08.04.14
Posted in News Roundup at 8:00 pm by Dr. Roy Schestowitz

Contents
-
Desktop
-
While market predictions for PCs have been generally bleak, Chromebooks–portable computers based on Google’s Chrome OS platform–have been doing well in sales terms. That’s especially true in schools, where many districts are purchasing the low cost systems that run cloud applications for students to use.
-
Server
-
Docker, a new container technology, is hotter than hot because it makes it possible to get far more apps running on the same old servers and it also makes it very easy to package and ship programs. Here’s what you need to know about it.
-
Work in the technology trenches tends to bubble over like an ignored pot of pasta boiling on the stovetop — but not because it’s being ignored. Rather, we fall victim to the fact that we need to be available at any given moment to deal with emergencies or to clarify technical facts for future planning or to provide an answer to a blocking problem. Folks who do data center and system architecture design and management do not have the luxury of being able to concentrate on a single task. Switching gears quickly and abruptly is part of the game.
-
Kernel Space
-
The final version of Linux kernel 3.16 has been released by Linus Torvalds and the next development cycle for the 3.17 branch has been officially opened.
-
-
-
There are many theories around why the pather might be doing it. Some say that he is writing a University Thesis on trolling the kernel development process (either by seeing if an obviously broken patch could be snuck past the peer review system, or to see if he can try to get someone to lose their temper much like Linus is supposed to do all the time — not realizing that this only happens to people who really should know better, not to clueless newbies), are that he’s a badly written AI chatbot, or just a clueless high school student with more tenacity than one usually expects at that age,” says Theodore.
-
For Linux 3.16 the KVM improvements were mostly about POWER, S390, and MIPS architectures while for Linux 3.17 the table has turned to focus upon x86 improvements to the Kernel-based Virtual Machine.
Paolo Bonzini sent in the first round of KVM changes for the Linux 3.17 merge window. The MIPS/S390 architectures in particular have seen little changes this kernel development cycle while x86 has been a greater focus. Linux 3.17 KVM has nested VMX improvements, optimizations for old processors (up through Intel Nehalem CPUs), and various x86 emulator bug-fixes.
-
With the Linux 3.17 kernel that’s now officially under development since yesterday’s Linux 3.16 release is now support for Xen EFI.
With the upcoming Linux 3.17, it’s possible to boot using (U)EFI under Xen Dom0. Daniel Kiper who worked on the Xen EFI patches explained, “Standard EFI Linux Kernel infrastructure cannot be used because it requires direct access to EFI data and code. However, in dom0 case it is not possible because above mentioned EFI stuff is fully owned and controlled by Xen hypervisor. In this case all calls from dom0 to EFI must be requested via special hypercall which in turn executes relevant EFI code in behalf of dom0.”
-
Graphics Stack
-
Tom Stellard of AMD is seeking the approval of other LLVM developers to rename the R600 back-end to something more generic like “AMDGPU” instead. The R600 back-end was originally developed for AMD’s R600 class hardware with support through the HD 6000 “Northern Islands” graphics cards, just as is the case for the R600 Gallium3D driver. However, while AMD developed the RadeonSI Gallium3D driver for the HD 7000 series graphics processors and newer, the existing R600 LLVM back-end has been extended to support all newer AMD GPUs up through the latest Rx 200 series graphics cards. As a result, the “R600″ name is rather irrelevant and no longer meaningful.
-
-
The latest Linux GPU benchmarks at Phoronix for your viewing pleasure are looking at the OpenCL compute performance with the latest AMD and NVIDIA binary blobs while also marking down the performance efficiency and overall system power consumption.
-
Applications
-
Plex Media Server, a software that makes it easy for everyone to play movies and TV shows on the computer, is now at version 0.9.9.14 and is available for download.
-
-
Proprietary
-
Dropbox, a client for an online service that lets you bring all your photos, docs, and videos anywhere, is now at version 2.11.5 and it has been released for Linux, Windows, and Mac OS X.
This is a development build of Dropbox, and beginning with the 2.11.x branch, the developers have started to make a number of important changes to the Linux client, after quite a long time of stagnant development.
-
Instructionals/Technical
-
Games
-
The Steam for Linux rate of adoption has dropped somewhat in comparison with the previous month, but it still holds around 1.1%.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
The Akademy Program Committee is excited to announce the Akademy 2014 Program. It is worth the wait! We waded through many high quality proposals and found that it would take more than a week to include all the ones we like. However we managed to bring together a concise and (still packed) schedule.
-
David Edmundson and I have been working hard the last weeks. It’s not that we don’t usually work hard, but this time I’m really excited about it.
A bit of context: in Plasma an important part of the system drawing is painting frames (others are icons, images and the like). Those are in general the elements that are specified in the Plasma themes. These will be buttons, dialog backgrounds, line edit decorations, etc.
-
GNOME Desktop/GTK
-
-
We have released the Preview of Black Lab Enterprise Linux 6. The release of Black Lab Enterprise Linux 6 signals our 8 years of operation in the enterprise and education sectors. There were three things that we focused on with this release.
-
Black Lab Enterprise Linux 6 Preview, a distribution that is better known after its previous name, OS/4 OpenLinux, has been released and is now available for testing.
-
Michael Tremer, a developer for the ipfire.org team, has announced that IPFire 2.13 Core 80, a new stable build of the popular Linux-based firewall distribution, has been released and is now available for download.
-
Evolve OS, a Linux distribution that it’s still under development and which boasts a beautiful new desktop environment called Budgie, has just got its third Alpha release.
-
Red Hat Family
-
Libvirt 1.2.7, a collection of software tools that provide a convenient way to manage virtual machines and other virtualization functionality, such as storage and network interface management, has been released and it’s now available for download.
-
Oracle has this month introduced the Oracle-flavoured Linux 7 open source operating system. Freely distributed under the GNU General Public License (GPLv2), Oracle Linux is based on Red Hat Enterprise Linux (RHEL) and follows the RHEL7 release, which arrived this June.
This distribution of Linux represents what Oracle would like to us to consider as its more open and community focused side, although of course a paid support model is available and widely adopted.
-
Debian Family
-
Hello Linux Geeksters. As you may know, Kernel 3.16 stable will be released soon, for now only the seventh release candidate of the kernel being available (Kernel 3.16 RC7).
The usage of a new kernel is a very important, due to the fact that the newest kernels support the newest hardware specs and come with important performance improvements, compared to the previous ones.
-
Derivatives
-
Canonical/Ubuntu
-
Ubuntu for phones is constantly receiving improvements and updates, but the browser was a little behind. It looks now that it’s about to receive an overhaul.
-
The Ubuntu developers are constantly working on their Unity desktop environment and most of changes and new features will most definitely land in the next versions of the operating system.
-
Canonical has published details in a security notice about a Samba vulnerability that has been corrected in Ubuntu 14.04 LTS (Trusty Tahr) operating system.
-
The Ubuntu community has made a habit of spotting their favorite operating system in the most unexpected places. The Linux distribution built by Canonical has been observed “flying” over an Antarctic region, during a NASA mission.
-
-
Itus Networks is set to launch a $149 “iGuardian” network security appliance on Kickstarter that runs OpenWRT Linux and the Snort IPS stack on a MIPS64 SoC.
Few vendors have targeted the consumer network security appliance market, and even fewer have done so with pricing under $500. A San Jose, Calif.-based startup called Itus Networks, however, plans to protect your home WiFi router with a $149, open source Linux iGuardian device that offers both a network intrusion prevention system (NIPS) and a network intrusion detection system (NIDS). The device blocks cyber attacks while also filtering out malware “and other undesirable content,” says the company. Like other network security appliances, it sits between your Internet source and your WiFi router, acting as a security firewall.
-
Phones
-
Android
-
Android has raced past iOS to become the top mobile operating system for the first time.
Figures from Net Applications show that devices powered by Android were used more than iPhones, iPads, and iPod Touch devices running iOS throughout July 2014.
-
A new official version of Android 4.4.2 KitKat, with the build number I9506XXUCNG3, was recently rolled out for the international LTE model of Samsung Electronics Co Ltd’s (KRX:005935) Galaxy S4 that comes with the model number GT-I9505.
-
The real motivation for Sandstorm is, and always has been, making it possible for open source and indie developers to build successful web apps.
In today’s popular software-as-a-service model, indie development simply is not viable. People do it anyway, but their software is not accessible to the masses. In order for low-budget software to succeed, and in order for open source to make any sense at all, users must be able to run their own instances of the software, at no cost to the developer. We’ve always had that on desktop and mobile. When it comes to server-side apps, hosting must be decentralized.
-
The appeal of open source solutions to government agencies around the world is not surprising as these solutions can address concerns which had prevented governments from reaping the full benefits of cloud, including security, governance and data transparency. The number of countries actively using open source solutions in their infrastructure is a testament to how it is an appropriate model for IT systems in the public sector.
-
Don’t trash the traditional resume just yet, but developers who contribute to open source projects may find their code becomes their best career-boosting tool.
-
Web Browsers
-
Mozilla
-
Mozilla’s website dedicated to developers has suffered from a database error that has exposed email addresses and encrypted passwords of registered users for about a month, the company announced.
-
Databases
-
MongoHQ and GoGrid have partnered to deliver a turnkey NoSQL MongoDB storage solution, which they say will make it easier to perform Big Data analytics with no major investment in time or resources.
-
CMS
-
The open-source WordPress blog and content management system platform is widely deployed around the world and powers some of the most popular sites on the Internet. WordPress’ popularity has also made it a target for attackers. WordPress is deployed in one of two ways, which affects what steps users should take to secure themselves. Users can directly set up and host a site with the WordPress.com service. In that scenario, much of the heavy lifting for ensuring secure configuration and server platforms is done by WordPress.com. The other scenario is the self-hosted one in which users set up their own WordPress sites, with code that is freely available under an open-source license from WordPress.org. For self-hosted WordPress users, the security challenge is more involved and requires that users take proactive steps to reduce risk. In multiple incidents in the last year, self-hosted WordPress user sites were attacked and leveraged as a basis for attacks against others. In March, the pingback URL tacking feature in WordPress was abused in a widespread attack. In June, attackers took advantage of flaws in the Timthumb image-processing library plug-in. Here are guidelines to help users limit security risks in WordPress.
-
Health/Nutrition
-
Toxins possibly from algae on Lake Erie fouled the water supply of the state’s fourth-largest city Saturday, forcing officials to issue warnings not to drink the water and the governor to declare a state of emergency as worried residents descended on stores, quickly clearing shelves of bottled water.
“It looked like Black Friday,” said Aundrea Simmons, who stood in a line of about 50 people at a pharmacy before buying four cases of water. “I have children and elderly parents. They take their medication with water.”
-
Residents in Toledo are flocking to stores in Michigan in search of water after Ohio officials issued a “do not drink” warning and declared a state of emergency.
Authorities in Toledo issued an alert around 2 a.m. Saturday, warning residents not to consume any of its water after tests revealed the presence of a toxin possibly related to algae on Lake Erie. The warning applies to about 400,000 people in the area. By the afternoon, Ohio’s governor had declared a state of emergency.
-
Security
-
Cisco has shipped a patch for a buggy Open Shortest Path First (OSPF) routing implementation it says offers exploits that include traffic blackholing or interception.
As the advisory notes, the vulnerability “could allow an unauthenticated attacker to take full control of the OSPF Autonomous System (AS) domain routing table, blackhole traffic, and intercept traffic”, which makes El Reg wonder why the NSA ever had to go to the alleged bother of intercepting hardware for to allegedly install its compromises.
Crafted OSPF packets can be sent to devices running the faulty code, and those packets would make the targeted router flush its routing table. A crafted OSPF Link State Advertisement (LSA) type 1 update can then be propagated through a targeted domain.
-
-
-
-
Defence/Police/Secrecy/Aggression
-
The Gaza offensive, which Israel says is also intended to quash rocket salvoes, has been the deadliest in the territory since Israeli settlers and soldiers left in 2005. At least 1,868 Palestinians have been killed, including hundreds of civilians, according to Gaza Health Ministry spokesman Ashraf al-Qedra. Sixty-seven people have been killed on the Israeli side, 64 of them soldiers.
-
Palestinians have accused Israel of breaking its own cease-fire by launching an attack which killed an 8-year-old girl in a refugee camp in the northern Gaza Strip
-
-
Israeli soldiers mourn over the grave of Israeli Army 2nd. Lt. Hadar Goldin during his funeral at the military cemetery in the central Israeli city of Kfar Saba on Sunday, Aug. 3, 2014. Israel announced that Goldin, a 23-year-old infantry lieutenant feared captured in Gaza, was actually killed in battle. Israel had earlier said it feared he had been captured by Hamas militants Friday near Rafah in an ambush that shattered an internationally brokered cease-fire and was followed by heavy Israeli shelling that left dozens of Palestinians dead. (AP Photo/Oded Balilty)
-
In this century, a full-scale second “Defense Department,” the Department of Homeland Security, was created. Around it has grown up a mini-version of the military-industrial complex, with the usual set of consultants, K Street lobbyists, political contributions, and power relations: just the sort of edifice that President Eisenhower warned Americans about in his famed farewell address in 1961. In the meantime, the original military-industrial complex has only gained strength and influence.
-
Increasingly, post-9/11, under the rubric of “privatization,” though it should more accurately have been called “corporatization,” the Pentagon took a series of crony companies off to war with it. In the process, it gave “capitalist war” a more literal meaning, thanks to its wholesale financial support of, and the shrugging off of previously military tasks onto, a series of warrior corporations.
-
August 2 marked the 50th anniversary of the Gulf of Tonkin incident, in which the U.S. reported attacks on a Navy destroyer by North Vietnamese patrol torpedo boats in the Gulf of Tonkin. Congress passed the Gulf of Tonkin resolution, giving President Lyndon Johnson the authority to send U.S. forces to Vietnam to combat “communist aggression.”
To provide the background to the U.S. government’s war drive, we reprint an excerpt from the 2007 book Vietnam: The (Last) War the U.S. Lost by SocialistWorker.org contributor Joe Allen. It is taken from the chapter “From the Overthrow of Diem to the Tet Offensive.”
-
Finance
-
Australia’s tech jobs market is booming, with the rate of growth for tech jobs outpacing both the US and the UK, according to a new report by the Progressive Policy Institute.
-
PR/AstroTurf/Lobbying
-
Me and Ben & Jerry’s want to get the influence of big money out of politics. You too? Well, we are the people, and its is up to us to make the impossible possible.
Is it impossible to get big money out of the governor’s position? You tell me. If it’s up to me, I will.
Without big money, how does one run for governor, you might ask? I meet a lot of people, write a lot of letters, go a lot of places. If you want money out of politics too, you are going to have to help level the playing field.
-
We’ve written a bunch about Larry Lessig’s MayDay SuperPAC and its crowdfunded attempt to elect politicians who promise to change the way money in politics works. And many users also pointed to Wolf PAC, which is another high profile political action committee committed to dealing with the issue of money in politics. Now another such PAC has been announced, kicked off by some more Silicon Valley folks, called CounterPAC, the focus is on getting candidates to take a pledge not to accept so-called “dark money”.
-
Censorship
-
As he prepares to host a Wikimania festival in London, the Wikipedia co-founder is also gearing up to challenge Europe’s controversial ‘right-to-be-forgotten’ legislation
-
Privacy
-
Philip Hammond launched an attack on critics of GCHQ and the British intelligence community on a visit to Cheltenham today.
The Foreign Secretary described the listening post as a “critical asset” which helps keep people safe at home and abroad.
But with the operations of GCHQ under more scrutiny than ever amid the continuing revelations of the American whistle blower Edward Snowden Mr Hammond believes some people have lost sight of how important its work is.
He told the Echo: “There are people across the political spectrum who have given the intelligence community a hard time who see this only through one lens; the civil liberties, data protection lens, and refuse to look at the benefits that this work brings us.
-
-
Sen. Ron Wyden, D-Ore., was right last week to demand further action on an internal CIA report that confirmed, despite Director John Brennan’s earlier denials of wrongdoing, that the agency hacked Senate Intelligence Committee computers that were used to produce a damning review of the CIA’s former interrogation program.
