EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.03.16

Links 3/10/2016: GNU Linux-Libre 4.8, DNF 2.0.0

Posted in News Roundup at 3:03 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Down the rabbit hole, part 3: Linux and Tor are key to ensuring privacy, security

      So, I’ve decided I need to improve the privacy and security of my life (especially as it relates to computing). And I’ve come to the conclusion that in order to effectively do this, I need to focus on utilizing open source software as much as possible.

      What next?

      Let’s start at a very simple, basic level: the operating system of my laptop computers (I don’t actually have a desktop currently, but the same ideas will apply) and how they connect to the internet.

  • Server

    • Mellanox Deploys Standard Linux Operating Systems over Ethernet Switches

      Today Mellanox announced the availability of standard Linux kernel driver for the company Open Ethernet, Spectrum switch platforms. Developed within the large Linux community, the new driver enables standard Linux Operating Systems and off-the-shelf Linux-based applications to operate on the switch, including L2 and L3 switching. Open Ethernet provides data centers with the flexibility to choose the best hardware platform and the best software platform, resulting in optimized data center performance and higher return on investment.

    • Mellanox Introduces New Driver for Open Ethernet, Spectrum Switch Platforms
    • Mesos and Kubernetes on a hybrid (IBM Power and x86) architecture scenario

      Currently, there are several popular containers clustering system for Linux®, such as Kubernetes, Mesos and so on. Google Kubernetes and Apache Mesos are probably two commonly used tools to deploy containers inside a cluster. Both are created as helper tools that can be used to manage a cluster of containers. However, they differ greatly in their approaches.

      Always, our customs have a hybrid architecture that includes IBM® Power® and x86. So, this article provides the reference solutions about how to apply Mesos and Kubernetes into Linux on a hybrid architecture (including Power and x86) environment.

      See Figure 1 for the reference architecture.

  • Kernel Space

    • GNU Linux-libre 4.8-gnu Released, Deblobs More Drivers

      Hot off the release of the official upstream Linux 4.8 kernel, the GNU Linux-libre 4.8-gnu kernel is now available as the deblobbed code that strips out support for loading non-free firmware and other references to non-free kernel support.

      With GNU Linux-libre 4.8-gnu, there is a change to allow AMD Evergreen GPUs to be able to successfully initialize correctly without any binary-only blobs, a port from a change these developers did back for R600 hardware on an earlier kernel.

    • Linux Kernel 4.8 released with Microsoft Surface 3 touchscreen support [Ed: How on Earth have some people spun a Linux release as a “Microsoft” thing? Part of the “Microsoft loves Linux” Big Lie or is “Microsoft” the biggest Linux feature now? Maybe just headline baiting.]
    • Linux 4.8 kernel will support newer hardware, including your Microsoft Surface 3
    • Systemd bug allows ordinary user to crash Linux systems

      The systemd project is yet to release a fix for a bug that was disclosed on 28 September but at least one GNU/Linux distribution has patched the same.

      The bug, allowing a user to crash a system by using a short command as an ordinary user, was disclosed by a developer named Andrew Ayer.

      After running this command, according to Ayer, “You can no longer start and stop daemons. inetd-style services no longer accept connections. You cannot cleanly reboot the system. The system feels generally unstable (e.g. ssh and su hang for 30 seconds since systemd is now integrated with the login system).”

    • Major Linux distributions suffer from the latest system crippling bug

      A system administrator, Andrew Ayer discovered a crippling bug while working with his Linux System. He reported the issue at length in a blogpost pointing out how anyone could crash Systemd by one single tweet. The system will not collapse as soon as the tweet is rendered on screen by the system. Instead, what it meant was that any Linux distribution could be crippled by a command that can fit into one tweet. He even posted a tweet with the command to prove his point.

    • Linux 4.9′s CPUFreq To Make Greater Use Of Scheduler Info, IOWait Boosting

      The past few kernel releases there’s been a redesign of CPUFreq and P-State code for being able to make use of the kernel’s scheduler utilization data by these CPU frequency scaling drivers. That work also led to the introduction of the Schedutil governor. Work along this line has continued for Linux 4.9.

    • EFI Test Driver Added To The Mainline Linux 4.9 Kernel

      The EFI material is one of the early pull requests for the Linux 4.9 kernel and its bringing a new driver via EFI_TEST.

    • Linux 4.9 On x86_64 To Support Vmapped Stacks

      With the forthcoming Linux 4.9 kernel, x86_64 builds will support CONFIG_VMAP_STACK where kernel stacks are allocated with vmalloc_node for greater security.

    • Mellanox Platform Support Coming In Linux 4.9

      The x86/platform updates for the Linux 4.9 kernel that entered development on Sunday is bringing initial support for the Mellanox systems platform.

    • Linux Should Soon Start Receiving “Make WiFi Fast” Improvements

      In the months ahead the Linux kernel should start receiving the work out of the “make-wifi-fast” initiative for improving WiFi reliability and performance.

      The Bufferbloat project has been working on the Make-WiFi-Fast project because “the current Linux WiFi stack and drivers are far from optimal.” The project aims to reduce latency, develop new packet scheduling and AQM techniques, and improve the stack to allow 802.11ac MU-MIMO to properly work.

  • Applications

  • Distributions

    • Screenshots/Screencasts

      • Apricity OS, a beautiful way to to enter Arch era

        Last time we told you about Manjaro Linux, which is an Arch based linux distribution. Now the point is there is not only one fork but there are others too. Today we will discuss about another fork of Arch in this 12th segment of “Introduction with Linux Distro”. The distribution we will see today is one of the most beautiful distributions in linux world and it is named Apricity OS.

    • Red Hat Family

      • Finance

      • Fedora

        • DNF 2.0.0 and DNF-PLUGINS-CORE 1.0.0 Released

          DNF-2.0 is out! This major version release of DNF brings many user experience improvements such as more understandable dependency problem reporting messages, weak dependencies shown in transaction summary, more intuitive help usage invoking and others. Repoquery plugin has moved into DNF itself. Whole DNF stack release fixes over 60 bugs. DNF-2.0 release was focused on getting rid of yum incompatibilities i.e. treat yum configuration options the same (`include`, `includepkgs` and `exclude`). Unfortunately this release is not fully compatible with DNF-1. See the list of DNF-1 and DNF-2 incompatible changes. Especially plugins will need to be changed to the new DNF argument parser. For complete list of changes see DNF and plugins release notes.

        • DNF 2.0 Released For Improved Package Management On Fedora

          Version 2.0 of the DNF package manager is now available in release candidate form as a major update to this Yum successor. Meanwhile, DNF-Plugins-Core reached version 1.0 for testing.

        • When every Beta closes another Alpha opens…

          As many of you may know, deadlines for Beta packaging for Fedora 25 have recently come and gone. With this said, designs for the default wallpaper are underway and I’m continuing to work through quirks in the design in order to represent the subtle, yet bold and memorable aesthetic that is present in Fedora wallpapers. Getting closer to the Alpha package deadline, I figured that I’d post another progress picture of where I’m at so far. Be sure to check out https://fedorahosted.org/design-team/ticket/473 for more information as to the background and thought process of the design as well!

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu Software Can Now Show Screenshots of Snap Apps

            A small fix this one, but it’s something that will help Snap apps stand out in the Ubuntu Software store.

            Snap apps are already available to find and install from the GNOME Ubuntu Software app, on both Ubuntu 16.04 LTS and Ubuntu 16.10. As there’s (still) no way to search for Snap app specifically you need to know the Snap app you want to find before you can find it.

            But until recently Snap apps didn’t display application screenshots, a valuable feature of any app store.

  • Devices/Embedded

    • Arduino on Arduino battle ends in reconciliation, merger

      On Saturday, the two rival groups—Arduino LLC (Arduino.cc) and Arduino Srl (Arduino.org)—announced that they had “settled their differences,” and agreed to merge. At present, the similarly-designed sites both carry the official Arduino logo, and both sell official Arduino products.

      The electronics platform Arduino describes itself as “the world’s leading open-source ecosystem for educators, Makers and IoT developers of all ages.” Its board plans are published under Creative Commons (CC) licences, while its software is released as open source. Ars interviewed one of Arduino’s co-founders, Massimo Banzi, back in 2013.

    • ROS: An Open Source Robotics Platform on Linux

      ROS is an open source framework allowing you to create advanced robots. Using ROS takes much of the tedious work out of creating useful robots because it supplies code for navigation, arm manipulation, and other common robot tasks. ROS allows various software components to communicate between one or more computers and microcontrollers, and it allows you to control one or more machine robot networks from a desktop, web browser, and/or other input device. Although ROS stands for Robot Operating System, it is really a framework that sits on top of an existing operating system such as GNU/Linux. Packages are provided for Ubuntu Linux to help get your robot up and rolling.

    • ORWL Open Source, Physically Secure Personal Computer $699 (video)

      First unveiled back in 2012 the ORWL open source personal computer has been designed with your data security in mind and is being marketed as the very first open source physically secure computer.

      What’s the promotional two-minute video below to learn more about the ORWL and how it can be used to keep your personal data safe. ORWL is currently in the final days of its crowdfunding campaign and has nearly raised double what the team requires to take the secure personal computer into production. For more information, full specifications and to make a pledge jump over to Crowd Supply via the link below.

    • Phones

      • Linux V4.8 on N900

        Basics work, good. GSM does not work too well, which is kind of a problem. Camera broke between 4.7 and 4.8. That is not good, either.

      • Android

        • Best Phones for Rooting and Modding

          If you’re not content with the software some company decided you are allowed to use and are willing to roll up your sleeves and do something about it, the Nexus 5X is the best phone to do it with.

          Because it’s a phone directly from Google, the bootloader is easy to unlock using tools and directions Google gives you, and you’ll have no restrictions on the software you can install. If you keep going until the phone just stops working getting back to the factory software is just as easy, and Google provides a downloadable image you can use to restore.

        • EU to Google: stop Android anti-competitive deals, or else [Ed: Remember Microsoft was behind this, remember Android is Linux based, ask yourself if "Microsoft loves Linux"]
        • White Google Pixel and Pixel XL leaked by Bell
        • Google Maps for Android Update Brings Calendar Integration, Shows Upcoming Events
        • Most Secure Android Phone

          The Nexus 6P is the most secure Android phone you can buy, and one of the most secure phones of any available today.

          Without disabling any security protections, the Nexus 6P is protected against known public security exploits and remote installations are monitored by Google’s scanning software which blocks potential malicious content. While security and privacy are two very different things, when you decide you want private things to stay private you need to make sure your phone is secure to keep them that way.

Free Software/Open Source

  • How startups can use open source software to compete against the big guys

    Open source software allows more small businesses in industries that haven’t yet been completely disrupted by technology to create agile software with a small team. This kind of access is what helped my team create our own content marketing software to better service our clients in-house. We did it with a small dev team, and we aren’t alone in that. I think we’re going to start seeing more companies use open source software to create custom tech solutions to fit their needs and make them more competitive against industry giants. – John Hall, Influence & Co.

  • Zeppelin: a Secure Smart Contracts Open-Source Framework for Blockchain Applications

    On September 15, the roadmap proposal for Zeppelin, a MIT licensed open source framework for building secure smart contracts, was published. This comes at an appropriate time as evidenced by the number of talks and discussions at DevCon2 surrounding formal verification of smart contracts.

    Demian Brener and Manuel Aráoz, founders of Smart Contract Solutions, are pioneering the effort around Zeppelin. Zeppelin is a community effort to enable the development of secure, tested and audited smart contract code. Earlier this year, “The DAO”, the largest smart contract application to date, was hacked for $60M by exploiting a loophole in its smart contract. This has justified many concerns in the community bringing formal verification to the forefront.

  • Google Open Sources Powerful Image Recognition Tool

    On the artificial intelligence front, there is a true renaissance going on right now, and it includes a slew of new open source tools, many of which are likely to give rise to businesses built around them. For example, Google recently open sourced a program called TensorFlow. It’s based on the same internal toolset that Google has spent years developing to support its AI software and other predictive and analytics programs. You can find out more about TensorFlow at its site, and you might be surprised to learn that it is the engine behind several Google tools you may already use, including Google Photos and the speech recognition found in the Google app.

    Now, Google has open sourced a “Show and Tell” algorithm to developers, who can purportedly use it recognize objects in photos with up to 93.9 percent accuracy, and help to automate smart photo captioning. It’s based on TensorFlow, and here are details.

  • Events

    • OpenStack Summit to Include Distinguished Contributor Awards

      Not long ago, the OpenStack Foundation created a Superuser publication to facilitate knowledge sharing and collaborative problem solving among individuals who are running OpenStack clouds. It’s actually become a very rich site, and if you are at all involved with OpenStack, it’s worth investigating.

      As the Superuser site has announced, at the upcoming OpenStack Summit in Barcelona, a special round of community awards will be handed out by the OpenStack Foundation. The idea is to recognize esteemed contributors, and here are the details on how you can enter a submission for consideration.

  • Oracle/Java/LibreOffice

  • FSF/FSFE/GNU/SFLC

    • GnuCash A Free & Open Source Accounting Software For Linux

      GnuCash is a free open source accounting program launched in 1998 for small business. GnuCash implements a double entry bookkeeping system. It was first designed for Linux but later in 2004 it was released for Mac and in 2007 was available for Windows. Its current version is 2.6.14. GnuCash is also available for Android in Playstore.

  • Public Services/Government

Leftovers

  • Security

    • security things in Linux v4.7
    • Microsoft warns Windows security fix may break network shares

      The latest of these, Preview Build 14936 – for testers on what Microsoft refers to as the Fast Ring – comes with the usual set of updates, new features, and fixes for things that the previous release managed to break.

      However, what caught our eye was a warning that after updating, users may find that shared devices such as NAS boxes have mysteriously disappeared from the home network folder, and that any previously mapped network drives are unavailable.

      Microsoft offers a fix for this; if you change your network to “private” or “enterprise”, it should start working again.

      It seems that the cause of this hiccup is a fix that Microsoft made earlier in September to address a security hole severe enough that it might allow remote code execution with elevated permissions on an affected system, although this would require an attacker to create a specially crafted request.

      The fix addresses this by, among other things, “correcting how Windows enforces permissions”.

      Windows Insiders are typically no newbies and used to preview builds breaking stuff, but it is likely that this change will find its way into the Windows 10 code everybody else is running sooner or later.

    • Android Devices Are Targeted By New Lockscreen Ransomware
  • Defence/Aggression

    • Inside the Shadowy PR Firm That’s Lobbying for Regime Change in Syria

      On September 30, demonstrators gathered in city squares across the West for a “weekend of action” to “stop the bombs” raining down from Syrian government and Russian warplanes on rebel-held eastern Aleppo. Thousands joined the protests, holding signs that read “Topple Assad” and declaring, “Enough With Assad.” Few participants likely knew that the actions were organized under the auspices of an opposition-funded public relations company called the Syria Campaign.

    • Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Proposed Drone Strike on Julian Assange

      Julian Assange and his free-speech brainchild Wikileaks were once lauded as global heroes of public service among United States politicians and policy makers. But by 2010, four years after its inception during the President George W. Bush administration, Assange and his organization were no longer considered lovable troublemakers and mavericks.

      A year into President Barack Obama’s first term, Wikileaks was suddenly considered an out-of-control free-speech Frankenstein wreaking havoc on United States foreign policy and intelligence gathering at the direction of Assange, its proverbial Dr. Frankenstein.

      The honeymoon for the whistle-blower web site, once a darling of the Democratic Party, was now over. Even more alarming, Assange’s personal safety and organization were increasingly at risk from U.S. concerns.

      By November 2010, Assange was a household name globally, but especially on Capitol Hill. And in the State Department alone his prowess of releasing otherwise secret, damning military documents and emails were filling conference rooms at Foggy Bottom and the White House with policy wonks and bureaucrats desperately seeking to squelch the upstart Wikileaks. At the State Department, meeting after meeting was conducted about how Secretary of State Hillary Clinton and her inner circle were going to squash Assange and Wikileaks latest planned document dump on the United States. Deemed “CableGate,” Assange planned to release confidential cables, or communications, unveiling damaging internal conversations between State Department personnel and its foreign assets and allies.

