge of their dangers.
Recently, Survival International, the organization that campaigns with ‘tribal peoples,’ ran a story about the Indian conglomerate, Adani Group, setting up a Tribal Residential School for children in Bankishole, Baripada, in Mayurbhanj District in Odisha State – a region in Eastern India known for its tribal communities. Adani is best recognized internationally for its mining activities, particularly its recent struggle to get a mine authorized in coal-addicted Australia in the face of massive popular protests.
A recent commentary promoting agriculture by Brenden Weiner of the Gallatin Valley Land Trust was full of misinformation.
Industry-friendly regulators are letting chemical companies flood the country with toxins. It should be a scandal.
U.S. stocks fell sharply Monday, sending the Dow Jones Industrial Average down by more than 450 points, as investors grappled with fresh worries about the spread of a new virus in China that threatens global economic growth.
"The Trump administration's policy could quite literally kill people by making them too afraid to seek life-saving medical care, and the Supreme Court seems to agree such a cruel system is acceptable."
"When so many people can't get the care they need even when they have insurance coverage, it says that insurance is not doing what it is supposed to do: ensure that healthcare is affordable when you need it."
"The present system of production is self-destructive; the present course of human civilization is suicidal."
Earlier this month, President Trump claimed credit€ for new figures from the American Cancer Society showing€ “the sharpest one-year drop in cancer death rate ever recorded” between 2016 and 2017.
Donald Trump on Friday became the first sitting president in U.S. history to attend the so-called March for Life, the annual anti-abortion rally held in Washington, D.C., that draws thousands of participants. President Trump — who once described himself as “pro-choice in every respect” — accused Democrats of infanticide and falsely stated that Virginia Governor Ralph Northam supports an abortion bill that would “execute a baby after birth.” The March for Life began in 1974 in response to the landmark 1973 Supreme Court ruling in Roe v. Wade, which guaranteed the constitutional right to abortion. Past U.S. presidents who opposed abortion considered the march too extreme and divisive to attend, and instead sent surrogates or recorded video messages. The same day that Trump addressed anti-abortion activists in Washington, his administration threatened to cut off federal funding for some health programs in California unless the state ends its requirement that private health insurers cover abortions. California Governor Gavin Newsom said the state would not change its policy. Trump’s Education Secretary Betsy DeVos also recently compared anti-abortion activism to the fight to end slavery. We speak with Fatima Goss Graves, president and CEO of the National Women’s Law Center.
These days, it might seem like algorithms are out-diagnosing doctors at every turn, identifying dangerous lesions and dodgy moles with the unerring consistency only a machine can muster. Just this month, Google generated a wave of headlines with a study showing that its AI systems can spot breast cancer in mammograms more accurately than doctors.
But for many in health care, what studies like these demonstrate is not just the promise of AI, but also its potential threat. They say that for all of the obvious abilities of algorithms to crunch data, the subtle, judgment-based skills of nurses and doctors are not so easily digitized. And in some areas where tech companies are pushing medical AI, this technology could exacerbate existing problems.
Veterans of Foreign Wars, a prominent veterans group with more than 1.1 million members, called on the president to apologize for his comments.
"TBI is a serious injury and one that cannot be taken lightly. TBI is known to cause depression, memory loss, severe headaches, dizziness and fatigue — all injuries that come with both short- and long-term effects," VFW National Commander William "Doc" Schmitz said in a statement. "The VFW expects an apology from the president to our servicemen and women for his misguided remarks, and we ask that he and the White House join with us in our efforts to educate Americans of the dangers TBI has on these heroes as they protect our great nation in these trying times. Our warriors require our full support more than ever in this challenging environment."
Many people organize their data into folders to quickly find what they want. The Windows operating system comes with default folders for images, videos, and downloads for example that many users of Windows use.
Windows does not really provide good easily accessible options to compare the contents of two folders; this is especially the case if root folders contain hundreds of even thousands of files and folders.
A new ransomware called Ragnarok has been detected being used in targeted attacks against unpatched Citrix ADC servers vulnerable to the CVE-2019-19781 exploit.
Last week, FireEye released a report about new attacks exploiting the now patched Citrix ADC vulnerability to install the new Ragnarok Ransomware on vulnerable networks.
When attackers can compromise a Citrix ADC device, various scripts would be downloaded and executed that scan for Windows computers vulnerable to the EternalBlue vulnerability.
If detected, the scripts would attempt to exploit the Windows devices, and if successful, inject a DLL that downloads and installs the Ragnarok ransomware onto the exploited device.
The CARIN Alliance is meeting with the Office of Management and Budget (OMB) on Monday, January 27, 2020 at 3:00 pm ET in Washington, D.C., and representatives from Apple and Microsoft will be attending via phone. Apple is an official CARIN Alliance Board Member and what transpires on Monday could affect Apple's work positively regarding their Health Record-Sharing Platform beyond their current work with the U.S. Department of Veterans Affairs.
But it’s clear that as prevailing sentiment about big tech companies has darkened, tech CEOs see increasingly little value in having meaningful public conversations. Instead, they grit their teeth through every question, treating every encounter as something in between a legal deposition and a hostage negotiation.
We saw this in 2018, when the New Yorker profiled Mark Zuckerberg. We saw it again last year, when Jack Dorsey went on a podcast tour. At some point this year Tim Cook will probably give a zero-calorie interview to someone, and if it’s a slow-enough news day I’ll write this column for a fourth time.
BT is seeking to challenge the dominance of Huawei over the industry by throwing its weight behind a new “open source” approach to buying essential network gear, the chief executive of Openreach has claimed.
Clive Selley, who runs BT’s separate Openreach broadband business, said the company was seeking to push back against the existing industry structure in which a handful of suppliers, including China’s Huawei, Sweden’s Ericsson and Finland’s Nokia, hold too much power over a highly consolidated market.
“We are trying to challenge them,” he told The Telegraph in an interview last week.
“Because what you really want is a mix and match approach. We are trying to provoke the industry to move in that direction – more ability to mix and match [suppliers].”
We have tracked Cloudera from the very beginning and have watched as it has continually innovated in ways that help both enterprises and the open source community deliver more value. They started off on a mission to make Hadoop safe for the enterprise and then built upon that solid foundation to create full spectrum solutions for data management, security, machine learning and advanced analytics that will work on-prem, in the cloud or across hybrid clouds while maintaining security and business context of the data.
The team of Hydro Protocol, an open-source framework for building decentralized exchanges, has now open-sourced three project libraries it found most useful for interacting with the Ethereum blockchain.
Beyond the three libraries open-sourced today, Hydro Protocol says more will be coming in the months ahead in an effort to give back to the community.
Listed below are the first three libraries open-sourced. Utilized by the Hydro Protocol team daily, the tools could be useful to a wide spectrum of blockchain developers and enthusiasts.
H2O.ai, the open source leader in artificial intelligence (AI) and machine learning (ML), today announced that its open source platform, H2O, provides critical machine learning capabilities to MarketAxess, the operator of a leading electronic trading platform for fixed-income securities and the provider of market data and post-trade services for the global fixed-income markets. MarketAxess’ Composite+, powered by H2O open source, delivers greater insight and price discovery in real-time, globally, for over 24,000 corporate bonds. Composite+ has won several awards for its use of AI including the Risk Markets Technology Award for Electronic Trading Support Product of the Year and the Waters Technology American Financial Technology Award for Best Artificial Intelligence Technology Initiative.