-
The Germans are correct that the U.S.A. has a multitude of failings, but they don’t deny our easy access to wild landscape. We have inadequate biking lanes here in S.B., our government attacks foreign lands, we aerially assassinate thousands, the NSA spies on us, our infrastructure is collapsing, and some foolish politicians want to starve government and privatize public schools. At least we can easily drive to the nearby hills with our kids from time to time and temporarily escape this madness.
-
After a 2008 presidential campaign that criticized the Bush administration for increased government surveillance and lack of government transparency with the Patriot Act, the Obama administration has since expanded those very things it sought to diminish.
-
Documents published Monday by The Intercept revealed the “far-reaching” extent of the U.S. National Security Agency’s collaboration with Israeli intelligence services. The revelations came as the U.S. State Department criticized Israel for its “disgraceful” shelling of a U.N. school, and the death toll in the Israeli offensive in Gaza surpassed 1,800 Palestinians and 60 Israelis.
-
The U.S. government has long lavished overwhelming aid on Israel, providing cash, weapons and surveillance technology that play a crucial role in Israel’s attacks on its neighbors. But top secret documents provided by NSA whistleblower Edward Snowden shed substantial new light on how the U.S. and its partners directly enable Israel’s military assaults – such as the one on Gaza.
-
As if revelations about government spying weren’t alarming enough, it’s clearer that what have become routine practices that erode the privacy of citizens need thoughtful legislative intervention.
State lawmakers from this region such as Senators Ted O’Brien, Joe Robach and Michael Ranzenhofer, who are all members of a special Senate committee that deals with technology issues, should take the lead in conducting an assessment. If their special Senate Science, Technology, Incubation and Entrepreneurship Committee isn’t best suited for the task, then they should push Senate leaders to find better alternatives.
A state response to growing privacy concerns is a logical followup to steps currently underway in Washington to reform the National Security Agency. Red flags went up after it was learned that the NSA collects and stores phone data on virtually all Americans’ phone records.
-
On February 24, 2014, Turkish daily Yeni Şafak broke the story that the authorities had eavesdropped on the phone calls and intercepted e-mail messages of thousands of citizens, including several Daily Sabah journalists, under secret court orders. Local media reported that the scandal was uncovered after several prosecutors were reassigned in mid-January citing their affiliation with the Gülen Movement, which the news outlets claimed had formed a shadow state involving members of law enforcement, public prosecutors and judges. Five months later, on July 22, dozens of police officers who allegedly were involved with unlawful mass surveillance were detained for questioning. Subsequently, an Istanbul court ordered the formal arrest of over 30 police officers on charges of wiretapping, forging documents and espionage. Meanwhile, the chief prosecutor of Istanbul withdrew terrorism charges against victims of unlawful wiretapping and ordered the destruction of all illegally obtained personal data.
-
The Green Party has called on Prime Minister John Key to “come clean” after revelations that a US National Security Agency (NSA) engineer was in New Zealand in 2013, discussing with the GCSB the setting up of an interception site on the country’s only fibre optic cable.
Documents obtained by the New Zealand Herald show that in February 2013, an engineer from the NSA visited Blenheim, the location of the GCSB’s Waihopai spy base, to participate in discussions about a future Special Source Operations (SSO) site.
-
-
-
This Israeli start-up no longer operates a website. But it has peddled its wares to the Mexican government, gotten on the radar of Central Intelligence Agency officials and recently was bought by an American private equity firm.
-
The fifth edition of the India-US Strategic Dialogue was not a cheerful occasion for US Secretary of State John Kerry, the highest-ranking leader to visit India since Narendra Modi came to power.
Kerry wanted the dialogue to be the right springboard for Modi’s trip to Washington in September but returned dissatisfied over India’s strong reservations against NSA snooping, the US immigration bill and a sense that economic reforms may not be introduced at a faster pace.
-
Civil Rights
-
Two officials with access to the declassified executive summary told VICE News that some of the redactions allegedly pertain to the manner in which the detainees were held captive, and to certain torture techniques that were not among the 10 “approved” methods contained in a Justice Department legal memo commonly referred to as the “torture memo.” The officials said the never before–revealed methods, which in certain instances were “improvised,” are central to the report because they underscore the “cruelty” of the program. Some other redactions allegedly pertain to the origins of the program and the intelligence the CIA collected through the use of torture, which the Senate report claims was of little or no value — a claim with which the CIA disagrees.
-
U.S. Senate Intelligence Committee member Senator Angus King said on Sunday that the Central Intelligence Agency (CIA) personnel committed an “unjustifiable” act when they tortured 9/11 terror suspects.
-
-
Before his election to the top office, Obama was known as a soft-spoken person and enjoyed image of a gentleman who feels for others. But soon after his entry in the White House he understandably had to follow dictates of the very powerful US establishment. Then he took several decisions which could not be considered as a true reflection of sentiments of the President but his frank admission at the televised news conference shows that he was opposed to the mistreatment that security officials done to the detainees. But what is more surprising is that to this day many of the Bush era officials who carried out the CIA programme insist that what they did was not torture.
-
Truth in state government and here in the federal capital again has trumped all as the most elusive quality in public affairs. Five months ago, CIA Director John Brennan blandly said of charges that his agency spied on Congress, “nothing could be further from the truth.”
-
“We did a whole lot of things that were right, but we tortured some folks; we did some things that were contrary to our values. When we engaged in some of these enhanced interrogation techniques, techniques that I believe and I think any fair-minded person would believe were torture, we crossed a line. And that needs to be understood and accepted,” said President Obama at a press conference a couple of days ago.
[...]
I believe American business investments in Africa without morality breed only misery and thievery.
-
U.S. Senator Martin Heinrich (D-N.M.), a member of the U.S. Senate Select Committee on Intelligence, issued the following statement on the CIA’s redactions to the executive summary of the Committee’s study of the CIA’s Detention and Interrogation Program.
-
The torture debate will continue with the release of a Senate report on the controversial interrogation techniques the CIA used after the September 11 attacks.
-
The move was extraordinary: Germany, one of America’s closest allies, went public with a private gripe. More, the move was the kind expected by a rival country like Russia, signaling a complete breakdown of diplomacy between the U.S. president and the German chancellor.
-
Will an apology be enough to soothe the strained relations between the CIA and members of the Senate Intelligence Committee? It’s a critical lingering question in the rare public spat between the intelligence agency and the lawmakers charged with the agency’s oversight.
Tempers on the committee flared in recent months over reports that the CIA spied on computers used by intelligence committee staffers. A CIA inspector general’s report confirmed these reports this past week, prompting CIA Director John Brennan to apologize to committee members Thursday. However, some members aren’t satisfied, citing Brennan’s previous remarks that batted down the spying accusations…
-
CIA responded to Obama’s acquiescence when it spied on the Senate Intelligence Committee.
-
Intellectual Monopolies
-
Transparency has been one of the key issues for TTIP – and is, of course, a prime concern of this blog. As people who follow me on Twitter may have noticed, I recently had quite a long, er, discussion with the TTIP team at the European Commission that centred on transparency, or lack of it.
-
Copyrights
-
Every time somebody questions the copyright monopoly, and in particular, whether it’s reasonable to dismantle freedom of the press, freedom of assembly, freedom of speech, freedom of information, and the privacy of correspondence just to maintain a distribution monopoly for an entertainment industry, the same question pops up out of nowhere:
“How will the artists get paid?”.
The copyright industry has been absolutely phenomenal in misleading the public in this very simple matter, suggesting that artists’ income somehow depend on a distribution monopoly of publishers. If the facts were out, this debate would have been over 20 years ago and the distribution monopoly already abolished quite unceremoniously.
Permalink
Send this to a friend
Posted in Bill Gates, Microsoft at 11:25 am by Dr. Roy Schestowitz
Summary: How the corporate media continues to accept payments from plutocrats such as Bill Gates and then promotes their agenda, for power and for profit
Bill Gates relies on buying the media. Without buying it people would sooner or later realise that he is no better — if not much worse — than the Koch Brothers (they are a tad late in buying the media, which they try to buy because they realise they have a public ‘perception’ problem). Bill Gates has bribed a lot of the media over the years. Here in this site we lost track and lost count of many blogs, local media, press outlets of moderate size and also very large networks Bill Gates had paid in exchange for propaganda (puff pieces, gagging of Gates’ critics, attacks on Gates’ opponents, competition, etc.), with examples ranging from private entities such as The Guardian to public ones like PBS, NPR, and the BBC.
On the one hand we have lobbying at the personal level, which is influenced not only by the media. Professor Ravitch recently explained how Bill Gates distorted the media and all sorts of groups, including politicians, to make a profit from the public education system in the US. Others cite her observations [1] that continue to come out.
On the other hand we have corporate media pushing the Gates line. Journalists do not seem to be doing their job. Well, a lot of them don’t even state who funded their so-called articles (it would embarrass them), but one media outlet does [2]. Yes, Bill Gates bribes the press to promote policy that grants him public funds and gets Microsoft more contracts. NBC finally admits being part of it. How long has this been going on for? A lot of trend-setting media coverage about Common Core turns out to be directly funded by Gates, who would gain from it through Microsoft and InBloom, a surveillance company that Rupert Murdoch too would gain from.
It should be seen as no coincidence that Murdoch is using his tabloid to attack Ravitch, the messenger, trying to label her a sexist. Murdoch, unlike Gates, does not need to buy the media as he already has a lot of media. Ravitch slams Common Core and InBloom (which makes Murdoch rich through spying on students), so Murdoch’s tabloid attacks her.
Media control has enabled Bill Gates to slam critics, which is why Melinda Gates was ousted from the Washington Post (she smeared critics/competition there). It’s often hard to say who’s behind the articles because the payments from Gates are discreet, whereas in the case of Murdoch it is quite clear who owns the news channels (News Corp.), acting as instruments as indoctrination, just like the education system that Gates and Murdoch pursue. █
Related/contextual items from the news:
-
As Ravitch reminds us, any replacement “would have to be acceptable to DFER, Stand on Children, Bill Gates, Eli Broad, and the other reformers.” And, that gets to the real reason why the Obama administration, which teachers and our unions helped elect and reelect, has spread the insanity to the point where schools are reduced to test prep factories. The Billionaires Boys Club in general, and Bill Gates in specific, are really in charge of our nation’s education policy. We’ve had a “barrage” of weird ideas, based solely on the hunches of elites, and Arne Duncan coerced states into making them the laws of most of the land.
-
Wow. Here’s a link to the Gates-subsidized NBCNews.com article. There is no indication that it’s an advertisement or advertorial. It appears to be a bona fide news story written by a bona fide reporter (Nona Willis Aronowitz). Here it is featured along with NBC News’ other articles on its education page:
Permalink
Send this to a friend
08.03.14
Posted in News Roundup at 6:12 pm by Dr. Roy Schestowitz

Contents
-
These days, that includes me. While I’m happy I have enough skills to usually fix a bug that made it past the developers at Mint or Fedora, I’d just as soon not have to deal with it. I have work to be done. And when I’m not working, I want to be wasting time with my friends on Facebook, not getting aggravated with my computer.
To be sure, Linux has changed with the times. In recent years you can pretty much be sure that when you install a major Linux distro on a laptop, Wi-Fi will work out of the box. Also, most of the time all you have to do is plug a new printer into a USB port and, presto!, it’s already up and running. But there are still way too many little niggling problems that need to get fixed – stuff that should have been fixed long ago.
Maybe if Ken keeps complaining enough…
-
What is more, whenever a new version of Ubuntu (the flavour of Linux I use) comes out, I can upgrade for free. I don’t need to worry about ongoing license costs, because there are none. I will always have the most up to date version of the operating system and will never be in the position that the creators stop supporting my PC. Sorry Windows XP users, but it is true.
-
Desktop
-
As far as Linux is concerned, there wasn’t any learning curve for Jaimee and she told me so. When I was explaining the difference between Windows, Linux and Mac, she brushed the explanation off and summarized it quaintly.
“It’s not a big deal,” she told me. “You see an icon, you click an icon and stuff happens.” I smiled and thought inwardly, “Stuff happens indeed.” You may have heard or read me say the exact same thing. Now you know that I stole it from a brilliant 15 year old girl.
-
Representative from the Valencia Linux School district have announced that they have managed to save €36 million ($48.3 million) by using a Linux distribution instead of proprietary software.
-
Kernel Space
-
The Linux 3.16 kernel could be released as soon as today with its development having calmed down but if you’ve refrained from reading up on this new kernel, here’s the rundown on the new features and capabilities of this 2014 late-summer kernel debut.
-
Graphics Stack
-
In complementing the Nouveau vs. NVIDIA OpenGL benchmark results published earlier this week on Phoronix, here are the power consumption and performance-per-Watt metrics.
Due to the current Nouveau re-clocking situation, the results aren’t a huge surprise, thus this quick, one page-page write-up. The proprietary NVIDIA driver led over Nouveau on all of the tested graphics cards in power efficiency.
-
-
Mesa 10.2.5 has been released. Mesa 10.2.5 is a bug fix release fixing bugs since the 10.2.4 release, (see below for a list of changes).
-
Applications
-
The VideoLAN team released version 2.1.5 of their VLC player a while ago. The development of this versatile multimedia player has slowed down quite a bit as the team seems to have more focus on improving the OSX and Android versions (the previous release for Linux was almost half a year ago) so I was not really in a hurry to provide new packages.
-
Email remains the killer information and communications technology. Email volume shows no sign of diminishing, despite the increasing popularity of collaborative messaging tools.
Messages are exchanged between hosts using the Simple Mail Transfer Protocol with software programs called mail transfer agents, and delivered to a mail store by programs called mail delivery agents, frequently referred to as email clients.
-
-
-
-
-
-
-
Instructionals/Technical
-
Wine or Emulation
-
The Wine development release 1.7.23 is now available.
-
Games
-
Steam for Linux has been released a years and half ago and now it has accumulated more than 600 games, which should make Linux a very successful platform.
-
Two months ago I wrote about Steam having 500+ Linux games while now to start off August they have crossed the 600 game threshold.
-
With the start of a new month comes updates to Steam’s hardware/software survey by those running this multi-platform gaming software.
Compared to last month’s results, Steam Linux usage dipped slightly to 1.11% from 1.20% the month prior. Ubuntu 14.04 LTS 64-bit lost some ground though Ubuntu 14.04.1 LTS rolled out in this time to reflect the shift, while Linux Mint 17 Qiana gained a little bit.
-
Valve has released a new update for the development version of its Debian-based SteamOS operating system, bringing updates for some of the packages and a very important fix for the compositor.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
In one week the Randa Meetings 2014 will start and this is possible because of you. You supported us (and can still support us Wink and thanks to you we will be able to improve your beloved KDE software even more. So it’s time to give you something new. Here is another interview with one of the persons who will be participating in this year’s meetings (and participated since the start in 2009). And watch out for some other interviews to come in the next days and weeks.
-
-
A lot has changed in the last few months in Ekos, KStars advanced astrophotraphy tool. The powerful builtin sequence queue is more robust now and can support in-sequence autofocusing, autoguiding limits with dither support, and autopark functionality. The astrometry.net based alignment module has been improved to support the online astrometry solver using Web Services, thereby eliminating the need for an offline astrometry solver that requires gigabytes of star indexes in order to solve.
-
GNOME Desktop/GTK
-
-
Over the last years I noticed that I was copying too much code to create simple GStreamer based playback applications. After talking to other people at GUADEC this year it was clear that this wasn’t only a problem on my side but a general problem. So here it is, a convenience API for creating GStreamer based playback applications: GstPlayer.
-
-
Newbies are often deterred from trying out Linux (or other open source operating systems) because of the amount of time and effort they may need to spend in customizing the OS to work on their hardware after a fresh installation. The same goes for old users planning to switch hardware. It is often difficult to figure out if a new model will work in harmony with Linux. Distroshare is trying to solve this problem.
-
PCLinuxOS/Mageia/Mandrake/Mandriva Family
-
Welcome From The Chief Editor
Templates: Google Docs Best “Hidden” Feature
Inkscape Tutorial: Holiday Wallpaper
PCLinuxOS Recipe Corner
ms_meme’s Nook: Oh, Look At Me Now
Extend LibreOffice Capabilities With Extensions
Cool Add-ins For LibreOffice & OpenOffice
Programming With Gtkdialog, Part Five
More Templates: LibreOffice Plus!