      Prodded by the looming CableGate, Clinton met with staff on Tuesday November 23, 2010 shortly after 8 a.m. on Mahogany Row at the State Department to attempt to formulate a strategy to avert Assange’s plans to release an enormous batch of 250,000 secret cables, dating from 1966 to 2010. Assange had professed for months to rain the internal cables down on Clinton and President Obama. The collective fear was the context of the secret cables would hamper U.S. intelligence gathering and compromise private correspondences and intelligence shared with foreign governments and opposition leaders. Splashing such juicy details on television news shows and the front pages of major newspapers in the country was great for the media but lousy for intelligence and foreign policy. Many, including Clinton and her elected boss, expressed fear these revelations would embarrass and expose intelligence allies of the United States and set America’s already fragile foreign policy back decades.

    • The Empire Strikes Back

      A decade ago left-wing governments, defying Washington and global corporations, took power in Brazil, Argentina, Paraguay, Venezuela, Uruguay, Bolivia and Ecuador. It seemed as if the tide in Latin America was turning. The interference by Washington and exploitation by international corporations might finally be defeated. Latin American governments, headed by charismatic leaders such as Hugo Chavez in Venezuela, Luiz Inácio Lula da Silva in Brazil, Evo Morales in Bolivia and Rafael Correa in Ecuador, won huge electoral victories. They instituted socialist reforms that benefited the poor and the working class. They refused to be puppets of the United States. They took control of their nations’ own resources and destinies. They mounted the first successful revolt against neoliberalism and corporate domination. It was a revolt many in the United States hoped to emulate here.

      But the movements and governments in Latin America have fallen prey to the dark forces of U.S. imperialism and the wrath of corporate power. The tricks long practiced by Washington and its corporate allies have returned—the black propaganda; the manipulation of the media; the bribery and corruption of politicians, generals, police, labor leaders and journalists; the legislative coups d’état; the economic strangulation; the discrediting of democratically elected leaders; the criminalization of the left; and the use of death squads to silence and disappear those fighting on behalf of the poor. It is an old, dirty game.

      President Correa, who earned enmity from Washington for granting political asylum to Julian Assange four years ago and for closing the United States’ Manta military air base in 2009, warned recently that a new version of Operation Condor is underway in Latin America. Operation Condor, which operated in the 1970s and ’80s, saw thousands of labor union organizers, community leaders, students, activists, politicians, diplomats, religious leaders, journalists and artists tortured, assassinated and disappeared. The intelligence chiefs from right-wing regimes in Argentina, Bolivia, Chile, Paraguay, Uruguay and, later, Brazil had overseen the campaigns of terror. They received funds from the United States and logistical support and training from the Central Intelligence Agency. Press freedom, union organizing, all forms of artistic dissent and political opposition were abolished. In a coordinated effort these regimes brutally dismembered radical and leftist movements across Latin America. In Argentina alone 30,000 people disappeared.

    • Colombia referendum: Voters reject Farc peace deal

      Voters in Colombia have rejected a landmark peace deal with Farc rebels in a shock referendum result, with 50.2% voting against it.

      The deal was signed last week by President Juan Manuel Santos and Farc leader Timoleon Jimenez after nearly four years of negotiations.

      But it needed to be ratified by Colombians in order to come into force.

      Addressing the nation, President Santos said he accepted the result but would continue working to achieve peace.

    • Democracy At Its Worst – Colombians Choose War

      The recent result in Colombia is very unsatisfactory. It allows both sides to see victory is achievable with a little more killing or screaming or whatever…

      The world is not a better place when democracy decides that war is better than a few compromises and wider participation of groups in society. Let’s hope that cooler heads prevail and people care enough to do the right thing sooner or later.

  • Environment/Energy/Wildlife/Nature

    • Reykjavík: the geothermal city that aims to go carbon neutral

      Reykjavík used to be marketed as a place of ‘pure energy’, run on geothermal power – and now Iceland’s capital is trying to become the world’s first carbon neutral city.

      Last month, Iceland became the one of the first countries to ratify the Paris climate deal with a unilateral parliamentary vote, shortly after Reykjavik announced its aim to be carbon neutral by 2040.

      It wants to reduce its greenhouse gas emissions from 2.8 tonnes per person in 2013 to zero – largely by changing the shape of the city to reverse urban sprawl and encouraging Icelanders out of their beloved cars to walk, cycle or use public transport.

      The city already has a head-start thanks to its reliance on geothermal energy. The US, for example, has a greenhouse gas footprint of 16.5 tonnes per person.

  • Finance

    • 589 million Chinese tourists will spend $72 billion in just seven days celebrating “Golden Week”

      Nearly 600 million Chinese tourists will flock to local tourist spots or fly overseas during the country’s 67th National Day holiday, a seven-day break nicknamed “Golden Week.” Unexpectedly, the new hot destination is Morocco, the North African country.

      South Korea, Thailand and Japan continue to be the top 10 most popular travel destinations (link in Chinese) for Chinese tourists, but there was a 3500% year-on-year increase in visa applications to Morocco processed by Ctrip, a Nasdaq-listed travel agency based in Shanghai, China, according to a 2016 National Day Holiday travel prediction report by Ctrip and the state-backed China Travel Academy. The report also said the United Kingdom, Cambodia, Russia and New Zealand will each see a 60% year-on-year increase.

    • After article 50, Brexit will be easy. A trade deal will be anything but

      Article 50, providing for Brexit, will be triggered by the end of March next year, Theresa May has promised. Two years after it is triggered, Britain will find itself outside the European Union, unless there is unanimous agreement among the other member states to extend the time limit.

  • AstroTurf/Lobbying/Politics

    • Trump Campaign Threatens To Sue NY Times For Sharing His 1995 Tax Returns

      It’s kind of amazing how quickly Donald Trump’s lawyers seem to threaten any media outlet for publishing information about him that he doesn’t like. The latest target is the NY Times which ran a big story over the weekend with some leaked pages of his 1995 tax returns, suggesting that the guy who repeatedly claims he’s great at business, reported personal losses of $916 million. We’ll leave the analyzing of the tax returns to those who do that sort of thing (though I will recommend reading this analysis, which suggests that it’s likely a key part of the NYT article is wrong concerning Trump’s ability to use those losses to avoid taxes for 18 years), but we did want to focus in on something more relevant to what we discuss here at Techdirt.

      [...]

      But, it’s not that simple. The NY Times would have a pretty strong First Amendment defense that what they’re doing here is very much in the public interest. After all, Trump himself has made his tax returns (and his supposed acumen as a business man) an issue in this campaign by refusing to release them, despite every other major party candidate for President releasing tax returns going back decades (and even Trump himself mocked Mitt Romney for taking too long to release his own tax returns in 2012). So there’s no argument here that this isn’t newsworthy. It clearly is, and that certainly helps the NY Times’s case. To me it seems like it should be a clear First Amendment win for the Times — and plenty of others agree.

      Plus, there’s the fact that if Trump actually did sue, he’d have to admit the returns are really his and are accurate.

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Hackers auctioning NSA code disappointed in bidding
    • NSA Secrets Could Be Yours for Only $1,083!
    • Hacker group finds no takers for NSA exploits
    • Nobody wants hacked NSA tools; The Shadow Brokers go on an angry rant in broken English
    • No-one wants to buy the Shadow Brokers’ stolen NSA tools
    • The Peculiar Case of Email in the Cloud [Ed: All E-mail goes through a server; stop using the Clown Computing buzzword, it’s misleading and harmful]

      If you install Postfix on your server, it’s possible to use a Gmail account to send all e-mail on your system. There are a few downsides to this method, but the configuration is simple, and Google’s e-mail servers are very reliable. Plus, because you’re not acting as an e-mail server yourself, you don’t have to worry about having your e-mail rejected by recipients. It’s legitimately coming from gmail.com.

      The first unfortunate consequence is that for its simplest implementation, you need to enable “less secure apps” to log in to your Gmail account. I actually set up a separate gmail.com account for my server, and then I don’t worry about the less secure setting. Thankfully, if this is a concern, it’s possible to use two-factor authentication (more on that later).

    • Snowden — see this film!

      You’ve seen the news stories, and maybe the documentary. The film Snowden will still scare and inspire you. Oliver Stone has made a film that will draw you in, engage you, and even feel anxious about Snowden’s safety. Joseph Gordon-Levitt is amazingly like the man you’ve seen on TV or Youtube.

      Imdb says about Snowden: Its performance during its opening weekend was the lowest opening of Oliver Stone’s career for a film playing in over 2,000 theaters. So go to a theater near you, and see it!

  • Civil Rights/Policing

    • UNSOLVED: The Murder of Ferguson Activist Darren Seals

      It’s been three weeks since the body of 29-year-old Ferguson, Missouri protester Darren Seals was discovered inside his burning vehicle with a gunshot wound to the head. St. Louis County police say the homicide investigation is still without leads. However, some community members are questioning the legitimacy of that investigation.

      Darren Seals was one of the most visible and vocal activists to emerge from Ferguson following the 2014 police shooting of unarmed black teenager Michael Brown. Seals was known as a “day one-er” – meaning he was a visible presence from the very beginning.

      Watching, from just outside the yellow police tape on the afternoon of August 9th, 2014, as Brown’s body lay in the middle of Canfield Drive, and then demonstrating later that same day just a few blocks away on West Florissant Avenue – where clashes between police and protesters would eventually capture the world’s attention.

    • Chelsea Manning’s Integrity

      In Laura Poitras’s documentary, Citizenfour, Edward Snowden worries to Poitras and Glenn Greenwald that “they” (the press and government) will use his “personality” as a distraction when Greenwald starts publishing stories about the documents that Snowden has leaked. Snowden’s concern was meaningful considering the media coverage of Chelsea Manning, who was on trial at the time Poitras was filming the documentary for charges arising from the Espionage Act, including the charge of aiding the enemy.

      Manning’s queerness, gender nonconformity (she now identifies as trans*), and experiences of being bullied in the Army made her an easy target for claims that her leaking of documents was not true whistleblowing, but amounted simply to a private vendetta against the Army and government. In one of the first articles on Manning in the New York Times, for example, Ginger Thompson suggested that Manning might have leaked documents as a way of seeking revenge for being bullied in the military, or for her struggles under Don’t Ask Don’t Tell, or out of “delusions of grandeur.”

    • Arkansas Congressman Who Helped Protect Citizens’ Right To Record Police Arrested For Recording Police

      While the recording of police activities has been covered here for years, I think we’re starting to see what is at least a slight ratcheting down of the drama over the issue. Once almost universally rejected by law enforcement groups, the freedom to record police as they go about their public duty has become more recognized rather than less. That doesn’t mean the issue is settled, though, as shown in a recent example in which Arkansas police arrested a state Congressman who had helped push through a state law protecting the rights of citizens to film police.

    • Arkansas lawmaker who pushed law protecting right to video police is arrested for videoing an arrest

      Officer Jeff Thompson of the Little Rock Police Department arrested Arkansas state Representative John Walker for recording their treatment of a black man who had been put in handcuffs during a traffic stop.

    • Green Party vice presidential candidate Ajamu Baraka on Palestine and Syria

      Ajamu Baraka: Well, of course. The linking of these struggles for liberation in Central America and South Africa with the struggles in the US is a part of the tradition of black internationalism, the center of which is a struggle against the continuity of the colonial, capitalism system. So the quite natural connection has always been with Palestine. In fact, one of the first real structural, organizational connections we point to is the fact that SNCC, the Student Non-Violent Coordinating Committee issued a statement standing in solidarity with the liberation aspirations of the Palestinians in the mid-1960s. And of course there was a very negative backlash for that. So solidarity with Palestinian struggles for self-determination has always been part of the black internationalist tradition. The connection for us has always been clear.

  • Internet Policy/Net Neutrality

    • Domain name system transitions to private sector

      ICANN, the body that regulates the domain name system, is no longer under US government oversight as of October 1

      The contract between ICANN and the US Department of Commerce National Telecommunications and Information Administration to perform the Internet Assigned Numbers Authority (IANA) functions expired at midnight on Friday.

  • Intellectual Monopolies

    • Big Week For WIPO Marrakesh Treaty On Access For Visually Impaired; Human Rights Side Under Focus [Ed: WIPO is attacking its own staff and Gurry needs to resign]

      The Marrakesh Treaty to Facilitate Access to Published Works for Persons Who Are Blind, Visually Impaired or Otherwise Print Disabled was adopted on 27 June 2013, and the 20th WIPO member ratified it on 30 June 2016, bringing it into force 90 days later on 30 September. The first-ever meeting of the Marrakesh Treaty Assembly is scheduled to take place on 5 October at WIPO.

      The Social Forum of the UN Office of the High Commissioner for Human Rights (OHCHR) is taking place from 3-5 October at the UN Palais. The theme of the 2016 session of the Social Forum is the “promotion and full and equal enjoyment of all human rights and fundamental freedoms by all persons with disabilities in the context of the tenth anniversary of the adoption of the Convention on the Rights of Persons with Disabilities (CRPD),” according to the event website.

    • External Offices, WIPO Normative Work At Heart Of General Assemblies

      WIPO Director General Francis Gurry, in his opening speech, said “very good process has been made across the organisation over the course of the past 12 months.” He remarked on the last biennium’s (2014-2015) overall surplus of CHF 70.3 million (US$ 72.3 million). WIPO is faring well in the current biennium, he said, and is foreseen to yield an overall surplus as well.

    • Copyrights

      • Phoneix Police Issues Totally Bogus Cease & Desist To Trump Campaign Claiming Copyright Infringement

        Yes, yes, we know that resorting to copyright to take down speech from a politician you don’t like is pretty common. Most of the time it involves musicians not liking politicians playing songs, but lately we’ve seen some other ones as well. Last week, for example, we wrote about a photographer successfully using the DMCA to remove the now infamous image of a bowl of Skittles that Donald Trump Jr. tweeted.

        The latest, however, is even more ridiculous. The city of Phoenix Arizona has sent a cease & desist letter to the Donald Trump campaign, arguing (incorrectly) that Trump was violating their copyrights and publicity rights, by using imagery of Phoneix police officers in an advertisement (first reported by a local NBC affiliate in Arizona). The ad is available on YouTube, and don’t blink or you might miss the Phoneix police officers. It’s a pretty generic politician ad, frankly, but there’s a very brief shot of Trump shaking hands with some Phoneix police officers on a tarmac somewhere (I’m guessing Phoenix…). It appears to last all of about a second.

Links 3/10/2016: Linux 4.8 Released, Steam Survey Shows GNU/Linux Growth

Posted in News Roundup at 3:31 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • The Bug Report

      So I get a bug report. It is on GNU/Linux, of course, because that is the only ecosystem that sends bug reports.

      So first I boot up my work box (Computer #1, Windows 10) which is the one that has the sweet monitor and try to VPN to the Server box (Computer #2, GNU/Linux Fedora Server, amd64). But, of course, at one point I’d stripped all the non-console-mode functionality off of the server, so VPN is a fail. I could have done the fix easily via ssh and emacs-nox, but, I figure it will only take a minute to get a graphical environment up and running.

      There’s a GNU Linux VM running on VirtualBox on the work box, but, I get distracted from the actual problem when I can’t figure out how to get VirtualBox to create a large screen. Totally not a problem, but, I get obsessed with this minutiae and can’t let it go. I waste time tweaking the virtual graphics card settings with no effect.

    • Doom for Windows [Ed: by the creator of DirectX, who isn't pleased with Windows Update.]

      Windows failed to make the leap to new business models and new distributed computing paradigms such that now in the year 2016 Microsoft is on the cutting edge of adopting Apple’s 2007 business model for Windows 10. Here’s why Microsoft has reached the end of its road. They lost the mobile market, they lost search, they’re struggling to compete in the cloud and all they have left is a legacy OS with an architecture from the days of personal computing when connectivity was something only nerds and IT managers worried about. Now the idea of personal computer security is collapsing. It is readily becoming apparent that NOTHING can stop malicious attackers from eventually penetrating the best most advanced security measures of any personal device. Furthermore, as the Edward Snowden scandal has made plain to us all, if malicious attackers aren’t breaking into our computers, then the worlds governments are requiring companies to make their products vulnerable to intrusion. The idea that a lowly personal computer behind a frail consumer router… made in China… stands any chance of resisting serious hacking attempts is a fast fading dream.

      Back when I was making online game publishing DRM (Digital Rights Management) Solutions we measured the time it took Chinese and Russian hackers to crack our best latest security attempts in weeks. Today it can take a matter of days or hours.