Today, the Xen Project is happy to welcome XCP-ng as an incubation project. XCP-ng is a fully open-source virtualization platform and is a result of the massive cooperation between individuals as well as companies. XCP-ng fits well into the Xen Project ecosystem for many reasons. In the past, the Xen Project was primarily focussed on providing code to system integrators, such as distros. Consequently, the project never connected well with it’s end-user community. XCP-ng includes some key features inherited from Xen Project as the ability to live migrate VMs without interruption, scalability and security but also brings a whole new ecosystem as a modern Web-ui (Xen Orchestra), compatibility with recognized solution on the market (eg. Netdata) and turnkey installer to ease the adoption. XCP-ng provides a central, validated distribution that delivers Xen. Why is this important? It’s a streamlined way for users to gain access and creates a default go-to solution for the community. The inclusion of XCP-ng with its large and active user community into the Xen project creates a bridge between users and developers. The healthy flow of knowledge sharing ensures input from end-users gets incorporated into new releases.
Intel has joined CHIPS Alliance, the consortium advancing common and open hardware for interfaces, processors and systems. To foster broad adoption, Intel said it is contributing the Advanced Interface Bus (AIB) to CHIPS Alliance.
CHIPS Alliance is hosted by the Linux Foundation to foster a collaborative environment to accelerate the creation and deployment of open SoCs, peripherals and software tools for use in mobile, computing, consumer electronics and IoT applications.
Intel is joining CHIPS Alliance to share the Advanced Interface Bus (AIB) as an open-source, royalty-free PHY-level standard for connecting multiple semiconductor die within the same package. This effort should encourage an industry environment in which silicon IP can be developed using any semiconductor process as a “chiplet,” and easily integrated with other chiplets into a single device to deliver new levels of functionality and optimization, the consortium said.
The Linux Foundation, the nonprofit organization enabling mass innovation through open source, and the Open Source Technology Improvement Fund (OSTIF) today announced a strategic partnership to advance security for open source software (OSS) that has become critical to the world’s infrastructure.
The organizations will bring together and build on a depth of their experience supporting security audits for widely deployed open source communities. This formal and strategic agreement will allow the Linux Foundation to augment its work on security audits, of which it has already invested more than $1m across more than 20 security audits for open source projects to date, by including audit sourcing experts through OSTIF’s network. OSTIF will share the resources available through the Linux Foundation’s Community Bridge, a funding and support ecosystem for developers and projects, with its community to help fundraise for new audits.
“The Linux Foundation’s ability to fundraise across industries to support thousands of developers around the world is unprecedented,” said Amir Montazery, vice president of development at OSTIF. “The Linux Foundation is a pioneer in open source software and one of the few organizations taking the actions required to truly support it for generations to come. We are excited to join forces and increase our collective impact on improving critical software.”
As part of the strategic partnership, The Linux Foundation will appoint Mike Dolan, vice president of strategic programs, to the OSTIF Advisory Board.
Data is valuable only insofar as you can trust it. If you can’t be confident about its origin or contents, then the information isn’t worth much.That’s a big problem for businesses eyeing the 5G future and developing strategies for monetizing data generated at the edge. Project Alvarium, formed under the Linux Foundation, aims to help organizations disrupt today’s edge business model by quantifying the privacy, accuracy, and security of data flowing into their networks using trust fabrics.
[...]
“The concept of a trust fabric will increasingly become critical in order to make reliable and non-damaging business decisions due to the ever-increasing volume and velocity of edge data, as well as the increasing risk of tainted data going undetected,” said Michael Morton, chief technology officer at Boomi.
Project Alvarium doesn’t reinvent the trust insertion technologies that make up a DCF. Rather, the project focuses on system-level trust, unifying existing and emerging technologies under a framework with open APIs to create refined confidence scoring algorithms.
Looking to aid developers who rely on external software components, Microsoft has introduced a source code analyzer, Microsoft Application Inspector, to help surface features and other characteristics of source code.
Downloadable from GitHub, the cross-platform command-line tool is designed for scanning components prior to use to assist in determining what the software is or what it does. The data it provides can be useful in reducing the time needed to determine what software components do by examining the source code directly rather than relying on documentation.
A new variant of the Mushtik botnet has been found attacking routers using the open-source Tomato router firmware with about 4.600 routers currently exposed on the internet.
Musthtik has been operating since March 2018 using a worm-like propagating ability to infect and harvest Linux servers and IoT devices. The good news is the new variant uses its botnet for only a few tasks, cryptocurrency mining as to launch DDoS attacks and it has not been spotted injecting any additional malware onto a system, said Palo Alto Networks Unit 42.
[...]
“Botnet developers are increasingly compromising IoT devices installed with the open source firmware, which often lack the security updates and maintenance patches necessary to keep devices safeguarded. End users should be cautious when installing open source firmware and must follow the security guidelines in the firmware manual,” Unit 42 said.
Working with Terraform infrastructure-as-code can sometimes be a bit of a headache when it comes to tracking security misconfigurations and compliance violations, but now Fugue has open sourced their Regula tool to assist engineers with maintaining vigilance. Let’s take a closer look.
Last week, cloud infrastructure security and compliance solution provider Fugue open sourced one of their tools called Regula. From the press release, it “is a tool that evaluates Terraform infrastructure-as-code for security misconfigurations and compliance violations prior to deployment. Regula rules are written in Rego, the open source policy language employed by the Open Policy Agent project and can be integrated into CI/CD pipelines to prevent cloud infrastructure deployments that may violate security and compliance best practices.”
Security updates have been issued by Debian (iperf3, openjpeg2, and tomcat7), Mageia (ansible, c3p0, fontforge, glpi, gthumb, libbsd, libmediainfo, libmp4v2, libqb, libsass, mbedtls, opencontainers-runc, php, python-pip, python-reportlab, python3, samba, sysstat, tomcat, virtualbox, and webkit2), openSUSE (java-11-openjdk, libredwg, and sarg), Oracle (sqlite), Red Hat (libarchive, nss, and openjpeg2), Scientific Linux (sqlite), SUSE (nodejs6), and Ubuntu (cyrus-sasl2, linux, linux-aws, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux, linux-aws, linux-oem, mysql-5.7, mysql-8.0, tcpdump, and tomcat8).
One of the biggest issues that IoT has is keeping everything secure. Putting devices online is a double-edged sword: it allows benevolent useful services to connect to it, but it can also allow malicious agents to harvest data from it.
This was proven a few days ago when a list of 500,000 IoT credentials made their way onto the Internet. The list was posted on a hacker forum for anyone to see and use.
A review of the National Vulnerability Database (NVD) shows the number of vulnerabilities contributed to the database is increasing year over year. Let’s be clear. This doesn’t mean that code development is getting worse. To the contrary, the industry is doing a better job of paying attention to finding and reporting issues and, in addition, to finding fixes that address problems. We see this as a trend that will continue into 2020 and beyond.
Likewise, developers are spending a significant amount of time both reviewing and remediating vulnerabilities as opposed to innovating and improving their applications. Technical debt is more than ever moving to the forefront of application development as engineers are dealing with security issues that were once dormant or unknown but because of raised awareness are now being discovered.
The accused leaker of CIA phone hacking tools -- the "Vault 7" collection released by Wikileaks in early 2017 -- is still awaiting trial. To pass the time, alleged leaker Joshua Schulte is suing the government for $50 billion and, apparently, generating a whole lot of evidence against himself.
The New York Times’ recent story on Clearview AI, maker of a secretive facial recognition app that markets its product to law enforcement, has raised critical questions about what can be done to protect our privacy online. Clearview claims to have amassed a dataset of over three billion face images by scraping websites like Facebook, YouTube, and Venmo.
The solution to the Clearview problem is clear: comprehensive federal privacy legislation that gives consumers real power over their data and real power to fight back.
I was preparing to do something for Data Privacy Day on January 28th, when I discovered something truly alarming…
On January 15, a Norweigian Consumer Council (NCC) investigative report exposed the ways that Grindr, OKCupid, and eight other apps are collecting and sharing extremely sensitive personal data. Grindr in particular was sharing users’ age and location tied to a device ID that would allow trackers to match that information to a real identity.