LibreOffice Macros
PCLinuxOS Puzzled Partitions
Game Zone: Tank Riders
PCLinuxOS Family Member Spotlight: Ramchu
Inkscape Tutorial: Tracing A Logo
Screenshot Showcase
-
Arch Family
-
This week X.Org Server 1.16 was promoted for Arch Linux with a number of end-user changes as a result.
With X.Org Server 1.16 officially landing now for Arch Linux, X now runs without root privileges in combination with systemd-logind, but there’s some stipulations such as right now launching X through a log-in manager will not lead to a rootless X environment, etc.
-
Red Hat Family
-
This all started Friday, I’m an Ubuntu user, it works out of the box, well most of the time it does. However just recently with updates small things just don’t seem to work properly. So I had a chat with one of our consultants and CentOS 7 came up. I love CentOS as a server, its basically Red-Hat after all, so there is great support, stability and it just works (once you get the NIC working) I’d never even considered CentOS as a Desktop.
-
Fedora
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Canonical has stopped promoting Ubuntu Touch images for a while (except for the unstable channel), due to some chroot issues, that were causing the environment to be unstable.
-
-
-
Phones
-
Android
-
Way back before the Motorola Moto G wasn’t even released yet, the company devised a plan to get ahead of its competitors. Upon release of the Moto G, the phone was equipped with the Android 4.3 Jelly Bean but the OS was quickly amped up to the Android 4.4 Kitkat.
-
I wish to encourage modern android app developers to use open source OS Linux and latest Android SDK for better Android app development so development would be cost-effective as well as quick to reach as early as possible to the market. Therefore, I have given good hints in this post for newbie as well as seasoned Android developers.
-
Google I/O started off on high note and ended making a lot of Nexus users happy. Pure Android lovers who bragged about their Nexus device got even more bragging rights. Android L with a brand new design and a lot of under-the-hood changes has given Android the revamp it needed. The release is one more step towards fighting off the fragmentation problem that has been plaguing Android for years. Also with L, Android might finally manage to overthrow iOS in areas that Apple has been constantly dominating. Besides this being a “fix what’s weak” release for Google, the conference had another less-noticed gem that might bring more users to the search giant: Android One.
-
I’ve just released a new version of my Open Source GLSL development tool: Synthclipse 0.9.0. Maybe somone on this board find it useful.
-
Web Browsers
-
Chrome
-
The Development branch of Google Chrome, a browser built on the Blink layout engine that aims to be minimalistic and versatile at the same time, is now at version 38.0.2107.3 for Linux, Windows, and Mac OS X.
-
SaaS/Big Data
-
FSF/FSFE/GNU/SFLC
-
The GPLGPU is now available, a GPLv3-licensed Verilog design for a 2D/3D graphics engine.
-
Openness/Sharing
-
Open Hardware
-
Shawn Frayne and Alex Hornstein, two young inventors based in the Philippines, are taking their passion for clean free energy and developing a way to make it accessible and cheap for everyone. These guys are working tirelessly to provide a product that could be used by practically anyone to make homemade solar panels.
-
Health/Nutrition
-
The Taliban went on an offensive against polio immunization in 2012 after it became clear the CIA used a fake hepatitis vaccination campaign to gather intelligence on Osama bin Laden.
-
Security
-
High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. http://www.ft.com/cms/s/0/897f35e2-19ad-11e4-8730-00144feabdc0.html#ixzz39MVkoiJS
Internet-connected cameras, USB sticks and even a web browser promising anonymity have serious security flaws, according to researchers preparing to lay bare the dangers of online life at conferences in Las Vegas this week
Cyber security researchers from across the world will gather for the Black Hat and Def Con conferences, aiming to expose vulnerabilities in devices and software that people trust in order to fix the problems and try to make companies more careful when designing technology.
-
-
Defence/Police/Secrecy/Aggression
-
Israel withdrew most of its ground troops from the Gaza Strip on Sunday in an apparent winding down of the nearly monthlong operation against Hamas that has left more than 1,800 Palestinians and 60 Israelis dead.
-
The world is not so blessed that it can afford to waste the lives of the 1.8 million Palestinians who live there
-
SUPERMARKET giant Sainsbury’s were forced to close several stores after pro-Palestine demonstrations were held in response to the retailer stocking Israeli goods.
-
Why do people who self-identify as “Jewish Americans” not subject the “American” part of that identity to the same high standards?
-
Several sources in the intelligence community confirm to ‘Der Spiegel’ that Israel listened to US Secretary of State’s unencrypted calls.
-
“Sustainable security for Israel cannot be achieved simply by permanent blockade, aeriel bombardment and periodic ground incursion. Instead, it requires acknowledging the legitimate claims of Palestinians to statehood, and sustained efforts to secure a viable Palestine alongside a secure Israel.
-
-
Gaza is a suicide bomb. It is rigged by its leaders to explode.
This is not a metaphor. It is a war crime. It makes the calculus of proportionality in the use of armed force by the Israeli Defence Forces complex and uncertain.
The Hamas use of suicide bombings is well-developed. A decade ago, it involved the leadership preparing vulnerable Arab individuals to end their lives by blowing up Jews in Israeli cities. The use of Hamas towns and local populations in their entirety as huge suicide bombs to kill Israeli soldiers drawn into them by repeated Hamas provocations is an innovation.
-
-
Remember one other fact: about half of Gaza’s people are under the age of 18. No one fights in Gaza without maiming, killing, displacing or traumatising legions of children. This not a campaign waged in empty desert, mountain or plain – forget Iraq or Afghanistan – but a battle fought in narrow alleyways crowded with infants and families.
-
An Israeli air strike has killed at least 10 people and wounded about 30 others in a UN-run school in the southern Gaza Strip, witnesses and medics said, as dozens died in renewed Israeli shelling of the enclave.
The Israeli military declined immediate comment on the attack, the second to hit a UN school in less than a week.
-
The death toll in Rafah has risen to more than 100 in 24 hours since the Israeli military unleashed its fury on the town after announcing that one of its soldiers, Second Lieutenant Hadar Goldin, had been captured and two others killed in an ambush in which a suicide bomber was used. Last night, Israel’s military declared that the missing 23-year-old had been killed in battle on Friday.
-
British drones have killed hundreds of Taliban fighters in secret SAS attacks, reveals the Sunday People.
-
Since 2008 RAF Reapers have been armed with smart weapons like Hellfire anti-tank missiles and 500lb bombs. They can fly unseen and unheard for 18 hours a day at altitudes of 30,000ft, transmitting real-time video of suspects to their controllers.
-
Why Pakistan must declassify wars in order to stop them
It was 2004 when a bird like object turned into a missile mid-air and killed Nek Muhammad, who was a tribesman leading a tribal revolution with allies in the government and the Taliban. The drone strike was one of the first where CIA had agreed to kill him and Pakistan government allowed them to enter the air space of Pakistan to hunt down the American enemies on the soil.
-
Let me begin with whether robots can kill, since whether we should or should not kill another person is ultimately a moral question. Unmanned and remotely operated Predator drones (Telerobots as they are sometimes referred to) have, in the last five years, killed more than 2,400 people. However, since Predator drones are robots programmed and remotely controlled by human soldiers, it would be more accurate to say they are the proximate not the ultimate cause of death. Given this, moral accountability and the bestowal of praise or blame continues to remain with the human soldier-pilot. Recently, however, the UN hosted a debate between two robotics experts on the efficacy and necessity of “killer robots.” In a report on the debate, the BBC described the latter as “fully autonomous weapons that can select and engage targets without any human intervention.” Although such robots do not presently exist the authors assure us that “advances in technology are bringing them closer to reality.”
-
The documents, which were obtained by the Campaign Against Arms Trade (CAAT) under the Freedom of Information Act, showed that the weapons used by Israel against Gaza contain British-made components.
-
-
-
British government’s Business Innovation and Skills Department (BIS) to review all UK export licenses for arms sales to the Jewish state.
-
US Congress okays $225m fresh aid to strengthen Israel’s anti-missile defence system
-
Hamas have said an Israeli soldier with links to the UK may have been killed in a strike on his captors by the Israeli military, Hamas has said.
-
The US Mission in Pakistan started requiring the display of US flags along with its logo so that illiterate Pakistanis became aware of the origin of assistance
-
Jones, 30, and Australian Christopher Havard were killed in a US drone strike in Yemen in November. They were not the primary targets of the attack, but were described as “collateral damage”. Australian media have quoted anonymous intelligence officials as saying Jones, also known as Muslim bin John and Abu Suhaib al-Australi, and Havard were “foot soldiers” for al Qaeda in the Arabian Peninsula.
-
Another US-led assassination drone strike in Afghanistan’s eastern Khost Province has reportedly left at least three people dead.
-
Libya’s new parliament elected earlier this year held an emergency meeting to discuss Libya’s deteriorating security situation in the eastern city of Tobruk. Handover of power to the new parliament was scheduled to happen August 4 in Benghazi.
-
W.’s fear of being unmanned led to America actually being unmanned. We’re in a crouch now. His rebellion against and competition with Bush senior led directly to President Obama struggling at a news conference Friday on the subject of torture. After 9/11, Obama noted, people were afraid. “We tortured some folks,” he said. “We did some things that were contrary to our values.”
And yet the president stood by his C.I.A. director, John Brennan, a cheerleader for torture during the Bush years, who continues to do things that are contrary to our values.
Obama defended the C.I.A. director even though Brennan blatantly lied to the Senate when he denied that the C.I.A. had hacked into Senate Intelligence Committee computers while staffers were on agency property investigating torture in the W. era. And now the administration, protecting a favorite of the president, is heavily censoring the torture report under the pretense of national security.
The Bushes did not want to be put on the couch, but the thin-skinned Obama jumped on the couch at his news conference, defensively whining about Republicans, Putin, Israel and Hamas and explaining academically and anemically how he’s trying to do the right thing but it’s all beyond his control.
Class is over, professor. Send in the president.
-
Scotland Yard holds an astonishing 260 crates of documents on police corruption in one corner of London alone – and very few of the rogue detectives have ever been successfully prosecuted.
A review led by one of Britain’s most senior police officers has unearthed a mammoth amount of intelligence spawned by Operation Tiberius, a secret police report written in 2002 that concluded there was “endemic corruption” inside the Metropolitan Police.
The file found organised crime networks in north-east London were able to infiltrate the Met “at will” to frustrate the criminal justice system.
The huge number of crates, revealed in a letter by Craig Mackey, the Met’s deputy commissioner, indicates the scale of criminality inside Scotland Yard’s north-east London units, which appears to have gone almost unchallenged since Tiberius was compiled 12 years ago.
Research suggests that only a tiny number of the scores of then-serving and former police officers named as corrupt by Tiberius have been convicted.
-
At least 32 people died in three CIA drone strikes in Pakistan, making this the bloodiest month since July 2012.
-
Transparency Reporting
-
Q: What are the overarching goals of the Freedom of the Press Foundation?
A: This first got started about a year and a half ago. The original inspiration for it was actually the Wikileaks financial blockade. Back in 2010 when Wikileaks started publishing all this classified information-State Department cables and war logs from Afghanistan and Iraq-the payment processors, Visa and MasterCard and PayPal, all cut them off, even though they were fully protected by the First Amendment and they were doing exactly what other media organizations do all the time.
-
If you want to uncover some of the secrets inside the CIA, you basically need to already know what they are when you put in your request for records, according to TechDirt.
This interesting Catch-22 stems from a request under the Freedom of Information Act from Michael Morisy of the website MuckRock, who had asked for emails related to technical issues the agency was having with its online FOIA website.
-
-
-
The NYPD said Sunday that the man who shot a video of a fatal police chokehold had been arrested on a gun charge.
A police spokesman says 22-year-old Ramsey Orta was arrested Saturday night on Staten Island on a charge of criminal possession of a firearm.
-
-
PR/AstroTurf/Lobbying
-
At least 72 corporate funders have cut ties with the American Legislative Exchange Council (ALEC) in the wake of the scandal over its pushing “Stand Your Ground” bills and restrictive voter ID laws that make it harder for Americans to vote. Newly obtained documents indicate, however, that certain long-term ALEC funders such as Koch and the tobacco industry remain committed to ALEC as a tool to advance their legislative agendas.
-
-
Censorship
-
“Soft censorship,” including actions such as quiet dismissals, punitive tax laws, denied radio frequencies and abuse of privacy legislation, is arguably the most worrisome type. It creeps and grows in small increments and therefore often goes unnoticed until it has become institutionalized, at which point it is difficult to reverse. Over the past four years, Hungary has seen dozens of small, and not so small, encroachments on the right to free expression. Taken en masse, certain developments in Hungary indicate a clear trajectory towards authoritarian regulation of the media, and the situation is becoming increasingly dire.
-
Dinanath Batra, dubbed “the book police” and “the Ban Man” by local media, is a self-appointed censor with wide influence. When he sends a legal notice to publishing houses informing them that their authors have injured Hindus’ feelings, they listen. Fearing long court battles and violent protests by Hindu activists, they have withdrawn and pulped titles or asked authors to rewrite.
-
“The first casualty when war comes,” U.S. Senator Hiram Johnson reportedly declared in 1918, “is truth.”
Johnson was an isolationist who opposed U.S. entry into the First World War, and his concern over the fate of truth in that conflict was justified.
-
The US atomic destruction of 140,000 people at Hiroshima and 70,000 at Nagasaki was never “necessary” because Japan was already smashed, no land invasion was needed and Japan was suing for peace. The official myth that “the bombs saved lives” by hurrying Japan’s surrender can no longer be believed except by those who love to be fooled. The long-standing fiction has been destroyed by the historical record kept in US, Soviet, Japanese and British archives — now mostly declassified — and detailed by Ward Wilson in his book “Five Myths about Nuclear Weapons” (Houghton Mifflin Harcourt, 2013).
-
Former Malaysian Prime Minister Mahathir Mohammad has called for the Internet to be censored to preserve “public morality”, in what the opposition suggested on Saturday was an attempt to silence government critics.
-
-
-
Still, the very idea of censorship or gag orders by a foreign government is a disturbing one, not only for journalists but for all who value the free flow of information. It’s heartening to hear that The Times has not submitted any articles for review, and I hope that that will remain the case as this situation develops.
-
The Israeli military told The New York Times on Friday to withhold publishing additional information about an Israeli soldier reportedly captured by Palestinian militants until it is first reviewed by a censor.
-
WHEN a doctor asks her patient a question, is the doctor engaged in free speech protected by the Constitution? If you think the answer is obvious, think again. According to a recent decision by the United States Court of Appeals for the 11th Circuit, everything a doctor says to a patient is “treatment,” not speech, and the government has broad authority to prohibit doctors from asking questions on particular topics without any First Amendment scrutiny at all.
-
Privacy
-
Following reports the Bahamas are under total NSA surveillance, Nimrod Kamer went to the Caribbean state to investigate for RT how its people cope without any privacy and why local authorities refuse to lift a finger to restore it.
-
The concept of privacy changed once it went online. What was once a sacred tomb of personal information has been twisted and altered by the digital age, like so many analog and now antiquated concepts before it.
-
The Courage Foundation dedicated to supporting former U.S. Central Intelligence Agency (CIS) employee and National Security Agency (NSA) contractor Edward Snowden has forwarded a letter to the Russian embassy to the U.S. to extend his asylum in Russia.
-
What happened? You guessed it: everyone’s favorite hero/villain/demon/saint, Edward Snowden, who was granted asylum in Russia exactly one year ago. This week, the tech industry threw its weight behind a bill that proposes “sweeping curbs on NSA surveillance” and “would represent the most significant reform of government surveillance authorities since Congress passed the USA Patriot Act 13 years ago.” And it could actually pass — again, thanks to Snowden.
-
Glenn Greenwald has refused to go to Germany as a witness for their investigation into NSA spying. He has released a full statement where he says that Germany is conducting an illusion of investigation to keep the German public satisfied.
-
Google knows what you’re looking for. Facebook knows what you like. Sharing is the norm, and secrecy is out. But what is the psychological and cultural fallout from the end of privacy?
-
Students in the UK can now get graduate degrees in cyber-spying approved by the masters of the craft at the UK’s Government Communications Headquarters, the British counterpart of the US National Security Agency. Students at the University of Oxford and five other universities can get masters in cyber-security signed off by the best eavesdroppers in the country, the BBC reported.
