First up, in our Wanderings, Leo’s chromium based pixels do a dance, Tony Hughes plays with chaos, Moss has a Fuzzyputer, Joe has an idea… pad, and Josh butters his machine.
Then, our news Linux Mint gets some love, the Gorilla’s in beta and so is Fedora
In Security, we chat with Josh
Our secrets for a low-cost bulletproof Nextcloud server that we figured out the hard way. We take you into the "server garage" and share our lessons learned.
We examine the deeper problems in Open Source development the recent Hacktoberfest drama has exposed.
Plus some great feedback, failures to launch, and more.
When you're talking about Linux, everyone is quick to point out that Linux doesn't have Microsoft Office. It's a big part of the Linux desktop's app gap, but there are some solutions there. Most of you probably know of LibreOffice, which is an amazing open source project, but there is another solution, which is suitable for individuals, and professionals alike, and might just be the best choice out there for Linux, and it's called Only Office
U-Boot is a lesser-known Germany boot loader that's actually quite widely deployed on things like embedded devices, Chromebooks, networking gear and SpaceX rockets. The latest v2020.10 has a rather long list of interesting changes considering that it's only been three months since the last v2020.07 release.
[...]
The German U-Boot boot loader is not very popular among GNU/Linux distributions who all use GRUB but it's actually a widely used boot loader found on a lot of networking devices, Chromebooks and even things like hi-end HI-FI equipment.
The latest quarterly U-Boot release has a long list of changes since the last release.
It looks like the upcoming Linux 5.10 kernel cycle will be the first to bring initial support for UEFI booting on RISC-V hardware.
Going back to the beginning of the year there has been RISC-V patches for UEFI support thanks to engineers at Western Digital. Prior kernel releases also saw UEFI clean-ups and other prep work in getting ready for RISC-V CPU architecture support to be added. Now with Linux 5.10 it looks like the first-cut support is ready to go.
While the feature-packed OpenZFS 2.0 is on track for releasing before year's end as the evolution of ZFSOnLinux and now with FreeBSD support and many other improvements in tow, for those riding the ZFSOnLinux 0.8 stable series out today is v0.8.5.
Compared to ZFSOnLinux 0.8.4 from May where support tapped out at Linux 5.6, the 0.8.5 release now supports up through Linux 5.8 while also carrying some tentative fixes for the soon-to-be-minted Linux 5.9.
Synaptics has contributed RMI4 F3A support for Linux 5.10 to better the support for newer laptop touchpads.
Synaptics' RMI4 Function 3A (F3A) is used by newer touchpads for GPIO support, this is needed to support buttons on TouchPads and Clickpads. Among the devices benefiting from the RMI4 F4A support are the likes of the Lenovo ThinkPad X1 Extreme Gen1 and P1 Gen2 laptops.
I'm announcing the release of the 5.8.14 kernel.
All users of the 5.8 kernel series must upgrade.
The updated 5.8.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.8.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...
thanks,
greg k-h
Linaro is working on the DTPF framework for the Linux kernel for meeting legal requirements around the maximum allowed case/contact temperature of devices.
The Dynamic Thermal Power Management (DTPM) framework being worked on for the Linux kernel is a unified interface for dealing with the power of different devices -- namely for mobile hardware and related consumer devices. The DTPM kernel framework would then provide a generic interface to user-space where a daemon is taking into account any application profile(s) and allocating an appropriate power budget to different components.
Nvidia 455.28 display driver adds support for the Nvidia GeForce RTX 3080, Nvidia GeForce RTX 3090, and Nvidia GeForce MX450 graphics cards. If you own any of these GPUs, you can now use it on your 64-bit or AArch64 (ARM64) GNU/Linux distribution or 64-bit FreeBSD operating system, while Solaris is not supported at this time.
Another exciting new feature of the Nvidia 455.28 graphics driver is support for a new, host-coherent and host-visible device-local VkMemoryType that promises a performance boost in various 3D apps and games in Linux, including DiRT Rally 2.0 (DXVK), DOOM: Eternal (Steam Play), and World of Warcraft (DXVK).
Terminator, a feature-packed terminal emulator for Linux, has reached version 2.0 stable.
The application includes features such as split terminals (arranging terminals in grids_, saving and restoring custom layouts, terminal grouping, support for plugins, and customizable keyboard shortcuts.
After more than 4 years of work, the developers have finally finished migrating Terminator from Gtk2 to Gtk3, and from Python2 to Python3, with the latest Terminator 2.0 release.
I have updated the Shutter (screenshot tool) Ubuntu PPA I maintain to support the latest Ubuntu 20.10 Groovy Gorilla, which will be released later this month. The PPA already supported Ubuntu 20.04 and 18.04.
Due to some packages being removed from the Ubuntu 20.10 repositories, I couldn't build the last Shutter stable version for Ubuntu 20.10, so I used the latest Shutter from Git, which removes some dependencies. This Shutter from Git continues to use the old Gtk2 (though a work in progress branch for Gtk3 exists, but it still needs work), but it has enough changes to get it to run on Ubuntu 20.10. However, don't expect it to make it back to the official repositories just yet, because I had to build quite a few of its dependencies in the PPA, due to them no longer being in the Ubuntu repositories.
It has been more than a year since the last official 1.16 release for the GStreamer project. There were good reasons for the long wait for 1.18 as much has changed since the previous release, with the biggest improvement being the move to Gitlab, a more productive environment. This has led to a significant increase in contributors, which now total 300 (200 more than 1.16!). In addition, 1.18 contains almost 4000 commits for only the core GStreamer repositories, as opposed to 3000 in 1.16. A full description of this important release can be found here.
It's been a long time coming but it sounds like it's seriously close now, with the major OpenGL rendering work for Them's Fightin' Herds on Linux being done.
Reminder: originally funded during an IndieGoGo crowdfunding campaign with an initial funding goal of $436K, which was way back in 2015. Linux and macOS support were stretch-goals at $486K, meaning they would only happen if it hit that goal. Once the campaign finished, they managed to raise around $586,346. It then went into Early Access in February, 2018 and released proper in May, 2020 for Windows.
Continuing to be one of the most interesting traditionally-styled real-time strategy games in development, The Fertile Crescent has a major new release available.
This latest release has been in development for a little while, as it expands the gameplay quite a lot. You can now build Walls, Gates and Siege units giving you many more strategic options. The wall system fits in with their watch towers too, so you can connect it all up.
If you need an easy full-screen gaming experience with Linux, perhaps with your main big TV then GamerOS looks to be the next best thing to SteamOS (since Valve aren't currently working on it).
GamerOS, despite the naff naming, is actually genuinely good. An up to date Linux distribution ready out of the box for a somewhat console-like experience. GamerOS 20 was just released, bringing the usual upgrades to things like the Linux Kernel to 5.8.10, Mesa drivers 20.1.8, NVIDIA drivers 450.66 along with updates to their own software and RetroArch 1.9 is included too.
Using the tech built for the likes of CS:GO, Destiny 2, and Dota 2 - Valve has officially rolled out the new Steam Chat Filtering across the rest of Steam.
So now this means you can have a consistent experience across supported games, the Steam desktop client, web, and mobile chat experiences. The key thing is that it's optional, you can turn it off or turn it up as the choice is still mostly down to users on what they want to see. As a default, Valve has turned it on to block "strong profanity and slurs" from people you don't know. These settings can be changed any time here.
Desperados III: Money for the Vultures - Part 2: Five Steps Ahead is out now, further expanding the already fantastic game with more content.
It's the second of three parts that tell the story of a new adventure called "Money for the Vultures", which takes place after the events of Desperados III. So you should have finished the main campaign to enjoy this DLC set, which forms part of the Season Pass or you can buy individually.
With Five Steps Ahead the gang returns to Louisiana to challenge a new member of the DeVitt family. You get to explore a brand new location in the Bayou State, reunite with Isabelle for more Voodoo awesomeness and encounter cunning enemies worthy of your talents.
[...]
If you missed it, official Linux support for Desperados III released back in early September. Our own thoughts on it are still to come later this month after we've played more.
We have released KDSoap 1.9.1
As part of our commitment to cross-platform solutions, KDAB offers developers KD SOAP, a web service access package for Qt applications.
This is a final release in this series, with just a few small changes to ensure continued support for those who want to keep using Qt4. Our next release in a few weeks (Version 1.10) will no longer support Qt 4.
With the release of GNOME 3.38.0, we started producing and distributing bootable VM images for debugging and testing features before they hit any distribution repository. We called the images GNOME OS. The name itself is not new, and what it stands for has not changed dramatically since it was introduced, but let’s restate its goals.
GNOME OS aims to better facilitate development of GNOME by providing a working system for development, design, and user testing purposes.
The main feature of GNOME OS is that we can produce a new system image for each commit made in any of our modules. The ability to have these VM images is truly amazing since we are dealing with hundreds of modules that depend and integrate with each other, and with the lower layers of the OS stack. This effort represents a game changer with regards to being able to automate the boot and session initialization, testing design and implementation changes, catching regressions earlier in the development cycle, and many other possibilities.
In this video, we are looking at Ubuntu MATE 20.10 Beta.
Today we are looking at Ubuntu MATE 20.10 Beta. It comes fully packed with MATE 1.24.1, Linux Kernel 5.8, and uses about 800MB of ram when idling. It is fast, stable, and should be another great Ubuntu MATE release! Enjoy!
In this video, I am going to show an overview of Garuda Linux KDE Ultimate 200831 and some of the applications pre-installed.