A third-party advertising company called MoPub, owned by Twitter, was responsible for much of the technology that Grindr used to collect and share data. In response to the NCC report, Twitter announced that it was suspending Grindr’s ad account pending an investigation into “the sufficiency of Grindr’s consent mechanism.”
Avast used to collect the browsing history of their users without informing them and turn this data into profits via their Jumpshot subsidiary. After a public outcry and considerable pressure from browser vendors they decided to change their practices, so that only data of free antivirus users would be collected and only if these explicitly opt in. Throughout the entire debacle Avast maintained that the privacy impact wasn’t so wild because the data is “de-identified and aggregated,” so that Jumpshot clients never get to see personally identifiable information (PII).
[...]
How Amazon would deanonymize this data
The example used by Ondà â¢ej VlÃÂek makes it very obvious who Avast tries to protect against. I mean, the address identifier they removed there is completely useless to me. Only Amazon, with access to their data, could turn that parameter value into user’s identity. So the concern is that Jumpshot customers (and Amazon could be one) owning large websites could cross-reference Jumpshot data with their own to deanonymize users. Their patent confirms this concern when explaining implicit private information.
But what if Amazon cannot see that addressID parameter any more? They can no longer determine directly which user the browsing history belongs to. But they could still check which users edited their address at this specific time. That’s probably going to be too many users at Amazon’s scale, so they will have to check which users edited their address at time X and then completed the purchase at time Z. That should be sufficient to identify a single user.
And if Jumpshot doesn’t expose request times to their clients or merely shows the dates without the exact times? Still, somebody like Amazon could for example take all the products viewed in a particular browser history and check it against their logs. Each individual product has been viewed by a large number of users, yet the combination of them is a sure way to identify a single user. Mission accomplished, anonymization failed.
How everybody else could deanonymize this data
Not everybody has access to the same amounts of data as Amazon or Google. Does this mean that in most scenarios Jumpshot data can be considered properly anonymized? Unfortunately not. Researchers already realized that social media contain huge amounts of publicly accessible data, which is why their deanonymization demonstrations such as this one focused on cross-referencing “anonymous” browsing histories with social media.
And if you think about it, it’s really not complicated. For example, if Avast were collecting my data, they would have received the web address https://twitter.com/pati_gallardo/status/1219582233805238272 which I visited at some point. This address contains no information about me, plenty of other people visited it as well, so it would have been passed on to Jumpshot clients unchanged. And these could retrieve the list of likes for the post. My Twitter account is one of the currently 179 who’s on that list.
The US government has officially thrown its weight behind the rollout of FHIR, mandating in 2020 that all medical providers who receive government funding make patient data available through FHIR-compatible apps. This move cements an unspoken alliance between Big Tech and Big Brother that has repeatedly seen the former deployed to circumvent troublesome constitutional restrictions imposed on the latter. The government may not be able to violate Fourth Amendment provisions against unreasonable search and seizure, but if, say, the FBI wants access to a target’s health records, it no longer has to show up at their doctor’s office with a warrant – those records will be sitting in an unsecured corporate database on the cloud, if history isanyguide. Unless the medical records industry seriously overhauls its idea of what constitutes information security, patient data will be fair game for everyone from the NSA to the lowliest basement-bound [cracker].
Americans’ health data is supposed to be protected under a law called HIPAA (Health Insurance Portability and Accountability Act) that, at least in theory, [...]
First up is a four pack of Tile Sticker for $40. That’s the all time low for this bundle, which often sells for $55 to $60. Tile Sticker is a small Bluetooth beacon that can be slapped on pretty much anything. It has a three-year battery life and a 150-foot range.
Ring isn't just a product that allows users to surveil their neighbors. The company also uses it to surveil its customers.
An investigation by EFF of the Ring doorbell app for Android found it to be packed with third-party trackers sending out a plethora of customers’ personally identifiable information (PII). Four main analytics and marketing companies were discovered to be receiving information such as the names, private IP addresses, mobile network carriers, persistent identifiers, and sensor data on the devices of paying customers.
In the early 2000s, a series of civil lawsuits against giant corporations illustrated the disastrous consequences that could ensue if a defendant failed to provide electronic evidence such as company emails or records. In one suit against tobacco giant Philip Morris in 2004, U.S. District Judge Gladys Kessler concluded that the company deliberately deleted troves of emails that contained incriminating information. She fined the company $2.7 million for the breach, levied $250,000 fines against each of the company supervisors found culpable and barred them from testifying at the trial.
Big corporations rallied for changes and got them. In 2006, the rules that govern federal litigation were changed to create a “safe harbor” that would protect companies from consequences for failing to save electronic evidence as long as they followed a consistent policy and, when put on notice of imminent litigation, preserved all relevant materials.
The Amazon-owned video doorbell uses third-party trackers to serve up rich data to marketers without meaningfully notifying users.
Amazon’s Ring Doorbell app for Android is a nexus for data-harvesting, according to an investigation by the Electronic Frontier Foundation (EFF). Privacy advocates allege Ring goes so far as to silently deliver updates on Ring customer usage to Facebook, even if the Ring owner doesn’t have a Facebook account.
While countries like Russia, China and North Korea have invested in developing powerful, tailored cyber weapons, Saudi Arabia has instead opted to purchase them, according to experts and former government officials.
The Middle Eastern nation’s cyber arsenal is believed to be primarily composed of outsourced espionage tools, which it has combined with disinformation tactics on social media, they said.
However, the rejection of Wahhabism inside Saudi Arabia and its use as a tool of soft power abroad — the Saudis spent tens of billions of dollars, starting in the 1970s, promoting it — is the most positive global ideological change since the fall of communism. From pop concerts to women driving, art exhibitions to mass tourism, the ending of sex segregation to the neutering of the religious police: for those of us who lived in the kingdom when Wahhabism hung over everything like a toxic cloud, the changes are breathtaking.
Baqi's horrific tale illustrates that women are not the only victims in Pakistan of so-called "honor crimes" -- a scourge of violence that has included acid attacks, blinding, and murder by relatives of victims accused of dishonoring their families.
Baqi says he was attacked after his 73-year-old father, Dost Mohammad, learned about his intention to marry the woman he loves. He says his father refused to consent to the marriage because the couple had gotten to know each other by speaking on the telephone during the previous three years.
The future of transatlantic co-operation in criminal investigations will be discussed when the foreign secretary meets his US counterpart in London tomorrow.
Dominic Raab will discuss the refusal of the US to extradite Anne Sacoolas to face charges over the death of Harry Dunn with the US Secretary of State Mike Pompeo at their bilateral dinner and talks.
Mr Raab is also under pressure to withhold British co-operation in the case of Jeffrey Epstein — a convicted sex offender whose friendship with the Duke of York is of interest to the FBI — and to resist the extradition on espionage charges of Wikileaks founder Julian Assange.
Around the world, dozens of theoretically sovereign nations are hopelessly in debt to a global financial system that is rigged to benefit multinational corporations. Those corporations strip these places of all of their natural resources, like gold, diamonds, oil, bauxite and rare earth elements.
And once the materials are extracted from the earth, they are sent to the cheapest place on the planet to mould them into sellable products — wherever has the most lax labor and environmental regulations at the moment. Then, to grow and protect the wealth generated by this process, they park their revenues in off-shore tax jurisdictions.
And with their hidden billions, they leverage their financial power to protect the vast political and economic system that made this miserable scheme possible to begin with. You see their influence in our media, the academy, philanthropy, popular culture, and of coruse in our politics. Like the smog from the planet's burning forests, it covers everything and fills our lungs.
Former actress Louise Linton deleted an Instagram post praising teenage climate change activist Greta Thunberg, who her husband Treasury Secretary Steven Mnuchin publicly criticized last week for lacking a college degree.