-
And in December, Der Spiegel reported that a leaked internal NSA catalogue described a tool called DeityBounce that attacked the BIOS of Dell Inc servers.
-
Google has rolled out the beta version of an anonymising proxy service, called uProxy. But Google is allegedly a partner to the NSA in PRISM project. There are other anonymiser browsers like Tor.
But then while the NSA is trying to take it down, U.S. agencies are funding it.
Germany and Brazil want a U.N. Resolution for internet privacy. European and Latin American countries are thinking of joining the effort.
Russia and Germany have switched to typewriters to type out important documents, to avoid electronic snooping.
-
On Aug. 6 bill SB-828 (4th Amendment Protection Act) will move to keep California from co-opting with the National Security Agency and its massive surveillance programs, many of which will end up in California if this bill is not passed.
-
In the first half of this year, Twitter’s seen a 46% increase in user data requests from 2013: the majority of these have come from the US (1,257), followed by Japan (192) and Saudi Arabia (189). Due to the large increase in user data requests, Twitter’s talking to the Department of Justice (DOJ) in an effort to have more transparency about what user data the Federal Government wants when it makes requests about Twitter users.
-
Digital security is more important than it’s ever been. Hacks and other digital attacks are on the rise, and to no one’s surprise the NSA is snooping as much as ever.
-
AT&T has partnered the NSA since 1985. US court records in the class action suit Hepting Vs. NSA are revealing. (Details at https://www.eff.org/cases/hepting). Page 102 of a “top secret” slide presentation of the NSA shows AT&T as one of the “80 major global corporations” supporting its missions. Page 103 shows the NSA has a ‘Special Source Operation’ which has a list of three major corporates giving it access to various kinds of telecommunication facilities.
-
So where does this leave the average user? Does one give up certain privacies for the greater good, or is what someone does online entirely their own business, even if it’s illegal? Only time will tell, but hopefully if Google is watching they’ll continue to help put men like Skillern away.
-
She “unhesitatingly agreed” to work with them and travel clandestinely to Cuba as soon as possible. The following March, she went there via Spain and Czechoslovakia. The Pentagon report does not state the obvious: while there, she must have received specialized training in intelligence tradecraft.
-
The Sarkozy case raises important questions about the issue of technology and lawyer-client confidentiality.
-
-
While some of us are comfortable with the fact that we can eat breakfast without having to tell our 429 Facebook friends about it, a few users apparently think it is an emergency if Facebook goes down for 30 minutes and prevents them from sharing pictures of the soggy cereal and milk they had for breakfast.
That is what happened on Friday when Facebook and Facebook-owned Instagram experienced a brief outage affecting millions of users around the world and prompting them to take to Twitter to complain. One user, Sgt. Burton Brink of the Los Angeles County Sheriff’s Department, posted the following tweet.
-
Here’s how bad things are between Washington and New Delhi these days: It’s news that Kerry even made the trip. Why this reluctant partnership might be best left to wither.
-
A pan-ideological group of senators this week unveiled the most high-profile bill yet for reforming the National Security Agency’s surveillance programs. The proposal does not go far enough for many civil liberties advocates. But that’s fine: The bill represents a careful, politically achievable balance, advancing several worthwhile reforms without seeking to dismantle the nation’s intelligence capabilities. Just as important, it would insist on the public release of much more information about U.S. intelligence collection, and it would provide a clear timeline for renewed debate on a range of NSA and FBI activities so the country would be able to take another crack at the issue if the bill’s balance proves unsatisfactory.
-
Civil Rights
-
It’s funny how strong-arming governments, theoretically able to bypass the red-tape that makes republics and democracies so slow-moving, just can’t produce that kind of nimble posture when walking back their attempts to thought-control the internet. Time and again, we find examples of governments taking Orwellian measures against their own people on internet sites and social media networks, finding them to be far less useful than they’d thought, and then merely inching away from those attempts rather than outright reversing them. Ukraine recently served as an example of this, when they attempted to track and creep-out protesters via text messages and police action, before then walking back the text message portion and then finally succumbing to regime-changing revolution.
-
-
Heads of Both the CIA and NSA Have Been Caught Lying To Congress and the American People, They Are Not Prosecuted for Perjury and They Keep Their Jobs
-
-
The Senate Intelligence Committee’s top Republican on Sunday defended CIA Director John Brennan for not knowing the extent of the agency’s spying on Senate computers as revealed in a recent internal watchdog report.
-
Nothing puts the exclamation mark on the culture of impunity that President Barack Obama’s administration has enabled like the war on whistleblowers. As whistleblowers sit in prison or are effectively living in exile because they dared to call attention to crimes, misconduct or abuses of power, some of the very same officials implicated walk freely and live with the comfort of knowing the United States government will never seek to hold them accountable.
-
-
-
-
-
In the realm of human rights advocacy, few organizations enjoy the influence commanded by Human Rights Watch (HRW).
With outposts and contacts all over world, the New York-based NGO enjoys a reputation for assiduously chronicling human rights abuses and leveraging its political clout to hold abusers to account. HRW experts routinely testify before Congress, and HRW scholars enjoy access to a range of media outlets – from the New York Times on down to Foreign Policy In Focus.
-
Just as a Senate report condemning the waterboarding of a couple of the most dangerous GITMO terrorists is due to be released, Democrats are calling for the head of the CIA director.
With midterm elections looming, the timing is significant since in the Senate report Democrats are condemning the Bush administration and CIA operatives for “torturing” top terrorists in order to gain critical information about terrorist activities.
-
A controversial investigation began right after the CIA released a report on Thursday that gravely contradicted John Brennan’s public statements. It seems that the CIA illegally hacked several computers of the Senate and when the CIA declared that they were in possession of a document from one of those computers, John Brennan, CIA Director, came under serious scrutiny.
-
-
Torture is illegal. Laws were broken. Obama said his administration won’t pursue criminal charges. But if Boehner’s attorneys aren’t too busy with that frivolous lawsuit, there’s some actual lawlessness to look into.
-
So the nation’s top spy organization, the CIA, has been spying not just on terrorists but on the U.S. Senate, and now even admits it.
Really?
And a president of the United States who condemned this sort of thing before he entered the Oval Office apparently now condones this behavior by his silence, while putting roadblock after roadblock in front of an increasingly and justifiably irritated Congress wanting to get to the bottom of the matter.
Really?
After repeated and vehement denials from CIA Director John Brennan that his employees had ever hacked into U.S. Senate Intelligence Committee computers to find the contents of a coming and reportedly quite damning report on the agency’s behavior following 9-11 — specifically regarding the detention and alleged torture of terror suspects — the CIA now concedes, though its inspector general, that such deliberate infiltration did in fact happen. Brennan has apologized, specifically to Sen. Dianne Feinstein, chairwoman of the committee, after initially responding to her and other senators’ allegations that “nothing could be further from the truth … that’s just beyond the scope of reason.”
-
-
I voted for Barack Obama twice and would do so again, given his election opponents, but man, he can annoy the hell out of me.
This time, it’s his statement Friday that after Sept. 11, the CIA “tortured some folks.” Here’s the story in The Guardian.
Let’s dispense with the small detail first: That statement is a 10 on the no-shit-ometer. Is there anybody who didn’t already believe this? We’re a long way from “breaking news” alerts from your favorite news websites.
I have a bigger problem. It’s Obama’s use of the word “folks.” It’s a colloquial word. It’s relaxed. It’s informal. Example: “My folks have a cabin in Tennessee.” Or “I’m eating barbecue this afternoon with my folks to celebrate my dad’s birthday.”
-
The release of a highly anticipated Senate Intelligence Committee report on the CIA’s interrogation tactics has been delayed due to “significant redactions” made by the Obama Administration, the committee chairwoman Sen. Dianne Fenistein (D-Calif.) announced on Friday.
-
-
Speaking with guest-host Monica Crowley on the Fox’s Hannity, Liz Cheney, daughter of the former Vice President Dick Cheney, called President Barack Obama a “disgrace” and “despicable” for admitting that America tortured detainees following the attack on 9/11.
-
Last night, the Hannity show “analyzed” President Obama’s comments characterizing the CIA’s “enhanced interrogation” program under the Bush/Cheney administration as “torture.” So whom did Fox call on for some of its typically “fair and balanced” commentary? Why, none other than Dick Cheney’s daughter, Liz Cheney. There were no pesky challenges from substitute host Monica Crowley, either.
-
-
The government stands accused of seeking to conceal Britain’s role in extraordinary rendition, ahead of the release of a declassified intelligence report that exposes the use of torture at US secret prisons around the world.
The Senate report on the CIA’s interrogation programme, due to be released in days, will confirm that the US tortured terrorist suspects after 9/11. In advance of the release, Barack Obama admitted on Friday: “We tortured some folks. We did some things that were contrary to our values.”
-
-
-
At the same time, a panel of federal judges has upheld a new policy allowing guards at the US “war on terror” prison at Guantanamo Bay, Cuba, to search the groin areas of suspects meeting with their lawyers.
-
What the CIA’s entry to twitter confirms is the increasing acceptability of soft power as an instrument of diplomacy and international relations. As an Agency that evokes keen global interest as an instrument of US foreign relations, allowing a peep into its unclassified content via social media is a clear indication of its intention to increase its soft power quotient. It is merely following a growing global trend broadly referred to as Digital Diplomacy.
-
A forthcoming Senate report on the controversial interrogation techniques employed by the CIA in the wake of September 11 is expected to clearly label those techniques torture and conclude that they did not yield much in the way of actionable intelligence.
-
-
-
-
-
Republicans on the Senate intelligence committee will soon release a minority report asserting that the CIA’s use of harsh interrogation techniques helped bring down Osama bin Laden and other terrorists, the panel’s top Republican said on Sunday.
“Information gleaned from these interrogations was in fact used to interrupt and disrupt terrorist plots, including some information that took down Bin Laden,” the Georgia senator Saxby Chambliss said on CBS’s Face the Nation.
The Senate intelligence committee reports will come five years after it authorised an investigation into the use of possible torture by the CIA after the September 11 attacks.
-
No one new called for Brennan’s resignation, as Sen. Mark Udall (D-Colo.) and other lawmakers have in the past few days. President Obama said Friday that he has “full confidence” in Brennan. But the CIA director continues to be under fire from some and defended by others.
-
House Intelligence Committee Chairman Mike Rogers (R-Mich.) said Sunday he doesn’t think the CIA spied on the Senate.
Rogers said it’s clear that someone at the CIA “overstepped their bounds,” but he also defended the agency during an interview on CNN’s “State of the Union.”
-
-
-
White House adviser Dan Pfeiffer defended CIA Director John Brennan, calling him a man of “great integrity” amid calls for the intelligence chief to step down after the agency admitted to spying on Senate staffers.
-
Sen. Angus King, a member of the Senate Intelligence Committee, said Sunday that Central Intelligence Agency personnel committed acts of torture in the wake of 9/11 and called it “unjustifiable.”
King, an independent from Maine who caucuses with Democrats, said he has voted to declassify a report by the Senate intelligence panel detailing the incidents of alleged torture.
-
-
-
-
-
-
-
After much brouhaha, post an internal inquiry, the Central Intelligence Agency (CIA) has finally acknowledged that some of its employees had “improperly accessed” computers that were in use by the U.S. Senate Intelligence Committee.
Reuters managed to lay its hands on an “unclassified summary of the inspector general’s report” and the document reveals that the inspector general (IG) discovered that two lawyers, five employees and three IT staff had accessed sensitive information pertaining to the Senate’s investigation via their computers in an improper manner.
-
-
A controversial investigation began right after the CIA released a report on Thursday that gravely contradicted John Brennan’s public statements. It seems that the CIA illegally hacked several computers of the Senate and when the CIA declared that they were in possession of a document from one of those computers, John Brennan, CIA Director, came under serious scrutiny.
-
Internet/Net Neutrality
-
Comcast is a monopoly. The question is, how much of a monopoly is Comcast, and how much of a monopoly will it be after it absorbs Time-Warner Cable (TWC)?
To help quantify market influence, economists use the Herfindahl–Hirschman Index (HHI), a metric that is calculated by adding the squares of the market shares of every firm in an industry. HHI produces a number between 0 (for a perfectly competitive industry) and 10,000 (for an industry with just one firm).
-
Permalink
Send this to a friend
Posted in GNU/Linux, Microsoft, Windows at 7:08 am by Dr. Roy Schestowitz
Summary: The world is leaving Windows behind (at all levels) and Microsoft is now joining companies that are using GNU/Linux, perhaps acknowledging that the demise of Windows is inevitable
MICROSOFT has suffered a huge decline in sales of Windows. It was very clear. Microsoft wasn’t able to hide it anymore. Not even increased pressure on companies to pay up could make up for the alarming numbers which preceded massive layoffs (almost 20,000 staff). As large nations gradually move away from Windows (not ‘upgrading’ Windows) the company is likely to resort to lawsuits (when extortion tactics fail). Without Windows, the common carrier, Microsoft is reduced to almost nothing. This milking cow is the only reason many people still use Office and other offerings from Microsoft.
Gregg Keizer from IDG says that “Windows 8′s uptake was stuck in reverse for the second straight quarter as the reputation-challenged operating system fell behind the pace set by Windows Vista six years ago, according to data released Friday.
“Web metrics firm Net Applications’ figures for July put the combined user share of Windows 8 and 8.1 at 12.5% of the world’s desktop and notebook systems, a small drop of six-hundredths of a percentage point from June. That decline was atop a one-tenth-point fall the month before, the first time the OS had lost user share since its October 2012 debut.”
Regarding the source of the data, Net Applications, it is Microsoft-affiliated, too.
It sure looks like the Windows franchise is becoming a thing of the past; sales of Android devices outpace sales of computers with Windows and as older PCs (running Windows XP) age too much users may move to GNU/Linux or buy new devices with Linux/Android on them. Microsoft (Nokia) tried to make its own version of Android but failed. Nobody wanted Microsoft.
On the server side too this is happening. Microsoft's share in Web servers has been reduced to just spam and inactive domains. GNU/Linux is highly mature a platform and many hosting platforms now use GNU/Linux by default. I see this in my daytime job. There’s an influx/inertia leading to FOSS, albeit quite silently. This means that a lot of companies will make the migration sooner or later, especially now that Windows Server 2003 becomes orphaned [via]:
The end of extended support for Windows Server 2003 is just under a year away. One manager says the average migration will take 200 days, so start thinking about migrating if you haven’t already.
Hopefully he speaks of a migration to GNU/Linux. There is no reason to stay with the Vista equivalent on the server side. There is nothing in it, except newer back doors, increased fees, and more lock-in. Based on the trend in nations such as Russia and China, many systems at the back end will be converted to GNU/Linux, perhaps when support lapses for the current version of Windows (that’s what happened in Munich, Germany).
Microsoft has become so desperate on the server side that it is now liaising with one of the largest users of GNU/Linux, namely Akamai. There is no suggestion that Akamai will be using Windows; in fact, even years in the past (e.g. the Olympic Games in Beijing) Microsoft relied heavily on GNU/Linux (at Akamai) for data delivery. For Microsoft to grow closer to Akamai is rather telling; perhaps Microsoft too is already seeing the writings on the wall. The world is moving beyond Windows, and there’s absolutely nothing Microsoft can do to stop it (except perhaps trying to tax it using software patents). █
Permalink
Send this to a friend
Posted in Microsoft at 6:44 am by Dr. Roy Schestowitz
Summary: Microsoft goes batting for DRM, removing other people’s code from the Web for doing exactly what Microsoft itself is doing
As part of Microsoft’s openwashing “charm offence”, the company recently — GASP — opened an account at GitHub. Some gullible writers made a big deal out of it and Microsoft-friendly press once said that “The New Microsoft Is a Pal of GitHub” (“New Microsoft” is a marketing term, the company is now suing Android leaders for antagonising Microsoft extortion). Never mind if Microsoft nearly snatched staff that had created GitHub, potentially ruining GitHub. Microsoft wants us to believe that it is now a “Pal of GitHub”.
Anyway, several weeks ago Microsoft became a mass cleanser of the Internet, bringing down millions of services by aggressively taking over No-IP and then rewriting history. The company clearly cares neither for GitHub nor for the integrity of the Net. Microsoft bombards Google with bogus DCMA takedown requests, too. Takedowns have a long history at Microsoft. The company is a censor. It’s a bully that hates the Web because disruption to its business comes from the Web.