When you look at containers, cloud-native, and public cloud in general, they’re all built around open source technologies. Red Hat’s been at the center of open source for 20-plus years. Since then, in the past decade or so, it’s shifted from being about lowering costs to being about innovation.
With open-source, you see innovation not only in the cloud, but in AI and analytics and big data, all of that driven from open source. We’re working with contributors within the community, and we’re also competing with them. For example, Google is one of our best partners in terms of driving Kubernetes upstream. Red Hat OpenShift also competes with Anthos and Google’s Community Solutions. But together, we’re able to drive the evolution of that technology much faster than any one company could do on their own.
Secondly, since open source is available to end-users, standards are emerging around this technology. One of the things about OpenShift is we actually built it around containerization technology since the beginning, back in 2011. At that point, there really weren’t any standards around how containers were built or run. It wasn’t until Docker and Kubernetes emerged that these standards emerged, and Red Hat did as much as anyone to drive those standards in the industry.
The call for proposals is now open for Red Hat Summit 2021 – a three-part experience that includes two virtual components in the spring and summer and a series of in-person events later in the year! We’re inviting our partners, customers, collaborators and community members to submit their proposals for their chance to showcase unique tech perspectives among thousands of open source enthusiasts.
Red Hat, Inc., the world's leading provider of open source solutions, today announced that Pibank, part of Grupo Pichincha, has launched as a digital banking brand in Spain powered by Red Hat OpenShift.
Red Hat has made the industry’s leading enterprise Kubernetes platform, Red Hat OpenShift, available as a managed service across major public cloud providers, including AWS, Google Cloud, IBM Cloud and Microsoft Azure. Red Hat OpenShift Dedicated removes the challenges of managing the underlying infrastructure, enabling IT teams to simply focus on building differentiated services and digitally transforming.
With more than six years managing Red Hat OpenShift across multiple clouds, more than any other Kubernetes or cloud provider, we have gained the expertise to more reliably and cost-efficiently build, manage and operate enterprise Kubernetes platforms. Red Hat OpenShift Dedicated is already used by hundreds of customers for managing mission critical workloads across a wide range of industries, from telecommunications and connected driving to insurance and IT services. Today, we are passing these savings on to you.
In this 32nd edition of the Kafka Monthly Digest, I’ll cover what happened in the Apache Kafka community in September 2020.
Here is the first QSoas quiz ! I recently measured several identical spectra in a row to evaluate the noise of the setup, and so I wanted to average all the spectra and also determine the standard deviation in the absorbances. Averaging the spectra can simply be done taking advantage of the average command:
QSoas> load Spectrum*.dat /flags=spectra QSoas> average flagged:spectra
However, average does not provide means to make standard deviations, it just takes the average of all but the X column. I wanted to add this feature, but I realized there are already at least two distinct ways to do that...
This month I accepted 278 packages and rejected 58. The overall number of packages that got accepted was 304.
I’m from Argentina, and I did my undergrad in software engineering here. I worked for Intel in Argentina for six years – first as an intern and then as a fully-fledged software engineer. Then I received a Fulbright scholarship to do my master’s degree at Carnegie Mellon University in the United States. After finishing my Masters, I went back to Intel and then McAfee for a few more years, and then joined Canonical in 2019 as a Security Generalist.
I was looking for a new challenge. Even though I had more than ten years of industry experience and had been involved in security activities, the prospect of working for the team that makes Ubuntu secure was more than exciting! What’s more, I hadn’t previously been that deeply involved in open source projects. I knew that joining Canonical would offer different learning and career opportunities.
At its core, Hybrid Client is a combination of Software-as-a-Service (SaaS) and hardware. It starts with the Dell systems like its OptiPlex 7070 Ultra platform or Wyse 5070 thin clients, running a highly-customized Ubuntu 18.04 Long Term Support (LTS)-based operating system. However, Dell representatives also told us that basically any Dell system that runs Linux is a good candidate for Hybrid Client, including sleek notebooks like the XPS 13 Developer Edition. Since these systems arrive ready to deploy, this distro should also keep deployment costs down.
8devices’ $79 and up “Mango” module and $219 “Mango-DVK” run OpenWrt Linux on an up to 1.8GHz, quad -A53 Qualcomm IPQ6000 or IPQ6010 SoC with 802.11ax (Wi-Fi 6). The DVK features 2.5GbE with PoE, SFP, and 2x GbE.
8devices has opened pre-orders on a surface-mountable Mango compute module that runs OpenWrt Linux on the Qualcomm IPQ6000 or IPQ6010 “Cypress” networking processors. The $79 Mango module uses the 1.2GHz IPQ6000 and the $99 Mango-I uses the 1.8GHz IPQ6010.
NVIDIA has announced the Jetson Nano 2GB Developer Kit for students, educators and hobbyists. Priced at $59, the Jetson Nano 2GB is designed for teaching and learning AI by creating hands-on projects in such areas as robotics and intelligent IoT.
NVIDIA also announced the availability of free online training and AI-certification programs to supplement the many open-source projects, how-tos and videos contributed by developers in the Jetson community.
Since the official launch of the Elkhart Lake processor family last month, we’ve covered a Pico-ITX SBC, a 3.5-inch SBC, and several CoM’s following SMARC, Q7, COM Express, and other system-on-module standards.
[...]
Vecom SPC-6000 embedded computer support Windows 10 and Linux, and the company provide wallmount mounting bracket, as well as an optional DIN rail mount. The company also highlights the system is optimized for VHub one-stop AIoT Solution Service which supports OpenVINO based AI accelerators and advanced Edge AI applications for faster development of AI powered computer vision applications.
Vecow’s rugged “SPC-6000” system runs Linux or Win 10 an Elkhart Lake Atom x6425RE with up to 32GB DDR4-3200, GbE and 2.5GbE with TSN, 4x USB, 4x COM, 3x M.2, dual 4K displays and an optional VHub AI SDK.
We have seen several SBCs and compute modules based on the new Elkhart Lake Atom x6000E, Intel’s 10nm fabricated follow-on to the 14nm Gemini Lake and Apollo Lake. Now Vecow has unveiled an embedded PC based on one of the TSN- and TCC-enabled Elkhart Lake “RE” models.
With this latest launch at Tuesday, 7:29 am EDT from the Kennedy Space Center in Florida, SpaceX has now launched 775 Linux-powered Starlink satellites. But, via CBS News, only 728 Starlink satellites remain in orbit, according to astronomer Jonathan McDowell's latest Space Report.
[...] To accelerate development, University of Michigan bioengineer Elliott Rouse, director of the neurobionics lab, and colleagues created the Open Source Leg. They report that the Open Source Leg costs $10,000 to $30,000 to build, compared to $100,000 for similar commercial products. [...]
We’re excited to announce the launch of the Arduino Portenta Vision Shield, a production-ready expansion for the powerful Arduino Portenta H7 that adds a low-power camera, two microphones, and connectivity — everything you need for the rapid creation of edge ML applications.
[...]
The powerful Arduino Portenta H7 makes machine possible learning on-device — greatly reducing the communication bandwidth requirement in an IoT application.
while ago, I published my wildly popular1 article How not to make a cup of tea. Casting around for something to write here, it occurred to me that I might write about something that I believe is almost as important as world peace, the forward march of progress, and brotherly/sisterly love: open source projects. There are so many guides out there around how to create an open source project that it's become almost too easy to start a new, successful, community-supported one. I think it's time to redress the balance and give you some clues about how not to do it.
In the world of software-as-a-service (SaaS) and service-based architectures, it's not uncommon for companies to maintain dozens or even hundreds of APIs, often spanning multiple teams, programming languages, and environments. This variability makes it extremely difficult to see what's happening at a high level to prevent changes from having negative impacts.
It's estimated that 40% of large enterprises struggle with challenges to secure, scale, or ensure performance for APIs. Because of this, more and more companies are choosing to adopt a "spec-first development" approach by defining and documenting APIs in an external format like OpenAPI. Storing these documents together in a central location makes it much easier to design, discuss, and approve changes before implementation.
Network Inventory Management collates all network infrastructure data and keeps it up to date, helping to streamline processes that improve operational performance. Network inventory management solutions offer reporting functions, and process modeling to automate work-intensive, back-office processes. With this software the system or network administrator will know what is on their network, how it is configured, and when it changes.
This type of software puts to pasture the antiquated way of tracking network inventory, dispensing with the horrid spreadsheet or word processing document.
Network inventory management software reduces time and costs by helping administrators locate information for every day operational issues. With an up-to-date network inventory there is the basis for optimizing devices to fully exhaust their potential and cost-effectively meet your needs. Another benefit offered by using this type of software is that service provisioning is both faster and more accurate. With increased efficiency comes a more accurate overview of the network.
In June of 2020, Tidelift fielded our annual managed open source survey of technologists.
Over 600 people shared how they use open source software today, what holds them back, and what tools and strategies would help them use it even more effectively.
Organizations are turning to open source during the COVID-19 recession to do more with less. According to the third annual Managed Open Source Survey released by Tidelift, 42% of organizations report their application development budgets were cut while 44% state they are likely to use more open source.
More than two-thirds of organizations say saving time and money is the top reason to use more open source for application development during the downturn (68%), while increasing efficiency of application development and maintenance was cited by almost half of respondents (48%).
The Open Source Initiative is in the middle of growth year which means we're building capacity and hiring staff. We're looking for someone to help us with capacity building, who has experience in both fundraising and relationship management. If you are interested in working with us or you know someone who is, please get in touch!