"I stand with Greta on this issue. (I don't have a degree in economics either.) We need to drastically reduce our use of fossil fuels. Keep up the fight @gretathunberg," Linton posted Saturday alongside a split-screen image of Thunberg and her husband. She later deleted the post.
Mnuchin aroused controversy last week after he told reporters at the World Economic Forum in Davos, Switzerland, that he did not consider the outspoken Thunberg to be a legitimate critic of fossil fuel investments.
364 Amazon employees gave one or more quotes below.
The tide is turning against the fossil fuel industry as countries and companies recognise the green business boom of alternative energy.
Let me betray my age for a moment. Some of you, I know, will be shocked, but I still read an actual newspaper. Words on real paper every day. I’m talking about the€ New York Times,€ and something stuck with me from the January 9th edition of that “paper” paper. Of course, in the world of the Internet, that’s already ancient history — medieval times — but (as a reminder) it came only a few days after Donald Trump’s drone assassination of Iranian Major General Qassem Suleimani.
"This framework should really be called the Dirty Future Act. In every way possible, Pallone's proposal fails to address the climate crisis."
The journal rolled out a "stellar set of ambitions," said climate group Divest Parliament.
The new effort will focus on utilities' monopolies and reliance on fossil fuels.
Flight shaming has been tacitly welcomed by policymakers and many media commentators, who promote train travel as a more sustainable form of transport, despite decades of underinvestment in Europe's rail networks and much lower passenger approval rates on lateness, overcrowding and cancellations than for airlines.
And while most people agree that the public's addiction to flying has to be tackled — after all, air travel is the most individually polluting form of transportation — many are loathe to acknowledge that our rail systems are ill-prepared to welcome an onslaught of new passengers.
Earlier this month we€ discussed€ how during Australia’s devastating fires, conservatives tried to claim that it was green party forest management policies that were to blame. That is, of course, wrong. It throws us back to 2018 in the U.S., when Secretary Ryan Zinke€ and others€ wrongly€ blamed environmentalists€ for California's wildfires and Trump wrongly blamed€ a lack of raking.
Are we all Australians yet?
The former vice president says he advocated for cuts to the safety net program "20 years ago," but his track record shows otherwise.€
Russia’s Central Election Commission has begun logistical preparations for a nationwide vote on a series of radical changes to the country’s Constitution proposed by President Vladimir Putin.
Think tanks in the United States and Cuban researchers agree on one thing: the policy of more sanctions and the extension of the U.S. blockade will not change the socialist course of Cuba.€ In the case of the island, punishment produces the exact opposite of weakness. It has been that way for more than 60 years and nothing indicates that it will change, just because Donald Trump wants to win Florida in 2020 and satisfy the Cuban-American right by raising his fist against the government of Miguel Díaz-Canel.
"It's bad enough that President Trump's and congressional Republicans' GOP tax scam betrayed workers—it's even worse that they're lining their own pockets off it."
Last week, as Donald Trump was trying to distract attention from his impeachment trial, he was holding events touting his big trade victories. The two items for celebration were the new NAFTA, dubbed by Trump as the U.S.-Mexico-Canada Agreement, and a “phase one” trade deal with China. While these deals may be useful props for the impeachment distraction, they are unlikely to offer much to the manufacturing workers who Trump claims are at the center of his trade agenda.
The 2010 landmark ruling in Citizens United amplified the influence of deep-pocketed Wall Street stockbrokers and private investors in federal politics and rewarded them with greater political purchasing power.
By the time Donald Trump was condemning environmentalists as the “perennial prophets of doom”€ in Davos, his impeachment trial was opening in Washington. But quite by chance, at that very moment, I was reading a new edition of a book by a child survivor of the 1915 Armenian Holocaust which, hauntingly and poetically, said more about America than anything Trump – or Congress – could ever utter.
The Payment Services Act, which comes into force Tuesday, is the first comprehensive regulation for companies handling activities ranging from digital payments to trading of tokens such as Bitcoin and Ether. As well bringing crypto firms into the regulatory fold, the law will hand the Monetary Authority of Singapore formal supervisory powers for cyber security risks and controls on money laundering and terrorism financing.
Some memes last a day. Others live on for years, forever finding new quirks and variations to keep them floating across the interwebs. The Woman Yelling at a Cat meme, derived from a frame in The Real Housewives of Beverly Hills, falls into the latter category. In fact, Meduza’s readers Russian-speaking named this blond human-feline pair the best meme of 2019. It’s no wonder that the image’s recent ventures into high art have brought Russian and Ukrainian visual traditions right along with them.
Former Culture Minister Vladimir Medinsky was excluded from the new cabinet composed by Russian Prime Minister Mikhail Mishustin. While Medinsky’s former subordinate, Olga Lyubimova, took over his portfolio, the ex-minister became an aide to President Vladimir Putin. On January 27, Kremlin Press Secretary Dmitry Peskov told journalists that in Medinsky’s new position, he will be charged with curating state policy on history and the humanities.
"We got Wall Street nervous. We got the insurance companies nervous. We got the drug companies nervous. We got the fossil fuel industry nervous. We got the military-industrial complex nervous."
"This town, man."
"Our people are waiting,€ Rep. Cuellar.€ Debate me."
Perez's nominations clearly show that the swamp seems in it to win for itself, regardless of the electoral outcome for the nation.
"Roberts' job is to preside over a fair trial, where relevant witnesses are heard from and jurors actually listen to the evidence. Right now, he's helping Republicans break the rules and cover for Trump. That has to end."
On January 19th the New York Times oddly co-endorsed Senators Elizabeth Warren and Amy Klobuchar for the Democratic presidential nomination. Two days later, the key New Hampshire primary showed Warren down four points. Bernie Sanders’ surge continued. What happened?
The youth movement is on the ground in New Hampshire€ showing the nation how it's done.
"We are citizens of the United States of America, and we must indeed unite together to stop this GOP cover-up."
For a job well done, the nation should be grateful. But…
On January 20, comedian and podcast host Joe Rogan mentioned that he’ll “probably vote for Bernie” Sanders in the Democratic Party’s presidential primary. Rogan cited Sanders’s decades of “consistency” as a “very powerful structure to operate from.”
Palestinians are under Israeli military rule and are being deprived of basic human rights, including the right to have citizenship in a state.
Britain and the USA have had close ties, echoes and parallels from our start, some very good, others nasty. One of the latter may now be threatening. Jeremy Corbyn’s rise in Labour Party leadership offered great hopes for a leftward turn in Britain, away from the worrisome policies of Boris Johnson.
"The knives are out."
An array of lobbyists, corporate consultants, think tank board members, party operatives, and pro-Israel Democrats were nominated to the 2020 Democratic National Convention committees by Democratic National Committee Chair Tom Perez.
Shadowproof editor Kevin Gosztola shared a thread that explored many of these individuals. Quite a few have connections to Bill and Hillary Clinton’s presidential campaigns. Very few have any connection to Senator Bernie Sanders’ 2016 presidential campaign.
Bernie Sanders was off the campaign trail over the weekend, stuck in the Senate for impeachment hearings, but if polling is any indication, that didn’t stop his campaign’s momentum. A New York Times/Siena College poll of Iowa Democratic voters shows 25% of respondents would vote for Sanders in the Iowa caucus on Feb. 3. A poll from Boston’s Emerson College of Iowa Democrats and independents found 30% of respondents planning to vote for him.
It’s long been obvious that Republican senators have little interest in serving as impartial jurors in the impeachment trial of Donald Trump. While there is a raft of motivations for such historic perfidy — with several GOP senators politically benefiting from some of the same corrupting influences — one under-examined, non-Russian reason is personal greed.
We’re 10 months away from the 2020 election. While the stakes are incredibly high and the electorate is more polarized than it has been in decades, Americans’ faith in the legitimacy of the outcome is low — and not without reason. There’s evidence that the forces that sought to influence the electorate in 2016 are at it again, and attempts to shore up the cyber defenses of local election systems have had uneven results.