      The Windows Operating system has become vast, bloated and cumbersome to maintain. It faces constant security bombardment by the entire worlds connected hacker community and government security agencies. The volume of patches it needs to maintain even the most rudimentary pretext of stability and security requires a constant and overwhelming flood of Windows updates. The seriousness of the situation and the sheer flood of data Microsoft is constantly sending to our computers is staggering. I wanted to show a screen shot of my HUGE Windows Update history but mysteriously, after this most recent disastrous update… Microsoft has seen fit to clear my machine of that information…

    • No Free Upgrades, No New Users: Windows 10 Declines for First Time Since Launch [Ed: based on Microsoft-connected firm]

      The latest batch of market share statistics provided by Net Applications for desktop operating systems puts Windows 10 on the second position in the rankings, but it also reveals something totally unexpected that happened last month.

      Windows 10 has actually lost market share last month despite the fact that everyone expected the operating system to continue its growth, which could be a sign that Microsoft’s 1 billion devices running Windows 10 goal might take a bit longer to become reality.

  • Kernel Space

    • You can crash Linux Systemd with a single Tweet

      System administrator Andrew Ayer has discovered a potentially critical bug in systemd which can bring a vulnerable Linux server to its knees with a single command line.”After running this command, PID 1 is hung in the pause system call. You can no longer start and stop daemons.

    • How to reignite a flamewar in one tweet (and I still don’t get it)
    • Multiple Linux Distributions Affected By Crippling Bug In Systemd

      System administrator Andrew Ayer has discovered a potentially critical bug in systemd which can bring a vulnerable Linux server to its knees with one command. “After running this command, PID 1 is hung in the pause system call. You can no longer start and stop daemons. inetd-style services no longer accept connections. You cannot cleanly reboot the system.” According to the bug report, Debian, Ubuntu, and CentOS are among the distros susceptible to various levels of resource exhaustion. The bug, which has existed for more than two years, does not require root access to exploit.

    • Lennart’s Look At Systemd This Year, What’s Going To Happen In 2017

      We have already covered some of the interesting talks from this year’s systemd conference including how to use it for application sandboxing, a new wireless daemon coming to replace wpa_supplicant, and BUS1 is on the way. But saving the best for last in another presentation to watch this weekend for those interested in systemd: Lennart Poettering’s state of the union address for systemd and a look ahead to 2017 features.

      Lennart’s systemd presentation covered recent improvements/features to systemd as well as a look ahead at some of the ideas baking for future releases. A lot of emphasis was placed on Portable Services for systemd and sandboxing of applications. Some other future ideas are having a Dbus daemon within systemd, more work on containers support, and a variety of new tunables coming. Some of the future options coming include ProtectKernelLogs, ProtectClock, ProtectKernelModules, ProtectMount, ProtectKeyRing, DataDirectory, CacheDirectory, and RestrictNamespaces.

    • October Should Be Very Exciting For Linux Enthusiasts
    • Legends of Linux Part 1: Linus Torvalds

      AS PART of our visit to LinuxCon this week we’re going to ask five key players in the Linux story the same 10 questions to get an idea of where Linux has been, where it is and where it’s going.

      And who better to start with than Linus Torvalds, the often outspoken creator of Linux itself. Torvalds isn’t actually attending the celebrations this year, but was kind enough to chat to the INQUIRER by email.

    • Linux Kernel 4.8 Released By Linus Torvalds — Here Are The 10 Best Features
    • Linux Kernel 4.8 Officially Released, Merge Window for Kernel 4.9 Now Open

      Today, October 2, 2016, Linus Torvalds proudly announced the release and availability for download of the Linux 4.8 kernel branch, which is now the latest stable and most advanced one.

      Linux kernel 4.8 has been in development for the past two months, during which it received no less than eight Release Candidate (RC) testing versions that early adopters were able to compile and install on their GNU/Linux operating system to test various hardware components or simply report bugs. That’s right, the Linux 4.8 kernel series was one of those special ones that received that eighth Release Candidate.

    • Linux 4.8 Kernel Released

      The Linux 4.8 kernel is now officially available.

      Linus Torvalds tagged Linux 4.8.0 and kept the codename as “Psychotic Stoned Sheep.”

    • The Best Features Of The Linux 4.8 Kernel

      If all goes according to plan, the Linux 4.8 kernel will be officially released this afternoon by Linus Torvalds.

    • Graphics Stack

      • Mesa May Move To A Date-Based Versioning System

        Beginning next year, Mesa developers so far appear favorable to moving towards a date-based versioning concept.

        Per the proposal laid out yesterday by AMD’s Marek Olšák, Mesa would move to a date-based version string. He explained, “2017 would start with 17.0, then 17.1, 17.2, 17.3 for following quarters of the year, respectively. 2018 would start with 18.0, then 18.1, 18.2, 18.3. The motivation is that you can easily tell when a specific Mesa version was released with an accuracy of 3 months.”

  • Applications

  • Desktop Environments/WMs

    • GNOME Desktop/GTK

  • Distributions

    • New Releases

      • 4MRecover 20.0 Data Recovery Live CD Is Now in Beta, Includes TestDisk 7.0

        4MLinux developer and project leader Zbigniew Konojacki informs Softpedia today, October 2, 2016, about the release and immediate availability for download of the Beta pre-release version of the upcoming 4MRecover 20.0 Live CD.

        As you might know already, the 4MLinux 20.0 and 4MLinux Core 20.0 GNU/Linux distributions are in the works, which means that Zbigniew Konojacki is also preparing new versions of his other projects, including 4MRecover, a Live CD that can be used for data recovery independent of a computer operating system.

        Therefore, 4MRecover 20.0 Beta is based on the Beta release of the 4MLinux 20.0 operating system, which should be officially promoted to the stable channel on the first day of November 2016, and it ships, as usual, with the powerful TestDisk 7.0 data recovery and PhotoRec 7.0 image recovery software.

    • Arch Family

    • OpenSUSE/SUSE

      • openSUSE Tumbleweed Gets Linux Kernel 4.7.5, openSSL 1.0.2j, and Firefox 49.0.1

        Today, October 2, 2016, Douglas DeMaio from the openSUSE project announced that the rolling release Tumbleweed distro received five new snapshots during the last week of September, which brought many goodies to users.

        As mentioned before, these new snapshots brought several updated components and applications for the openSUSE Tumbleweed operating system, which continually received the latest software releases a few days after they’re announced upstream. The most important one being the Linux 4.7.5 kernel.

        We’ve already reported last week that openSUSE Tumbleweed was the first stable GNU/Linux distribution to include the recently released GNOME 3.22 desktop environment, and the openSUSE team now reveals the fact that KDE Plasma 5.8 LTS is coming soon as well, along with Bash 4.4, Qt 5.7, Mono 4.6, and FreeType 2.7.

    • Red Hat Family

    • Debian Family

      • Derivatives

        • DebEX KDE Live DVD Updated with KDE 4.14.2 and Plasma 5, Linux Kernel 4.8 RC8

          GNU/Linux developer Arne Exton informs us about the release of a new stable build of his Debian-based DebEX KDE Live DVD, which ships with the latest stable Linux kernel packages and up-to-date software components.

          Based on the Debian GNU/Linux 8.6 “Jessie” operating system, DebEX KDE Live DVD Build 161001 is out as a drop-in replacement to version 160604, but it looks like Arne Exton managed to implement the latest Release Candidate (RC) version of the just announced Linux 4.8 kernel, which should be out any moment now.

        • Parsix GNU/Linux 8.5 Reached End of Life, Upgrade to Parsix GNU/Linux 8.10 Now

          As reported last month, the Parsix GNU/Linux 8.5 operating system was about to reach the end of its life on September 30, 2016, so today being October 2 means that you need to upgrade your system right now.

          Dubbed Atticus, Parsix GNU/Linux 8.5 was announced approximately months ago, on the 14th of February, and it was entirely based on the Debian GNU/Linux 8.5 “Jessie” operating system, which means that is shipped with the long-term supported Linux 4.1.17 kernel and thes GNOME 3.18 desktop environment with GNOME Shell 3.18.3.

  • Devices/Embedded

Free Software/Open Source

  • CoursePad to Become Open Source

    Cornell’s most popular course scheduling website, CoursePad.me, became an open source platform on Github last Thursday after enjoying two years of popularity among students, according to Jingsi Zhu ’16, the website’s sole developer.

    Zhu explained that he chose to open source his website — or make its code freely available for modification and redistribution — after he graduated last semester and realized that he would need to devote more time to his work than to CoursePad.

  • Yahoo open sources its NSFW-detecting neural network

    Yahoo has open-sourced its NSFW (not suitable/safe for work) detecting neural network, allowing developers to work towards improving the algorithm. Jay Mahadeokar and Gerry Pesavento of Yahoo explained in a blogpost that defining NSFW material on Internet is subjective and identifying such images is non-trivial. “Since images and user-generated content dominate the Internet today, filtering NSFW images becomes an essential component of Web and mobile applications,” they said.

  • Open source drives companies to change hiring and development

    “Do I want to play with this open source thing?” This was the question most people asked 20 years ago when I started reviewing PostgreSQL bug fixes and assembling like-minded database colleagues to help start the PostgreSQL Global Development Group.

    It’s mind-blowing to see how much things have changed.

    Today, not becoming a follower of some open source community almost means you’re cobaling yourself—excluding yourself from the reality of how organizations use open software today. As engineers, we always want to keep up with the latest technologies not only to satisfy our desire to create and innovate, but also to remain marketable in a business world where products and technology constantly evolve. What’s happened with the open source movement is different.

    Open source today is not just about the products and technologies that companies use, but rather a whole rainbow of adjustments that have penetrated the corporate culture beyond the engineering department.

    I heard some of the best examples of this during a discussion for data industry leaders at the forefront of open source software innovation this summer. The event was co-hosted by EnterpriseDB (EDB) and MIT Technology Review. We shared our experiences of data transformation with Postgres, NoSQL, and other solutions, and really learned a lot from each other.

  • Security analytics platform now an Apache open source project

    Infosec pros have been hoping for some time that big data and analytics can be harnessed to improve cyber security. A fledgling open source project with genes from Intel and Cloudera is another step in that direction.

  • Events

    • Indian language localization community meets in New Delhi

      Localization is one of the less glamorous aspects of computing. Despite the fact that less than 6% of the world speaks English, a majority of projects don’t feel inclined to accommodate the rest of the population. One of the primary reasons for sticking to English is the steep learning curve and the lack of standardization in various aspects of the localization process.

      The FUEL Project organized the GILT conference in New Delhi, India September 24-25 to highlight and address these issues. The annual event showcases the efforts of language technology organizations and volunteer communities, but this year’s also gave a platform for non-technical users to voice their concerns. The Indic computing developers were joined by academics, reporters, language researchers, publishers, and entrepreneurs who rely on localization tools to connect and interact with audiences in the various regional languages in India. The brainstorming between the two groups, both on and off the stage, was one of the highlights of the conference.

  • SaaS/Back End

  • Openness/Sharing/Collaboration

    • Open Hardware/Modding

      • Rehab Addict’s Nicole Curtis and Hackers Agree : Open Hardware Rules

        They say necessity is the mother of invention and it also happens to be responsible for transforming Nicole Curtis from a waitress/real estate agent into the TV star of Rehab Addicts. Much like the dozens of high-tech makers highlighted in Thomas’s book Making Makers, Nicole’s early challenge of “I had no money” galvanized her to find ways to turn beat up old houses and trash into high-value treasures.

        Her approach has been enormously successful. Nicole routinely shows her Rehab Addict fans how to remodel their homes and save a fortune. For example, she redid a bathroom by upcycling what others discarded for a tenth of the cost of putting in a new bathroom. Her videos provide the how tos for anyone with similar problems -they represent the “source code” to rehab a house.

Leftovers

  • French man walks into Apple store and smashes all of its iPhones, shouting ‘this is happening!’

    A man has been caught on camera smashing thousands of pounds worth of new iPhones on display in an Apple shop.

    The unidentified man, who is wearing dark glasses and carrying a steel ball used for boules, methodically removes display phones from their upright holders, and smashes the ball down onto the phones’ Retina HD displays.

    Footage shows him destroying at least 12 iPhones at the shop in Dijon, before he is challenged by security.

  • EU plans to give free Interrail pass to every 18-year-old in Europe on their birthday

    Plans to give all teenagers living in the EU a free Interrail pass on their 18th birthday are to be debated at the European Parliament.

    The proposal aims to give young Europeans a “sense of belonging” to the continent and comes after the President of the European Commission Jean-Claude Juncker called for greater cooperation within the EU during his State of the Union speech in Strasbourg.

  • Revealed: How one Amazon Kindle scam made millions of dollars

    He spent a little over 10 years working as a software development engineer for various companies, including Microsoft. He went on to co-found a startup, Alteroxity, which claims to help authors publish ebooks that are already “done for you” — that includes the writing, the creation, the publishing, and even “dozens of honest positive reviews”.

  • Science

    • 80% of data in Chinese clinical trials have been fabricated

      A Chinese government investigation has revealed that more than 80 percent of the data used in clinical trials of new pharmaceutical drugs have been “fabricated”.

      The report uncovered fraudulent behaviour at almost every level, and showed that some pharmaceutical companies had hidden or deleted records of potentially adverse side effects, and tampered with data that didn’t meet their desired outcomes.

      In light of the findings, 80 percent of current drug applications, which were awaiting approval for mass production, have now been cancelled.

      The investigation, led by the Chinese State Food and Drug Administration (SFDA), looked at data from 1,622 clinical trials for new pharmaceutical drugs currently awaiting approval. The applications in question were all for Western medicine, not traditional Chinese medicine.

    • Vint Cerf: Modern Media Are Made for Forgetting

      Vint Cerf, the living legend largely responsible for the development of the Internet protocol suite, has some concerns about history. In his current column for the Communications of the ACM, Cerf worries about the decreasing longevity of our media, and, thus, about our ability as a civilization to self-document—to have a historical record that one day far in the future might be remarked upon and learned from. Magnetic films do not quite have the staying power as clay tablets.

      It’s more than a then-vs-now thing. It’s a progression through history. Clay tablets are more resilient than papyrus manuscripts are more resilient than parchment are more resilient than printed photographs are more resilient than digital photographs.

      At stake, according to Cerf, is “the possibility that the centuries well before ours will be better known than ours will be unless we are persistent about preserving digital content. The earlier media seem to have a kind of timeless longevity while modern media from the 1800s forward seem to have shrinking lifetimes. Just as the monks and Muslims of the Middle Ages preserved content by copying into new media, won’t we need to do the same for our modern content?”

  • Health/Nutrition

    • This Is The Scariest Thing About Health Care In America Today

      I got an email from my husband’s nephrologist the other day that said: “I honestly do not think he will recover.” Before you gasp in horror and go to your dark place, just know that he and I have made our peace with this information. Kidney dialysis is a game-changer, not a game-ender.

      No, it actually wasn’t that particular sentence at all that made my heart sink. The Titanic that overcame me was when his doctor referred him to a vascular surgeon who is not within our insurance company’s network.

      The horrifying reality of my husband’s month-long hospitalization early this summer is that many of the doctors who paraded through his room and stayed for all of about 90 seconds were also out-of-network. And I have the bills to prove it.

      “Well gee, she probably has a cheap-o plan or should be blaming Obamacare,” you may be thinking. You’d be wrong. I work for a large company and we are covered by my large company’s group plan. We bought the best ― and most expensive ― plan offered, one that allowed us to go see any out-of-network doctor if we really wanted to. But somehow, during a hospitalization, the “if we really wanted to” part leaves your control.

    • In Year Since Water Crisis Began, Flint Struggles In Pipe Replacement Efforts

      It’s been one year since health officials in Michigan warned people in the city of Flint to stop drinking the tap water after a research team from Virginia Tech discovered elevated lead levels.

    • In Major Settlement, States Gang Up to Strike Deal with Soldier-Suing Company

      A coalition of attorneys general representing 49 states and the District of Columbia announced a settlement today with USA Discounters, requiring it to pay $40 million in penalties and wipe out more than $95 million in debt for its past customers.

      When ProPublica published its investigation of USA Discounters in 2014, the company was operating two dozen stores, most of them right outside the country’s largest military installations.

      To buy the marked-up furniture, appliances, and electronics the company offered in its showrooms, service members took out loans laden with high interest rates and extra fees. Soldiers who couldn’t pay were then subject to the company’s collection machine, which filed tens of thousands of collection suits in a local Virginia court regardless of wherever in the world the soldier might be.