If you've been on the internet for a very long time or you're just very resourceful, you might remember an early text-sharing protocol called Gopher. Gopher was eventually displaced by the HTTP protocol, which of course is the basis for the modern World Wide Web. For many people, the "internet" and the "World Wide Web" are the same thing, because many people don't consciously do anything online that's not on the www subdomain.
But there have always been a variety of network protocols to share information over an interconnected network: Telnet, FTP, SSH, Torrent, GNUnet, and many more. Recently, there's been an addition to this collection of alternatives, and it's called Gemini.
The Gemini protocol, named after the space mission between the rudimentary experiments of Project Mercury and Project Apollo, is meant to sit peacefully between Gopher and HTTP. It doesn't aim to replace the modern web, by any means, but it does try to create both a simplified web and a modernized Gopher.
Lately, I've been checking out pages on the nascent Gemini protocol, a new application-level protocol for hypertext documents. It falls somewhere between the minimalism of Gopher and the complexity and weight of the World Wide Web.
Chrome 86 is out today as the latest feature release to Google's cross-platform web browser.
Mozilla is a large community, with dozens of projects, from Firefox front-end to localization to addons.mozilla.org to Firefox Hubs to support.mozilla.org, etc. Unsurprisingly, we have many communication channels. Bugzilla and Phabricator, Github issues and Pull Requests, Matrix/Riot/Element (formerly IRC) and Discourse, etc.
Halloween is around the corner and like everything in 2020, it’s probably going to be different this year. Meeting up with friends is fraught, dunking for apples is right out, and going door-to-door for candy?
[...]
Hosting a virtual Halloween party in Hubs is easy. Visit the Hubs website, and click on “Create a Room.” A Hubs room is where you’ll invite your friends to gather. As you enter the room, you’ll need to grant mic permission so that your friends will be able to hear you talk.
About a year ago chutten started the "This Week in Glean" series with an initial blog post about Glean on Desktop. Back then we were just getting started to bring Glean to Firefox Desktop. No code had been written for Firefox Desktop, no proposals had been written to discuss how we even do it.
Now, 12 months later, after four completed milestones, a dozen or so proposal and quite a bit of code, the Project Firefox on Glean (FOG) is finally getting into a stage where we can actually use and test it. It's not ready for prime time yet, but FOG is enabled in Firefox Nightly already.
Over the past 4 weeks I've been on and off working on building out our support for a C++ and a JavaScript API. Soon Firefox engineers will be able to instrument their code using Glean. In C++ this will look like:
Among the many additions in the recent Apache Cassandra 4.0 beta release, virtual tables is one that deserves some attention.
In previous versions of Cassandra, users needed access to Java Management Extensions (JMX) to examine Cassandra details such as running compactions, clients, metrics, and a variety of configuration settings. Virtual tables removes these challenges. Cassandra 4.0 beta enables users to query those details and data as Cassandra Query Language (CQL) rows from a read-only system table.
Here is how the JMX-based mechanism in previous Cassandra versions worked. Imagine a user wants to check on the compaction status of a particular node in a cluster. The user first has to establish a JMX connection to run nodetool compactionstats on the node. This requirement immediately presents the user with a few complications. Is the user's client configured for JMX access? Are the Cassandra nodes and firewall configured to allow JMX access? Are the proper measures for security and auditing prepared and in place? These are only some of the concerns users had to contend with when dealing with in previous versions of Cassandra.
The joint openSUSE + LibreOffice Conference 2020 will take place from October 15 – 17. And there’s lots going on! We’ll have talks, presentations, keynotes, tutorials and much more – see the full schedule for all the details.
On October 4th, the Free Software Foundation (FSF) turned thirty-five years old, and is taking this week to celebrate. Activities will include the launch of a new FSF video, anniversary-themed artwork, and a livestreamed event with special guests from around the world.
On October 4, 1985, Harold Abelson, Robert J. Chassell, Richard M. Stallman, Gerald Jay Sussman, and Leonard H. Tower, Jr. incorporated the Free Software Foundation, Inc. In their application they wrote: "Our hope is to encourage members of the public to cooperate with each other by sharing software and other useful information. [...] In addition, the virtues of self-reliance and independent initiative will be furthered because users of our software will have the plans with which to repair or change it."
Free software gives every person the rights to run, change, share, and contribute to the software, and the FSF believes that these rights also help to support other fundamental rights like freedom of speech, freedom of the press, and the right to privacy. Since its incorporation, the encroachments on computer users that FSF founder Richard Stallman wrote about in his GNU Manifesto, published that same year, have not subsided.
Thirty-five years after the founding of the Free Software Foundation (FSF), its mission is more important than ever, and the organization has grown to fill that need, with multiple departments attending to crucial education, advocacy, and enforcement. Our Campaigns Team sounds the alarm about freedom-restricting developments and creates educational materials to bring more free software advocates to the movement. Our Licensing and Compliance Lab defends the GNU General Public License (GPL) and the thousands of programs distributed under its terms, and is actively building a future in which we can direct people to ethical hardware of any kind through the Respects Your Freedom (RYF) program.
Free software is first and foremost about ethical principles. But we also want everyone to be able to actually live in freedom, and to demonstrate the way free software can be technically excellent. This work is supported by our talented Tech Team, who provide dedicated "bare metal" and virtual machines for the daily operations of the GNU Project and other free software communities, including Web hosting, mailing lists, software repositories, and compiling and testing software packages. The FSF Tech Team is also building a free collaboration site, which will assist free software projects and developers with being able to share their code, as always, in full freedom.
The Free Software Foundation turned 35 on Sunday, ushering in a week-long celebration of its user liberation efforts.
Founded in 1985 by Richard Stallman (who was not-so-oddly absent* from the announcement), the Free Software Foundation (FSF) has its origins in the GNU Project and is all about opening up software for tinkering, studying, and distribution by users.
[...]
The FSF is keen that all should don their sandals and share in the celebration, perhaps by trying out an approved GNU/Linux distribution, or switching out a proprietary app like Microsoft Office for LibreOffice, or Adobe Photoshop for the GNU Image Manipulation Program. Heck, one could even have a crack at GNU Emacs and celebrate a keyboard shortcut or two.
Friday 9 October, from 1600 to 2100 UTC, will see an online anniversary event, to which the FSF is urging its community to submit a two-minute video "sharing your favorite memory about free software or the FSF."
After all, as S Club 7 never said, there ain't no party like a Free Software Foundation party.
This Friday, October 9th, from 12:00 EDT (16:00 UTC) until 17:00 (21:00 UTC), we will host a fun and informative live event with guests from all over the world, to discuss the future of free software and learn from their experiences in different fields driving free software forward.
[...]
It is promising to be a fun, educational, and entertaining event. You can join us via fsf.org, and join the conversation with our speakers live through IRC on Freenode in the #fsf channel; we'll make sure we put the link up prominently on our homepage as well. You can also join the online experience by sending in your own video commemorating the occasion, following the instructions on the LibrePlanet wiki.
This birthday celebration is gratis, and all of our speakers are volunteering their time to create a joyous event where we can share our experiences and knowledge together. The LibrePlanet safe space policy will be followed throughout the event, so please make sure you read it. If this online experience is anything like LibrePlanet 2020, we will have a wonderful event, and we can't wait to see everyone online.
PM2 is a popular daemon process manager for Nodejs with a complete feature set for a production environment, that will help you manage and keep your application online 24/7.
A process manager is a “container” for applications that facilitates deployment, enables you to manage (start, restart, stop, etc..) the application at runtime, and provides for high availability.
In this article, we will show how to monitor Nodejs applications using PM2 from the command line and on the web. This guide assumes you already have PM2 installed on your Linux system and you are already running your Nodejs application using it. Otherwise, check out:
A queue is a collection of items, where the first item added into the list, must be the first item to be removed next. So as items are added to the collection, it is growing in size, i.e. it is growing in length. Whenever any item is to be removed, it must be the first one added. If items are removed continuously, then the next one removed, is the second item; the third is removed afterward, and so on.
After the first item of the original list has been removed, the second becomes the first item. After the second item has been removed, the third becomes the first item, and so on.
A good real-life example of a queue is when people line up to wait for service or good. The first person is served first before the last. However, the queue talked about in this tutorial, is the software queue, as designed in C++.
In basic C++ programming, the data type, e.g., int or char, must be indicated in a declaration or a definition. A value such as 4 or 22 or -5 is an int. A value such as ‘A’ or ‘b’ or ‘c’ is a char. The template mechanism allows the programmer to use a generic type for a set of actual types. For example, the programmer may decide to use the identifier T for int or char. It is possible for a C++ algorithm to have more than one generic type. With, say, T for the int or char, U may stand for the float or pointer type. A class, such as the string or vector class, is like a data type, and the instantiated objects are like values of the data type, which is the specified class. So, the template mechanism also allows the programmer to use a generic type identifier for a set of classes.
A C++ template creates an algorithm independent of the type of data employed. So, the same algorithm, with many occurrences of the same type, can use different types at different executions. The entities of variable, function, struct, and class can have templates. This article explains how to declare templates, how to define templates, and how to apply them in C++. You should already have knowledge of the aforementioned entities to understand the topics covered in this article.