Crucially, in a vacuum of trustworthy facts, questions about election integrity, fraud and security can be answered by dishonest players with a stake in the outcome. Local newsrooms, reeling from new rounds of belt-tightening and layoffs, are less able to sustain the effort necessary to cover a fast-moving, complex, technical and data-rich story by themselves.
Let me betray my age for a moment. Some of you, I know, will be shocked, but I still read an actual newspaper. Words on real paper every day. I’m talking about the New York Times, and something stuck with me from the January 9th edition of that “paper” paper. Of course, in the world of the Internet, that’s already ancient history — medieval times — but (as a reminder) it came only a few days after Donald Trump’s drone assassination of Iranian Major General Qassem Suleimani.
“We are their worst nightmare,” Sen. Bernie Sanders said Sunday of the corporate and establishment forces allied against his presidential campaign — and the diverse grassroots movement fueling it — as a new Iowa poll showed the Vermont senator leading the 2020 Democratic field by nine points just a week ahead of the state’s Feb. 3 caucuses.
Of course President Donald Trump should be impeached. In fact, impeachment proceedings should have been initiated as soon as he took office and enacted the Muslim travel ban, or perhaps even before this, as he was in clear violation of the emoluments clause of the Constitution. But what has been frustrating as news of Trump’s impeachment has taken over headlines is not just the fact that Democrats waited until the final year of his first—though perhaps not his last—term in office, or that they ignored calls to “impeach the motherfucker,” as advised by Michigan Rep. Rashida Tlaib.
Calls are growing for the Senate to call witnesses in President Trump’s impeachment trial, after The New York Times published details about former national security adviser John Bolton’s forthcoming book. In the book, Bolton writes that President Trump personally told him in August that he wanted to maintain a freeze on $391 million in security assistance to Ukraine until Ukraine turned over materials related to former Vice President Joe Biden and supporters of Hillary Clinton in Ukraine. The New York Times broke the story on Sunday, one day after President Trump’s legal team began its defense of the president. During Saturday’s opening arguments, White House deputy counsel Mike Purpura claimed the Democratic case for impeachment is based on assumptions, and Trump’s attorney Pat Cipollone accused the Democrats of attempting to overturn an election. Trump’s lawyers will continue their opening arguments Monday, after the Democratic House impeachment managers wrapped up their three days of opening arguments on Friday. We speak with Dan Friedman, a reporter in the D.C. bureau of Mother Jones who focuses on foreign influence and national security.
Other teams that appeared to be impacted by the [attack] on Twitter were the Dallas Cowboys, the Philadelphia Eagles, the Houston Texans, the New York Giants, the Chicago Bears, and the official Twitter account of the NFL.
Prior to having its account suspended, OurMine tweeted out a running list of teams that had been [cracked] on Monday, noting that it had also successfully accessed the Instagram accounts of the Dallas Cowboys, the Buffalo Bills and the Minnesota Vikings.
The Vikings also had their Facebook account compromised, with OurMine tweeting they had also [cracked] the Facebook accounts of the Green Bay Packers, the NFL, the Buffalo Bills, the Dallas Cowboys and the Houston Texans.
Still, there have been times when Bonnell wondered aloud whether the American population is cognitively equipped to govern itself. As he said to one viewer, rather frankly, “I think that people in general are stupid, and I’ve actually lost my appreciation for democracy at this point.” Not too long ago, Bonnell inveighed against efforts to “deplatform” prominent figures on the internet, citing his commitment to freedom of speech. Today he supports, albeit waveringly, the opposite: Those who willingly lie and misinform at great scale should be silenced. His weary cynicism about the ordinary intellect is what you might expect from someone who has spent years trying to get people to change not what they think but how they think. That has always been slow, hard work. And it would be almost understandable, in the midst of so much thankless labor, in a climate so wracked by fear over the dangerous contents of the American mind, to forget why you started in the first place.
It’s been more than three years since Russia’s sweeping and systematic effort to interfere in U.S. elections through disinformation on social media, stolen campaign emails and attacks on voting systems. U.S. officials have made advances in trying to prevent similar attacks from undermining the 2020 vote, but the potential threats have increased and some old problems have not been addressed. A look at what has changed since 2016 and what has not.
Speaking to the PA news agency she explained: "I saw in the last British election so much widespread usage of fake news, disinformation and even suppression campaigns that look very similar, if not worse, than what we saw in 2016.
"Technology has advanced greatly in the past few years and there's now not just one Cambridge Analytica, there are hundreds.
This era of political espionage is rooted in manipulative ads, fake news articles and other forms of digital content, which are hardly distinguishable from facts and truths. Today’s espionage is one of the nation’s greatest threats, especially as we approach the 2020 presidential election, and leaders across industries and sectors need to take action now.
Recent research by the Oxford Internet Institute found that computational propaganda and social media manipulation have proliferated massively in recent years and are now prevalent in more than double the number of countries compared to two years ago. We’ve entered an era where the threat of manipulation on the internet is constant. With the 2020 presidential election looming, it is not only up to the federal government to protect the nation against manipulation campaigns -- the private sector must do its part as well.
We've written several times before about the constitutional challenge to FOSTA in the case Woodhull Freedom Foundation, et al. v. U.S. That challenge hit a roadblock when the district court dismissed that lawsuit for lack of standing by the plaintiffs. Per the district court, the plaintiffs had not been hurt by the statute, nor were they likely to be hurt by it, and thus they had no right to challenge it in the courts. The plaintiffs appealed, and we supported the appeal with an amicus brief.
Buckle up, because here's a wild one. Over the weekend, a ton of people sent me a tweet from "The Sparrow Project" that many people took to mean that Rep. Devin Nunes -- the Congressional Representative who spent much of 2019 filing highly questionable SLAPP suits against news organizations, journalists, political operatives, critics, and, most famously, a satirical internet cow -- has issued a highly questionable subpoena for The Sparrow Project's private Twitter DMs.
Like so many of her friends, colleagues, and admirers around the world, we were devastated to hear of the death of Lina Ben Mhenni at age 36, following a long illness. The Tunisian blogger, activist, athlete, and linguistics lecturer was a friend to several of us.
Amidst a community of determined and brilliant activists, Lina stood out for her compassion, and her relentless dedication to advocating for freedom of expression and women’s and human rights. She was humble but bold, using her real name online to advocate for democracy and human rights at a time when doing so in Tunisia was a great risk.
The New York Times headline was an attention grabber worthy of Sen. Joe McCarthy: “How Amazon, Geico and Walmart Fund Propaganda.” A subhed explained: “Algorithms are sending ads by American brands onto Russian disinformation sites.” The op-ed by L. Gordon Crovitz, a former publisher of the Wall St. Journal, culminated in a sales pitch for his latest venture, NewsGuard. The company’s business plan is to do for internet news sites what Red Channels did for Hollywood movies: maintain a blacklist. Patriotism for personal profit —perfect plan.
As you may recall, last year, Presidential candidate and current Congressional Rep. Tulsi Gabbard filed a laughably silly lawsuit against Google. We pointed out at the time that it had no chance at all, and echoed, quite directly, the debunked claims that some conservatives make about how Google censors them... even though Gabbard is not a conservative politician. It still threw the same kitchen sink of dumb legal arguments into the complaint, arguing that Google was a "state actor" (it's not), and that Google's moderation choices were a violation of California's civil rights law, the Unruh Act.
The stucco wall on Santa Fe’s Old Pecos Trail is now papered with images of Israeli soldiers terrorizing Palestinian women and children. This art was created by Navajo artist Remy at the request of Santa Feans for Justice in Palestine (SFJP), of which I am a member. For the past six years, we have been creating art depicting the conditions of Palestinians under the Israeli occupation. Guthrie Miller, the owner of the wall where the art has been located since 2014, has supported this effort. His wall abuts one of the main thoroughfares leading into Santa Fe, and is also on the cross street leading to Museum Hill, where Native American Art and history are displayed in several prestigious museums.