We were not entirely shocked to learn that Microsoft has censored GitHub, removing what was basically the equivalent of what Microsoft already does:
Following a complaint from Microsoft, GitHub has removed the code repository of an app that provides access to unprotected Xbox Music tracks. The developer of the software is surprised by Microsoft’s move, stating that the company itself is offering access to DRM-free music through its API.
Well, this is Microsoft censorship and strong-arming. The company is a bully and this too is a reminder of it. GitHub should not have obeyed Microsoft’s request. █
Permalink
Send this to a friend
Posted in Deception, Microsoft at 6:25 am by Dr. Roy Schestowitz
Summary: Netcraft explains why Microsoft’s numbers seem to be increasing and also finally changes the way it presents market share
Microsoft Windows is a malware farm, so it oughtn’t be too shocking that Web spam (“link farms”), according to Netcraft’s latest figures via], is driving up Microsoft’s share (along with what seems like bribed hosts of parked domains). “Microsoft spin” is what our readers called it. Here is what Netcraft says:
Microsoft’s most recent growth in hostnames since mid-2013 has, for the most part, been caused by a large number of Chinese linkfarms (泛站群). The sites in question provide advertising for gambling sites, online product listings, and normally make use of affiliate schemes. Yet they are hosted in the USA, on generic TLDs such as .com and .net to bypass China’s TLD and internet content provider (ICP) license requirements. Unusually, each linkfarm makes use of a reasonably large number of domains and IP addresses, presumably making them harder for search engines to evade. This would normally be cost prohibitive for this kind of activity, however hosting and domain packages can be found advertised on auction sites specifically for this purpose, with packages of (random/unspecified) .com domains available for as little as ¥17 (~ £2 / $3) each, guaranteed to remain yours for at least a month. It is not clear why IIS has been chosen for these sites, however it does have a considerably higher market share (for all of our metrics) in China compared to worldwide – for example 59% of domains hosted in China use IIS compared to just 29% worldwide.
We previously explained the role of parked domains as well. Here are some posts from a few months ago:
Microsoft software is not only behind inactive domains; it is also running behind spam (link farms). What a source of pride, eh? Microsoft’s real market share on the Web is ~10%, depending on how it’s measured. Top sites hardly have anything from Microsoft in them, so the total active site/domain count can be very misleading. Microsoft’ share on the Web (measured in terms of number of requests for a page) may actually be something far lower than 10%, and maybe lower than 5%. █
Permalink
Send this to a friend
08.02.14
Posted in News Roundup at 4:46 pm by Dr. Roy Schestowitz

Contents
-
Desktop
-
It’s impossible to deny the amazing rise of Chrome OS. The Chromebook has taken the consumer world by storm and is repeatedly the top selling laptop around. This Linux-based platform was the ideal solution at the ideal time. The cloud proved itself not only a viable option but, in many cases, the most optimal option. The puzzle was simple to solve…
-
Server
-
The chip maker’s offering includes its Opteron A100 “Seattle” SoC, its first chip based on the ARM architecture.
-
It is no secret that AMD plans to release SoCs (system on a chip) featuring ARM processor cores and that AMD and ARM have been collaborating on various projects for quite some time. A few months ago, AMD even released its low-power Beema and Mullins processors, which included on-die ARM-based Platform Security Processors which leverage the industry standard ARM TrustZone system security framework. Just yesterday though, AMD announced that it had made available development kits featuring AMD’s first 64-bit ARM-based processor, formerly codenamed “Seattle.”
-
If you have used Elastic Beanstalk from AWS or OpenShift from Red Hat you might be familiar with PaaS terminology, but if you haven’t then PaaS is a category of cloud computing services that provides a computing platform and a solution stack as a service.
If you are a java developer, then you might need Apache tomcat application server with a PostgreSQL database as a backend and some sort of storage to develop and publish your application.
-
Kernel Space
-
Stable kernels 3.15.8, 3.14.15, 3.10.51, and 3.4.101 have been released. All contain important fixes.
-
-
-
-
Today, the Linux Foundation “Introduction to Linux” course, which previously cost $2,400, is becoming available for free on the web. You can get the details and register here. The Linux Foundation has provided a very complete summary of what is found in the course, and it looks like an excellent offering that anyone can dive into online, without pressure. As we’ve noted many times, edX, which is hosting the class, has also emerged as one of the top destinations for online learning.
-
In today’s open source roundup: The free Introduction to Linux class starts today and you can still register. Plus: Can LibreOffice 4.3 beat Microsoft Office, and Debian 8 will ship with Linux 3.16
-
Several economic changes conspired to put OLS into the financial bind it is today. You can read Andrew’s take about it on the Indiegogo site. I think the problems started before the temporary move to Montreal. In OLS’s growth years, the Kernel Summit was co-located, and preceded OLS. After several years with this arrangement, the Kernel Summit members decided that OLS was getting too big, that the week got really really long (2 days of KS plus 4 days of OLS), and that everyone had been to Ottawa enough times that it was time to move the meetings around. Cambridge, UK would be the next KS venue (and a fine venue it was). But in moving KS away, some of the gravitational attraction of so many kernel developers left OLS as well.
-
Applications
-
The XBMC project has shared with us that they’re renaming the project entirely to something very different in order to no longer reflect its past Xbox Media Center name.
-
XBMC (Xbox Media Center) is undoubtedly one of the most popular media center products around. This open source project is now being rechristened as Kodi.
[...]
Personally, since I never owned or liked Xbox I really feel like installing an Xbox application of my system. Why would I install an application meant for Xbox on my Linux machine which has remotely nothing to go with Microsoft’s ‘me too’ game console? So I will be more inclined towards installing Kodi than some Xbox Media Center.
-
The Calibre eBook reader, editor, and library management software has been updated to version 1.47 and comes with a set of new features.
-
-
-
ClamTk is a GUI frontend for ClamAV using Perl and Gtk libraries, and it was developed to provide on-demand virus scanning and detection. It might feel a little redundant, but you can never be too sure.
-
Most note-taking applications I have used forced me to enter plain text and leave a reference to related files. With MyNotex, I can format as I enter the information and be done with it. For example, I can place graphics and photos within the note. Each note may have any number of attachments. I can manage paragraph alignment as well as bullets, numbered or alphabetic lists with automatic indentation.
-
-
-
-
-
-
Instructionals/Technical
-
Games
-
Linux has recently gotten a lot more attention as a platform for games, and this has caused a lot of joy among Linux gamers. But are we celebrating something that already happened a long time ago?
-
-
UNIGINE, a real-time 3D engine built to run on all major platforms, including Linux, has been updated again and its developers have implemented numerous features, including a comprehensive City Traffic System.
-
Valve has pushed another update out to SteamOS, with this time around there being benefits to fans of the XBMC multimedia software.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
As you can see in both the screencast and these two screenshots, the edit dialog for placemarks has a couple of fields which are unavailable at the moment (label scale, ion color/scale). This is because Marble is designed in a way so that the data (such as coordinates, name, description, label/icon scale, etc) is kept apart from the objects which deal with the rendering and these objects don’t have an implementation for the unavailable options I mentioned above. However, they will be implemented soon. Also, I’m planning to implement another way of managing icons in the near future.
-
-
-
It’s been a while since my last update, but the DVB implementation for Plasma Media Center (PMC) is fully functional, so from now on I am polishing the user interfaces.
-
-
-
-
Today KDE released the Release Candidate of the new versions of Applications and Development Platform. With API, dependency and feature freezes in place, the KDE team’s focus is now on fixing bugs and further polishing.
-
Almost all Kubuntu software is ported already. Some of the applications even managed to go qt-only because of all the awesome bits that moved from kdelibs into Qt5. It is all really very awesome I have to say.
-
-
The second Alpha images of the upcoming Ubuntu 14.10 (Utopic Unicorn) Linux distribution are now available for download and testing.
-
The release candidate for KDE’s Applications and Platform version 4.14 has been made available for testing.
-
GNOME Desktop/GTK
-
openSUSE is known for offering one of the most integrated experiences with the desktop environment it comes with. Their Plasma and Gnome desktops are par-excellence when it comes to polish and now those who still like the good old Gnome 2 UI can use the latest version of Mate in openSUSE.
-
WebKitGTK+ 2.5.1 is the first version of this release cycle. It comes very late mainly due to the regressions introduced by the switch to CMake and the problems we found after removing WebKit1 from the tree. It also includes some new features that I’ll talk about in other posts, probably when 2.6.0 is released. In this post I’ll only focus on the breaks introduced in this release, in order to help everybody to adapt their applications to the API changes if needed…
-
-
Zorin OS 9 is based on Ubuntu Linux 14.04 which is the long term support release and this means you will get software updates until 2019.
The unique selling point for Zorin OS is that it is has multiple themes which make it look like the operating system that you are used to using. For instance if you are used to Windows XP then you are able to switch to an XP style interface and if you use Windows 7 you can switch to a Windows 7 interface.
-
Screenshots
-
Red Hat Family
-
Fedora
-
-
Wow, I had no idea that people would care about the start of this project. There seems to be a few questions out there that I’d like to address here to clarify what we are doing and why.
-
-
Debian Family
-
Now that tracker.debian.org is live, people reported bugs (on the new tracker.debian.org pseudo-package that I requested) faster than I could fix them. Still I spent many, many hours on this project, reviewing submitted patches (thanks to Christophe Siraut, Joseph Herlant, Dimitri John Ledkov, Vincent Bernat, James McCoy, Andrew Starr-Bochicchio who all submitted some patches!), fixing bugs, making sure the code works with Django 1.7, and started the same with Python 3.
-
The folks at VolksPC started showing off a software solution that lets you run Android and Debian Linux simultaneously on an ARM-based computer. This lets you use the same machine to run full desktop Linux apps like LibreOffice or Firefox as well as Android apps including Netflix, Hulu Plus, and any number of video games.
-
Derivatives
-
Whether it’s the NSA exploiting weaknesses in encryption software, the holes in Tor making it less anonymous, or the major problems with Tails—vulnerabilities are constantly testing the security and anonymity of computer users.
But little known Montreal-based developers at Subgraph want to change all that, and have started working on a zero-day resistant Operating System (OS), protecting against infiltration.
Subgraph takes the approach that overall computer security is critical to anonymity, targeting protection against zero-day vulnerabilities, the types of weakness unknown to the developers while they’re writing software.
-
Canonical/Ubuntu
-
-
-
“Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. Ideal for those who want the most out of their desktops, laptops and netbooks and prefer a traditional desktop metaphor. With modest hardware requirements it is suitable for modern workstations and older hardware alike,” reads the official website.
-
Ubuntu 14.10 Alpha 2 implements new some under-development applications, so that the users can report bugs for the developers to fix in the daily images. For example, a RC version of Kernel 3.16 now runs on the Alpha 2 images, while Kernel 3.16 stable will be implemented on the final versions of Ubuntu 14.10.
-
Canonical published some very interesting details about a South Korean company called Bukwang Pharmaceuticals, which ditched most of its Windows OSes for Ubuntu and saved a lot of money. On top of the obvious savings, it also got a lot of good press, and other businesses found out that it can be done…
-
Bukwang Pharmaceuticals has been developing and manufacturing drugs and personal hygiene products in South Korea since 1960. Today, it has over 600 employees based at various sites across the country.
-
I’ve said it many times but it bears repeating that the price/performance of GNU/Linux that is widely accepted on servers can be had on desktops too. The licence says so. You can run, examine, modify and distribute the code, all those things that cost extra with that other OS and are a constant drain on resources.
-
Ami Banerji’s Linux desktop is clean, simple, and pretty open. What it gives up in widgets it gets back in simplicity, and what’s a good thing. Here’s how to get the same look for your computer.
-
Canonical has published details in a security notice about a Unity exploit that has been corrected in Ubuntu 14.04 LTS (Trusty Tahr) operating systems.
-
Canonical has published details in a security notice about a KDE-Libs vulnerability in Ubuntu 14.04 LTS and Ubuntu 12.04 LTS operating systems that has been found and fixed.
The Ubuntu developers have closed a small vulnerability with KDE-Libs that would cause kauth to be tricked into bypassing polkit authorizations.
-
Flavours and Variants
-
Kubuntu 14.10 Alpha 2 (Utopic Unicorn) is now ready for download and its developers provide both the KDE 4.14 branch and the new Plasma 5 for testing.
-
The Ubuntu developers have released the second alpha of the Utopic Unicorn (to become 14.10). Since Ubuntu Unity doesn’t participate in alpha releases, the alpha includes ISO images for Kubuntu, Lubuntu, Ubuntu GNOME, UbuntuKylin and the Ubuntu Cloud. Xubuntu is once again missing from the alpha release.
-
-
Marvell has posted detailed datasheets on its previously opaque Armada 370 and XP SoCs, used in Linux-based NAS systems from Buffalo, Netgear, and Synology.
-
The Revolv Smart Home Automation Solution is now available with an Android control app, greatly expanding its appeal beyond its core iOS user base. Until now, Android users have required an Insteon Remote in order to perform functions like assigning manual-triggered “Actions.” You can now use your Android phone to unify devices and customize automations based on four triggers, three of which are automatic: GeoSense, time of day, and device-to-device/motion sensor. The fourth is an On Demand manual trigger.
-
For some time now, there has been much talk about the Raspberry Pi revolutionising the teaching of computing in schools. Linux User & Developer has devoted much space and attention to the growing number of Jamborees and the increasing attention teachers are giving to the small, £25 bare-bones machine. It is, say advocates, the perfect way to introduce children to the world of computing, allowing them to see and actually interact with the innards of the machines they are using. It is, they add, a great platform for programming and for creating all manner of electronic wonders.
-
Phones
-
Ballnux
-
The problem has been execution. The Samsung UI that was once known as TouchWiz has earned derision for being bloated, bloopy, and unintuitive, while the subscription-based Samsung Music Hub was recently shuttered due to lack of user interest. Ironically, Samsung’s now struggling with the same sort of software issues that gave it the opportunity to become a leading phone manufacturer in the first place.
-
Android
-
-
Microsoft’s purchase of Nokia’s mobile division gave most of us the impression that Nokia was done with mobile phones. But suspicious job listings posted on LinkedIn recently may indicate that Nokia is planning a mobile comeback, and it might be based on new Android phones.
-
-
Hong Kong based reseller W2Comp, which previously introduced a dual-core Rockchip RK3066 based Probox2 Ultimate media player that runs Android 4.0, has now launched a faster model, called the Probox2 EX (Extreme), that runs Android 4.4 (“KitKat”). The new mini-PC is open for pre-orders at $150, with shipments beginning Aug. 8. There’s no mention of any support for Google’s upcoming remix of Google TV called Android TV, but the Probox2 EX would seem to have the advanced hardware to run it.
-
So you have rooted your device and are now thinking what do I do? What was all the flashing, installing and wiping for? My phone still looks the same! Well, yes, rooting does not actually do much in itself but instead offers you the opportunity to customize and alter the device. The best way to do this is with root-only available apps and this list should help you to get to grips with the basics of root apps.
-
OnePlus has generated a hell of a lot of hype over the last few months and seem to be using hype as an interesting marketing tool. The company’s flagship device, the ‘One’ generated enormous hype among techies and as a result has generated demand which clearly outweighed the company’s expectations and capabilities. Especially due to their notorious invite system. Last week there were suggestions OnePlus are already working on the OnePlus Two and now it seems hype is building around what very well could be a OnePlus Smartwatch…the OneWatch.
-
Android smartphones are becoming a seemingly unstoppable force, accounting for 85% of the worldwide market in the second quarter of 2014 according to new research.
-
The team at Mitro Labs, the developer of a password manager, is joining Twitter, and its software is being released under a free and open source license, Mitro said Thursday.
-
Today, Twitter acquired a password manager startup called Mitro. As part of the deal, Mitro will be releasing the source to its client and server code under the GPL.
-
Open source and open data solutions now should receive top consideration at the General Services Administration.
Sonny Hashmi, the GSA chief information officer, said Thursday during an online chat with Federal News Radio that he recently signed out a memo requiring agency software developers to look at open source before they consider traditional commercial solutions.
-
This week, SDN bloggers took a look at how open source SDN continues to take shape among vendors, how SDN adoption rates are higher than initially predicted, and all you need to know about OpenFlow.