If there is a national sport for programmers, it is reinventing existing things from scratch. This seems to be especially common inside corporations that tend to roll their own rather than, for example, using an existing open source library. If you try to ask around why this has been done, you typically get some variation of this:
Now, there genuinely are cases where this is true, but it mostly happens only in very spesialised cases, such as when you are google-scale, do space engineering or something similar. There might also be legal or regulatory reasons that you must own all code in a product. Most projects are not like this. In fact almost always someone (typically hundreds of someones) has had the exact same problem and solved it. Yet people seem to keep reinventing the wheel for no real purpose. If you ever find yourself in a debate on why people should use existing solutions rather than roll your own, here are some talking points to consider.We can't use off-the-shelf solutions because we have unique needs and requirements that no-one else has.
Pike is an interpreted, general-purpose, high-level, cross-platform, dynamic programming language. Its syntax is similar to C and C++, but it is much easier to learn and use. It can be used for small scripts as well as for large programs.
Pike features garbage collection, advanced data types, and first-class anonymous functions, with support for many programming paradigms, including object-oriented, functional and imperative programming.
Pike can be used to write small and simple scripts, and also for very large programs: the World Wide Web servers Roxen WebServer and Caudium are both written in Pike. Pike’s advanced data types and built-in support for sockets makes it ideal for use in internet applications.
Pike is free software, distributed under the GNU General Public License (GPL), GNU Lesser General Public License (LGPL), and Mozilla Public License (MPL). Pike is available for many operating systems, including Linux, Solaris, OS X and Microsoft Windows.
Here’s our recommended tutorials to learn Pike. IF you want something more substantial, read the book Programming, using and understanding by Fredrik Hübinette.
Python 3.9 is here! Volunteers from all over the world have been working on improvements to Python for the past year. While beta versions have been available for some time, the first official version of Python 3.9 was released on October 5, 2020.
Every release of Python includes new, improved, and deprecated features, and Python 3.9 is no different. The documentation gives a complete list of the changes. Below, you’ll take an in-depth look at the coolest features that the latest version of Python brings to the table.
Python 3.9 is now available–but should you switch to it immediately? And if not now, when?
The short answer is, no, you probably don’t want to switch immediately; quite possibly you can’t switch immediately. To understand why, we need to consider Python packaging, the software development process, and take a look at the history of past releases.
Python 3.9 is the first release since the Python project decided to move to a 17-month release cycle with yearly releases. The new schedule gives major versions like Python 3.9 one and a half years of full support with an additonal three and a half years of security fixes. Work on Python 3.10 begun five months ago and the first alpha preview of that version, scheduled to be released one year from now, was released alongside Python 3.9. Python 3.9 brings a lot of new features to the table. The Python documentation's What’s New In Python 3.9 is a long one.
[...]
The grammar requirements for decorations are far less restrictive in Python 3.9 than they were in previous versions. That change will make maintenance of things like PyQt5 a lot easier. It also makes it easier to read and understand the code. It is now possible to use any expression that would fit in a if or while block as a decorator.
Python 3.9 is released today with a massive list of changes, new features, and more.
After completion of the EuroPython Society General Assembly 2020 last Sunday, we’re happy to announce our new board for the next term:
Anders Hammarquist (Treasurer) Cheukting Ho Francesco Pierfederici Jason C. McDonald Marc-André Lemburg (Chair) Martin Christen (Vice Chair) Nicolás Demarchi Raquel Dou Silvia Uberti
Python is a flexible, efficient, and easy-to-learn programming language that provides a complete way and the liberty to build dynamic systems. Often, developers need to interact with users. The user might enter some data that is used for processing and calculation purposes. For example, for writing a program in Python that calculates the sum of two values, the user enters the values and the program returns the sum value as an output. In this case, it is necessary to take an input from the user to calculate the sum.
This is part of a series of essays I started to write a week ago where I use a few different approaches to implement cheminformatics fingerprint similarity search.
Last Thursday I developed a program which used the BitBound algorithm to do an in-memory search of the uncompressed chembl_27.fps.gz fingerprint file from ChEMBL, containing RDKit Morgan fingerprints.
After the confusion which was caused by a rock band starting to use the name “EuroPython” for themselves a few years ago, which we resolved amicably with the band, we had decided to register for a US trademark in addition to our European CTM mark for “EuroPython”.
We are happy to announce that we have now received the official certificate of the US trademark.
I've been working on a problem that's bugged me for about as long as I've used Python and I want to announce my stab at a solution, finally!
I've been working on the problem of "How do i get this little thing I made to my friend so they can try it out?" Python is great. Python is especially a great language to get started in, when you don't know a lot about software development, and probably don't even know a lot about computers in general.
Yes, Python has a lot of options for tackling some of these distribution problems for games and apps. Py2EXE was an early option, PyInstaller is very popular now, and PyOxide is an interesting recent entry. These can be great options, but they didn't fit the kind of use case and experience that made sense to me. I'd never really been about to put my finger on it, until earlier this year:
Python needs LÃâVE.
What can you do? Solving difficult software problems often requires the ability to reproduce the issue. As the saying goes, you can learn a lot by walking a mile in someone else’s shoes.
If you could access your customer’s account and see what they see, you might be able to deduce what went wrong by seeing the issue for yourself. Django takes the sensible approach of not storing plain text passwords in your database so you can’t log in as your customer. Or can you? With django-hijack, you can impersonate a user account to experience what your customer experiences.
In the remainder of this article, we’ll look at my experience with integrating django-hijack to provide this capability for one of my personal side projects. By the time we’re done, I think you’ll have a good idea of how to add django-hijack to your own project if you need to support your customers by impersonating their accounts.
In an excellent 2018 article aimed at mammal-studying scientists, three specialists described how to make data more easily re-usable.
What’s this all about These booths popping up A harvest of plastic bags The god that took you out of Egypt
The cage wirelessly connects to a smartphone via a Bluetooth signal, which is used to trigger the device's lock-and-clamp mechanism.
[...]
The security researchers said they discovered a way to fool the server into disclosing the registered name of each device owner, among other personal details, as well as the co-ordinates of every location from where the app had been used.
In addition, they said, they could reveal a unique code that had been assigned to each device.
So that makes comparison a bit more difficult. NVIDIA still states “the minimum latency throughput results were obtained with the maximum batch size that would not exceed 15ms latency (50ms for BERT) — otherwise, a batch size of one was used.”. That true except for result marked with * where the latency is over 15ms.
As the number of people in President Trump’s orbit who test positive for COVID-19 continues to grow, we meet a student journalist who is doing what the White House doesn’t want the CDC to do: tracing the contacts of people who may have infected or been infected by President Trump. Benjy Renton, a Middlebury College senior, helped develop a real-time tracking tool to monitor the growing number of people in President Trump’s circle who were exposed or infected with COVID-19. The site is called COVID-19 at the White House and lists over 270 contacts and 25 positive cases, so far. It uses “publicly available information to ensure the American public have access and have the transparency that they deserve,” says Renton.
The ongoing struggle for racial justice. The future for immigrant families. The health and well-being of all Americans. The very fate of our fragile planet. The US faces a crossroads in this year’s elections. Seeking out the stories flying under the national radar, The Nation and Magnum Foundation are partnering on What’s At Stake, a series of photo essays from across the country through the lenses of independent imagemakers. Follow the whole series here.
"The behavior of the first family has endangered not only their own health, but that of the staff."
"Political manipulation of science—this is exactly what so many of us were worried about," said one public health expert.
In a shocking turn of events, Donald Trump’s latest media fabulist, Kayleigh McEnany, who kicked off her new job by telling a whopper to assembled reporters in the White House Press Room, “I will never lie to you,” and who has spent the rest of her tenure to date€ padding President Trump’s resume of 20,000 plus lies since he assumed office, told the truth yesterday.
The long haul.
"How many fathers, mothers, grandparents, daughters, and sons would be alive right now if they would have received even a fraction of the care the president received?"
Twitter did not remove a tweet with the same message, but it added a warning label and restricted interactions with the post.
But no one in the Trump administration seems to understand what public health experts have been preaching for months about how the coronavirus spreads. Nor do they seem care about the Centers for Disease Control’s guidance that anyone who spends more than 15 minutes within six feet of someone who tests positive should isolate for 14 days. Not only is Pence not doing that, he’s been actively campaigning, and is currently gearing up to debate Sen. Kamala Harris at the University of Utah.
“It would be grossly negligent to break quarantine to come out for [the debate], especially after such significant exposure,” Dr. Saskia Popescu, an epidemiologist at the University of Arizona, tells Rolling Stone. “He sat right in front of somebody for a very significant period of time, and that doesn’t even account for any indoor activities. It would go against public health guidance and all of the recommendations that we’ve been giving the public.”
Medical experts immediately took issue with the post. More than 200,000 Americans have died from the virus, and more than 35 million cases have been reported around the world. Dr. Bob Wachter, the chair of the department of medicine at the University of California, San Francisco, said Mr. Trump’s tweet was “breathtakingly callous, inhumane & counterproductive.” Dr. Bernard P. Chang of Columbia University’s department of emergency medicine warned that people should remain afraid of the virus.
But Facebook and Twitter did nothing about Mr. Trump’s post, even though the companies have publicized their coronavirus misinformation policies.
But the point is: People will do a great deal to justify their belief systems, even if it means tolerating a thousand tiny inconsistencies. And Fox News is especially adept at giving people scripts they can use to minimize their discomfort with bothersome, disconfirming facts.
Even if they were to wake up one morning and realize that their thinking about this pandemic had involved some catastrophic errors in judgment, neither Sean Hannity nor Laura Ingraham seems like the type who’d acknowledge them publicly. It’s much more likely that they would quietly consign them to a memory hole. Conceding mistakes requires intellectual humility, which in both of these hosts is in demonstrably short supply; and anyway, what they peddle is certainty, cocksurety of opinion. It’s their brand.