      Late in 2014, the company underwent a rebranding, dubbing itself “USA Living.” Then, last year, it began to close its stores and later filed for bankruptcy.

  • Security

    • Your next DDoS attack, brought to you courtesy of the IoT

      The internet is reeling under the onslaught of unprecedented denial-of-service attacks, the sort we normally associate with powerful adversaries like international criminal syndicates and major governments, but these attacks are commanded by penny-ante crooks who are able to harness millions of low-powered, insecure Internet of Things devices like smart lightbulbs to do their bidding.

      Symantec reports on the rising trend in IoT malware, which attack systems that “may not include any advanced security features” and are “designed to be plugged in and forgotten” without “any firmware updates” so that “infection of such devices may go unnoticed by the owner.”

      The USA and China are the two countries where people own most of these things, so they’re also where most of the malicious traffic originates. Symantec ran a honeypot that recorded attempts to login and compromise a system that presented as a vulnerable IoT device, and found that the most common login attempts used the default passwords of “root” and “admin,” suggesting that malware authors have discovered that IoT owners rarely change these defaults. Other common logins include “123456,” “test” and “oracle.”

    • Meet Linux.Mirai Trojan, a DDoS nightmare
    • Linux.Mirai Trojan Carries Out DDoS Attacks
    • Fears of a hacked election may keep 1 out of every 5 voters home, says report

      Recent hacks of the Democratic National Committee, the Democratic Congressional Campaign Committee and election databases have increased fears that cybercriminals will try to interfere with the upcoming U.S. presidential election.

      Concerns leading up to election day on November 8 could have a real impact on voter turnout, according to a study from cybersecurity firm Carbon Black. More than one in five registered U.S. voters may stay home on election day because of fears about cybersecurity and vote tampering, the study — an online survey of 700 registered voters aged 18-54 — found.

    • Hostile Web Sites

      I was asked whether it would be safe to open a link in a spam message with wget. So here are some thoughts about wget security and web browser security in general.

    • Bug Bounty Hunters Can Earn $1.5 Million For A Successful Jailbreak Of iOS 10
    • How To Ensure Trustworthy, Open Source Elections [Ed: This reminds us Microsoft must be kicked out of election process [1, 2]

      A strong democracy hinges not only on the right to vote but also on trustworthy elections and voting systems. Reports that Russia or others may seek to impact the upcoming U.S. presidential election—most recently, FBI evidence that foreign hackers targeted voter databases in Arizona and Illinois—has brought simmering concerns over the legitimacy of election results to a boil.

    • Source Code for IoT Botnet ‘Mirai’ Released

      The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices.

      The leak of the source code was announced Friday on the English-language hacking community Hackforums. The malware, dubbed “Mirai,” spreads to vulnerable devices by continuously scanning the Internet for IoT systems protected by factory default or hard-coded usernames and passwords.

  • Defence/Aggression

    • Pentagon Paid for Fake ‘Al Qaeda’ Videos

      The Pentagon gave a controversial UK PR firm over half a billion dollars to run a top secret propaganda program in Iraq, the Bureau of Investigative Journalism can reveal.

      Bell Pottinger’s output included short TV segments made in the style of Arabic news networks and fake insurgent videos which could be used to track the people who watched them, according to a former employee.

      The agency’s staff worked alongside high-ranking U.S. military officers in their Baghdad Camp Victory headquarters as the insurgency raged outside.

      Bell Pottinger’s former chairman Lord Tim Bell confirmed to the Sunday Times, which has worked with the Bureau on this story, that his firm had worked on a “covert” military operation “covered by various secrecy documents.”

      Bell Pottinger reported to the Pentagon, the CIA and the National Security Council on its work in Iraq, he said.

    • As Brazil’s New Ruler Admits Lie Behind Impeachment, US Press Closes Eyes

      The Intercept‘s Inacio Vieira notes that the economic plan that Rousseff refused to implement called for widespread cuts to social programs and privatization, a radically different agenda from the one approved by the 54.5 million Brazilian voters who gave Rousseff’s Workers’ Party its fourth electoral victory in 2014.

      But Temer’s remarkable confession was not seen as newsworthy by virtually anyone in US corporate media—though the New York Times (9/19/16) did report on the speech by Temer to the United Nations a few days earlier in which he insisted in reference to the impeachment, “Everything happened with absolute respect for the constitutional order.”

    • When Is Direct Military Intervention Not Direct Military Intervention?

      “President Obama has long refused to approve direct military intervention in Syria,” the New York Times asserted in an editorial (9/29/16) about “Vladimir Putin’s Outlaw State.”

      That’s a peculiar thing to say, given that the Times regularly covers the United States’ ongoing direct military intervention in Syria. Since 2014, according to official Pentagon figures, the US has carried out 5,337 airstrikes in Syria. According to the monitoring group Airwars, these airstrikes (along with a few hundred strikes by US allies) have likely killed between 818 and 1,229 Syrian civilians.

      Nor is direct US military intervention in Syria limited to aerial attacks. In May 2015, the New York Times (5/16/15) reported on a combat raid by US Delta Force commandos in eastern Syria. Later that year, the Times (10/30/15) observed that President Barack Obama had announced he was sending (in the paper’s words) “several dozen” special forces troops on an “open-ended mission” inside Syria.

    • It’s Personal Now: Apologizing to My Daughter for the Last 15 Years of War

      4929686071_970be30b8d_o

      I recently sent my last kid off for her senior year of college. There are rituals to these things, and because dad-confessions are not among them, I just carried the boxes and kept quiet.

      But what I really wanted to say to her — rather than see you later, call this weekend, do you need money? — was: I’m sorry.

      Like all parents in these situations, I was thinking about her future. And like all of America, in that future she won’t be able to escape what is now encompassed by the word “terrorism.”

    • Bring Back The Cold War

      Pundits have declared a “New Cold War.” If only!

    • Colombia’s Santos, FARC scramble to revive peace after shock vote

      Colombia’s government and Marxist FARC guerrillas will scramble on Monday to revive a plan to end their 52-year war after voters rejected the hard-negotiated deal as too lenient on the rebels in a shock result that plunged the nation into uncertainty.

      Putting on a brave face after a major political defeat, President Juan Manuel Santos offered hope to those who backed his four-year peace negotiation with the Revolutionary Armed Forces of Colombia (FARC) in Cuba.

      Latin America’s longest conflict has killed 220,000 people.

      “I will not give up, I will keep seeking peace until the last minute of my term,” he said moments after losing Sunday’s plebiscite to those who want a re-negotiation of the deal or an obliteration of the FARC on the battlefield.

    • Colombia’s Brexit moment as politicians misjudge popular anger at Farc amnesty

      Colombia’s rejection of a peace deal with Farc rebels to end 52 years of war does not mean an automatic return to hostilities, but it makes the possibility of peace, which had looked close enough to touch, once again a faraway prospect.

      All the pieces were in place to begin implementation of a deal that was four years in the making after talks between government and Farc negotiators in Havana. The Farc had ratified the accord at a national conference, President Juan Manuel Santos and Farc leader Timochenko had signed it in a public ceremony and UN monitors were ready to oversee the bringing together and disarmament of the Farc’s 5,800 fighters. The Nobel committee was reportedly considering a peace prize for Colombia.

  • Environment/Energy/Wildlife/Nature

    • Bees added to US endangered species list for the first time

      Seven types of bees once found in abundance in Hawaii have become the first bees to be added to the US federal list of endangered and threatened species.

      The listing decision, published on Friday in the Federal Register, classifies seven varieties of yellow-faced or masked bees as endangered, due to such factors as habitat loss, wildfires and the invasion of non-native plants and insects.

      The bees, so named for yellow-to-white facial markings, once crowded Hawaii and Maui but recent surveys found their populations have plunged in the same fashion as other types of wild bees – and some commercial ones – elsewhere in the United States, federal wildlife managers said.

  • Finance

    • How Donald Trump could have – legally – paid no taxes

      Trump claimed a $916 million loss in 1995, according to a few pages from his state tax returns obtained by the New York Times.

      Because of how Trump structured his businesses and because of the vast array of tax breaks available to real estate developers, it’s a loss that he could have used to reduce the income tax he might otherwise owe.

      CNN has not independently verified the authenticity of the documents published by the New York Times.

    • ‘The Gender Pay Gap Follows Women Into All Areas’

      Janine Jackson: Every now and again, media will release a list of “best places to work if you’re a woman,” citing companies that treat women, well, fairly. Surely meant to be a spotlight on good guys, these features give the dispiriting impression that fair treatment for women at work is a matter of noblesse oblige, and the onus is on women to shop around till they find a job where they won’t be discriminated against.

      A fundamental reflection of that discrimination is, of course, the gender pay gap. The census data used to figure out the pay gap was released recently, and the American Association of University Women has put together their report analyzing it. Here to talk about where we’re at is Kevin Miller, senior researcher at AAUW and author of the new report, The Simple Truth About the Gender Pay Gap. He joins us now by phone from Washington, DC. Welcome to CounterSpin, Kevin Miller.

    • Post-Debate, NYT Scores Points on Trade–Not So Much on Accuracy

      While China has recently been trying to keep up the value of its currency by selling reserves, it still holds more than $4 trillion in foreign reserves, counting its sovereign wealth fund. This is more than four times the holdings that would typically be expected of a country its size. These holdings have the effect of keeping down the value of China’s currency.

      If this seems difficult to understand, the Federal Reserve now holds more than $3 trillion in assets as a result of its quantitative easing programs of the last seven years. It raised its short-term interest rate by a quarter point last December; nonetheless, almost all economists would agree the net effect of the Fed’s actions is to keep interest rates lower than they would otherwise be. The same is true of China and its foreign reserve position.

      The piece goes on to say that NAFTA has “for more than two decades has been widely counted as a main achievement of her husband,” Bill Clinton. It doesn’t say who holds this view. The deal did not lead to a rise in the US trade surplus with Mexico, which was a claim by its proponents before its passage. It also has not led to more rapid growth in Mexico, which has actually fallen further behind the United States in the two decades since NAFTA.

    • Alice O’Connor on the Politics of Poverty

      This week on CounterSpin: New data showing a drop in the percentage of Americans living below the poverty line is being rightly celebrated. But if eliminating poverty is really our goal, wouldn’t there be keener interest in asking exactly why the number went down—or what it means that it didn’t go down for everyone? For that matter, is monitoring the ups and downs in the poverty rate really the most useful way to think about the problem of persistent social inequity and hardship—or the best measure of the adequacy of the responses we’ve developed?

      We talk about the limits of how we talk about poverty with Alice O’Connor. She’s a professor of history at the University of California/Santa Barbara and author of Poverty Knowledge: Social Science, Social Policy and the Poor in 20th Century US History.

  • AstroTurf/Lobbying/Politics

    • Why Facts Don’t Matter to Donald Trump or the 2016 Electorate

      Between the hours of 3 AM and 5 AM Friday morning, Republican presidential nominee Donald Trump went on a tweetstorm in which he was, you know, just saying that maybe Hillary Clinton helped former Miss Universe (and a target of Trump’s misogyny) Alicia Machado become a US citizen “so she could use her in the debate.”

      Is that true? Almost certainly not—but in this election season, truth and facts hardly seem to matter. Trump’s attacks on Machado are just the latest data point in an election cycle that has seen wild speculation, rampant exaggeration, and outright lies become accepted as fact by huge swaths of the electorate on both sides of the aisle.

    • Challenge Donald Trump: The media needs to stop acting like the Republican nominee is reality TV

      According to the most recent polls — Donald Trump is now leading Hillary Clinton in the critical swing states of Ohio and Florida.

      And if their behavior in the primaries is any indication — the U.S. media is about to deliver this nation into the hands of Donald J. Trump, and there’s probably very little any of us can do about it.

      The “how” of this has played out in front of us for a year: While Bernie Sanders and Hillary Clinton were debating issues on the Democratic side — and being largely ignored — Trump was getting wall-to-wall coverage as he bullied his Republican opponents in the primary.

      So the “how” was grounded in editorial and business decisions about who to cover and how.

    • Trump Tax Records Obtained by The Times Reveal He Could Have Avoided Paying Taxes for Nearly Two Decades

      Donald J. Trump declared a $916 million loss on his 1995 income tax returns, a tax deduction so substantial it could have allowed him to legally avoid paying any federal income taxes for up to 18 years, records obtained by The New York Times show.

      The 1995 tax records, never before disclosed, reveal the extraordinary tax benefits that Mr. Trump, the Republican presidential nominee, derived from the financial wreckage he left behind in the early 1990s through mismanagement of three Atlantic City casinos, his ill-fated foray into the airline business and his ill-timed purchase of the Plaza Hotel in Manhattan.

      Tax experts hired by The Times to analyze Mr. Trump’s 1995 records said that tax rules especially advantageous to wealthy filers would have allowed Mr. Trump to use his $916 million loss to cancel out an equivalent amount of taxable income over an 18-year period.

  • Censorship/Free Speech

  • Privacy/Surveillance

    • There’s exactly one way to prevent misuse of surveillance data: to never collect it in the first place

      A key conclusion in my latest column deserves elaboration: why all available empiric data tells us that the only way to prevent misuse of surveillance data is to never collect it in the first place. This is a very unpopular fact with surveillance hawks, but it’s nevertheless the truth: all collected surveillance data will be abused and turned against the citizen, and that with a mathematical level of certainty.

      While it can’t be logically proven that all surveillance data has been misused and that the surveillance power has been abused, there comes a point in time in any activity where all available empiric data gives the same indication of failure forcefully enough to make people stop and ask “hey, maybe this wasn’t such a good idea”. We’re there with the so-called War on Drugs, we’re there with a number of activities, but the establishment is still fighting forcefully for more surveillance – even though all the data against it is there, and has been for decades.

      Let’s take one example of a super-benign data collection. Around 125 years ago, the Netherlands wanted to serve their citizens better in city planning to make sure everybody had a place of worship nearby, so they started collecting data on people’s faith and where they lived, in order to make sure everybody had a short distance to walk to places of worship.

      There’s absolutely nothing wrong with this on the surface, right? Making sure people have access to services? And yet, this is squarely in the “what could possibly go wrong” category.

    • Shadow Brokers rant about people wanting stolen NSA-linked hacking tools for free

      The hacking group trying to auction off NSA-linked Equation Group hacking tools is unhappy because no one has coughed up the big bucks yet to buy the exploits.

      On Saturday, the Shadow Brokers took to Medium to release the group’s third message. The hackers sound hurt that people don’t trust them and – if cursing is any indication – the hackers are angry that the Equation Group cyber weapons auction has flopped so far.

  • Civil Rights/Policing

    • This U.S. chess champion is missing the world contest in Iran to protest country’s hijab policy

      One female chess player is protesting Iran’s hijab laws by missing the world tournament.

      Nazi Paikidze-Barnes is the reigning U.S. women’s chess champion. But she won’t be going to the Women’s World Championship being held there in February.

      She explained her decision on Friday in a Facebook post in which she called the World Chess Federation’s decision to have the contest in Tehran “unacceptable.”

      SEE ALSO: Models in hijabs make history at New York Fashion Week

      “I think it’s unacceptable to host a WOMEN’S World Championship in a place where women do not have basic fundamental rights and are treated as second-class citizens,” she wrote on the site.

    • O.C. Woman Says Airline Made Her Move Because 2 Pakistani Monks Can’t Sit Next To Female

      An Orange County woman said she is the victim of discrimination.

      Mary Campos says her pre-booked ticket was given away by United Airlines. The reason? She’s a woman, and two men didn’t want to sit next to a female.

      It’s a story that is Only On 2. Stacey Butler spoke to Campos.

      A a million-mile flier, Campos — a mom who lives in Coto de Caza — said she thought she’d seen it all.

      Until a gate agent handed her a new boarding pass just before she got on a flight to Houston last Monday.

      “He said this is your new seat,” Campos said, “And I said, ‘Excuse me?’ And he said, ‘I don’t know how to tell you this’”

      She said she continued by saying, “Yes?”

      [...]

      The letter said, in part, “What if I were handicapped, or transgender?” she wrote. “What if your entire crew were female? Any belief that prevents individuals from interacting with females should not travel on commercial aircraft.”

      She got a reply that said United would look into it. She said she didn’t hear from them again.