While Amazon CEO Jeff Bezos was throwing a lavish party at his $23 million mansion in Washington, DC, this weekend—attended by celebrities like Ivanka Trump and Bill Gates—hundreds of his employees were gearing up to revolt.
At issue was the company’s external communications policy and reports earlier this month that it threatened to fire employees for speaking out about climate change without proper authorization. In protest, more than 350 Amazon workers published statements under their own names in a Medium post on Sunday, intentionally violating the policy en masse.
Article 18 said Ismaeil, who was arrested at his home in January 2019, faced two additional charges: “propaganda against the the Islamic Republic”, “membership of a group hostile to the regime”.
A judge said at a November hearing him that criminal chargeof “propaganda against the Islamic Republic” was “applicable”, because he had created a Telegram channel in which he had “promoted evangelical Christianity,” wrote Article 18.
As the head of the secular watchdog l'Observatoire de la laïcité, Nicolas Cadène, told the outlet, blasphemy is not a crime in France, so one can insult a religion, albeit not citizens due to their religious affiliation. This is what allowed writer Michel Houellebecq to be let off the hook in 2002 after having called Islam "the most stupid religion in the world".
Mila’s case, however, has not only sparked debate in France about the freedom of expression, but has also stirred memories of the Charlie Hebdo attack in January 2015, when journalists were killed for having made a caricature about Islam
Seven out of the country’s eight biggest newsrooms said that in the last two years the Chinese embassy had contacted them and criticised their content on China, according to a survey conducted by Swedish national television.
When you consider how emotional, divisive, and deeply high stakes the issues like insurance, pharmaceutical regulation, and the opioid epidemic have become – especially this election year – it's not difficult to see the how how critical the conversation around our care has become. There's a reason patients have lost faith in modern medicine. It's easy to laugh off, or more likely shudder, at Paltrow's "Goop Lab" promise of "optimization of self." But know that this juggernaut exists because of the failures of so many other systems. "This series is designed to entertain and inform, not provide medical advice," the show warns at the top of each episode. But in a world where patients where considered people and medical advice could also be entertaining and informative, we wouldn't be suckers for a Goop Lab at all.
Dozens of prominent independent journalists in Russia have recorded themselves speaking out in defense of Abuldumin Gadzhiev, the Chernovik.net editor now charged with terrorism.
"The most essential journalism of every era," says the NSA whistleblower, "is precisely that which a government attempts to silence."
In Howard Zinn’s play Marx in Soho, Karl Marx remarks, “They are all proclaiming that my ideas are dead! It’s nothing new. These clowns have been saying this for more than a hundred years. Don’t you wonder: why is it necessary to declare me dead again and again?”
The renowned historian Howard Zinn died on January 27, 2010. On the occasion of the 10 year anniversary of his passing, we are revisiting the following piece by whistleblower Daniel Ellsberg about his close friend and “the best human being [he’s] ever known,” originally published on January 28, 2010.€
Kelly’s extensive background in world and national security affairs makes Pompeo’s accusation that she lied about knowing where Ukraine is on a map absurd. Kelly graduated from Harvard and holds a master’s degree in European studies from the University of Cambridge in England.
NPR’s CEO John Lansing defended Kelly saying there are email exchanges with Pompeo’s staff that confirm the pre-approved subject matter that would be covered during the interview.
Lansing also said Pompeo’s behavior and statement, “goes well beyond tension” between journalists and government. Lansing added, “This goes towards intimidation. And let me just say this. We will not be intimidated.”
Last October Attorney General Bill Barr delivered a speech at Notre Dame during which he claimed that “Judeo-Christian moral standards are the ultimate rules for human conduct” and that “the fact is that no secular creed has emerged capable of performing the role of religion.” Barr, like many other Catholic and Evangelical fundamentalists, believes that without the moral standards defined by religion, society is doomed. That simply isn’t true. Look at Sweden and many other countries that are far more secular than American, yet have much lower crime rates. And in America, Christians are 20 times more likely to find themselves incarcerated than atheists. But Barr goes on to say that his moral standards “are like God’s instruction manual for the best running of man and human society.” Are they?
"Parchman Prison is a torture chamber and we cannot afford to be robbed of one more human life at the hands of Mississippi's state corrections system," said Rep. Ayanna Pressley.
Five years ago, an Idaho police department destroyed a woman's house to end a standoff with her dog. The Caldwell PD -- after having been given permission (along with a house key) to enter the home to see if a suspect was in the home -- decided this meant the Shaniz West had given them permission to fire grenade after tear gas grenade into the house before sending in the SWAT team to confront the family dog.
Back in 1941, the year of my birth, fascism stood on the brink of conquering the world. During the preceding decades, movements of the Radical Right—mobilized by demagogues into a cult of virulent nationalism, racial and religious hatred, and militarism—had made great strides in nations around the globe. By the end of 1941, fascist Germany, Italy, and Japan, having launched massive military invasions of other lands, had conquered much of Europe, Asia, and the Middle East.
In his testimony last week in the pre-trial hearing of five men charged with plotting the September 11 attacks on the United States, Dr. James Mitchell vividly described his role in torturing detainees in the program he helped design for the Central Intelligence Agency (CIA).
Sitting less than 25 feet from Khalid Sheikh Mohamed (referred to as KSM), Mitchell gave a detailed description of how Mohamed was waterboarded. Mitchell read aloud details and repeated the questions he asked Mohamed during a March 2003 interrogation session that included pouring 12 liters of water over Mohamed’s nose and mouth. He even claimed that at one point during a waterboarding session “KSM fell asleep on the waterboard” and thus could not have been scared.
As a Chinese studies graduate of the University of Maryland, I was drawn to the news that the school’s president, Wallace Loh, had decided to close its Confucius Institute – the oldest one in the United States. Confucius Institutes, found at numerous US universities, are Chinese government-funded outposts that offer Chinese language and culture classes.
Loh emphasized that the university closed its Confucius Institute because of the US 2019 National Defense Authorization Act, which forces schools to choose between keeping their Confucius Institutes or receiving language program funding from the US Defense Department.
On the 4th of December 2019 the Hindu nationalist Bharatya Janata Party (BJP)-led government of India introduced the Citizenship Amendment Bill (CAB) in parliament. By the 11th of December the bill had been enacted into law after being pushed through parliamentary votes, and signed by the President. The rules of the law are still being written and yet Home Minister Amit Shah announced on the 10th of January 2020 that the Citizenship Amendment Act (CAA) is now in operation. By doing so, the BJP has chosen to ignore thousands of citizens who have been gathering on the streets to protest against the Act since the 4th of December, and who continue to do so in defiance of state and police violence across the country.
Fender has been fined 4.5 million pounds (nearly $6 million) in the UK after admitting to price-fixing. The move breaks competition laws and prevents retailers from discounting instruments.
For the past few months, yet another legislative pillar of the country’s civil rights era, the Fair Housing Act, has been in the Trump administration’s crosshairs. First, in the autumn, the administration unveiled plans to make it harder for tenants, mortgage recipients and community organizations to sue banks and other financial institutions for using algorithms that end up having discriminatory impacts on the basis of race, religion, national origin and other protected categories. Then, a few weeks ago, HUD unveiled additional rule-rewrites diluting the obligation of cities to both develop public infrastructure in poor neighborhoods of color and also to build affordable housing across a range of locales rather than concentrating it all in a handful of places.
Diddy outright slammed the Recording Academy and Grammys in a 50-minute speech.
Tyler, the Creator is happy with his Grammy, but dissatisfied with its categorization.