This is not the first time the social media platforms had to take action due to the president attempting to spread false information about the pandemic or upcoming election.
In August, Facebook and Twitter removed a post by Trump for containing false claims about Covid-19. The post contained a video of President during a Fox News interview in which he falsely claimed that children are "almost immune" to the virus.
Tuesday afternoon, Trump tweeted, "REPEAL SECTION 230!!!" He said no more than that, leaving precisely what he was referring to out of the tweet, but it was likely a response to the actions taken by Facebook and Twitter. Section 230 is shorthand for the part of US law that gives tech companies immunity for almost all of their decisions regarding content moderation.
Twitter restricted a similar tweet from Trump, leaving it online but placing it behind a note saying the tweet violated the company’s rules about spreading misleading information.
Of course, individual human decisions are often biased at times too. But AI has the veneer of objectivity and the power to reify bias on a massive scale. Making matters worse, the public cannot understand many of these algorithms because the formulas are often proprietary business secrets. For someone like me, who has spent hours programming and knows firsthand the deep harm that can arise from a single line of code, this secrecy is deeply worrisome. Without transparency, there is no way for anyone, from a criminal defendant to a college applicant, to understand how an algorithm arrived at a particular conclusion. It means that, in many ways, we are powerless, subordinated to the computer’s judgment.
LFS267, developed in conjunction with the Continuous Delivery Foundation, is designed for DevOps engineers, Quality Assurance personnel, SREs as well as software developers and architects who want to gain expertise with Jenkins for their continuous integration (CI) and continuous delivery (CD) activities.
The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the availability of a new training course, LFS267 – Jenkins Essentials.
Security updates have been issued by Fedora (chromium, libproxy, mumble, and thunderbird), openSUSE (perl-DBI), Red Hat (qemu-kvm-rhev, rh-mariadb102-mariadb and rh-mariadb102-galera, rh-maven35-jackson-databind, spice and spice-gtk, and unbound), SUSE (gnutls, java-1_7_0-openjdk, openssl1, and perl-DBI), and Ubuntu (brotli, cyrus-imapd, openconnect, opendmarc, python-urllib3, ruby-rack-cors, spice, tika, and yaws).
Ganot said the attack was likely to have been an SMSC (short message service centre) spoofing attack; this uses the roaming function and the attackers need access to a cellular network that interacts with Israeli networks.
“It’s a rare assault. The hackers send a message from a foreign cell network to an Israeli one, updating the client’s location. For example: ‘The client has just landed in Tbilisi, he has registered with our network. Please route his SMS messages via this network'," Ganot explained.
Ransomware gangs appear to have added another tool to their arsenal in order to extort ransoms from their victims, with some using distributed denial of service attacks to pile on the pressure.
A gang of cyber criminals using SunCrypt, a new addition to the ransomware fold, claim to have staged a DDoS to attack the Irish company Glen Dimplex Home Appliances.
Formerly known as Glen Electric, the company is an electrical goods firm that has its headquarters in Dublin and manufacturing and development centres in the UK, China and a few other countries.
Glen also has branches in North America, Germany, the Netherlands, Japan, Poland, Belgium, France, Australia and Scandinavia.
With the aggressive pace of technological change and the onslaught of news regarding data breaches, cyber-attacks, and technological threats to privacy and security, it is easy to assume these are fundamentally new threats. The pace of technological change is slower than it feels, and many seemingly new categories of threats have been with us longer than we remember. Nervous System is a monthly series that approaches issues of data privacy and cyber security from the context of history—to look to the past for clues about how to interpret the present and prepare for the future.
The platform includes three components at launch. One is Eero Insight, which collects usage data to help ISPs foresee customers’ Wi-Fi issues and address them early. The company estimates that the tool will provide technicians “up to an estimated 30 percent reduction in time spent resolving Wi-Fi issues.”
Palantir started trading Wednesday, choosing to run a seldom-tested direct listing process instead of a traditional initial public offering. The stock closed Friday at $9.20, below the $10 per share it opened at on the New York Stock Exchange, giving the company a market valuation of $15.2 billion.
Named after a set of magical stones in Lord of the Rings, the secretive Colorado-based company was founded 17 years ago by Peter Thiel and CEO Alex Karp, among others. It specializes in data analysis to help organisations spot patterns and identify threats through two products: Gotham and Foundry, which offer clients various flavors of data integration and analytics on a large scale. It has a small but select customer base, primarily in the public sector, including work for the US Department of Defense and the National Health Service (NHS) in the UK.
Like many of its peers in technology, Palantir was reporting a loss at the time of its IPO, with $743 million in revenue in 2019 at a loss of $576 million.
My name is José Bustani. I am honoured to have been invited to present a statement for this meeting of the UN Security Council to discuss the Syrian chemical dossier and the Organisation for the Prohibition of Chemical Weapons. As the OPCW’s first Director General, a position I held from 1997 to 2002, I naturally retain a keen interest in the evolution and fortunes of the Organisation. I have been particularly interested in recent developments regarding the Organisation’s work in Syria.
The Organization for the Prohibition of Chemical Weapons (OPCW) has confirmed that Russian opposition figure Alexey Navalny was poisoned with a Novichok-type toxin.
A Texas Sheriff's Office with a history of questionable hiring practices and a fondness for excessive force deployment has covered itself with infamy again. The Williamson County Sheriff's Office was formerly best known for appearing on Live PD, a "Cops" knockoff that followed deputies around as they enforced the law and -- on one occasion -- tased someone to death in front of Live PD's cameras. (A&E "helpfully" destroyed the footage.)
"It's the first day of the new term and the Supreme Court is already wreaking havoc."
Thomas Muntzer’s name is indelibly inscribed in the blood of the peasants who were slaughtered in the Peasants’ War of 1524-5 in Germany. The German revolutionary and bon vivant, Friedrich Engels, celebrated Muntzer as a proto-revolutionary; streets were named after him in the former Democratic Republic of Germany (he was hated in West Germany). Today there is a minor Muntzer industry amongst Reformation historians. There are many fields carved out in this fertile land; one of them tries hard, perhaps desperately so, to see grave and great revolutionary significance in this mystical and contorted figure. Like the quest for the historical Luther, the quest for the historical Muntzer is alive. In this brief reflection, I would like to focus attention on the vile dispute between Muntzer and Martin Luther. It is offered as a contribution to understanding the violence of contemporary rhetoric in our daily politics.
Yes, when he was running for president, he did indeed€ say: “I could stand in the middle of Fifth Avenue and shoot somebody, and I wouldn’t lose any voters, OK? It’s, like, incredible.”
For me, as a veteran, the events of the past months repeatedly triggered jolts of recognition. But in the aggregate, they depict a country I no longer recognize. First, it was the National Guard in Washington. Then it was the domestic commandos in Portland, wearing the garb of Special Operations forces, who snatched Black Lives Matter protesters off the streets and shot and beat others. In Kenosha and Louisville, my hometown, it was the militias, clad head-to-toe in military kit, looking much like fellow service members and I did in Afghanistan—save for the occasional Hawaiian shirt and the fact that many in the militias are overweight. All along, of course, there have also been the cops, whose weapons, uniforms, and tactics are dangerously militaristic.
That night, I tracked down these Reddit exchanges, and my jaw dropped when I saw how many people and organizations were heavily pushing the possibility of her being trans. But perhaps I shouldn’t have been surprised, given the way such attitudes have gone mainstream. This includes the pediatrician mom whose recent opinion piece for the New York Times was titled What I Learned as the Parent of a Transgender Child. For kids Googling this subject, the overall effect is the equivalent of one big glitter bomb going off on their screen.
She received a backlash online for using the song Doom by artist Coucou Chloe, which includes a Muslim text known as a Hadith.
A massive shortfall in international funding is forcing aid groups to scale back their work in Yemen, a country enduring what the UN calls the world’s “worst humanitarian crisis”.
As of early October, the UN has received $1.3 billion for Yemen, about 40 percent of what it said it needed for the aid operations it intended to coordinate and carry out in 2020. That’s a major drop from the $3.6 billion it received in 2019, when it asked for $4.2 billion.
The UN’s humanitarian coordinator for Yemen, Lise Grande, said in a 23 September statement that “the consequences of under-funding are immediate, enormous and devastating”, noting that food distributions have already been cut and health services shut down. She said more programmes would close in the coming weeks if fresh funding doesn’t materialise. A group of NGOs that work in Yemen has also warned that under-funding “is leaving families vulnerable to malnutrition, disease and death”.
Countries investing in renewables are achieving carbon reductions far faster than those which opt to back nuclear power.
Following the recent discovery of high pollution levels off the coast of Russia’s Kamchatka Peninsula, scientists are reporting that nearly all of the marine life along the seabed (the benthos) of the Avacha Bay has been killed. This was reported to the regional authorities by specialists from the Kronotsky Nature Reserve, the Kamchatka Research Institute of Fisheries and Oceanography (KamchatNIRO), and the Kamchatka branch of the Pacific Institute of Geography, who conducted survey dives in the area.
The COVID-19 pandemic has highlighted the world’s structural dependence on exploitable labour.
Housing shortages are common explanations for the extraordinary increases in both rental and housing prices across all major U.S. cities. The solution then is straightforward: expand the housing stock and prices will fall and reach equilibrium.