-
One of the major driving forces behind the plethora of technological innovations in the cloud computing arena is the concept of open source software. With nearly one million open source projects related to the cloud believed to be in progress, new technologies such software as a service are on the rise.
Companies are contributing more in terms of time, money and support for user-led open source initiatives, with big business benefits such as operational cost reductions, application flexibility and boosts to competitive advantage being on offer.
Vendor-led development initiatives are gaining ground too, buoyed by massive collaboration projects on a global scale. The increasing ‘democratisation’ of the open source world is a major contributor to its burgeoning success.
-
A PRESENTATION by the European nuclear research organisation CERN at the recent open source convention (OSCON) has provided a glimpse at where IT organisations are going to have to go in order to remain competitive. They will need to leave old legacy proprietary approaches behind and adopt open source.
CERN collects huge volumes of data every day from thousands of detectors at its nuclear collider ring located under the border between France and Switzerland near Geneva. It organises and archives all of this data and distributes much of it to research scientists located throughout the world over high-speed internet links. It presently maintains 100 Petabytes of legacy data under management, and collects another 35 Petabytes every year that it remains in operation. One Petabyte comprises one million Gigabytes.
-
Brescia said that Bitnami’s goal is to make it as easy to deploy an application on a server as it is to install an application on an endpoint computer. Bitnami has more than 90 different open-source applications and development environments in its software library that can be deployed with one-click installer packages on desktop, virtual machine and cloud deployments.
-
Belkin revived the Linksys WRT54G in a new 802.11ac model earlier this year and one of its selling points has been the OpenWRT support as what made the WRT54G legendary. However, OpenWRT developers and fans are yet to be satisfied by this new router.
-
Web Browsers
-
Mozilla
-
If the release of Firefox’s Australis interface got you down, there are Firefox-based alternatives out there with a more traditional Mozilla UI. One such alternative is Pale Moon and here’s how you get it.
-
SaaS/Big Data
-
Paying talented developers to write high quality code isn’t cheap; why on Earth would you then turn around and give that code to your competitors? Turns out, there’s probably a competitive advantage in doing so.
-
ownCloud Inc, the popular open source enterprise file sync and share project, has launched the latest ownCloud 7.
-
June and July brought lots of big news surrounding enterprise analytic data management powered by the open source Hadoop platform. Cloudera, focused on supporting enterprise Hadoop, announced in June that it raised a staggering $900 million round of financing with participation by top tier institutional and strategic investors. It also firmed up a partnership with Dell and Intel to launch a dedicated Dell In-Memory Appliance for Cloudera Enterprise that facilitates Hadoop-driven analytics.
-
Oracle/Java/LibreOffice
-
Open Source Storage (OSS), the recently relaunched company that bills itself as “the only true end-to-end open source storage solution,” added two new executives this week who bring experience from Oracle (ORCL), Sun and elsewhere.
-
In this slide show, eWEEK takes a look at some of the new features in LibreOffice 4.3.
-
CMS
-
Back in early 2012, when the TechCrunch developer team (Nicolas Vincent, Alex Khadiwala, Eric Mann, and John Bloch) started working on the TechCrunch redesign, one of the main goals was to improve site performance. During the development process, we implemented several tools to help achieve that goal.
-
BSD
-
FSF/FSFE/GNU/SFLC
-
The FSF is happy to building bridges to new communities, and exploring the role of free software in social justice and economic change.
-
A number of GNU packages, as well as the GNU operating system as a whole, are looking for maintainers and other assistance: please see https://www.gnu.org/server/takeaction.html#unmaint if you’d like to help. The general page on how to help GNU is at https://www.gnu.org/help/help.html. To submit new packages to the GNU operating system, see https://www.gnu.org/help/evaluation.html.
-
Join the FSF and friends every Friday to help improve the Free Software Directory by adding new entries and updating existing ones.
-
Public Services/Government
-
As I write this, NASA has just passed another milestone in releasing its work to the Open Source community. A press release came out announcing the release on April 10, 2014, of a new catalog of NASA software that is available as open source. This new catalog includes both older software that was previously available, along with new software being released for the first time. The kinds of items available include project management systems, design tools, data handling and image processing. In this article, I take a quick look at some of the cool code available.
The main Web site is at http://technology.nasa.gov. This main page is a central portal for accessing all of the technology available to be transferred to the public. This includes patents, as well as software.
-
The commission’s consideration of open source options for content management was based on Cabinet Office requirements for public sector organisations to look at potential alternatives to proprietary systems dating back to 2010.
-
Openness/Sharing
-
-
-
-
It’s that time again. In this week’s edition of our open source games news roundup, we take a look at a WWI shooter for Linux where trench foot is conspicuously, blessedly missing from the feature list, as well as a remake of one of my favorite Dreamcast joints, ChuChu Rocket!
-
Open Data
-
In this podcast, we talk to Chris Albon, director of the global crisis data arm of Ushahidi, an open-source data mapping organisation that originated in Nairobi, Kenya.
-
Open Access/Content
-
Perhaps the most rewarding experience of education is self-direction. Here, the individual fully enjoys his or her own labor. Whatever one’s interests are, self-direction is achieved on one’s own terms.
Self-directed education promotes initiative, creativity, co-operative/mutual labor and healthy academic competition in one’s field to cultivate a learning network.
This is the very basis of the scientific method. We are encouraged to doubt and question the existing order, to follow self-direction and formulate our own hypotheses to work toward possible conclusions.
-
Open Hardware
-
MakerBot has launched MakerBot Europe in order to pave the way for desktop 3D printing beyond the United States.
-
Programming
-
A group of Facebook developers has decided to break with 20 years of tradition and release a formal specification for the PHP programming language.
-
If you’ve been using Linux long, you know that whether you want to edit an app’s configuration file, hack together a shell script, or write/review bits of code, the likes of LibreOffice just won’t cut it. Although the words mean almost the same thing, you don’t need a word processor for these tasks; you need a text editor.
In this group test we’ll be looking at five humble text editors that are more than capable of heavy-lifting texting duties. They can highlight syntax and auto-indent code just as effortlessly as they can spellcheck documents. You can use them to record macros and manage code snippets just as easily as you can copy/paste plain text.
-
Programming always has been that “thing” people did that I never understood. You’ve heard me lament about my lack of programming skills through the years, and honestly, I never thought I’d need to learn. Then along came the DevOps mentality, and I started introducing programmatic ways of managing my system administration world. And you know what? Programming is pretty awesome.
-
Today in Linux news, Jack Germain has a look at the perfect note taker. The Linux Voice has a comparison of text editors for programmers and the Linux Journal introduces their current issue on program languages. In other news, XBMC becomes Kodi and Linux.com has 10 reasons to take the Linux Foundation’s Introduction to Linux edX course.
-
During his visit to Estonia on June 21, the President of the European Commission Jose Manuel Barroso emphasized that it is vital to reach an agreement on the Rail Baltica project, reports Eesti Paevaleht.
-
Science
-
Just a week into the sampling program and SWERUS-C3 scientists have discovered vast methane plumes escaping from the seafloor of the Laptev continental slope. These early glimpses of what may be in store for a warming Arctic Ocean could help scientists project the future releases of the strong greenhouse gas methane from the Arctic Ocean.
-
Health/Nutrition
-
Take the case of cocoa farmers in the Ivory Coast, the world’s leading exporter of cocoa beans. (The country produces more than 30% of all the beans grown worldwide.) As this CNN infographic explains, only 3% of the money you pay for a chocolate bar makes it back to the farmers who grow the beans. The rest goes to the people further up the supply chain, the ones who transform the beans into chocolate and sell it it stores across the globe. Ivory Coast farmers make roughly $10 a day, putting a $2 chocolate bar out of reach.
-
Security
-
-
-
-
-
-
-
-
-
-
-
-
-
-
When creators of the state-sponsored Stuxnet worm used a USB stick to infect air-gapped computers inside Iran’s heavily fortified Natanz nuclear facility, trust in the ubiquitous storage medium suffered a devastating blow. Now, white-hat hackers have devised a feat even more seminal—an exploit that transforms keyboards, Web cams, and other types of USB-connected devices into highly programmable attack platforms that can’t be detected by today’s defenses.
-
-
-
-
-
We’ve been following the case of Adel Daoud for a little while now. He’s one of the many people arrested for “terrorism” in one of the FBI’s dozens of “home grown plots” in which they create their very own terrorist plot, dupe someone into “joining” and then arrest (and then relish in the headlines about stopping a terrorist “plot” that was never a real plot in the first place). In Daoud’s case, the made up “plot” involved blowing up a Chicago bar. But the Daoud case got a lot more attention, because in the big “debate” over the renewal of the FISA Amendments Act (FAA) in late 2012, Senator Dianne Feinstein directly described the Daoud “plot” as an example of why the FAA and Section 702 were necessary.
-
Four Mail on Sunday journalists were told by the police in 2006 that their mobile phones had been hacked
-
Defence/Police/Secrecy/Agfression
-
Iran does not have a “nuclear weapons program.” It has a uranium enrichment program; some politicians claim it also has a weapons program it is concealing. This has never been substantiated by international inspections. Unfortunately it is often treated as a fact by journalists. The original Times piece had it right, referring to Iran’s “suspected efforts to design a weapon.”
-
The debate about drone strikes can now be settled. Even the US no longer has the temerity to repeat the canard that the attacks do not cause civilian casualties. A years-long investigation by the Bureau of Investigative Journalism has been able to track down the names of more than 700 people killed in drone strikes and found that nearly half of them were civilians. This comes as no surprise. The idea that intelligence is so good and the targeting so perfect that missiles will only kill militants was always a scarcely believable fiction. Even the figure that half the dead were civilians is most probably understating the count. So far, through its painstaking work, the Bureau of Investigative Journalism has been able to put names to less than one-third of the total victims. It stands to reason that militants would be easier to identify since the US, and the Pakistan authorities, are interested only in trumpeting the militants the US has killed and hiding any known details about civilian casualties. The typical press release issued after a drone strike only notes the number of militants killed and never mentions civilians. Journalists have little access to the areas where drone strikes are conducted, making identification a difficult task. The only logical deduction, then, is that a vast majority of unidentified drone victims may be civilians.
-
-
-
An investigative project shows that 323 out of a little over 700 identified victims of US drones in Pakistan are reported to be civilians, including 99 children.
-
The United Kingdom-based Bureau of Investigative Journalism has been able to record the names of more than 700 people reportedly killed by the CIA-operated drones in Pakistan and nearly half of them are stated to be civilians.
-
-
Some 32 people died in three CIA drone strikes in Pakistan, making this the bloodiest month since July 2012. This was stated by the Bureau of Investigative Journalism, United Kingdom, in its report on the drone strikes for July 2014. It said the strikes all reportedly occurred in and around Dattakhel in North Waziristan.
-
Recep Tayyip Erdogan’s anti-Semitism is getting the better of him. Once again, the Turkish prime minister has trotted out the Hitler analogy in relation to Israel and what it has done in Gaza. “They curse Hitler morning and night,” he said of the Israelis. “However, now their barbarism has surpassed even Hitler’s.”
-
At least 1,600 Palestinians – most of them civilians – have been killed and 8,000 injured during the assault, while Israel has lost 63 soldiers and three civilians.
-
Photos obtained by Breitbart News showcase the struggle far-left activists are facing in persuading the public to support their anti-Israel rallies. A rally hosted by Code Pink on Wednesday in front of the Israeli embassy appeared to be more populated by journalists covering the protest than protesters themselves.
-
-
The children are coming from three Central American countries—Guatemala, El Salvador, and Honduras. Is it just a coincidence that these are all countries in which the American hand has weighed particularly heavily? Guatemala we just wrecked starting in 1954, with the CIA-directed coup against land reformer Jacobo Arbenz that led to a military dictatorship and, eventually, 36 years of civil war that ended in 1996. El Salvador was, with Nicaragua (more on it later), the focus of Ronald Reagan’s “keep the commies out of Harlingen, Texas” doctrine; a few billion Yanqui dollars poured into the country to arm death squads and perpetuate another wrenching civil war, which took 75,000 lives and ended in 1992.
-
I wish to express my extreme displeasure at the ongoing incremental genocide of the Palestinians at the hands of the Israelis, the knee-jerk military support of the US government, and their apparent encouragement of the Zionist quest to solve the “Palestinian problem” in the same the way the Turks did the Armenians.
-
This doesn’t square with a review of Serwer’s record. Since arriving at MSNBC from Mother Jones in 2013, Serwer has written on issues pertaining to the Afghanistan war, the aborted US military intervention in Syria, Barack Obama’s drone strike program, the international fallout from Edward Snowden’s NSA disclosures, the ongoing turmoil in Iraq, and more — all subjects with clear “foreign affairs” dimensions.
-
Think about it. When it comes to Israel, the United States is the ball game. It provides Israel with the money, the weapons, and the United Nations’ vetoes that enable both the occupation and its multiple wars (like this one) to preserve it. And that shows no sign of changing.
Watch the television coverage. For three weeks the killing of children and other innocents in Gaza at the hands of the Israeli military has dominated the news. We see the bombs dropping. We see the destroyed schools, hospitals and mosques. We see the parents wailing over the deaths of their children and children wailing at the deaths of their parents and siblings.
But it makes no difference to the United States government which can stop the slaughter with a few words. (Five of those words are “your $3.5 billion aid package.)
-
-
Fifty years ago in August, the US contrived an incident that led to the escalation of the US war on Vietnam. That incident, known historically as the Gulf of Tonkin incident, was said to involve an unprovoked attack by northern Vietnamese forces on two US Navy boats. As it turned out, the Vietnamese were repeatedly provoked before the incident and the US had fired first. Nonetheless, Lyndon Johnson and the US Congress used the events as a reason to intensify the war on the Vietnamese. Like so many times since, the rush to war swept all dissent aside.
-
U.S. military chiefs came under great pressure to clarify the fracas of the 4th. The NSA, Hanyok reports, produced what it claimed was the text of a North Vietnamese assessmdnt of the “battle,” although this material was at least unreliable and perhaps fraudulent. On the Turner Joy, as reported by writer Eugene Windchy, only those sailors who believed the “battle” was real were allowed to talk to Pentagon investigators. On the Maddox, great uncertainty hardened into qualified belief. It was enough for President Johnson.
-
Like most of her supporters in the courtroom, I was enraged when I heard N.Y. Judge David Gideon sentenced Mary Anne Grady-Flores to one year in jail on July 10. But a deep hope prevailed, which characterizes the local anti-drone movement in New York and is no small part of the impact we’ve had.
-
Environment/Energy/Wildlife
-
The state’s drilling boom is bringing more spills — many of which go unreported to residents
-
Now that summer is here, a trip to the shore should bring familiar smells: seawater, sunscreen and, depending on your beach of choice, sewage.
One in 10 recreational beaches in the United States isn’t fit for swimming, according to a new report from the Natural Resources Defense Council (NRDC).
-
While the Court appreciates the Longmont citizens’ sincerely-held beliefs about risks to their health and safety, the Court does not find this is sufficient to completely devalue the State’s interest, thereby making the matter one of purely local interest.
Instead, the Court finds this matter of mixed local and state interest
[...]
Longmont’s ban on hydraulic fracturing does not prevent waste; instead, it causes waste. Because of the ban, mineral deposits were left in the ground that otherwise could have been extracted in the Synergy well.”
-
Finance
-
It’s been the refrain of behavioral economists and, in my case at least, my wise husband for years: Spend your money on experiences, not things. A vacation or a meal with friends will enrich your life; new shoes will quickly lose their charm.
That’s true, but it’s not the whole story, argue psychologists Darwin A. Guevarra and Ryan T. Howell in a new paper in the Journal of Consumer Psychology. Not all goods, they say, should be lumped together.
-
Maybe she should question the fact that large corporations and the extremely wealthy do not pay their fair share of the taxes. Oil companies actually receive subsidies after showing record profits.
-
PR/AstroTurf/Lobbying
-
After forty years of pushing corporate-friendly policy in state legislatures, this week the American Legislative Exchange Council (ALEC) is launching its new project aimed at doing the same at the local level.
-
The National Federation of Independent Business (NFIB), a big business-funded group that claims to be the “nation’s leading small business association,” has joined the corporate board of the American Legislative Exchange Council, or “ALEC.” It marks perhaps the final step towards the NFIB abandoning any pretense of being a nonpartisan representative of small business owners.