      But Butler did. A company spokesperson wrote, in part:

      “We regret that Ms. Campos was unhappy with the handling of the seat assignments on her flight. United holds its employees to the highest standards of professionalism and has zero tolerance for discrimination.”

    • Egyptian MP calls for women to undergo virginity tests before being admitted to university

      An Egyptian MP has called for women to be forced to undergo virginity tests before being admitted to university, it has been reported.

      Parliamentary member Elhamy Agina called on the Minister of Higher Education to issue a mandate requiring him or his officials to enforce the virginity tests, Egyptian Streets reports. He has suggested that university cards could only been issued to female students on completition of a virginity test.

      In an interview with local media, he said: “Any girl who enters university, we have to check her medical examination to prove that she is a Miss. Therefore, each girl must present an official document upon being admitted to university stating she’s a Miss.”

      The term “Miss” in Egyptian culture is often used to refer euphemistically as to whether a woman is a virgin.

    • Operators of baby factory risk 10 years imprisonment

      Henceforth, operators of baby factories, racketeering with human pregnancy and those involved in sale of new born baby across the country on conviction by Court of any competent jurisdiction will be subjected to 10 years imprisonment.

      The punitive measure was contained in the bill for an Act to amend “trafficking in persons (Prohibition) law enforcement and administration Act No. 28 of 2005 to prohibit racketeering with human pregnancy or operation of baby prosecution factory, harbouring or pregnancy persons under the age of 18 and above or selling or attempting to sell new born baby and for related matters, 2016.”

    • California Governor Signs Major Civil Forfeiture Reform – Institute for Justice

      Today, California Governor Jerry Brown signed SB 443, a major overhaul of the state’s civil forfeiture laws. The bill marks one of the nation’s most significant reforms of its kind.

      “Civil forfeiture is one of the most serious assaults on due process and private property rights in America today,” said Institute for Justice Legislative Counsel Lee McGrath. “By generally requiring a criminal conviction, SB 443 would go far in curbing this abuse of power.”

    • Don’t Abandon Due Process, Not Even For Terrorism

      The clash in American history between liberty and safety is as old as the republic itself. As far back as 1798, notwithstanding the lofty goals and individualistic values of the Declaration of Independence and the Constitution, the same generation — in some cases the same human beings — that wrote in the First Amendment that “Congress shall make no law…abridging the freedom of speech” enacted the Alien and Sedition Acts, which punished speech critical of the government.

      Similarly, the Fifth Amendment’s guarantee of due process has been ignored by those in government charged with enforcing it when they deal with a criminal defendant whom they perceive the public hates or fears. So it should come as no surprise that no sooner had the suspect in the recent New Jersey and New York City bombings been arrested than public calls came to strip him of his rights, send him to Gitmo and extract information from him. This is more Vladimir Putin than James Madison.

    • Big Papers Want Foreign Companies, Not War Crime Victims, to Sue US

      Notice that the possibility of other countries suing the US for war crimes its government commits is automatically assumed to be undesirable. The Washington Post puts “terrorism” in irony quotes because, of course, the US could never actually commit terrorism; claims to this effect could only be invoked “when convenient” by greedy non-Americans.

      The New York Times uses its trademark euphemisms to describe how the US is “engaged in the world” with “drone operations.” A nice way of saying the US uses drones to bomb people in a half-dozen countries with—so far—legal impunity. Changing this state of affairs is simply glossed over as a nonstarter.

      USA Today frames any attempt at legal recourse over American terrorism overseas as “retaliation”—presumably for some righteous kill executed by the United States in the service of freedom.

      The New York Times, Washington Post and USA Today are saying that exposing American military and intelligence personnel to foreign liability is per se bad—a nativism so casual and matter-of-fact one might hardly notice it until circumstances force them to explicitly state it. No account is taken of the 7 billion non-Americans or their rights. No explanation is given as to why victims of US terror–of which there are many–shouldn’t register in our moral calculus. They just don’t.

      The irony is that none of these publications were overly concerned with exposing the US to foreign lawsuits when they offered support for the Trans-Pacific Partnership, a corporate trade deal that includes a provision for Investor-State Dispute Settlement—meaning it permits corporations to sue governments, including the US, in the event that a regulation undermines corporate profits. So increased exposure to liability to the US government when it gives more power to corporations is permissible, even desirable, but when it might provide recourse for victims of US war crimes? Not so much.

    • Death threats force Muslim woman into hiding

      Liberal Party politician Mostafa Geha was one of several speakers at the demo, arranged by the local Liberal Party and GAPH, an organisation against “honour violence.” It came in response to a sustained campaign of intimidation and violence on 21-year-old Walaa, who lives in Hedemora.

      In an interview with local radio station P4 Dalarna, she claimed that she has been harassed by both men and women in the town for “not living in the right way”. Tension heightened during a confrontation when she was hit in the face by a young man who had been harassing her over a long period.

      Walaa reported the incident to the police but in the following days the row spread over social media and the story was picked up by local Liberal Party leaders.

      “I decided we should organise a demonstration because that is the way we solve conflict in Sweden. We do it by trying to hold a discussion and say “this is not right”, Anna Eling, chairperson for the Liberals in Hedemora told TT.

  • Internet Policy/Net Neutrality

    • US government no longer manages internet’s technical functions

      The US government has ceded control of the technical management of the internet, in what has been called the “most significant change in the internet’s functioning for a generation”.

      Following a long legal battle, the California-based NGO Internet Corporation for Assigned Names and Numbers (ICANN) will gain control over the organisation of unique online identifiers.

      The change will not affect ordinary internet users but is a reflection of the rapidly shifting online landscape and attitudes to it.

  • Intellectual Monopolies

    • Copyrights

      • “If KickassTorrents is a Criminal Operation, Google Should Start Worrying”

        Polish authorities have extended the arrest of Artem Vaulin, the alleged owner of KickassTorrents. His defense team is currently preparing to fight the U.S. extradition request, which will start next month. According to Artem’s U.S. lawyer, operating a torrent site is not a criminal offense. “If KickassTorrents is a criminal operation, then Google should start worrying,” he says.

      • Watching Pirate Streams Isn’t Illegal, EU Commission Argues

        This week the European Court of Justice heard a crucial case that will give more clarity on the infringing nature of unauthorized streaming. Dutch anti-piracy group BREIN and the Spanish authorities argued that offering or watching pirate streams is a violation of the EU Copyright Directive. However, the European Commission believes that consumers who watch unauthorized streams are not breaking the law. […]

        Based on the hearing the Advocate General will issue a recommendation later this year, which will be followed by a final verdict from the EU Court of Justice somewhere early 2017.

      • Record Label Picks Copyright Fight — With The Wrong Guy

        An Australian record label may have picked a fight with the wrong guy. The label sent a standard takedown notice threatening to sue after YouTube computers spotted its music in a video.

        It turns out that video was posted by one of the most famous copyright attorneys in the world, and Lawrence Lessig is suing back.

10.02.16

Links 2/10/2016: Wine 1.9.20, Raspberry Pi PIXEL

Posted in News Roundup at 6:28 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Windows vs. Linux vs. Mac: the channel comparison

    Linux is open source meaning you can customise and modify the code any which way you like. This flexibility has made the system hugely popular amongst the developer community. This is not the same in Windows and Mac. Neither the Windows and Mac programmes nor the operating systems are open source.

    So there we have it, three entirely different operating systems offering unique experiences that can meet the differing demands of the modern user, whilst offering unique opportunities throughout the channel. So the real question now is, are you a Mac Linux or Windows user?

  • Linux Journal October 2016

    There was a show a few years back called, “Extreme Makeover: Home Edition”. The premise of the show was to find families who needed their houses overhauled, but couldn’t afford to do it on their own. Generally, those chosen had sacrificed for others rather than spend time and money on themselves. Then the show would completely redo their houses, making it so nice the happy families no longer could afford the taxes, and they’d soon be homeless. I might have missed the point of the show, but the idea of improving on outdated infrastructure certainly rings true for IT folks. This month, we look at improving our lives by improving on the tech we depend on every day.

  • Desktop

  • Server

    • Kubernetes 1.4 Improves Container Security

      The latest release of the open-source container orchestration technology adds new security features, including TLS bootstrap.
      The open-source Kubernetes 1.4 release, which debuted Sept. 26, provides users with a host of enhanced security capabilities for container deployment and orchestration.

      Kubernetes originated at Google and is now part of the Cloud Native Computing Foundation, benefiting from the contributions of multiple vendors.

      Among the new features in Kubernetes 1.4 is TLS bootstrap, which is designed to improve the use of encryption for data in motion across a cluster. TLS (Transport Layer Security) is widely used on the internet today for encryption.

      “The TLS bootstrapping work done in Kubernetes 1.4 is a step toward automating the addition of new hosts to the Kubernetes cluster,” Clayton Coleman, Red Hat’s lead architect for OpenShift, explained to eWEEK.

  • Kernel Space

    • Why kernel development still uses email

      In a world full of fancy development tools and sites, the kernel project’s dependence on email and mailing lists can seem quaintly dated, if not positively prehistoric. But, as Greg Kroah-Hartman pointed out in a Kernel Recipes talk titled “Patches carved into stone tablets”, there are some good reasons for the kernel community’s choices. Rather than being a holdover from an older era, email remains the best way to manage a project as large as the kernel.

      In short, Greg said, kernel developers still use email because it is faster than any of the alternatives. Over the course of the last year, the project accepted about eight changes per hour — every hour — from over 4,000 developers sponsored by over 400 companies. It must be doing something right. The list of maintainers who accepted at least one patch per day contains 75 entries; at the top of the list, Greg himself accepted 9,781 patches over the year. Given that he accepts maybe one third of the patches sent his way, it is clear that the patch posting rate is much higher than that.

      Finding tools that can manage that sort of patch rate is hard. A poor craftsman famously complains about his tools, Greg said, but a good craftsman knows how to choose excellent tools.

      So which tools are available for development work? Greg started by looking at GitHub, which, he said, has a number of advantages. It is “very very pretty” and is easy to use for small projects thanks to its simple interface. GitHub offers free hosting and unlimited bandwidth, and can (for a fee) be run on a company’s own infrastructure. It makes life easy for the authors of drive-by patches; Greg uses it for the usbutils project and gets an occasional patch that way.

    • Fireside Chat with David Rusling and Linus Torvalds
    • The Problem with Linux Kernel Documentation, and How We’re Fixing it

      The Linux Kernel has one of the biggest communities in the open source world; the numbers are impressive: over 4,000 contributors per year, resulting in about 8 changes per hour. That results in 4,600 lines of code added every day and a major release every 9-10 weeks. With these impressive numbers, it’s impossible for a traditional printed book to follow the changes because by the time the book is finally written, reviewed and published, a lot of changes have already merged upstream. So, the best way to maintain updated documentation is to keep it close to the source code. This way, when some changes happen, the developer that wrote such changes can also update the corresponding documents. That works great in theory, but it is not as effective as one might think.

    • How To Use Systemd For Application Sandboxing & How To Easily Crash Systemd

      Another one of the interesting systemd.conf 2016 presentations in Berlin was a talk by Djalal Harouni of EndoCode for using systemd to carry out application sandboxing.

    • Graphics Stack

      • Experimental Unity Vulkan Demos For Linux

        Some of the exciting news this week was Unity releasing their Vulkan renderer in preview form and this initial debut did contain Linux support. There are now some unofficial Unity demos built for Linux with the Vulkan renderer enabled.

        Levi Bard is hosting some sample Linux player builds with the Vulkan preview support enabled. There are two demos currently offered: Corridor Lighting Example and Viking Village. There are both x86 and x86_64 builds and should work with newer Vulkan Linux drivers.

      • The Talos Principle native radv vulkan amdgpu (SI)
      • We Might Never See A New OpenGL Version, At Least Not For A Long Time

        During past Khronos press briefings about OpenGL/Vulkan and in other communications, while Vulkan is the organization’s big graphics API focus, it was implied during these conversations that OpenGL would continue to march to its own beat and evolve as needed. While OpenGL continues to be significantly used by cross-platform graphics application/game developers, it turns out there might not be a new official version for a long time – if ever.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • KDE neon Korean Developer Edition (… and future CJK Edition?)

        Among many other locations around the planet, the local community in Korea is planning to put on a KDE 20th Anniversary birthday party in Seoul on October 14th. The KDE neon Korean Developer Edition was directly created on request for this event, to be made available to attendees.

        That said – this is actually something we’ve been wanting to do for a while, and it’s not just about Korean.

        None of the bits that make up the new image are new per-se; KDE has supported Korean for a long time, both with foundational localization engineering and regular maintenance activity. And as of the Plasma 5.6 release, our Input Method Panel is finally bundled with the core desktop code and gets automatically added to the panel on first logon in a locale that typically requires an input method.

        Yet it’s pretty hard to keep all of this working well, as it requires tight integration and testing across an entire stack, with some parts of the whole living upstream or downstream of KDE.org. For example: After we attempted to make the Plasma panel smarter by making it auto-add the Input Method Panel depending on locale, we couldn’t actually be sure it was working as desired by our users, as it takes time for distros to get around to tuning their dependency profiles and for feedback from their users to loop back up to us. It’s a very long cycle, with too many opportunities to lose focus or domain knowledge to turnover along the way.

      • Qt Champion nominations for 2016 now open
      • MediaWikiToLearn Hackathon + Editathon
      • Mobile IMG 20160930-021219
      • KIO GDrive 1.0 released

        I’m happy to finally announce the first stable release of KIO GDrive. KIO GDrive enables KIO-aware applications (such as Dolphin, Kate or Gwenview) to access and edit Google Drive files on the cloud.

        Given the lack of an official Google Drive client for Linux, KIO GDrive can be used as replacement for managing your Drive files with Dolphin. Even better, you don’t have to use space on your disk! The files are still in the cloud, yet you can edit them as if they were locally stored on your machine.

        For example you can edit a text file in Kate or crop an image in Gwenview, and just save those files as you normally would. The edited file will be automatically uploaded on the cloud. This will also work with non-KIO applications, for example Libreoffice, but in this case a dialog will explicity ask if you want to upload the new version of the file.

      • In Defence for Permissive Licences; KDE licence policy update
      • My Adventures and Misadventures in Qt Quick Land

        I have the worst sense of timing when adopting technologies and always find myself at transition points. Python 2 to 3, OpenGL fixed to programmable pipeline, and Qt widgets to Qt Quick. Perhaps the most significant thing to come out of Nokia’s short stewardship of Qt, Qt Quick (originally Qt QUICK, or Qt User Interface Creation Kit) is perhaps the biggest, and somewhat most controversial, change in Qt in recent years. Unless The Qt Company makes a highly unlikely U-turn, it is also probably Qt’s future (without discarding regular widgets, of course). It is also definitely the future for Plasma, the KDE desktop. In fact, it is already its present. Of course, I just had to sink my teeth into it, if only briefly. Since I still wasn’t yet set firmly in the ways of the Widget, I thought it might be easier to wrap my head around this new way of coding. I was both wrong and right. Here is my story.

      • Qt on Android: How to create an Android service using Qt
      • Using Qt Quick for prototyping
      • KDAB talks at QtCon 2016
      • Tomorrow is a New Day – Joining Blue Systems
      • [Krita] New Stable and Development Builds
      • Kubuntu 16.10 Beta 2 is here! Test Test Test! And then more Testing
      • RFC: How to fix a tricky leak in QFormLayout?
      • Kirigami 1.1
      • Kirigami 1.1
      • Emoji restyling

        I started to restyling and try to finish the Emoji.

    • GNOME Desktop/GTK

      • An Introduction to GNOME Boxes (virtualization) on Linux

        GNOME Boxes is a system virtualization application that is a core part of the GNOME desktop environment. Based on the QEMU machine emulator, it offers a simplified and user-friendly approach to the whole OS virtualization idea. This post is just an introduction to its capabilities and a statement that it finally works in other distributions besides Fedora.

        Once you launch Boxes, you are greeted with a message to press the “New” button to add a new system. Doing so will let the application quickly search in your home folder to find any supported image files. You may either select from the list, navigate your disk, or even insert a URL address.

  • Distributions

    • This Week in Solus – Install #36

      Welcome to the 36th installation of This Week in Solus.