"Trump's Senate allies are doing everything they can to ensure Trump's pick for the high court moves swiftly through the approvals process. Where has this urgency been as Americans have languished for weeks without new coronavirus relief?"
The average person may be forgiven for thinking that the South actually won the Civil War. Despite a brief experiment in interracial democracy during the Reconstruction years, for much of its history the region has upheld a regime of brutal racial subordination. In the late 19th century, after the overthrow of Reconstruction, many of its state governments disenfranchised Black men, instituted racial segregation, condoned racial terrorism and violence, and kept a majority of Black and white Southerners economically bound through sharecropping, debt peonage, convict lease labor, and tenancy. By the 20th century, Franklin Roosevelt called the South the nation’s No. 1 economic problem, resistant to unionization and social policies. Even today it leads in indices for poverty and weak educational systems. The Jim Crow South was upended by the civil rights revolution. Yet even in defeat, its language of oligarchy and its opposition to progressive political and economic policies through an appeal to racism has been adopted by the modern Republican Party.
Today, inequality—especially racial inequality—is not only produced through the job market but through people’s ability to hustle.
The futurism of technology discourse is ahistorical and ideological. Tech utopianism disembeds the future from the political economies that produce its social relations, and it obscures the machinations of racial capitalism. When I was recently asked to consider how digital technologies shape “economic opportunity” and the “future of work,” I started by examining what we mean by economic opportunity, and what counts as work.
In lay terms, economic opportunity in the future of work looks like hustling. Hustling traditionally refers to income-generating activities that occur in the informal economy. It has also become synonymous with a type of job-adjacent work that looks like it is embedded in the formal economy but is governed by different state protections, which makes the work risky and those doing it vulnerable.
“Platform entrepreneurs” who trade their labor using a digital platform (like TaskRabbit or Takl) that extracts a portion of that labor in exchange for facilitating payments and promotion between provider and customer are hustling. So are independent contractors who enter arrangements with companies (like Uber, Lyft, or Amazon with its delivery drivers) that provide access to proprietary scheduling-based work in exchange for workers who will accept the risk of not being an employee. Hustling also refers to influencers, who develop personal brands on social media platforms and exchange their share of market capture in the attention economy for discounted products, free goods, and direct-to-consumer sales. While all of these types of hustling can happen in conjunction with waged employment and other forms of entrepreneurship, they all show how the assumption of risk has shifted from states and employers to workers. Today, inequality—especially racial inequality—is not only produced through the job market but through people’s ability to hustle.
Just two weeks before the 2016 election, Donald Trump traveled to Miami to accept the endorsement of the Bay of Pigs Veterans Association. Speaking at a museum in Little Havana dedicated to the paramilitary invasion, he blasted the Obama administration’s normalization of relations with Cuba and lauded those he called “true freedom fighters” in the audience. His efforts to pander to the hard-line Cuban American community seemed a long shot; Trump trailed Hillary Clinton by 3.3 points in the Florida polls, and news reports at the time indicated he was exploring investments in the hotel industry in Cuba. But on November 8, Trump won the state and its critical 29 Electoral College votes by a narrow margin of 1.2 points, paving his way to the White House.
So, could it be that what he’s fearing Is gobs of orange makeup smearing? Could that be why he takes the view That wearing masks is up to you? And why he mocks as sissies those Who cover up the mouth and nose, So even some not in his base Now emulate his unmasked face? A shame so many die so he Can keep his visage blemish-free.
There are only two guns in the current battleground that is the 2020 presidential election, and one of them is in the hands of a Nazi.
Deliberate efforts to suppress the vote in battleground states were not taken seriously enough in 2016. Only after the damage was done did law enforcement officials begin to pay proper attention to the outright lies and crude calculations that were employed in attempts to derail democracy in Detroit and other urban centers.
The importance of accurate information has been all too apparent during the Covid-19 pandemic. Besides charting the devastation of the virus, the World Health Organization has mapped a subsequent “infodemic,” a period of often dangerous and inflammatory misinformation circulating globally. This infodemic has had deadly effects. Donald Trump and Brazil’s Jair Bolsonaro have denied the scale of the pandemic and then peddled false cures, leading to hospitalizations and deaths among people who followed Trump’s advice to drink bleach or take hydroxychloroquine. Indian Prime Minister Narendra Modi got in on the act, claiming that yoga could increase immunity to Covid-19.
We've discussed in the past Yochai Benkler's excellent book "Network Propaganda," (and had Benkler on our podcast) showing (with a ton of data) how the inclination many have to immediately blame social media for the spread of disinformation is, in its own way, misinformation itself. What the research found was that crazy conspiracy theories didn't really spread as fast until they showed up on Fox News. That was basically the catalyst for them to then spread wildly on social media.
In June of 2018, Talia Lavin, then a fact-checker for The New Yorker, found herself in an unusual position for a journalist: She personally became the target of a government agency. She had come under the scrutiny of ICE’s Office of Public Affairs, the public face of the agency that played a central role in President Trump’s crackdown on undocumented migrants. That role was increasingly earning the agency the ire of a growing movement, encompassing a range of opposition from faith groups to members of Congress. A Jewish activist group, Never Again Action, had gone so far as to draw parallels between the disturbingly poor conditions in ICE detention facilities and the concentration camps of the Holocaust. When Lavin saw a tweet from ICE featuring one of its officials, Justin Gaertner, with a cross-shaped tattoo, she wondered if it was the Iron Cross familiar to Nazi iconography. She posted a tweet comparing them. When people began pointing out that it could be another symbol, like a Maltese cross, Lavin promptly removed the tweet. But it was already too late.
Yes, when he was running for president, he did indeed say: “I could stand in the middle of Fifth Avenue and shoot somebody, and I wouldn’t lose any voters, OK? It’s, like, incredible.”
More than four million Americans have already cast ballots, with 28 days to go until Election Day.
Sound materialist analysis (not always satisfying) often adds a little treat at the end. For example, let’s take the Barack Obama rules. Instead of saying Barack Obama was a neoliberal President who largely complied with the general trend of the last half-century of consolidating wealth, privatizing industry, and using imperialism and capitalism together to continue the expansion of a an earth wrecking growth model, period, we hear something more like Barack Obama was a neoliberal and he was black just to fool everyone.
The whole Trump nightmare summed up in a week and a half.
ARD, also known as Channel One, is the main state-run broadcaster in Germany. On 7 October it will start showing the third season of Babylon Berlin. In order to prepare the German audience for the third season, ARD has put together a 44-minute documentary which highlights the true political and financial circumstances of the time. Not only is it informative, but it sheds light on a company and person that even Germans who know their own history quite well were not aware of: Alfred Hugenberg and the Hugenberg-Konzern (Hugenberg Corporation).
The House of Donald’s Populist Tweetocracy instructs us daily how sharing doesn’t matter and that taxes are for losers, those impecunious citizen-suckers who can’t afford a lawyer who charges less than the claimed deductions. Tax Avoidance 101. No need to share with the “little people,”€ a.k.a.€ socialism. Of course, in Socialism American Style, the protected class siphons the spoils their way, a purposefully designed “trickle-up” system of wealth management that even shelters the losses from any storms. Some say we are born equal, at least until the moment of conception.
You may recall that, last year, Rep. Tulsi Gabbard decided to file a ridiculously silly lawsuit against Google, claiming that the company had "violated her First Amendment rights" because it temporarily shut down her advertising account, and also because it filtered some of her campaign emails to spam. In a lawsuit that read remarkably similar to the various people arguing that "anti-conservative bias" was the basis for a lawsuit, it made a whole bunch of silly claims that any good lawyer would recognize as frivolous (hold that thought).
John Pilger has watched Julian Assange’s extradition trial from the public gallery at London’s Old Bailey. He spoke with Timothy Erik Ström of Arena magazine, Australia.
Several virtual summits in California, North Carolina, South Carolina and Louisiana over the past several weeks and an upcoming summit in New Jersey addressing human trafficking (also referred to as trafficking in persons or modern slavery) suggest a widespread awareness of the crisis in this country.
The temperature hovered just above freezing as Officer Zachary Harmon drove his patrol car down the Route 1 bypass close to Maine’s border with New Hampshire. It was right after midnight on Feb. 25, 2012. A mix of snow and rain had fallen throughout the night, leaving the blacktop slick. Out of the dark ahead, Harmon saw a pair of headlights headed directly at him.
Harmon cranked up his siren and flashed the cruiser’s red and blue lights. The oncoming car was driving in the wrong lane, forcing him to veer off the road. Swinging his patrol car around, he pulled in front of the vehicle, bringing it to a stop. After a flustered search the driver handed a passport to Harmon. Dispatch confirmed she was out on bail for drunken driving, police records show, so Harmon asked her to step out of the car. In fast and slurred words, Suzanne Dwyer-Jones made one thing clear: She was a lawyer.
Two longtime workers at a Whole Foods store in Cambridge, Massachusetts allege they were recently fired in retaliation for voicing concerns over safety protections during the pandemic, the cancellation of hazard pay, and enforcement of the dress code policy to prohibit workers from wearing Black Lives Matter slogans on masks. Both workers were involved in organizing efforts with Whole Worker.
Nicholas Dukes, who worked at Whole Foods for around ten years in the Cambridge, Massachusetts area, said he was fired after expressing several concerns and filing safety complaints with OSHA and state agencies over the lack of enforcement of coronavirus safety protections.
For years, the city of Baltimore has handed out settlements to victims of government abuse. And for years, the city has forced them to remain silent about these settlements. The city tied every settlement to an extensive non-disparagement clause that effectively bought people's silence. If you can't say anything nice, you can't have half your settlement, as the old saying goes.