-
-
-
-
-
-
Censorship
-
Google has released the first figures to show which countries have been busy wanting us to ‘forget’, with France being the source of more than 17,500 ‘right to be forgotten’ requests.
The internet search giant is continuing its push towards transparency since the revelations of the US electronic surveillance PRISM programme became apparent and that the US National Security Agency had been using companies such as Google to find information about its users.
Privacy
-
“When it comes to Citizen Lab, what you have is methodical, careful, but passionate people,” says Gus Hosein, the director of the UK-based Privacy International and a longtime acquaintance of Deibert’s. “That is what I wish every academic research institution was, but clearly they’ve been allowed a degree of freedom that others in academia aren’t given.”
-
-
The social network is requiring that mobile users install Messenger for chatting. Don’t like it? Too bad!
-
For about $12, Sprint will soon let subscribers buy a wireless plan that only connects to Facebook .
For that same price, they could choose instead to connect only with Twitter , Instagram or Pinterest—or for $10 more, enjoy unlimited use of all four. Another $5 gets them unlimited streaming of a music app of their choice.
The plan, offered under the company’s Virgin Mobile brand of prepaid service, comes as wireless carriers are experimenting with ways to make wireless Internet access more affordable for the poorest consumers by offering special deals on slices of the Web.
-
An internal investigation by the C.I.A. has found that its officers penetrated a computer network used by the Senate Intelligence Committee in preparing its damning report on the C.I.A.’s detention and interrogation program.
The report by the agency’s inspector general also found that C.I.A. officers read the emails of the Senate investigators and sent a criminal referral to the Justice Department based on false information, according to a summary of findings made public on Thursday. One official with knowledge of the report’s conclusions said the investigation also discovered that the officers created a false online identity to gain access on more than one occasion to computers used by the committee staff.
-
-
-
An internal CIA investigation confirmed allegations that agency personnel improperly intruded into a protected database used by Senate Intelligence Committee staff to compile a scathing report on the agency’s detention and interrogation program, prompting bipartisan outrage and at least two calls for spy chief John Brennan to resign.
-
-
-
-
President Obama said U.S. intelligence officials “crossed a line” after the 9/11 attacks and “tortured some folks” during the George W. Bush administration, conclusions he said on Friday will be described in a long-awaited report by the Senate Select Committee on Intelligence, portions of which he and his counsels have agreed to declassify.
-
Democratic Sens. Mark Udall and Martin Heinrich both called for CIA Director John Brennan’s resignation late Thursday after the spy agency admitted it had improperly hacked into Senate staffers’ computers used during a review of the agency’s Bush-era interrogation practices.
-
-
-
When John Brennan assured the country that the CIA hadn’t improperly monitored the Senate team that compiled a report on Bush-era torture, he fed us false information. That much is clear from Thursday’s news that “the C.I.A. secretly monitored a congressional committee charged with supervising its activities.” Either the CIA director was lying or he was unaware of grave missteps at the agency he leads. There are already calls for his resignation or firing from Senator Mark Udall, Trevor Timm, Dan Froomkin, and Andrew Sullivan, plus a New York Times editorial airing his ouster as a possibility.
-
The latest scandal at the Central Intelligence Agency reads as if torn from the pages of one of the late Tom Clancy’s spies-know-best novels: Noble CIA agents, unhappy that weak-kneed U.S. Senate oversight staffers were pussyfooting around its detention and torture records, hack the Senate’s computers to find out what its minders have discovered. The Constitution? Never mind.
-
In March, at the Council on Foreign Relations, CIA Director John Brennan was asked by NBC’s Andrea Mitchell whether the CIA had illegally accessed Senate Intelligence Committee staff computers “to thwart an investigation by the committee into” the agency’s past interrogation techniques. The accusation had been made earlier that day by Sen. Dianne Feinstein (D-Calif.), who said the CIA had “violated the separation-of-powers principles embodied in the United States Constitution.” Brennan answered:
-
I don’t want to understate how seriously wrong it is that the CIA searched Senate computers. Our constitutional order is seriously out of whack when the executive branch acts with that kind of impunity — to its overseers, no less.
-
-
Private apologies are not enough for a defender of torture, the architect of America’s drone program and the most talented liar in Washington. The nation’s top spy needs to go
-
-
Here’s a surprise. An internal investigation by the CIA has determined — just as Senator Dianne Feinstein charged — that the CIA illegally hacked into the network of Senate Intelligence Committee staffers in order to spy on what they were doing with regards to a report on the CIA’s torture program. They did this despite an earlier instance of a similar problem after which the CIA promised it would not touch the Senate Intelligence Committee network any more.
-
-
Thanks to Snowden’s leaks and a host of other information proceeding those, it’s become clear that intelligence agencies — despite their constant and loud “worrying” about cyberattacks — are more than happy to make computers and the Internet itself less safe by purchasing, discovering and hoarding vulnerabilities. These are exploited to their fullest before being reported to the entities that can patch the holes. In the meantime, the NSA and others make use of security holes and vulnerabilities, leaving millions of members of the public exposed.
-
One morning last July, the German intelligence service knocked on Daniel Bangert’s door. They had been informed by the US military police that Bangert was planning to stage a protest outside the Dagger Complex, an American intelligence base outside Griesheim in the Hesse region. Why hadn’t he registered the protest, and what were his political affiliations? they asked.
-
-
-
An influential cross-party group of British MPs have come out in support of whistleblowers, such as ex-CIA contractor Edward Snowden and others who have exposed wrongdoing in major institutions. They report some incidents of treatment of whistleblowers as being “shocking” and subject to “victimisation”
-
-
-
-
External Affairs Minister Sushma Swaraj on Thursday conveyed to US Secretary of State John Kerry the ‘anguish’ of people of India over media reports on authorisation of his country’s National Security Agency (NSA) to spy on the Bharatiya Janata Party.
“I raised this issue with Secretary Kerry. I told him that when this news appeared in newspapers, people of India were agitated and expressed their anguish. I told him that I want to make him aware of that anguish,” Swaraj said, addressing a joint news conference with Kerry after they co-chaired the fifth annual strategic dialogue between the two nations.
-
The German chancellor claims to have learned a lot of interesting facts through Edward Snowden. The fact that Germany is now refusing to take Snowden in shows a lack of political courage, writes DW’s Jens Thurau.
-
Details about the National Security Agency’s “Prism” surveillance program have entered the news in dribs and drabs since former NSA contractor Edward Snowden leaked revealing documents about the program to the Guardian and the Washington Post in June of last year. The unsettling insights revealed by Snowden generated quite a stir in the press, and large tech and telecom companies faced a wave of consumer backlash in the wake of the ongoing story.
-
-
Central Intelligence Agency Director John Brennan is facing calls to resign after admitting CIA officials spied on a Senate panel probing the agency’s torture and rendition program. The allegation surfaced in March when members of the Senate Intelligence Committee openly accused CIA officials of illegally monitoring their staffers’ computers. The Senate report has yet to be released but reportedly documents extensive abuses and a cover-up by CIA officials to Congress. At the time, Brennan denied the spying allegations and said those who make them will be proved wrong. But he reversed his stance this week after an internal CIA inquiry found the spying indeed took place with the involvement of 10 agency employees. Brennan apologized to lawmakers in a briefing earlier this week. The White House is standing by Brennan, citing President Obama’s “great confidence” in his leadership. But at least two members of the Senate Intelligence Committee, Democrats Mark Udall of Colorado and Martin Heinrich of New Mexico, are calling for his resignation. We speak with the reporter who first broke the news of the CIA’s admission to spying on Senate computers: Jonathan Landay, senior national security and intelligence correspondent for McClatchy Newspapers.
-
The recent accusation against Xiaomi for having allegedly planted spying software in the smartphone’s firmware that secretly transfers data to the company’s Beijing servers brings to light the new dimension of international spying in the tech savvy times of today. What is even more intriguing is that turning off the MiCloud service on the smartphone that is believed to be the culprit does not help things either.
-
The NSA is looking for a Director of Strategic Communications on LinkedIn. Why is it even advertised?
-
Rather than seek out traditional Silicon Valley funding, the Switzerland incorporated startup chose to crowdfund the development costs because, “unfortunately, too many VCs nowadays are just looking for a quick profit,” says cofounder Andy Yen, who’s based at MIT with half the team.
-
A reminder to Apple and smug iPhone owners: Just because iOS has never been the victim of a widespread malware outbreak doesn’t mean mass iPhone hacking isn’t still possible. Now one group of security researchers plans to show how to enslave an entire botnet of Apple gadgets through a perennial weak point—their connection to vulnerable Windows PCs.
-
This week, that changed. Whisper Systems, makers of the widely-lauded Android encryption app RedPhone, released a voice encryption application designed specifically for iPhone. It’s called Signal, and if you’re in the market for a voice encryption app (and you should be) then look no further.
-
-
-
-
Privacy advocates aren’t happy with an NSA reform bill that only gets part of the job done.
-
The federal government has been brazenly violating citizens’ privacy rights in the name of national security. The nation’s spy apparatus has gone so far as to spy on members of Congress, with the CIA admitting on Thursday the agency had gone into Senate computers.
-
-
-
-
-
Twitter Inc. (TWTR), the San Francisco-based social media company, has been receiving a plethora of requests from governments to access its user data. The company has reported in its biannual transparency report that it received 2058 requests from governments in the first half of 2014, which marks a 46% increase from 2013.
-
-
There appears to be a clear bipartisan consensus that the NSA has gone too far with its bulk collection of Americans’ phone records. The question is how far Congress will go to restore a balance between individual liberty and national security.
-
Nice intranet you’ve got there. Shame if something should happen to it.
-
-
-
Investigative reporter Jason Leopold is suing the National Security Agency for refusing to release the financial disclosure statements of recently retired director Gen. Keith Alexander.
-
Former NSA director Keith Alexander will charge companies up to $1 million a month to keep them safe from online hackers, Foreign Policy reports. Apparently Alexander and business partners from IronNet Cybersecurity have founded a new firm after leaving the government and military in March. The company supposedly offers a new technology that has a “unique” approach when it comes to detecting hackers online.
-
-
-
The centerpiece of the NSA debate after Edward Snowden has been the bulk collection of the call logs of U.S. citizens. The Senate bill would end the government’s practice of collecting and saving vast storehouses of U.S. calling data. In its place, the proposal would require government agents to identify a particular target — and to get a judicial order. Any information collected under this program that is superfluous to a legitimate intelligence investigation would have to be discarded, and the inspector general would do more to monitor the application of these rules.
-
-
New Zealand lawmakers demanded Friday that the government reveal whether the United States National Security Agency (NSA) had set up an interception site on New Zealand’s only international fiber optic communications cable.
-
The statement said they don’t use the term SSO and what is being referred to is a “cable access programme”. However, there is no explanation of what that is, or why someone was in New Zealand from the NSA to discuss it.
-
The New Zealand Herald yesterday reported an engineer from the US National Security Agency’s Special Source Operations (SSO) unit visited New Zealand last year to talk to the Government Communications Security Bureau (GCSB) about electronic spying.
-
On July 22, 2014, police officers arrested over 100 members of law enforcement as part of an ongoing investigation regarding widespread illegal wiretapping and invasion of privacy without just cause. The probe dated back to a massive eavesdropping scandal that the authorities uncovered back in February 2014 relating to the surveillance of thousands of journalists, academics, politicians and senior government officials. Although scores of police officers and members of the judiciary have since been reassigned or suspended, the July 22 operation marked the first concrete response from the Turkish judiciary. An Istanbul court has subsequently ordered the formal arrest of key police officers on charges of espionage, document fraud and illegal wiretapping. As such, the Gülenist shadow state has come under an unprecedented level of public and legal scrutiny.
-
-
-
-
-
The reports that Edward Snowden has been living in Russia with precarious “temporary leave to remain” rather than under any formal asylum protection is further evidence he must be allowed to travel to and seek asylum in the country of his choice, said Amnesty International today.
-
-
Fugitive US intelligence agent Edward Snowden marked on Thursday one year of political asylum in Russia, where he continues to live a life shrouded in mystery amid a dearth of public appearances.
-
-
-
Past decades offer an endless trail of evidence: Operation Gladio, Operation Mockingbird, Project MKUltra, Operation Wheeler/Wallowa, Watergate, Operation CHAOS, COINTELPRO, Operation Northwoods, P2OG (the Proactive, Preemptive Operations Group), Iran-Contra, etc.
-
-
-
Austrian law student Max Schrems appealed to a billion Facebook users around the world on Friday to join a class-action lawsuit against Facebook’s alleged violations of its users’ privacy, stepping up a years-long data-protection campaign.
-
-
-
-
Facebook is facing a class-action lawsuit from Max Schrems, an Austrian law student and data privacy activist who announced Friday that he will sue social networking site. Mr. Schrems claims Facebook violated Europe’s privacy laws and its own terms of agreement during its participation in NSA spying programs.
-
-
-
-
-
-
As major crisis surround the US and world, the real issues that matter involve the inability to like, comment or post on Facebook
-
But recently it was leaked that the NSA pried its way into the servers in Huawei’s sealed headquarters in Shenzhen, China’s industrial heartland. According to documents provided to the NSA by former contractor Edward Snowden, the NSA obtained information about the workings of giant routers and monitored communication of the company’s top executives.
-
Governments in the United States, Russia and Britain have worked for years to unmask users of Tor, which, according to the British Broadcasting Corp., has been linked to illegal activity including drug deals and the sale of child-abuse images.
Civil Rights
-
-
What do I hold Obama accountable for? The NSA spying on just about everyone. His war on whistleblowers, which is really a war against an informed citizenry. His very troubling use of drones.
Before his first election, Obama supported a public option for health care, but the first thing he did when negotiations began was yank it off the table. He made statements supporting net neutrality, but then installed cable lobbyist Tom Wheeler as head of the FCC.
-
We’ve been joking the last few weeks about how everyone was waiting for the White House to dump buckets of black ink on the Senate Intelligence Committee’s torture report. As we’d noted, for reasons that still don’t make any sense, the CIA was given first crack at redacting the 480 page declassified executive summary of the 6,300 page, $40 million Senate Intelligence report into the CIA’s torture program. Once the CIA was done with it, it was handed over to the White House to exhaust reserve stores of black ink.
-
-
-
President Barack Obama admitted on Friday that the U.S. “tortured” some al-Qaida detainees captured after the 9/11 attacks — but retired Gen. Michael Hayden was disconcerted at Obama describing the controversial CIA practice that way at a news conference.
-
-
We continue to wait and wait for the White House to finish pouring black ink all over the Senate’s torture report, before releasing the (heavily redacted) 480-page executive summary that the Senate agreed to declassify months ago. However, every few weeks it seems that more details from the report leak out to the press anyway. The latest is that officials at the State Department were well aware of the ongoing CIA torture efforts, but were instructed not to tell their superiors, such that it’s likely that the top officials, including Secretary of State Colin Powell, may have been kept in the dark, while others at the State Department knew of the (highly questionable) CIA actions.
-
The charge against Khadr is that he was an “unprivileged belligerent” — meaning he was not a soldier — and so had violated the “US common law of war” by fighting the invading American forces in Afghanistan. Now a US Department of Justice memo to the US Department of Defence implies that the case against Khadr is bogus. The memo was sent in July 2010 and dealt with the status of CIA agents who are not soldiers but who operate drones and kill people. Are they guilty of war crimes?, the Department of Defence asked. The Justice Department responded that war criminality depends on a person’s actions, not on whether he or she is a part of an army. The memo was only disclosed now on the order of a court in a case initiated by the American Civil Liberties Union and the New York Times.
-
Gary McKinnon, the computer hacker who won a 10-year battle to avoid extradition to the US, has been warned not to visit his ill father in Scotland, for fear America will mount fresh bids for his arrest.
-
George Tenet, who presided over the CIA when terrorist suspects were waterboarded and subjected to other forms of brutal “enhanced interrogation,” has set himself a near-impossible task. He is leading an effort to discredit an impending Senate committee report expected to lay out a case that the intelligence agency tortured suspects and then misled Congress, the White House and the public about its detention and interrogation program.