Juice WRLD was almost entirely ignored the Grammy Awards on Sunday night, partly due to the shocking death of Kobe Bryant. But the rapper wasn’t nominated for any awards, despite a stellar 2019.
The couple said, their marriage had sparked enmity between their families who had declared them Karo-Kari and wanted to put them to death. Ghulam Rasool Bhutto flanked by his wife, told that he had contracted love marriage with a woman, out of his caste.
In 2018, Hillary Clinton told Britain's Channel Four News: "The real question is how did the Russians know how to target their messages so precisely to undecided voters in Wisconsin or Michigan or Pennsylvania–that is really the nub of the question." No, the real question is why so much of the US and European establishment accepted and promulgated Clinton's alibi for her failure to follow her husband into the office of president of the United States. A Clinton or a Bush was president, vice president, or secretary of state in every year between 1981 and 2013, an era in which working-class incomes stagnated, offshoring devastated US and European manufacturing, the world suffered the worst economic collapse since the Great Depression of the 1930s, and the US plunged into multiple disastrous wars in the Middle East and Central Asia. Trump became president by running against a Bush in the Republican primaries and a Clinton in the general election. The desire of many American voters to disrupt the quarter-century cycle of nearly identical versions of technocratic neoliberalism under alternating Bushes and Clintons is quite sufficient to explain the presidential election of 2016.
Most of us, who are Americans or Europeans, would answer with our name, hometown, job, and any other information that helps to locate our unique spot on the socio-cultural grid.
When I describe who I am in enough detail, that description doesn’t fit anybody else.
But that is just one culture’s way of answering the question, “Who are you?” Other cultures answer the question very differently. Consider the answer given by members of the Zulu tribe in South Africa.
If you were to ask an individual Zulu, “Who are you?” they would respond with the word “ubuntu.” This is a word that translates, “I am because you are.” The Zulus have no concept of an individual in isolation. They define who they are through community.
We've noted for a while that the "race to 5G" is largely just the byproduct of telecom lobbyists hoping to spike lagging smartphone and network hardware sales. Yes, 5G is important in that it will provide faster, more resilient networks when it's finally deployed at scale years from now. But the society-altering impacts of the technology are extremely over-hyped, international efforts to deploy the faster wireless standard aren't really a race, and even if it were, our broadband maps are so terrible (by design) it would be impossible to actually determine who won.
Here we are. The year 2020. The future. We've got more Internet-based services than you can shake a stick at. And, yet, with all of these modern advancements… there's one decades old technology that is proving surprisingly useful. And fun. The BBS. Back in the 1980s (and a pretty big chunk of the 90s) most people who did something “On-Line” with their computer were doing so via a modem, a POTS phone line, and a dial-up Bulletin Board System (aka “BBS”).
In the convoluted realm that has become copyright, licensing agreements, and SaaS-style everything, we've had something of a running series of posts that focus on the bewildering concept that we no longer own what we buy. Between movies simply being disappeared, features on gaming consoles being obliterated via firmware update, and entire eBook platforms simply ceasing to work, the benefits of handing over very real dollars have never been more fleeting.
On January 15th, the U.S. and China announced bilateral approval of an agreement resolving some of the trade disputes between the two countries that have developed (or become more evident) over the past three years. One of the most consistent (if sometimes incoherently expressed) policy positions taken by the Trump Administration (and Mr. Trump himself) is that the trade balance between the U.S. and China has been unbalanced and in need of correction. This idea is not unique to Mr. Trump (although its idée fixe nature may be) and has been a feature of the U.S. Trade Representative's Special 301 Report for the past decade (most recently last April). It has been the source of numerous tariffs imposed on China by this Administration (even in the face of criticism from economists and others that U.S. consumers and farmers, not the Chinese, bore the brunt of the consequences and the costs) and the periodic imposition of these tariffs has rattled the financial markets since the time when Mr. Trump first came into office.
[...]
As mentioned above, one interesting feature of the agreement is that many of the provisions setting forth standards for protection of party rights contain the affirmative statement (requirement to requirement) that "[t]he United States affirms that existing U.S. measures afford treatment equivalent to that provided for in this Article," indicating that the negotiators conceded to adopt U.S. standards for intellectual property protection and other matters falling within the scope of the agreement. Indeed, it is difficult to ascertain any concessions made by the U.S. for obtaining China's approval of these terms. There is an aphorism that if a deal seems to good to be true then perhaps it isn't (true, that is). It is contrary to this administration's puffery that the U.S. might not get the better part of any agreement it enters, and when making arrangements with economically weaker partners that may tend to be true because the odds tend to be stacked in our country's favor. But in view of China's strengths it might be foolish to think that the Chinese will be as accommodating as the Trump Administration would prefer them to be, and agreements inconsistent with these realities are likely to be ephemeral.
The new North American trade deal is expected to take centre stage when Parliament returns Monday, marking the first challenge for a Liberal minority government that will need Opposition support to pass legislation.
The House of Commons reconvenes Monday after rising for the holidays in December, giving Canadians their first serious look at Canada's 43rd Parliament in action.
Moving forward with the Canada-United States-Mexico Agreement (CUSMA) will likely dominate the agenda this week when the Liberals table a bill to approve the deal Wednesday.
An issue I’ve frequently been asked to discuss is the ethical constraints on firms to impose restrictions or requirements on departing lawyers — such as precluding a lawyer from doing logistical work on setting up a new, separate firm upon departure — as well as the departing lawyer’s obligations to her clients and soon-to-be-former firm. In addition, migrating lawyers create issues for the new employer, such as imputed disqualification of former client conflicts.
The jury awarded a royalty of $.45 per iPhone 6 & 7. This is less than 0.1% royalty rate ($650 per iPhone 7) but things add up when you sell 200 million units.
This is the second time around on damages. The first jury awarded $145,100,000. However Judge Sabraw gave WiLAN the option of either (1) remitting the damages down to $10 million or (2) holding a new trial on damages. According to the court the problem stemmed from expert opinions regarding apportionment that were not supported by the evidence. Even though it was a single-issue jury trial, the judge still provided the jury with 31 pages of jury instructions: Jury Instructions.
Monsanto Technology LLC (Monsanto) had a registered patent no. 214436 for Nucleotide Acid Sequence (NAS) containing the gene Bacillus thuringiensis (Bt gene). On insertion into DNA of cotton seeds, NAS killed bollworms from inside the seed and therefore reduced the dependence of farmers on insecticides and pesticides.
The dispute between Monsanto and Nuziveedu Seeds Limited (Nuziveedu) started in 2016, when Monsanto issued proceedings in the Delhi High Court for patent infringement. In its reply, Nuziveedu filed a counter-claim challenging the validity of the patent. The trial court held that the patent was prima facie valid. Against the order, both the parties appealed to the division bench of the Delhi HC. This Court revoked the patent on the ground that the said invention was not patentable subject matter under Section 3(j) of the Patents Act, 1970 (the Act), which excludes from patentability “plants and animals in whole or any part thereof other than micro-organisms but including seeds, varieties and species and essentially biological processes for production or propagation of plants and animals”. It opined that the product of Monsanto was more suitably protected under the Protection of Plant Variety and Farmers’ Rights Act, 2001 (PPV). Both parties appealed the decision to the Supreme Court.
On 8th January 2019, the SC remanded the matter to the division bench holding that the Delhi HC was wrong in deciding the validity of the patent merely on the basis of prima facie examination. It held that the question of validity of a patent is a mixed question of fact and law and therefore evidence and expert testimony were to be considered.
[...]
The matter is currently pending before the High Court of Delhi. Monsanto’s patent has already expired, leaving Monsanto’s claim for injunction defunct. The only remedy available to it now is damages, that is, if the NAS is held to be patentable subject matter. Though the decision of the Delhi HC may not have any significance for the immediate parties, it would definitely establish the law for future applications involving NAS-like inventions.