    • Reviews

      • Sabayon Bizarre But Useful

        Sabayon, which gets its name from the the Italian egg-derived dessert known as zabaione, is a distribution that we don’t hear too much about these days, although the British Linux press gave it some love a few years ago. It was unassuming…with a hint of mystery. I tried it back then, when I was still fairly new to actually using Linux and thought it was a nice effort, but a little too weird. That wasn’t their fault; that was mine. I was still clinging sharply to Ubuntu at the time. Plus, I was a bit more shallow in those days because I was really set on the idea that an operating system had to look good before I would really put some hours into using it. I still am in many respects. I’m just not crazy about boring.

        So when I approached Matt with the idea of documenting a revisitation to Sabayon, he greenlighted it immediately. Team Sabayon has been very busy. It still has a hint of mystique that I find very attractive. It’s got a lot of applications at default and offers you a lot of decision-making power as well. More on that later.

    • Screenshots/Screencasts

    • OpenSUSE/SUSE

      • Mesa, Kernel, GNOME, KDE apps update in Tumbleweed

        Another week and another five snapshots for openSUSE’s rolling release Tumbleweed produced updates for openSSL, GNOME 3.22, Mesa and the Linux Kernel.

        Dominique Leuenberger, a core member of the openSUSE release team, informed subscribers of the openSUSE Factory Mailing List about some of the packages that were updated during the week and some packages users can expect over the next couple of weeks.

        Snapshot 20160928 produced an update for openSSL to 1.0.2j, which patched a high severity Online Certificate Status Protocol vulnerability. The same snapshot also gave users the updated 4.7.5 Linux Kernel.

    • Red Hat Family

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu Phone pre OTA 14 quick view
          • Canonical Brings Kubernetes to Ubuntu

            It appears as if the guys and gals at Canonical have been working overtime to stay ahead in the cloud, where its Linux distribution, Ubuntu, is the decisive winner as far as the number of deployments goes. Evidently, they’d like to keep it that way. On Tuesday the company unveiled its own fully supported enterprise distribution of Kubernetes. This comes only a week after the company announced it had worked with IBM to bring its own implementation of OpenStack to Big Blue’s hardware.

            If you don’t know, Kubernetes is a container tool for DevOps that was originally developed by Google but which is now managed by the Cloud Native Computing Foundation and available under the Apache open source license. To develop its own distribution, Ubuntu copied its IBM mainframe move and worked with the source, in this case Google. They’ve come up with what Canonical founder Mark Shuttleworth is calling a “pure, vanilla version” of the platform.

          • Flavours and Variants

            • Mintbox Mini Pro: A Cheap Linux Machine With Compelling Specs

              The Mintbox Mini has been received a major hardware upgrade and it is now called Mintbox Mini Pro. The Linux machine comes at a price of $395 and features an all-metal casing which eliminates the need for a cooling fan. Significant bumps having been given to the storage, RAM, processor, wireless, and other hardware components.

            • budgie-remix 16.10 beta 2 is now available
            • Addressing FUD

              I find it really despicable to see developers, maintainers and communities from competing projects create and spread FUD about Linux Mint in an effort to promote their own distribution.

              At this cost, getting more users is futile. Of course, a project needs a large audience to succeed, but what matters the most is how happy your users are. If you want your project to work, make it great. If you want to promote it, highlight your own work and efforts.

              At the time when Ubuntu was dominant in the Linux market, it continuously received a huge amount of FUD. It was unfair, it was stupid and frankly, it was embarrassing for the entire Linux community. It still is and it has gotten worse for us because we’re now receiving a significant chunk of that FUD, some of it coming from the very same project who already suffered so much from it.

            • Monthly News – September 2016

              Many thanks to you all for your help, support and donations. This month has been very exciting for us because the release cycle was over, the base jump to the new LTS base was achieved, we had plenty of ideas to implement, nothing got in our way and we could focus on development. Not only that but the development budget was high, and that’s thanks to you, and it tightens the bonds a little more between us. It makes everybody happy, some developers start looking for a new laptop, others use the money to relax. No matter how it’s used, it always helps, and because it helps them, it helps us.

              Another team was set up recently to gather artists and web designers who are interested in improving our websites. This is a new team, with 9 members who just started to get to know each others. It’s hard to predict how the team will evolve, or if it will be successful. It’s hard to know also who in this team might end up being central to our designs and maybe not only to our websites but also to our software, our user interfaces.

  • Devices/Embedded

Free Software/Open Source

  • Trainline creates open source platform to help developers deploy apps and environments in AWS

    The Trainline, the independent rail ticket retailer, has created an open sourced standardised way for its developers to deploy and manage individual applications and environments in Amazon Web Services’ public cloud.

    The company has 150 staff in its development area, who focus on improving user experience, and in order to ensure that its underlying infrastructure wasn’t a constraint on time to market, the firm recently migrated all of its development, staging, UAT and production environments from a legacy private data centre to Amazon’s public cloud.

  • Trainline creates open source platform to let developers test apps in AWS
  • Yahoo open-sources machine learning porn filter

    Yahoo is the latest tech company to open source its computer vision code. The beleaguered outfit’s application for it? Filtering porn. Yahoo hopes that its convolutional neural net (CNN) will empower others to better guard innocent eyes, but admits that because of the tech’s very nature (and how the definition of “porn” can vary wildly), that the CNN isn’t perfect.

    “This model is a general purpose reference model, which can be used for the preliminary filtering of pornographic images,” a post on the Yahoo Engineering Tumblr says. “We do not provide guarantees of accuracy of output, rather, we make this available for developers to explore and enhance as an open source project.” The code is available on Github at the moment, and if you need any testing material, well, there isn’t exactly a shortage of it on Tumblr. Just ask Indonesia.

  • Jahshaka VR alpha release

    We have finally managed to release the alpha version of the Jahshaka VR authoring toolkit under the GPL and wanted to invite people to jump in, look at the code and help out. We have been working on it for 6 months now and its starting to stabilize.

  • Events

    • The Linux Foundation Announces Session Lineup for ApacheCon(TM) Europe
    • OpenShift Commons Gathering event preview

      We’re just two months out from the OpenShift Commons Gathering coming up on November 7, 2016 in Seattle, Washington, co-located with KubeCon and CloudNativeCon.

      OpenShift Origin is a distribution of Kubernetes optimized for continuous application development and multi-tenant deployment. Origin adds developer and operations-centric tools on top of Kubernetes to enable rapid application development, easy deployment and scaling, and long-term lifecycle maintenance for small and large teams. And we’re excited to say, the 1.3 GA release of OpenShift Origin, which includes Kubernetes 1.3, is out the door! Hear more about the release from Lead Architect for OpenShift Origin, Clayton Coleman.

  • Web Browsers

    • Mozilla

      • Firefox ready to block certificate authority that threatened Web security

        The organization that develops Firefox has recommended the browser block digital credentials issued by a China-based certificate authority for 12 months after discovering it cut corners that undermine the entire transport layer security system that encrypts and authenticates websites.

        The browser-trusted WoSign authority intentionally back-dated certificates it has issued over the past nine months to avoid an industry-mandated ban on the use of the SHA-1 hashing algorithm, Mozilla officials charged in a report published Monday. SHA-1-based signatures were barred at the beginning of the year because of industry consensus they are unacceptably susceptible to cryptographic collision attacks that can create counterfeit credentials. To satisfy customers who experienced difficulty retiring the old hashing function, WoSign continued to use it anyway and concealed the use by dating certificates prior to the first of this year, Mozilla officials said. They also accused WoSign of improperly concealing its acquisition of Israeli certificate authority StartCom, which was used to issue at least one of the improperly issued certificates.

        “Taking into account all the issues listed above, Mozilla’s CA team has lost confidence in the ability of WoSign/StartCom to faithfully and competently discharge the functions of a CA,” Monday’s report stated. “Therefore we propose that, starting on a date to be determined in the near future, Mozilla products will no longer trust newly issued certificates issued by either of these two CA brands.”

      • Firefox gains serious speed and reliability and loses some bloat

        There’s no way around it. Firefox has struggled. As of this writing, Firefox 47 is the top of the Firefox market share heap at a scant 3.14 %. Given that Chrome 52 holds 23.96 % and IE 11 holds 17.74 %, the chances of Firefox displacing either, anytime soon, is slim. If you scroll way down on the browser market share listing, you’ll notice Firefox 49 (the latest release) is at .19 %. Considering 49 is the stable release candidate that was only recently unleashed, that is understandable (to a point).

        Thing is, Firefox 49 is a really, really good browser. But is it good enough to give the open source browser any significant gains in the realm of market share? Let’s take a look at what the Mozilla developers have brought to the fore with the latest release of their flagship browser and see how much hope it holds for the future of the software that was once leader among its peers.

      • Mozilla’s Project Mortar Wants Pepper API Flash & PDFium In Firefox

        This week word of Mozilla’s “Project Mortar” surfaced, which aims to explore the possibility of bringing the PDFium library and Pepper API based Flash plugin into Firefox. This project is being led by various Mozilla engineers.

        Mozilla is so far developing Project Mortar in private while they plan to open it up in the future.

  • SaaS/Back End

    • What’s Happening in OpenStack-Ansible (WHOA) – September 2016

      Welcome to the fourth post in the series of What’s Happening in OpenStack-Ansible (WHOA) posts that I’m assembling each month. OpenStack-Ansible is a flexible framework for deploying enterprise-grade OpenStack clouds. In fact, I use OpenStack-Ansible to deploy the OpenStack cloud underneath the virtual machine that runs this blog!

  • Pseudo-Open Source (Openwashing)

  • BSD

    • Next Tech Book

      Instead, I’m starting a book on OpenBSD’s web stack.

  • FSF/FSFE/GNU/SFLC

    • ​For lessons on digital swaraj, Gandhi is an open source

      Gandhi engaged with the copyright law to subvert the economics he disagreed with, and to infuse it with values close to his heart, wrote a US law professor in a 2013 paper titled ‘Gandhi and Copyright Pragmatism’. “Toward the later part of his life, he also came to deploy copyright law to curtail market-based exploitation when he could. In many ways then, Gandhi’s approach did with copyright law what open source licensing and the Creative Commons Project would begin doing with copyright in the 21st century,” wrote Shyamkrishna Balganesh of University of Pennsylvania Law School.

      Now, consider the life and work of Richard M Stallman (callsign RMS in the geek-verse). A champion of the movement for Free and Open Source Software (FOSS), he is more commonly known as the pioneer of ‘Copyleft’. “If you want to accomplish something in the world,” says his Wikiquote page, “idealism is not enough — you need to choose a method that works to achieve the goal. In other words, you need to be pragmatic.” RMS was among the first to call for a free online encyclopaedia. Wikipedia, no surprise, is governed by Creative Commons licensing.

    • GNU project- the free software movement turns 33

      On September 27, 1983 he had announced the launch of GNU, which was a free software replacement for UNIX.

  • Openness/Sharing/Collaboration

Leftovers

  • The makers of the video game “No Man’s Sky” are under investigation for false advertising

    No Man’s Sky was billed as a revolutionary video game—one that contained such multitudes of programmatically generated planets and animals that the developers said even they weren’t sure what players would find in its vast universe.

  • Science

    • Sexual harassment in STEM: ‘It’s tragic for society’

      These are the experiences of three women who spoke to CNN about a culture of pervasive sexual harassment in academia, especially in the sciences. They were harassed by different men, throughout different parts of their education and careers.
      “We see it in anthropology, we see it in philosophy, we see it in physics, we see it in the humanities, we see it in the social sciences. We see it in engineering in particular. Astronomy just happened to be, sort of, first” to get attention, said Alessondra Springmann, a rocket scientist at the University of Arizona who studies asteroids and comets.
      Distinguished scientists in the field of astronomy have been making headlines for harassing students they are supposed to be advising.
      And it’s happening at the same time as a nationwide push to get more American women into science careers. Young girls are increasingly encouraged to embrace STEM — the acronym for science, technology, engineering and mathematics — in elementary and middle school.

    • 9 Bizarre and Surprising Insights from Data Science

      Data is the world’s most potent, flourishing unnatural resource. Accumulated in large part as the byproduct of routine tasks, it is the unsalted, flavorless residue deposited en masse as organizations churn away. Surprise! This heap of refuse is inherently predictive. Thus begins a gold rush to dig up insightful gems.

      Does crime increase after a sporting event? Do online daters more consistently rated as attractive receive less interest? Do vegetarians miss fewer flights? Does your e-mail address reveal your intentions?

  • Health/Nutrition

    • Clinical Trial Reporting Biased; Full Disclosure, Transparency Needed, Speakers Say

      A conference on clinical drug trials held today shed a harsh light on the availability and honesty of clinical trial reports. Many factors concur to possible distortion of results, speakers said, calling for more stringent obligations to provide all data for analysis. They also noted legislative efforts to tackle the issue. Speakers also pointed out a growing trend for pharmaceutical companies to conduct clinical trials in developing countries.

    • Developing Countries Should Be Able To Shield Their Markets From Cheap Food Imports, Panel Says

      On the first day of the World Trade Organization Public Forum, which took place from 27-29 September, a panel organised by Our World Is Not for Sale (OWINFS), and The Right to Food campaign, looked at ways to reduce hunger and achieving the right to food in Africa, Asia, and the Middle East. In particular, the panel considered the possibility of developing countries investing in domestic production for food security.

    • DEA has kratom users holding their breath, lawmakers write more letters

      Starting today, the US Drug Enforcement Administration is free to list a popular herbal supplement called kratom as a Schedule I controlled substance. This would put kratom in the same lineup as heroin and make its sale and use a felony. But, in statements to the press, the agency said it has no timetable for officially listing kratom—it could be next week or longer—leaving users on the edge of their seats.

      Since the DEA announced its plan to ban kratom at the end of last month, thousands of users have frantically sought to reverse the decision, as well as buy up as much of the drug as they can. Users claim kratom, or Mitragyna speciosa, a tree in the coffee family, is effective at treating chronic pain, as well as depression, anxiety, PTSD, and other ailments. The main active ingredients in kratom are mitragynine and 7-hydroxymitragynine, which can interact with opioid receptors in the brain. While the data to back up medical use of the plant is scant, users are adamant that it’s a lifesaver, allowing them to kick deadly and all-too-common opioid addictions.

  • Security

    • Report: Linux security must be upgraded to protect future tech

      The summit was used to expose a number of flaws in Linux’s design that make it increasingly unsuitable to power modern devices. Linux is the operating system that runs most of the modern world. It is behind everything from web servers and supercomputers to mobile phones. Increasingly, it’s also being used to run connected Internet of Things (IoT) devices, including products like cars and intelligent robots.

    • security things in Linux v4.6

      Hector Marco-Gisbert removed a long-standing limitation to mmap ASLR on 32-bit x86, where setting an unlimited stack (e.g. “ulimit -s unlimited“) would turn off mmap ASLR (which provided a way to bypass ASLR when executing setuid processes). Given that ASLR entropy can now be controlled directly (see the v4.5 post), and that the cases where this created an actual problem are very rare, means that if a system sees collisions between unlimited stack and mmap ASLR, they can just adjust the 32-bit ASLR entropy instead.

    • Let’s Encrypt Wants to Help Improve the CA Model

      Let’s Encrypt, a non-profit effort that brings free SSL/TLS certificates to the web, was first announced in November 2014 and became a Linux Foundation Collaborative Project in April 2015. To date, it has provided more than 5 million free certificates.

      While having an SSL/TLS certificate to encrypt traffic is an important element of web security, it’s not the only one, said Josh Aas, executive director of the Internet Security Research Group and leader of Let’s Encrypt.

      “There is a lot in the total picture of what makes a website secure, and we can do a lot to help a certain part of it,” he said in a video interview.

    • How to Throw a Tantrum in One Blog Post

      The systemd team has recently patched a local denial of service vulnerability affecting the notification socket, which is designed to be used for daemons to report their lifecycle and health information. Some people have used this as an opportunity to throw a fresh tantrum about systemd.

  • Defence/Aggression

    • Rodrigo Duterte compares himself to Hitler and pledges to ‘slaughter three million drug addicts’

      The Philippine President has likened his national crackdown on drug crime to the Holocaust, saying he would be “happy” to kill as many addicts as Hitler slaughtered Jews.

      Rodrigo Duterte said he had been compared to a “cousin of Hitler” by critics during a press conference in southern Davao city on Friday. “Hitler massacred three million Jews… there’s three million drug addicts. I’d be happy to slaughter them,” he said.

      At least six million Jews and other minority groups are known to have been killed by the Nazis before and during the second world war.