When the Justice Department recently publicized an ongoing investigation into potentially improperly discarded Trump ballots, critics accused it of violating long-standing agency policy against interfering in an election.
But the unusual decision to publicly detail the Pennsylvania case may also have run afoul of guidelines that Attorney General William Barr himself issued to federal prosecutors this year, according to a memo obtained by ProPublica.
It is hard to believe that the first presidential debate was just one week ago. That night, President Trump worked to undermine voter confidence: He made unsubstantiated claims about voter fraud, urged his supporters to engage in intimidation at the ballot box, and refused to say that he would accept the results of the election. In the days since, Trump’s positive coronavirus test has heightened the chaos. What happens while the president is unable to campaign? What about future debates? Will Trump demand voting be delayed (again)? What will his supporters do if he becomes fully indisposed on or before Election Day?
The Senate Judiciary Committee is about embark on the important task of determining whether President Trump’s newest nominee to the United States Supreme Court, Amy Coney Barrett, is qualified to serve as a Justice.
Prisons and cops survive only in tales for the young like twin Atlantises or two drowned boogeymen. A cop’s as harmless a Halloween getup as any monster, while a prisoner costume’s as taboo as a slave one now that schools teach what makes them kin. A prison is the far-off past of a structure turned free housing, each cell wall knocked to sandcastle ruin, halls reshaped and re-dyed in green paints, former floor plans carved out like shores into spacious homes, laundry and A/C a given in each. Though prisons and cops won’t be found anywhere, our youths still learn of them, and they know what they mean, how they look, how they function, what it will take to stop them if they return with new names.
Greece’s ‘new tactic’ of migrant expulsion from deep inside its land borders
On 27 August, Jawad, a 24-year-old asylum seeker from Afghanistan was picked up by police outside a grocery store near the northern Greek city of Thessaloniki.
Less than 12 hours later, after a long journey in the back of a dark van, the police deposited him around 400 kilometres from Thessaloniki on the banks of the Evros River, which runs along much of the land border between Greece and Turkey.
Jawad had arrived in Greece from Turkey in October 2019 and was a registered asylum seeker with a valid International Protection Applicant’s Card (or “white card”) that gave him the right to stay for six months, and prohibited authorities – at least in theory – from removing him from the country while his asylum request was being processed. But that didn’t matter.
We've noted for years that the U.S. simply adores throwing billions in tax breaks and subsidies at telecom monopolies in exchange for broadband networks that somehow, mysteriously, only wind up half deployed. AT&T's particularly gifted at this particular grift, routinely promising a massive boost in network investment if it gets merger approval, deregulation, or subsidization. Like most recently when it nabbed a $42 billion tax break from the Trump administration in exchange for not only network investment that never happened -- but 41,000 layoffs.
As part of a top-to-bottom review of the online market, the US House Committee on the Judiciary initiated a bipartisan investiation into Amazon, Apple, Facebook, and Google. Antitrust, also known as anticompetitive, is an area where regulators determine if the economic powers of business is healthy and allows competition to flourish. The 449-page report released today that thoroughly reviewed nearly 1.3 million documents, held seven separate hearings, and six hours of testimony from the CEOs of the four companies clearly shows anticompetitive behavior.
[...]
Apple, Google, Amazon, Facebook are all “C” Corporations, they have a fudiciary responsibility maximize shareholder value at all costs, even anticompetitive ones. Purism is a Social Purpose Company, who enshrined its articles of incorporation to protect and respect society, it releases all its source code.
The four companies are gatekeepers that lock-in control, exploiting and extracting concessions people would not normally consent to. Purism offers complete freedom to use its products and services in anyway people desire without fear of control nor exploitation.
These companies push network effects of platform lock-in create a barrier to entry since they refuse to be interoperable with other platforms. Purism offers all services with free and open source software that is interoperable based on standards and supports decentralized hosting between other platforms.
Technology giants are facing mounting criticism on both sides of the political aisle, but partisan splits on the nature of concerns and the possible solutions have so far prevented broad agreements on competition, privacy and the handling of controversial content.
The staff report’s most consequential recommendation is for Congress to consider legislation that would prevent tech companies from owning different lines of businesses, which could lead to a mandate to break them up.
“Their ability both to use their dominance in one market as negotiating leverage in another, and to subsidize entry to capture unrelated markets, have the effect of spreading concentration from one market into others, threatening greater and greater portions of the digital economy,” the report said.
Lawmakers also estimate Amazon controls about 50% or more of the U.S. online retail market, which is higher than analysts' projections.
Democrats also uncovered evidence that Amazon's dominance in cloud computing potentially creates a conflict of interest where customers are forced to consider working with a competitor.
The House Judiciary Committee has released its conclusions on whether Amazon, Facebook, Apple, and Google are violating antitrust law. Its 449-page report criticizes these companies for buying competitors, preferencing their own services, and holding outsized power over smaller businesses that use their platforms. “Our investigation revealed an alarming pattern of business practices that degrade competition and stifle innovation,” said committee member Val Demings (D-FL). “Competition must reward the best idea, not the biggest corporate account. We will take steps necessary to hold rulebreakers accountable.”
The majority’s report lays out a number of concrete policy recommendations, which, taken together, would drastically change how the tech industry operates. It urges Congress to consider passing commercial nondiscrimination rules that would make large companies offer equal terms to companies selling products and services on their platforms. It recommends barring certain dominant platforms from competing in “adjacent lines of business” where they’d have a huge advantage.
The lawmakers say Congress should overhaul the laws that have let the companies grow so powerful. In particular, the report says, Congress should look at forcing "structural separations" of the companies and beefing up enforcement of existing antitrust laws.
The recommendations, if enacted, could radically change how these companies operate. They could, for example, restrict Amazon from selling its own products in its marketplace, in direct competition with sellers who depend on the platform to reach customers. Google could be banned from using the data the Android operating system collects on users and other apps to refine its products. Facebook could, theoretically, be barred from acquiring another competitor, after concerns over how it bought rivals including Instagram and WhatsApp.
While the investigation was a bipartisan effort by the subcommittee, the final report has been met by partisan division over its recommendations. The Democratic majority staff authored the report, and no Republicans have publicly endorsed it so far.
In a 449-page report that was presented by the House Judiciary Committee’s Democratic leadership, lawmakers said the four companies had turned from “scrappy” start-ups into “the kinds of monopolies we last saw in the era of oil barons and railroad tycoons.” The lawmakers said the companies had abused their dominant positions, setting and often dictating prices and rules for commerce, search, advertising, social networking and publishing.
House lawmakers released a scathing report on four of the world’s largest tech companies, accusing them of abusing their market power. The report, which was released on Tuesday and concludes a 16-month investigation into Amazon, Apple, Facebook and Google, recommended breaking up the companies and passing the most sweeping reforms to antitrust laws in decades.
Here is a summary of the accusations against each company in the report, which was endorsed only by Democratic lawmakers.
“To put it simply, companies that once were scrappy, underdog startups that challenged the status quo have become the kinds of monopolies we last saw in the era of oil barons and railroad tycoons,” the report says. “Although these firms have delivered clear benefits to society, the dominance of Amazon, Apple, Facebook, and Google has come at a price.”
But Republicans involved in the effort did not agree with the recommendations.
“Starting today, we will remove any Facebook Pages, Groups and Instagram accounts representing QAnon, even if they contain no violent content. This is an update from the initial policy in August that removed Pages, Groups and Instagram accounts associated with QAnon when they discussed potential violence while imposing a series of restrictions to limit the reach of other Pages, Groups and Instagram accounts associated with the movement,” the company writes in its update. A Facebook spokesperson tells The Verge that while the ban targets organized behavior on the platform, it does not prohibit individuals from posting about QAnon to their person Facebook profiles.
Starting Tuesday, the ban will extend to all affiliated pages, groups and accounts.
“We are starting to enforce this updated policy today and are removing content accordingly, but this work will take time and need[s] to continue in the coming days and weeks,” Facebook said in a blog post.
NBC News first reported on the updated policy.
Facebook had previously banned QAnon Pages, Groups and accounts if they called for or celebrated violence. But that meant Groups and Pages that peddle the QAnon conspiracies, but were not explicitly violent, remained on the service.
Now associating with QAnon is in many instances against the company’s rules, Facebook said Tuesday in a blog post. Individual accounts and posts related to QAnon are allowed on the social network, but the company imposed the ban on Groups and Pages in an effort to keep followers of the conspiracy movement from congregating. Instagram accounts linked to QAnon are also banned. The photo-sharing app doesn’t require people to use their real identities.
It has been called everything from a virulent conspiracy theory to a mass delusion, a cult, and a complete scam, and yet it’s growing daily. It seems set to send some faithful followers to Congress, it has earned the tacit acknowledgement of the president, and it still maintains a core following of about 600,000 people on Facebook alone, despite efforts by the platform to ban QAnon outright. QAnon followers have attempted political violence, and links between apparent acts of domestic terrorism and the movement are increasingly apparent.
Facebook said the change is an update on the policy it created in August that initially only removed accounts related to the QAnon conspiracy theory that discussed violence, which resulted in the termination of 1,500 pages, groups and profiles.
A company spokesperson said the enforcement, which started Tuesday, will “bring to parity what we’ve been doing on other pieces of policy with regard to militarized social movements,” such as militia and terror groups that repeatedly call for violence.
The company said Tuesday that it will remove Facebook pages, groups and Instagram accounts for "representing QAnon."