-
US President Barack Obama hasacknowledged that the CIA had tortured suspects detained in the immediate aftermath of September, 11 terror attacks.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
The Obama administration censored significant portions of the findings of an investigation into the CIA’s use of harsh interrogation methods on suspected terrorists, forcing the chairwoman of the Senate Intelligence Committee to delay their release “until further notice.”
The postponement added to serious frictions over the investigation between the administration and lawmakers, who have been pressing for the swiftest, most extensive publication of the findings on one of darkest chapters in the CIA’s 65-year history.
-
Two Democratic senators, Mark Udall (D-CO) and Martin Heinrich (D-NM), have called on CIA Director John Brennan to resign after he admitted that the CIA had spied on Senate computers used by Senate staffers to research a report on the agency’s interrogation and detention practices during the Bush administration. Brennan apparently called Sen. Diane Feinstein (D-CA), Chairman of the Senate Intelligence Committee, to apologize. Despite this admission, however, neither President Obama nor Feinstein has called for Brennan’s resignation and the likelihood is the president won’t.
Why? Because Brennan wasn’t asked to resign for a major intelligence breach that was far worse than anything that happened with the Senate’s computers. As we explain in our new book, Obama’s Enforcer: Eric Holder’s Justice Department, despite White House denials, John Brennan was apparently responsible for the outing of a Saudi Arabian intelligence agent inside the Yemen branch of Al Qaeda.
-
It was the release of the so-called “smoking gun tape” on Aug. 5, 1974, that prompted even Nixon’s most ardent defenders to agree that he must go. On the tape, you hear Nixon, just six days after the Watergate break-in, order aides to get the CIA to tell the FBI to back off its investigation by claiming a bogus national security connection.
-
-
-
Military guards may continue to touch the groins of detainees at Guantánamo Bay, Cuba, when they search for contraband before the prisoners are moved to speak with their lawyers, a federal appeals court ruled Friday. Because of the procedure, which was put in place in May 2013, some inmates have stopped meeting with or calling their lawyers.
-
So it was with deep regret that I watched Nixon’s televised address on Aug. 8, 1974, and heard him utter words never spoken before in the Oval Office — “Therefore, I shall resign the presidency … ” At that historic moment, I felt heartily sorry.
Not sorry for Nixon, especially not when he swaggered across the White House lawn the next day and mounted the helicopter, smirking triumphantly and brandishing the double-V victory sign as if he had just won another election. Nor was I sorry for his minions, although they would do jail time for their lockstep loyalty to the commander-in-chief while he would emerge with a full, free and absolute pardon.
-
Also on my list of bad-Jew sins is my complete disinterest in religion, and apparently religion plays a small role in Jewish life – it’s not just eating gefilte fish and controlling Hollywood. Not so long ago, a dear old Jewish friend passed away, and at her funeral service all the men had to go in a separate room and read from a Hebrew prayer book – but I can’t read Hebrew so I hid up the back of the group, cowering behind a guy with a 50-centimetre full-bush Jew-fro. Then the rabbi came in and said, ‘‘When we pray, we must face Jerusalem … so let us all turn to the east!’’ and every man in the room spun 180 degrees, so I went from being at the back, to being at the front, with everyone staring at me like I was about to give a Zumba class. I had to pretend-pray for the next half-hour, the focus of the entire ceremony, making up my own Hebrew language – part Yiddish words I heard Fran Drescher use on The Nanny, part Honey-Boo-Boo hillbilly drawl.
Internet/Net Neutrality
-
In a letter sent to Verizon CEO Dan Mead on Wednesday, Federal Communications Commission Chairman Tom Wheeler said he is “deeply troubled” by the cell phone carrier’s announcement. He demanded more details about the plan and questioned whether it’s legal.
-
U.S. cellphone users frequent victims of ‘cramming’: Senate study. Reuters reports: “U.S. mobile phone users have likely paid hundreds of millions of dollars in unauthorized charges “crammed” onto their bills, according to a report released by the U.S. Senate Commerce Committee on Wednesday to coincide with a hearing on the topic.”
DRM
-
Soon, the government won’t be able to throw you in jail for “unlocking” your iPhone to use it with a new wireless phone company.
Late last week Congress passed a bill that rolled back draconian penalties for unlocking a mobile phone or tablet purchased on a wireless carrier contract. It is now waiting for the President to sign it into law.
Intellectual Monopolies
-
Visiting US Secretary of State John Kerry has urged the Indian leadership not to oppose global trade reforms in the coming days. The senior US official, currently on an official visit to the South Asian country, told the local media in New Delhi that India should show its commitment to carry on economic liberalisation process by backing the protocol.
-
-
Copyrights
-
As part of our Open Wireless Movement, we set out to create router software that would make it easier for people to safely and smartly share part of their wireless network. Protecting hosts, so their security is not compromised because they offer open networks, is one of the goals of the router software we released. However, as research published by Independent Security Evaluators (ISE) and others has shown, almost every popular home router has serious security flaws.
-
Just as discussion moves away from the punitive measures that did little to curtail piracy in the last decade, an Australian minister has urged a return. Communications Minister Malcolm Turnbull says that in order to send a clear message, rightsholders need to “roll up their sleeves” and strategically sue some “moms, dads and students.”
Permalink
Send this to a friend
Posted in Microsoft, Open XML, OpenDocument, OpenOffice at 3:39 pm by Dr. Roy Schestowitz

Summary: Microsoft continues to distort the office suites market and impede interoperability using the OOXML pseudo ‘standard’, essentially by branching out into “Strict” and “Transitional”, making it exceedingly hard for developers to deal with files generated by Microsoft Office and vice versa
TRYING to work with Microsoft is misguided. Just look and see what has happened to many companies, including — to name a recent example — Nokia. Microsoft has no honour for anyone but Microsoft itself. Microsoft was bribing officials and abusing sceptics in order to get its way when it comes to document formats. Nobody should forget the crimes that Microsoft committed in order to keep the world stuck with Microsoft Office. We reminded the British government of these crimes and very recently the UK adopted ODF. This was a very smart and timely move because based on people from The Document Foundation (TDF), the bogus ‘standard’ which is basically just an ‘open’-looking gown for Microsoft Office (proprietary) formats is now being further distorted in order to cause trouble for people who are not Microsoft customers. These abuses are even worse than before and Microsoft thinks it can get away with them because it bribed people to put an ECMA and ISO stamp on OOXML (no matters what happens to it later on).
As Charles from The Document Foundation put it the other day:
Regular readers of this blog will remember these glorious days, just before the big financial crisis, where Microsoft had created the so-called OpenXML standard that was supposed to be totally not competing against the OpenDocument Format, managed to have pretty much the entire standards community swallow it in the most creative ways possible, then fell short of actually implementing it in its own products. A good summary of the whole -technical- story is available here. The irony of life has the uncanny ability to devise ways to enchant us. Well, sort of. The format called “OOXML – Strict”, by comparison to “OOXML-Transitional” was the readable open part of the ISO 29500 standard, known as OOXML. For years, it was obvious that Microsoft Office implemented OOXML-Transitional (the heap of the more or less documented parts of the format alongside undocumented blurbs) and nothing else, creating a situation where one standard, OOXML was existing, and another format, OOXML, was fully implemented and spread all around, yet was an undocumented, proprietary specification. That’s the .docx, pptx, and .xlsx you see everywhere, and the one LibreOffice was busy reverse-engineering for all these years.
This unfortunate situation, we were told, was about to change soon, with the full adoption of OOXML-Strict by Microsoft Office. Helas, if you open a purely OOXML-Strict compliant file with Microsoft Office 2013, the file will be declared corrupt. If you open the same one with LibreOffice 4.3, the file will open and you will be able to edit its contents just like with any other format supported by LibreOffice. In other words, LibreOffice can claim to have a better support of OOXML than Microsoft Office, despite years of unfulfilled promises, pledges, and never met expectations by Redmond. I guess that, just like the old saying goes, promises only commit the ones who actually believe them.
IBM’s Rob Weir has just released another piece about document formats [1] and a new interview with Italo Vignoli of The Document Foundation [2] sheds more light on what Charles spoke about. To quote Vignoli: “MS Office locks-in the user not only with proprietary formats but also with the OOXML pseudo-standard format. This is due to the way the supposedly standard format is handled by MS Office.
“In fact, each version of MS Office since 2007 has a different and non standard implementation of OOXML, which is defined as “transitional” because it contains elements which are supposed to be deprecated at standard level, but are still there for compatibility reasons.
“Although LibreOffice manages to read and write OOXML in a fairly appropriate way, it will be impossible to achieve a perfect interoperability because of these different non standard versions.
“In addition to format incompatibilities, Microsoft – with OOXML – has introduced elements which may lead the user into producing a non interoperable document, such as the C-Fonts (for instance, Calibri and Cambria).”
When Microsoft speaks about following standards what it means to say is that “Microsoft is the standard” and everyone must just follow Microsoft. Only a fool would choose OOXML over ODF, especially now. Korea and China seem to be moving away from Office quite rapidly. █
Related/contextual items from the news:
-
And then there is a document as the record of what we did. This is implied by the verb “to document”. This use of documents is still critical, since it is ingrained in various regulatory, legal and business processes. Sometimes you need “a document.” It won’t do to have your business contract on a wiki. You can’t prove conformance to a regulation via a Twitter stream. We may no longer print and file our “hard” documents, but there is a need to have a durable, persistable, portable, signable form of a document. PDF serves well for some instances, but not in others. What does PDF do with a spreadsheet, for example? All the formulas are lost.
-
The UK government recently announced that they would use ISO approved document standard ODF for viewing and sharing government documents. It’s a very important move because it breaks Microsoft’s vendor lock where single US-based company ‘owns’ and ‘controls’ all the documents created on Earth. Microsoft is infamous for using unethical means to make it harder for other players to offer any kind of interoperability with their products which can threaten Microsoft’s market share.
So we reached out to Italo Vignoli of The Document Foundation, the organization responsible for developing LibreOffice which is a fork of OpenOffice, to understand the risks of using OOXML…
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »
Further Recent Posts
- Links 6/1/2017: Irssi 1.0.0, KaOS 2017.01 Released
Links for the day
- Watchtroll a Fake News Site in Lobbying Mode and Attack Mode Against Those Who Don't Agree (Even PTAB and Judges)
A look at some of the latest spin and the latest shaming courtesy of the patent microcosm, which behaves so poorly that one has to wonder if its objective is to alienate everyone
- The Productivity Commission Warns Against Patent Maximalism, Which is Where China (SIPO) is Heading Along With EPO
In defiance of common sense and everything that public officials or academics keep saying (European, Australian, American), China's SIPO and Europe's EPO want us to believe that when it comes to patents it's "the more, the merrier"
- Technical Failure of the European Patent Office (EPO) a Growing Cause for Concern
The problem associated with Battistelli's strategy of increasing so-called 'production' by granting in haste everything on the shelf is quickly being grasped by patent professionals (outside EPO), not just patent examiners (inside EPO)
- Links 5/1/2017: Inkscape 0.92, GNU Sed 4.3
Links for the day
- Links 4/1/2017: Cutelyst 1.2.0 and Lumina 1.2 Desktop Released
Links for the day
- Financial Giants Will Attempt to Dominate or Control Bitcoin, Blockchain and Other Disruptive Free Software Using Software Patents
Free/Open Source software in the currency and trading world promised to emancipate us from the yoke of banking conglomerates, but a gold rush for software patents threatens to jeopardise any meaningful change or progress
- New Article From Heise Explains Erosion of Patent Quality at the European Patent Office (EPO)
To nobody's surprise, the past half a decade saw accelerating demise in quality of European Patents (EPs) and it is the fault of Battistelli's notorious policies
- Insensitivity at the EPO’s Management – Part V: Suspension of Salary and Unfair Trials
One of the lesser-publicised cases of EPO witch-hunting, wherein a member of staff is denied a salary "without any notification"
- Links 3/1/2017: Microsoft Imposing TPM2 on Linux, ASUS Bringing Out Android Phones
Links for the day
- Links 2/1/2017: Neptune 4.5.3 Release, Netrunner Desktop 17.01 Released
Links for the day
- Teaser: Corruption Indictments Brought Against Vice-President of the European Patent Office (EPO)
New trouble for Željko Topić in Strasbourg, making it yet another EPO Vice-President who is on shaky grounds and paving the way to managerial collapse/avalanche at the EPO
- 365 Days Later, German Justice Minister Heiko Maas Remains Silent and Thus Complicit in EPO Abuses on German Soil
The utter lack of participation, involvement or even intervention by German authorities serve to confirm that the government of Germany is very much complicit in the EPO's abuses, by refusing to do anything to stop them
- Battistelli's Idea of 'Independent' 'External' 'Social' 'Study' is Something to BUY From Notorious Firm PwC
The sham which is the so-called 'social' 'study' as explained by the Central Staff Committee last year, well before the results came out
- Europe Should Listen to SMEs Regarding the UPC, as Battistelli, Team UPC and the Select Committee Lie About It
Another example of UPC promotion from within the EPO (a committee dedicated to UPC promotion), in spite of everything we know about opposition to the UPC from small businesses (not the imaginary ones which Team UPC claims to speak 'on behalf' of)
- Video: French State Secretary for Digital Economy Speaks Out Against Benoît Battistelli at Battistelli's PR Event
Uploaded by SUEPO earlier today was the above video, which shows how last year's party (actually 2015) was spoiled for Battistelli by the French State Secretary for Digital Economy, Axelle Lemaire, echoing the French government's concern about union busting etc. at the EPO (only to be rudely censored by Battistelli's 'media partner')
- When EPO Vice-President, Who Will Resign Soon, Made a Mockery of the EPO
Leaked letter from Willy Minnoye/management to the people who are supposed to oversee EPO management
- No Separation of Powers or Justice at the EPO: Reign of Terror by Battistelli Explained in Letter to the Administrative Council
In violation of international labour laws, Team Battistelli marches on and engages in a union-busting race against the clock, relying on immunity to keep this gravy train rolling before an inevitable crash
- FFPE-EPO is a Zombie (if Not Dead) Yellow Union Whose Only de Facto Purpose Has Been Attacking the EPO's Staff Union
A new year's reminder that the EPO has only one legitimate union, the Staff Union of the EPO (SUEPO), whereas FFPE-EPO serves virtually no purpose other than to attack SUEPO, more so after signing a deal with the devil (Battistelli)
- EPO Select Committee is Wrong About the Unitary Patent (UPC)
The UPC is neither desirable nor practical, especially now that the EPO lowers patent quality; but does the Select Committee understand that?
- Links 1/1/2017: KDE Plasma 5.9 Coming, PelicanHPC 4.1
Links for the day
- 2016: The Year EPO Staff Went on Strike, Possibly “Biggest Ever Strike in the History of the EPO.”
A look back at a key event inside the EPO, which marked somewhat of a breaking point for Team Battistelli
- Open EPO Letter Bemoans Battistelli's Antisocial Autocracy Disguised/Camouflaged Under the Misleading Term “Social Democracy”
Orwellian misuse of terms by the EPO, which keeps using the term "social democracy" whilst actually pushing further and further towards a totalitarian regime led by 'King' Battistelli
- EPO's Central Staff Committee Complains About Battistelli's Bodyguards Fetish and Corruption of the Media
Even the EPO's Central Staff Committee (not SUEPO) understands that Battistelli brings waste and disgrace to the Office
- Translation of French Texts About Battistelli and His Awful Perception of Omnipotence
The paradigm of totalitarian control, inability to admit mistakes and tendency to lie all the time is backfiring on the EPO rather than making it stronger
- 2016 in Review and Plans for 2017
A look back and a quick look at the road ahead, as 2016 comes to an end
- Links 31/12/2016: Firefox 52 Improves Privacy, Tizen Comes to Middle East
Links for the day
- Korea's Challenge of Abusive Patents, China's Race to the Bottom, and the United States' Gradual Improvement
An outline of recent stories about patents, where patent quality is key, reflecting upon the population's interests rather than the interests of few very powerful corporations
- German Justice Minister Heiko Maas, Who Flagrantly Ignores Serious EPO Abuses, Helps Battistelli's Agenda ('Reform') With the UPC
The role played by Heiko Maas in the UPC, which would harm businesses and people all across Europe, is becoming clearer and hence his motivation/desire to keep Team Battistelli in tact, in spite of endless abuses on German soil
- Links 30/12/2016: KDE for FreeBSD, Automotive Grade Linux UCB 3.0
Links for the day