      Since taking up office in June, Mr Duterte has overseen a vicious anti-drug campaign in which more than 3,000 suspected drug dealers and users are understood to have been killed by police operations or vigilantes. The bodies of those killed are often left in the streets with signs listing their crimes.

  • Finance

    • Panic, Anxiety Spark Rush to Build Luxury Bunkers for L.A.’s Superrich

      Given the increased frequency of terrorist bombings and mass shootings and an under-lying sense of havoc fed by divisive election politics, it’s no surprise that home security is going over the top and hitting luxurious new heights. Or, rather, new lows, as the average depth of a new breed of safe haven that occupies thousands of square feet is 10 feet under or more. Those who can afford to pull out all the stops for so-called self-preservation are doing so — in a fashion that goes way beyond the submerged corrugated metal units adopted by reality show “preppers” — to prepare for anything from nuclear bombings to drastic climate-change events. Gary Lynch, GM at Rising S Bunkers, a Texas-based company that specializes in underground bunkers and services scores of Los Angeles residences, says that sales at the most upscale end of the market — mainly to actors, pro athletes and politicians (who require signed NDAs) — have increased 700 percent this year compared with 2015, and overall sales have risen 150 percent. “Any time there is a turbulent political landscape, we see a spike in our sales. Given this election is as turbulent as it is, we are gearing up for an even bigger spike,” says marketing director Brad Roberson of sales of bunkers that start at $39,000 and can run $8.35 million or more (FYI, a 12-stall horse shelter is $98,500).

  • AstroTurf/Lobbying/Politics

    • USA TODAY’s Editorial Board: Trump is ‘unfit for the presidency’

      In the 34-year history of USA TODAY, the Editorial Board has never taken sides in the presidential race. Instead, we’ve expressed opinions about the major issues and haven’t presumed to tell our readers, who have a variety of priorities and values, which choice is best for them. Because every presidential race is different, we revisit our no-endorsement policy every four years. We’ve never seen reason to alter our approach. Until now.

      This year, the choice isn’t between two capable major party nominees who happen to have significant ideological differences. This year, one of the candidates — Republican nominee Donald Trump — is, by unanimous consensus of the Editorial Board, unfit for the presidency.

      From the day he declared his candidacy 15 months ago through this week’s first presidential debate, Trump has demonstrated repeatedly that he lacks the temperament, knowledge, steadiness and honesty that America needs from its presidents.

      Whether through indifference or ignorance, Trump has betrayed fundamental commitments made by all presidents since the end of World War II. These commitments include unwavering support for NATO allies, steadfast opposition to Russian aggression, and the absolute certainty that the United States will make good on its debts. He has expressed troubling admiration for authoritarian leaders and scant regard for constitutional protections.

    • A principled option for U.S. president: Endorsing Gary Johnson, Libertarian

      As Nov. 8 looms, a dismayed, disconsolate America waits and wonders: What is it about 2016?

      How has our country fallen so inescapably into political and policy gridlock? How did pandering to aggrieved niche groups and seducing blocs of angry voters replace working toward solutions as the coin of our governing class? How could the Democratic and Republican parties stagger so far from this nation’s political mainstream?

      And the most pressing question: What should tens of millions of voters who yearn for answers do with two major-party candidates they disdain? Polls show an unprecedented number of people saying they wish they had another choice.

    • Jill Stein Eagerly Pointed Out All The Holes In The First Debate

      After being escorted away from Hofstra University ahead of the first presidential debate on Monday, Green party candidate Jill Stein took to Twitter to share her views as the two major party candidates faced off. Stein fell far short of the Commission on Presidential Debate’s requirement that candidates must be polling at 15 percent or more to earn a spot on the stage — Stein was averaging 3.2 percent, according to the commission. But still, she jumped on the opportunity to have her policies lined up next to Hillary Clinton’s and Donald Trump’s. Ultimately, Stein’s tweets made me wish she had debated on the main stage to present her extremely progressive politics.

      Stein’s policies skew much farther left than those of Clinton or Trump on nearly every issue — and even farther left than many of Vermont Sen. Bernie Sanders’ proposals. Given the impact that Sanders arguably had on Clinton’s positions throughout the primaries, it would have been interesting to see if Stein’s presence on the debate stage exerted a leftward pull on not only Clinton, but Trump as well. But more importantly, it would have been a service to the viewing public to hear from someone other than the major-party candidates, with whom the electorate is not thrilled.

    • Poll: Desire for major third party grows

      Most Americans say that the country needs a third major political party according to a Gallup poll released Thursday.

      Fifty-seven percent say that the two major parties aren’t enough to represent the country’s voters.

      The majority opinion represents an increase from recent elections. In 2012, some 46 percent said a third party was needed.

      Those who currently want to see another major party include 73 percent of independents, 51 percent of Republicans and 43 percent of Democrats.

    • Ukip denies that Farage is coaching Donald Trump for next debate

      Ukip has denied reports that Nigel Farage has flown to the US to coach the Republican presidential nominee, Donald Trump, for his next debate with Hillary Clinton.

      Farage hinted in his farewell speech at Ukip’s conference last month that he might return to Trump’s side following an appearance with the Republican candidate in August, saying: “Who knows, I may even go back to the United States of America at some point.” Ukip sources at the conference also confirmed Farage would travel to the US to help support Trump before the election.

    • Leaked Tape Exposes Hillary Mocking Bernie’s Supporters in Front of Big Donors

      The Democratic nominee said that Bernie’s supporters believed in a fictional world and are “living in their parents’ basement” hoping the United States becomes “Scandinavia, whatever that means.”

      A leaked audio recording of Hillary Clinton from a high-dollar fundraiser in February shows the Democratic nominee mocking not just progressive firebrand Bernie Sanders, but also the cadre of young supporters who favored the insurgent candidacy of the Vermont Senator, a revelation that is bound to have damning ramifications for Clinton’s campaign.

  • Censorship/Free Speech

    • [Older] Facebook thanks Norway PM after censorship row [Ed: publicity stunt after an ugly act of revisionism by censorship]

      After a protracted debate on censorship and Facebook’s outsized role in today’s media world, the social media giant has thanked Prime Minister Erna Solberg for raising “important issues”.
      Facebook restored a post by Solberg which it had taken down over an iconic Vietnam War photo of a naked girl escaping a napalm bombing. The world’s leading social network later backtracked on the decision to remove the PM’s post, which is believed to be the first such online censorship involving a government leader.

    • Evidence of Feared Israel-Led Censorship as Zuckerberg Facebook Bans Palestinian Editors
    • To Stage Or Not To Stage: Theatre Censorship in India

      In December 1872, the Calcutta National Theatrical Society staged Nil Darpan, a play written by Dinabandhu Mitra, that exposed the atrocities committed by British indigo planters on Indian farmers. While the play received glowing reviews in most newspapers with nationalistic leanings, it was expectedly criticised by the British press. There was a demand that the play be banned. Other plays followed, criticising and making fun of the white rulers. Finally, in 1876, came the Dramatic Performances Act, putting restrictions on the public performance of plays.

      Cut to 2016. Nearly seven decades after the country’s independence from British rule, actor-director Amol Palekar moved the Mumbai high court in September, challenging rules framed under provisions of the Bombay Police Act, 1951, which make pre-censorship of drama scripts mandatory by the Maharashtra State Performance Scrutiny Board. In his petition, Palekar said the rules framed under the provisions of the Act were arbitrary and violated citizens’ fundamental right to freedom of expression, guaranteed under the Constitution. However, on September 26, the state government told the Bombay High Court that in March this year, the then commissioner of police had repealed the rule which required prior scrutiny of theatre scripts. Palekar has not replied to HT’s email requesting an interview. Repeated calls to advocate Sugandh Deshmukh, who is representing him in court, also went unanswered. But veteran theatre personality Alyque Padamsee who had filed an affidavit in support of Palekar’s petition said he is not surprised by the court proceedings. “It is the way bureaucracy works,” he says.

    • Your right to read trumps censorship

      “I Know Why the Caged Bird Sings.” “To Kill a Mockingbird.” “Harry Potter and the Sorcerer’s Stone.”

      Three very different books that share a common thread.

      Each year, individuals across the country take it upon themselves to decide what books you should and should not read. These are three that apparently you should not.

      Yes, censorship and attempts at censorship are alive and well in 2016. In most instances, the censor is someone who is sincerely concerned about a societal issue and feels strongly that censoring a book, magazine, film or artwork will improve society, protect children, and restore their idea of moral values.

      However, the First Amendment to the United States Constitution gives each of us the right to read, view and listen to things that others might find offensive. No one, no matter how well-intentioned, can take away that right.

    • Recreation of removed art echoes 40-year-old accusations of censorship

      A piece of public art is set to be erected in the Plateau next week, 40 years after its predecessor was torn down amid accusations of censorship towards city hall – accusations being echoed towards the current mayor.

      A reclining cross, designed by artists Pierre Ayot, once sat at the corner of Park and Pine, but it didn’t last long.

      Longtime resident Michael Hendricks remembered how in 1976, just before Montreal would host the Olympic Games, then-Mayor Jean Drapeau ordered 16 large works of art torn down.

      “For us, it was a shock,” he said. “It was so beautiful.”

      “It was done in the night, a sneaky dirty trick and that was the end of it,” he added. “The artists weren’t respected, nobody was respected.”

      At the time, Drapeau called the artworks “indecent” because some of them criticized overspending on the Olympics.

    • Racist social media users have a new code to avoid censorship

      Racist online communities have developed a new code for racial, homophobic and bigoted slurs in an attempt avoid censorship, according to an online report from Buzzfeed News.

      The code, using terms like Google, Skittle, and Yahoo as substitutes for offensive words describing blacks, Muslims and Mexicans, appears to be in use by various accounts on Twitter and elsewhere. Many tweets using the code are doing so in support of Republican Presidential nominee Donald Trump.

  • Privacy/Surveillance

    • The U.S. presidential candidates on technology, privacy issues

      Stein: “End-to-end encryption should be an internet standard, just like SSL for financial transactions.”

    • ‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files

      The hacking group responsible for stealing a large cache of National Security Agency hacking tools is very upset that no one seems to be bidding on their pilfered files.

      Early Saturday morning, the person or group which calls itself “TheShadowBrokers” authored another bizarre rant, expressing their annoyance at the seeming lack of interest in ponying up bitcoins to release the full set of stolen files.

    • Hackers Angry That People Don’t Want To Pay For The NSA Tools They Stole
    • Spotify’s 40 Million Tunes Won’t Go Far With CD-Happy Japanese [Ed: music that spies on the listeners]

      On a recent muggy afternoon in Tokyo, 21-year old Shintaro Naganuma joined several hundred customers browsing CDs at the eight-story downtown outpost of music retail chain Tsutaya.

      Having discovered a couple of new rock artists on YouTube, the third-year university student hit Tsutaya Co.’s flagship store in trendy Shibuya to look up their albums. That process encapsulates the dilemma now facing Spotify Ltd.’s head Daniel Ek, who on Thursday presided over the music streaming service’s long-awaited entry into the world’s second-largest music market.

      On the one hand, the nation’s consumers have grown accustomed to finding music or listening casually through smartphones, which should help the Swedish company attract users for its free ad-supported version. But when it comes time to hand over the cash, most people in Japan continue to buy CDs and even vinyl. That’s largely because record labels remain wary of signing away their music to streaming services.

    • The US government can’t protect its dirtiest laundry, so what makes anyone think a government is capable and willing to protect data about you?

      Governments collect insane amounts of data about ordinary people, and officials get caught red-handed again and again using governmental surveillance networks to stalk private relations. It’s been the NSA, it’s been the FBI, and now it’s the police abusing collected data. The U.S. government has shown it can’t even protect its own dirtiest laundry, so what makes anyone think any government is willing and capable of protecting the data of a random citizen?

      Yesterday, there was yet another story breaking about abuse of surveillance, as police was discovered abusing law enforcement surveillance to spy on basically anybody they were personally interested in. It’s not the first story and it won’t be the last.

    • Networks of Control by Wolfie Christl and Sarah Spiekermann

      The collection, analysis and utilization of digital information based on our clicks, swipes, likes, purchases, movements, behaviors and interests are now part of everyday life. But, while individuals become increasingly transparent, companies take control of the recorded data. Wolfie Christl and Sarah Spiekermann show in their book “NETWORKS OF CONTROL” how today’s networks of corporate surveillance are constantly tracking, profiling, categorizing and rating the lives of billions – across platforms, devices and life contexts.

    • On Phone Numbers and Identity

      Coinbase sees a lot of motivated attackers, it’s one of the things that makes working in security at Coinbase so interesting. I want to deep dive into one recent attack for a few reasons: 1) when we share we all get stronger; 2) It was a really interesting way to end-run around a lot of traditional security protections and highlights, the extent of which personal and corporate systems are linked; 3) we found very little in the way of public discussion around this set of attack vectors and want to help move it from ‘theoretical’ to ‘this really happens’. To be crystal clear, I’m happy to say, no customer data or funds were lost or at risk of loss.

      Rewind back to 25 Aug. It’s around 9 AM when one of our high profile employees wrote in to our on call security engineer. The user said that something weird was happening with his phone.

    • GCHQ gave private Dutch data to Australian firm: report

      The private conversations of thousands of Dutch citizens have ended up in the hands of the Australian technology company Appen which develops software for converting speech into text.

      A report in the Dutch online site Volkskrant said telecommunications experts had opined that the only way this could have happened was by the British spy agency GCHQ tapping the information and then handing it over to Appen.

      Both Appen and GCHQ have been contacted for comment.

      According to Volkskrant, the matter came to light through a Dutch woman who had been employed by Appen in the UK. The company has four main offices: in Sydney, Seattle, San Rafael (California) and Davao City (the Philippines).

  • Civil Rights/Policing

    • Women competitors must wear hijabs at chess world championship, oddly awarded to Iran

      If you thought soccer’s world cup being awarded to baking-hot Qatar marked the zenith of sporting corruption, give FIDE a chance: the international chess federation’s forthcoming world championship is headed to Iran, and women players must wear the hijab to compete. UK tabloids quote leading women chess players as threatening to quit the tournament rather than obey.

    • Female chess players from around world outraged after being told to wear hijabs at tournament in Tehran

      The world’s top female chess players have reportedly been told they must wear hijabs if they wish to compete in next year’s world championships.

      The next Women’s World Championships are due to be held in Tehran, Iran in March 2017 but several Grandmasters have threatened to boycott the tournament if female players are forced to conform to the country’s strict clothing laws.

      Iran, which has been welcomed back into the diplomatic fold after signing a nuclear deal with the US and several other countries last year, is a theocratic country which strictly polices how women dress, behave and where they go.

    • Justice Watchdog Rips D.E.A.’s Use of Confidential Sources

      The Drug Enforcement Administration is running a freewheeling confidential sources program that leaves the agency vulnerable to fraud and constitutional abuses, according to an audit by the Department of Justice’s Inspector General (OIG).

      While DEA officials boast that the use of informants is the “bread and butter” of their enforcement, the agency does not adequately oversee their activities. Nor does it sufficiently track the payments made to them, the investigation found.

      The lack of oversight, according to the report: “exposes the agency to an unacceptably increased potential for fraud, waste, and abuse, particularly given the frequency with which DEA offices utilize and pay confidential sources.”

      Over the last five years, the DEA has employed more than 18,000 sources, paying them roughly $237 million. The inspector general stated, however, that the agency is unable to analyze the quality of information they provide.

    • Ex-drug squad chief gets three-year prison sentence

      Former head of the Helsinki Police anti-drug unit, Jari Aarnio, was handed a three-year unconditional prison sentence in Helsinki Appeal Court on Friday after being convicted of charges including malfeasance, fraud and accepting bribes.

    • Saudi Arabian teen arrested for online videos with American blogger

      A male Saudi Arabian teenager has been arrested in Riyadh over a series of online videos of conversations between him and a female Californian streaming-video star that went viral.

      A Riyadh police spokesperson, Colonel Fawaz Al-Mayman, said the teenager, known online as Abu Sin, was arrested on Sunday for engaging in “unethical behaviour” in videos with Christina Crockett, a popular broadcaster on the conversational live-streaming site YouNow. Abu Sin’s real name is not known.

      “His videos received many comments and many of the commenters of the general public demanded for him to be punished for his actions,” Al-Maymann added, according to the Saudi Gazette.

      The two amassed thousands of fans on the YouNow network, and later on YouTube after videos of the two speaking were uploaded there. The videos featured Abu Sin – a nickname given to him for his broken teeth – and Crockett communicating despite their significant language barriers.