Facebook is now completely banning all posts related to QAnon, the bizarre pro-Trump conspiracy and disinformation movement, the company announced.
“Starting today, we will remove any Facebook Pages, Groups and Instagram accounts representing QAnon, even if they contain no violent content,” the social giant said Tuesday.
This 30 second clip comes from a recent Federal Circuit oral arguments in a case captioned In Re Google Technology Holdings LLC (2019-1828). The voices you hear are Judge Chen asking a question and Kathryn Kayali representing Google.
Until recently, patent applicants have always been the human inventors. Now the law allows the patent owner to serve as the applicant.
In the Patent Trial and Appeal Board's decision on motions issued September 10th in Interference No. 106,115 (see "PTAB Decides Parties' Motions in CRISPR Interference") between Senior Party The Broad Institute, Harvard University, and the Massachusetts Institute of Technology (collectively, "Broad") and Junior Party the University of California/Berkeley, the University of Vienna, and Emmanuelle Charpentier (collectively, "CVC"), the Board granted Broad's Motion No. 4 for priority benefit to U.S. Provisional Application No. 61/736,527. As a result, Broad will remain Senior Party during the Priority Phase of the interference.
Broad in its substantive Motion No. 4 argued that it had satisfied the standard for priority to USSN 61/736,527 to Zhang (termed "Zhang B1" in the motion). The following diagram, showing the interrelatedness of the various Broad patents and applications in the interference, illustrates the basis of Broad's priority claim...
2020 begun with 97% of all memory chips on the market coming out of the factories of only three big manufacturers: Micron Technology (American), Samsung (South Korean) and SK Hynix (also South Korean). Those three have been caught price-fixing cartel-style more than once.
A fourth player, Chinese ChangXin Memory Technologies (éâ¢Â¿Ã©â«åÂËÃ¥â¨), begun trial production of 8 GiB DDR4 DRAM chips in 2018 and 8 GiB LPDDR4 chips were sampled in Q3 2019. ChangXin is currently producing DDR4 RAM from 20,000 wafers per month. They plan on ramping that up to beteen 70 and 80 thousand wafers per month by the end of the year with future targets as high as 120,0000 wafers per month.
[...]
ChangXin's design being similar to a design they have acquired the rights to may not be enough to fend off a potential lawsuit by Micron Technology.
How much of an impact a lawsuit would have is not all that clear. ChangXin is primarily targeting the Chinese market and it's partners are primarily Chinese. A trade/patent war with Micron could easily result in ChangXin being banned from the US market the same way Huawei has been banned in order to give inferior American companies a unfair competitive advantage. A patent lawsuit from Micron on Chinese soil would not be so easily won as one on American soil would be and there's a limit to what the Americans can do to prevent a Chinese company from selling Chinese goods on the Chinese market.
The Court FINDS the actual damages suffered by Centripetal as a result of infringement total $755,808,545; that the infringement was willful and egregious and shall be enhanced by a factor of 2.5x to equal $1,889,521,362.50. … The Court, additionally, imposes a running royalty of 10% on the apportioned sales of the accused products and their successors for a period of three years followed by a second three year term with a running royalty of 5% on said sales upon the terms described supra.
[...]
Apart from the $1.8 billion judgment, the case is interesting because it involved a 22 day bench trial (no jury) via video. Ironically, Cisco had objected to video conferencing — especially because the court was not using Cisco tech. The patents here relate to secure network communications.
The ABA issues formal ethics opinions that often influence how state and federal judges decide motions to disqualify, as well, of course, as matters of discipline. Thus, ABA Formal Opinion 494 (July 2020) (here) should be of interest. A comment to the Model Rules had explained that a “lawyer related to another lawyer, e.g., as parent, child, sibling or spouse, ordinarily may not represent a client in a matter where that lawyer is representing another party, unless each client gives informed consent.”(For patent practitioners, the USPTO has adopted the 2003 version of the ABA Model Rules, but not its comments, but has stated that the commentary and opinions construing the ABA Model Rules are informative.)
PR crisis management is not an easy gig. When a company suffers through a tumultuous period, it is all too easy for a company to try to combat the bad press through all kinds of means that are, in the end, a detriment to the effort. Instead, good PR crisis management follows three chief axioms: don't lie, don't try to downplay the severity of the crisis, don't be afraid to say you screwed up.
Matthew Anderson is leaving Roku after serving as its chief marketing officer for seven years — and he’s joining James Murdoch’s Lupa Systems investment company as a strategic adviser.
Anderson, a former News Corp and Sky exec, announced Monday that he will exit Roku effective in December. A Roku rep confirmed his departure but declined to comment. At this point, Roku has not identified a replacement for Anderson as CMO.
Since Campbell, the Court has not issued another opinion on fair use. But the lower courts have issued many.
Those courts have cultivated an expanded concept of transformative use that has detached fair use from its historical focus on facilitating public debate, that often omits meaningful inquiry into economic harm, and yields decisions that are arguably irreconcilable with the architecture of the copyright statute. While these judicial innovations have lowered the costs of accessing certain content, it has facilitated free-riding by digital platforms that can deploy the defense to neutralize infringement suits by authors, artists and other copyright owners. The result is a wealth transfer from individuals and entities that produce content to individuals and entities that replicate and distribute it.
On Wednesday, Oct. 7, the Supreme Court will hold oral arguments in the much-discussed case of Google LLC v. Oracle America, Inc. The case involves Google’s infringing use of Oracle’s copyright-protected application programming interfaces (APIs), to which Google naturally claims a fair use exemption even though the APIs were available to be licensed. Oracle claims billions of dollars in infringement damages.
Despite her essential conservatism, I guess I understand why so many US residents are lamenting the death of Justice Ginsburg and demanding the Senate not confirm whomever Trump’s choice is. Arguably, this focus on the Supreme Court seat is a distraction from the greater issues the country is facing; even more than the upcoming election. In my experience and understanding, it seems more important for people who still think the US political system works for the regular people to change the nature of the legislature than to focus so much energy on the Court.
"Judge Barrett has demonstrated that she will march in lock step with President Trump's cruel agenda to deprive millions of people of their access to healthcare."
But far away from Silicon Valley, there’s been a sea change that encompasses much more than a mere $6 billion and the future of copyright law. Three Supreme Court seats have been vacated since the last time Google asked the high court to review its case. In 2014, SCOTUS denied certiorari, sending the case back to the district court in San Francisco for a retrial. Since then, one justice has retired and two have passed away — most recently, Justice Ruth Bader Ginsburg.
The absolute least important part of Ginsburg’s legacy is that she was the most reliable vote in copyright law cases, tending to vote in favor of rights-holders. Her loss also means that Google v. Oracle is being heard by eight justices and is therefore prone to a split court. (In the 1996 software copyright case Lotus v. Borland, an eight-justice court split evenly and was unable to set national precedent).
When Google v. Oracle began in 2010, it involved seven patents as well as a copyright claim; by 2012, the case had been whittled down to a mere 37 Java APIs, made up of about 11,500 lines of code. (The various versions of Android range from 12 to 14 billion lines of code). The 11,500 lines of code at issue were written in a “clean room,” a project siloed away from the existing code they were reverse-engineering. This feat of engineering became necessary when negotiations between Google and Sun Microsystems — which owned the Java platform — failed. Oracle acquired Sun in early 2010; by August, it had filed suit against Google.
In 1966, a Canadian musician and a BBC television host sat down together to talk about, among other things, the future of music performance. Humphrey Burton’s admiration for his guest’s talent is almost palpable, but it is clear from the outset that the two hold dramatically different views on this question.
“Why so much love for recording?” Burton asks.
Without a moment’s hesitation, the musician replies: “Because it’s the future. It’s the future for performing music. It’s the future for writing music. It’s the future for listening to music. All of our futures in music are involved in recording. It’s as simple as that – and as complicated as that.”
“The concert hall as we know it is – is –“
“Is dead.”
[...]
More than a half-century after this interview, Gould’s provocative statements appear prescient. Just as importantly, they remain provocative.
The era of potential listener engagement that Gould foresaw – or, more precisely, that he saw dawning – has arrived. With digital recording, the possibilities of manipulating sound files through technology have become ever more sophisticated. The technology for altering musical recordings to suit musical tastes and needs is highly accessible.
Similar phenomena have infused every area of art and culture: from literature to the fine arts, from text to image, technology has made it possible to find, use, re-use, recreate, and disseminate the results of those experiments around the world. And yet, technology has not yet made the concert hall obsolete, as Gould suggested that it would. Instead, technology and live performance continue to co-exist.
New technologies have generated vast quantities of new materials, some of them more creative than others. Among artists as well as those more broadly interested in copyright law, a sense that these changes present immense challenges to authorial control, and, thereby, to the prerogatives of ownership, coexists with an opposing awareness of expanded creative possibilities. Not only may it be impossible to resist technology, but it may also be undesirable to do so.
Internet provider RCN has submitted its answer to the piracy liability lawsuit filed by the major recording labels. The ISP denies most of the allegations and also strikes back. In a recent filing, it accuses the music companies, the RIAA, and piracy tracking company Rightscorp, of unfair and fraudulent practices that violate California's Business and Professions Code.
Plex has failed in its initial legal action to prevent new streaming service Zee Plex from using the word 'Plex' in its branding. The High Court in Bombay found that low domestic sales for Plex, a fundamental difference in services offered by the parties, plus no evidence of "passing off" or anticipated injuries all went against Plex.