19-522 TRADING TECHNOLOGIES INT’L V. IBG LLC, ET AL. 19-353 TRADING TECHNOLOGIES INT’L V. IBG LLC, ET AL. 19-521 CHARGEPOINT, INC. V. SEMACONNECT, INC. The Supreme Court has denied certiorari in these three eligibility cases largely clearing the docket of pending petitions in patent cases. There are a few remaining:
In an unusual decision, the Federal Circuit has disqualified PerDiem’s appellate counsel – the firm of Davidson Berquist Jackson & Gowdey, LLP – based upon a current client conflict.
The particular problem here stems from Davidson’s simultaneous performance of patent prosecution work for Trimble Transportation Enterprise Solutions, Inc.. Trimble Transport is a wholly owned subsidiary of appellant Trimble Inc (TRMB).
Although Davidson has now withdrawn its representation of Trimble, the court judges current-client conflicts as of the filing of the motion to disqualify. At that time Davidson was representing both Trimble Transportation and PerDiem. Also, because the district court case was litigated in California, California professional responsibility rules control conflict situations.
[...]
Despite my misgivings noted above, this appears to be the right outcome. Representing a client is a pledge of loyalty that is not easily set aside.
Unified is pleased to announce the PATROLL crowdsourcing contest winner, Rakon Nahar, who received a cash prize of $1,000 for his prior art submission for U.S. Patent 8,089,980, owned by Blueprint IP Solutions, LLC, a subsidiary of well-known NPE, IP Edge, LLC. The ‘980 patent was acquired as part of a larger portfolio originating with Siemens, was used in an assertion campaign that started in March 2019 over a network redundancy patent, and has been asserted in district court litigation against various companies.
To help the industry fight bad patents, we have published the winning prior art below.
With the eligibility rubric of Alice v. CLS Bank, an applicant/patentee must navigate a minefield of pre-issuance and post-issuance validity challenges under 35 U.S.C. ۤ 101 in order to obtain and enforce a patent.
First, through clever drafting, the applicant must convince a U.S. Patent and Trademark Office (USPTO) examiner to not raise a ۤ 101 rejection during prosecution. If one is raised, the applicant has to persuade the examiner, through amendment or argument, to withdraw it. If the examiner remains unpersuaded, an appeal to the USPTO's Patent Trial and Appeal Board (PTAB) must serve that function. Failing that, appeals to the Federal Circuit (which applies a highly-unpredictable eligibility analysis) and even the Supreme Court (which has not found a patent eligible since 1981) are possible. To be fair, it is unlikely that the high Court will grant certiorari on a ۤ 101 issue these days, as we have recently seen.
Once issued, the patent might be able to be pulled back into the PTAB for a Post-Grant Review (PGR) or a Covered Business Method (CBM) Review. In addition to that, enforcement proceedings in a district court can subject the patent to further invalidity challenges under ۤ 101 on the pleadings and at summary judgment. If the district court's ۤ 101 decision is appealed, the patent then has to survive said eligibility analysis of the Federal Circuit, the decision of which could potentially be further appealed to the Supreme Court with said unlikely chance of being heard.
Only once these avenues have been exhausted can the patentee relax and use the surviving patent to enjoin a party from practicing the claimed invention or to seek damages therefrom without the specter of ۤ 101 hanging over the proceedings (this specter is one of stock horror-movie fare -- pale complexion, chunks of missing flesh, sharp claws -- quite non-abstract, if you will). And yes, the patent also has to be found novel, non-obvious, properly specified, and infringed.
[...]
Consequently, the Court ruled the '796 patent invalid under ۤ 101 as a matter of law, effectively rendering the jury verdict moot.
For anyone following ۤ 101 jurisprudence, a quick glance at claim 1 was probably enough to provide an educated guess for which way the Court was going to rule. Recent ۤ 101 opinions from the Federal Circuit have repeated found that claims lacking in technical detail -- ones that recite what an invention does rather than how the invention accomplishes its goals -- are generally abstract. This is not the dictionary definition of the word "abstract," but instead a legal fiction that a concrete and tangible invention can be invalid if it is defined in terms of its outcome rather than the process used to achieve that outcome.
Intellectual Property Owners Association (IPO) Board has proposed a “clarifying” amendment to Section 101(a)(1) of the Patent Act:
[...]
EPC Art. 54. Note that 54(1) and 54(2) are parallel to 35 U.S.C. 102(a) while 54(3) is parallel to 102(a)(2) which the IPO does not propose to change. Regarding these secret prior patent application filings identified in 54(3) and 102(a)(2); the European approach is broader than the US in some ways because it creates prior art even when the prior filing is the same inventor / owner; at the same time, the European approach is narrower than the US because 54(3) prior art does not apply to the inventive step (obviousness) analysis.
Starting from the perception of the relevant public (collectively agreed to be the general public of the EU), the Court emphasised the need to assess whether the mark applied for was unrelated to the appearance of the goods.
It was apparent that the classes of goods and services applied for could be made from fabric bearing the pattern or contain fabric parts which might represent or bear the pattern constituting the mark applied for.
The Court drew on Louis Vuitton Malletier v OHIM - Nanu-Nana (T-359/12 and T-360/12 (IPKat analysis here), concerning the representation of Vuitton's chequerboard pattern. As affirmed in that case (and in accordance with earlier case law), the more closely the shape for which registration is sought resembles the shape most likely to be taken by the goods in question, the greater the likelihood of the shape being devoid of distinctive character is. Whilst that case law had been developed in relation to 3D trade marks consisting of appearance the goods themselves, the Louis Vuitton case highlighted that it would equally apply to figurative marks consisting of a 2D representation of that product. As such, a figurative mark consisting of a part of the shape (or characteristic) of a product could not be considered unrelated to the appearance of the goods covered by the mark.
[...]
It is interesting to see Hästens Sängar's mark back on the IP scene, this time in relation to a different type of IP protection. Hästens Sängar previously unsuccessfully applied to the US Copyright Office for protection of a very similar mark, referred to as a “repeating 2-dimensional fabric pattern”. It therefore serves as a good example of how protection can be sought for (virtually) the same mark in various ways, yet still fail to do so (due to a lack of distinctiveness or a lack of originality).
As a side note, this case may also be seen to contribute to wider questions raised around the effectiveness of the EU court system. This Kat couldn’t help but be reminded of a point raised by Sir Robin Jacob when he gave his keynote speech at the JIPLP-GRUR Joint Conference in December 2019. When asked whether there could be any improvements to the EU system, he raised the three stage appeal process for trade mark decisions. In retrospect, the General Court Hästens case was, in effect, a reiteration of all of the remarks made by the Board of Appeal, which nonetheless made a reappearance before the EU courts. To a seasoned trade mark expert, the mark was unlikely to achieve the protection sought.
Obviously, the EU court system is not something that can be changed overnight, nor does this Kat think that this will happen anytime soon. Even so, this acts as an apt illustration of how the process of trade mark registration has the potential to be improved.
The Creative Commons (CC) License Chooser was made nearly 15 years ago and is long overdue for an update. The purpose of the CC Chooser is to help users choose which CC license is right for them and their needs. However, since its release, it has fallen short in a few respects.€
South Korean authorities say they have rquested their first ever Interpol 'Red Notice' in an effort to apprehend the suspected operator of a torrent site that indexed around 455,000 copyright works. Information released by the Ministry of Culture and National Police suggests that the unnamed person is Australian. Police are demanding his or her arrest and extradition.
The operator of YTS has 'settled' another lawsuit, agreeing to a stipulated judgment that includes a $150,000 damages payment. This is the second movie piracy case to be resolved in this manner, allowing the site to remain online. While that appears to be good news, the same filmmakers have also filed new cases against YTS users.
With Brexit rapidly approaching, the United Kingdom has decided it will not enforce the EU’s Copyright Directive.