      The popularity of the videos of the two of them surprised Crockett, she told the Guardian in an interview. As a broadcaster on YouNow, she can invite her fans to join her broadcasts on split-screen, which is known as “guesting”.

    • Kodi boxes are now a key target in the UK government’s piracy crackdown

      Kodi boxes and other devices which can be configured to enable the streaming of pirated content are to become key targets in a UK government intellectual property crime crackdown.

      Revealing the extent to which so-called “fully-loaded” Kodi boxes are being used to circumvent copy protection laws, the Federation Against Copyright Theft (FACT) has stated that half of its investigations currently centre around streaming devices using third party piracy software or add-ons.

      Set top boxes are of course legal, and the open-source Kodi software in its vanilla configuration is a harmless media centre. But, Kodi can be tweaked to facilitate the illegal streaming of premium content, ranging from current cinema releases to streams of cable TV channels.

  • Internet Policy/Net Neutrality

    • Last Formal Tie To Historic US Internet Control Is Cut

      “The federal court in Galveston, Texas denied the plaintiffs’ application for declaratory and injunctive relief. As of 1 October 2016, the IANA functions contract has expired.” This two-sentence statement from Assistant US Commerce Secretary for Communications and Information and National Telecommunication and Information Administration Administrator Lawrence Strickling ended an era of direct United States oversight over changes to the authoritative root zone of the internet domain name system, and as a contractor for a set of core internet databases.

  • Intellectual Monopolies

    • Copyrights

      • J.J. Abrams Can’t Stop Copyright Lawsuit Against Star Trek Fan-Film

        Paramount Pictures and CBS Studios have no plans to end their lawsuit against the crowdfunded Star Trek spin-off ‘Prelude to Axanar’. Director J. J. Abrams previously announced that the case would be dropped soon. However, paperwork filed in court this week reveals that the movie studios dismiss this claim as an irrelevant third party statement.

      • RIAA Label Artists & A-List Stars Endorse Megaupload In New Song

        MegaUpload is currently being portrayed by the MPAA and RIAA as one of the world’s leading rogue sites. But top music stars including P Diddy, Will.i.am, Alicia Keys, Snoop Dogg and Kanye West disagree and are giving the site their full support in a brand new song. TorrentFreak caught up with the elusive founder of MegaUpload, Kim Dotcom, who shrugged off “this rogue nonsense” and told us he wants content owners to get paid.

      • ‘When Is A Chair Just A Chair?’ And Other Annoying Copyright Questions

        Last year, the UK decided to repeal a part of its copyright law that enforced a drastically reduced copyright term for “industrially exploited artistic works” including “works of artistic craftsmanship” — in other words, the industrial design of manufactured objects that are primarily functional, like appliances and furniture. Rather than the full life-plus-seventy term, the copyright on such works was limited to 25 years from the date of manufacturing, making it somewhat closer to the US approach where functional designs can’t be copyrighted but can qualify for 15-year design patents. It was a sensible rule (at least far more sensible than giving them full copyright, even if giving them any at all is still questionable) that allowed industrial designs to rapidly enter the public domain and be used by multiple manufacturers for everything from inexpensive reproductions to retro-chic luxuries — or, in the eyes of IP maximalists and the furniture industry, it was a travesty of a rule that cruelly robbed aging designers and flooded the market with cheap knockoffs and brazen cash-grabs.

        In any case, the rule was repealed and it was repealed retroactively: furniture designs that had already entered the public domain were shoved back under life-plus-seventy copyrights, and the industry was given a grace period to purge their stocks. The repeal officially came into effect in July, and the transitional window will end in January. Then we can watch the lawsuits begin to flow — and they are going to involve a whole lot of wrangling over stupid, highly subjective questions, with lots of flowery protestations about artistry and judges thrust unwittingly into the role of critic, because the question of what exactly this law applies to is one big gray area.

10.01.16

Links 1/10/2016: Linux 4.7.6 and 4.4.23, Blender 2.78

Posted in News Roundup at 3:21 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Linux Unable To Boot Lenovo Yoga 900 & 900; Is Microsoft At Fault?

      The popular device developer Lenovo has verified the claims that Lenovo Yoga 900 and 900s unable to boot Linux OS but only Microsoft Windows 10. The new Lenovo convertible laptop, Lenovo Yoga 900 and 900s, would reject and decline any attempt to install Linux operating system, making users turn their heads to Microsoft as the suspect for this issue.

      [...]

      This issue about the OS started when an identity of BaronHK posted on Reddit about installing Linux on the latest Lenovo Yoga book in which BaronHK encountered being blocked by a locked solid state drive (SSD) which Linux cannot define itself, and come up to link the issue to Microsoft.

  • Server

    • Why Good Linux Sysadmins Use Markdown

      The Markdown markup language is perfect for writing system administrator documentation: it is lightweight, versatile, and easy to learn, so you spend your time writing instead of fighting with formatting.

      The life of a Linux system administrator is complex and varied, and you know that documenting your work is a big time-saver. A documentation web server shared by you and your colleagues is a wonderful productivity tool. Most of us know simple HTML, and can whack up a web page as easily as writing plain text. But using Markdown is better.

    • How to Effectively and Efficiently Edit Configuration Files in Linux

      Every Linux administrator has to eventually (and manually) edit a configuration file. Whether you are setting up a web server, configuring a service to connect to a database, tweaking a bash script, or troubleshooting a network connection, you cannot avoid a dive deep into the heart of one or more configuration files. To some, the prospect of manually editing configuration files is akin to a nightmare. Wading through what seems like countless lines of options and comments can put you on the fast track for hair and sanity loss.

      Which, of course, isn’t true. In fact, most Linux administrators enjoy a good debugging or configuration challenge. Sifting through the minutiae of how a server or software functions is a great way to pass time. But this process doesn’t have to be an exercise in ineffective inefficiency. In fact, tools are available to you that go a very long way to make the editing of config files much, much easier. I’m going to introduce you to a few such tools, to ease some of the burden of your Linux admin duties. I’ll first discuss the command-line tools that are invaluable to the task of making configuration more efficient.

  • Kernel Space

    • Linux 4.7.6

      I’m announcing the release of the 4.7.6 kernel.

      All users of the 4.7 kernel series must upgrade.

    • Linux 4.4.23
    • Linux Kernel 4.7.6 Is Out with MIPS and OCFS2 Improvements, Updated Drivers

      Today, September 30, 2016, renowned Linux kernel developer Greg Kroah-Hartman announced the release of the sixth maintenance update to the latest stable Linux 4.7 kernel series.

      Linux kernel 4.7.6 comes only five days after the release of the previous maintenance version, Linux kernel 4.7.5, and, according to the appended shortlog and the diff from the last update, it changes a total of 76 files, with 539 insertions and 455 deletions. In summary, it updates multiple drivers, adds improvements to various filesystems and hardware architectures, and improves the networking stack.

    • Linux Kernel 4.4.23 LTS Has ARM and MIPS Improvements, Updated Filesystems, More

      Immediately after announcing the release of Linux kernel 4.7.6, Greg Kroah-Hartman proudly informed the community about the general availability of the Linux 4.4.23 LTS kernel.

      The Linux 4.4 kernel is a long-term supported branch, the latest and most advanced one, used in many stable and reliable GNU/Linux operating systems, including Ubuntu 16.04 LTS (Xenial Xerus) and Alpine Linux 3.4. Therefore, it is imperative for it to receive regular updates that bring fixes to the most important issues, as well as other general improvements.

    • From NFS to LizardFS

      If you’ve been following me for a while, you’ll know that we started our data servers out using NFS on ext4 mirrored over DRBD, hit some load problems, switched to btrfs, hit load problems again, tried a hacky workaround, ran into problems, dropped DRBD for glusterfs, had a major disaster, switched back to NFS on ext4 mirrored over DRBD, hit more load problems, and finally dropped DRBD for ZFS.

    • IBM’s Ginni Rometty Tells Bankers Not To Rest On Their Digital Laurels
    • BUS1, The Successor To KDBUS, Formally Unveiled — Aiming For Mainline Linux Kernel

      BUS1 has been in development as an in-kernel IPC mechanism building off the failed KDBUS project. An “RFC” will soon be sent out to Linux kernel developers about BUS1 and the subject will be discussed at next month’s Kernel Summit.

      David Herrmann, one of the BUS1 developers, presented at this week’s systemd.conf conference about the new capability-based IPC for Linux. He talked about how BUS1 is superior to KDBUS, how BUS1 is similar to Android’s Binder, Chrome’s Mojo, Solaris’ Doors, and other common IPC implementations.

    • A New Wireless Daemon Is In Development To Potentially Replace wpa_supplicant

      In addition to the BUS1 presentation, also exciting from the systemd.conf 2016 conference is a thorough walkthrough of a new wireless daemon for Linux being developed by Intel’s Open-Source Technology Center.

      Intel has been developing a new wireless daemon for Linux to potentially replace wpa_supplicant. This new daemon isn’t yet public but the code repositories for it will be opened up in the next few weeks. This new daemon has improvements around persistency, WiFi management, reduced abstractions for different operating systems and legacy interfaces, and changes to operation. This daemon is designed to be very lightweight and work well for embedded Linux use-cases especially, including IoT applications.

    • Graphics Stack

      • Libinput X.Org Driver Updated For X.Org Server 1.19

        Peter Hutterer has announced the release of a new version of xf86-input-libinput, the X.Org DDX driver that makes use of libinput for input handling on the X.Org Server.

      • xf86-input-libinput 0.20.0

        Most important fix is the use of input_lock() instead of the old SIGIO stuff to handle the input thread in server 1.19.

      • Mesa 13.0 Planning For Release At End Of October, Might Include RADV Vulkan

        Following the mailing list talk over the past two days about doing the next Mesa release, plans are being discussed for releasing at the end of October and it might have just got a whole lot more exciting.

        Emil Velikov, Collabora developer and Mesa release manager for the past several release series, has commented on that previously discussed mailing list thread. He mentioned he was secretly waiting in hopes of seeing the RADV Radeon Vulkan driver merged for this next release! He said he’d even be willing to see it merged even if it’s “not perfect/feature complete.”

    • Benchmarks

      • FreeBSD 11.0 Comes Up Short In Ubuntu 16.04 vs. macOS Sierra Benchmarks

        Yesterday I published some macOS 10.2 vs. Ubuntu 16.04 LTS benchmarks from a Mac Mini and MacBook Air systems. For those curious if BSDs can outperform macOS Sierra on Apple hardware, I tested the MacBook Air with FreeBSD 11.0 compared to the Linux and macOS results on that Core i5 system. Here are those results.

      • Early Benchmarks Of The Linux 4.9 DRM-Next Radeon/AMDGPU Drivers

        While Linux 4.9 will not officially open for development until next week, the DRM-Next code is ready to roll with all major feature work having been committed by the different open-source Direct Rendering Manager drivers. In this article is some preliminary testing of this DRM-Next code as of 29 September when testing various AMD GPUs with the Radeon and AMDGPU DRM drivers.

        Linux 4.9 does bring compile-time-offered experimental support for the AMD Southern Islands GCN 1.0 hardware on AMDGPU, but that isn’t the focus of this article. A follow-up comparison is being done with GCN 1.0/1.1 experimental support enabled to see the Radeon vs. AMDGPU performance difference on that hardware. For today’s testing was a Radeon R7 370 to look at the Radeon DRM performance and for AMDGPU testing was the Radeon R9 285, R9 Fury, and RX 480. Benchmarks were done from the Linux 4.8 Git and Linux DRM-Next kernels as of 29 September.

      • How Ubuntu 16.10 Beta 2 Performance Compares To Some Other Linux Distros

        The final Ubuntu 16.10 Beta for “Yakkety Yak” was released this week and we found its performance doesn’t differ much from Ubuntu 16.04 LTS (with the exception of the newer graphics stack) while here are some results comparing it to other modern Linux distributions.

        Tested for this quick, one-page-article comparison were Ubuntu 16.04.1 LTS, Ubuntu 16.10 Beta 2, Clear Linux 10660, Fedora 24, openSUSE Tumbleweed 20160927, and the Arch-based Antergos 16.9-Rolling release.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Qt 3D WIP branches
      • New Qt 3D Functionality Is Being Worked On

        Sean Harmer of KDAB is organizing work around some upcoming “major Qt 3D features” for the open-source toolkit.

        It’s not known if the next round of Qt 3D features will be ready for the Qt 5.9 tool-kit release, but KDAB is looking to have these new branches for feature work with continuous integration coverage.

    • GNOME Desktop/GTK

      • GNOME Calendar App to Feature a New Sidebar, Week View & Attendees in GNOME 3.24

        GNOME developer Georges Stavracas wrote an in-depth blog post the other day to inform the GNOME, Linux, and Open Source communities about the upcoming improvements and new features coming to the GNOME Calendar apps.

        Now that some of us are already enjoying the recently released GNOME 3.22 desktop environment, the GNOME developers are hard at work to improve the GNOME apps and core components by either adding new exciting features and technologies or improving existing ones.

      • Cinnamon 3.2 in Linux Mint 18.1 Supports Vertical Panels, Better Accelerometers

        After informing the community a few days ago about the Mintbox Mini Pro PC and the upcoming improvements and new features shipping with the XApps software projects in Linux Mint 18.1, Clement Lefebvre just published the monthly Linux Mint newsletter.

      • Cross-compiling WebKit2GTK+ for ARM

        Of course, I know for a fact that many people use local recipes to cross-compile WebKit2GTK+ for ARM (or simply build in the target machine, which usually takes a looong time), but those are usually ad-hoc things and hard to reproduce environments locally (or at least hard for me) and, even worse, often bound to downstream projects, so I thought it would be nice to try to have something tested with upstream WebKit2GTK+ and publish it on trac.webkit.org,

      • Should we drop Vala?

        Is it Vala development a waste of time? Is Vala suitable for long term support libraries?

  • Distributions

    • LXLE: A Linux distro to give new life to old hardware

      I’ll bet that somewhere, perhaps at home and most likely at work, you’ve got some old hardware lying around. What to do with it? It still works but what’s it running? Windows XP? Vista? Windows 7 Starter or Home Basic?

      Yep, you’re stuck on some old version of Windows but moving that machine up to a newer version of Windows could be tricky ‘cause one or more of those old graphics cards and printer drivers have probably have fallen out of the update cycle.

      Even if those subsystems are still available, you’ll still have a problem as the newer OSs’ are pretty much guaranteed to suck the life out of old processors with the result that performance and therefore usability will be marginal at best.

      So, what to do? Before you start looking for a deal on a new machine and an e-waste disposal site, consider moving to Linux and, most specifically, consider migrating to LXLE, the LXDE eXtra Luxury Edition (though some people also claim it stands for Lubuntu Extra Life Extension).

    • OpenSUSE/SUSE

    • Red Hat Family

      • Red Hat, Logicalis in digital transformation partnership in Latin America

        PromonLogicalis, a provider of information technology and communication solutions and services in Latin America, and Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, announced a collaboration that aim to help organizations navigate the digital transformation of their infrastructures to pave the way for cloud and the software-defined technologies, and to advance open source technology awareness in the region.

        Open source is delivering significant advancements in many areas of technology through community-powered innovation, including cloud computing, mobile, big data, and more. And, as companies embrace modern technology as a competitive advantage via digital transformation efforts, many are turning to open source because of the flexibility and agility it can enable.

      • Finance

      • Fedora

        • PHP version 5.6.27RC1 and 7.0.12RC1
        • An Easy Way To Try Intel & RADV Vulkan Drivers On Fedora 24

          Fedora 25 should have good support for the open-source Vulkan Linux drivers (particularly if it lands the next Mesa release) while Fedora 24 users can now more easily play with the latest Mesa Git RADV and Intel ANV Vulkan drivers via a new repository.

          A Phoronix reader has setup a Fedora Copr repository that is building Intel’s Vulkan driver from Mesa Git plus the RADV Radeon Vulkan driver re-based from its source (David Airlie’s semi-interesting GitHub branch). Fedora COPR, for the uninformed, is the distribution’s equivalent to Ubuntu PPA repositories.

        • Meeting users, lots of users

          Every year, I introduce Fedora to new students at Brno Technical University. There are approx. 500 of them and a sizable amount of them then installs Fedora. We also organize a sort of installfest one week after the presentation where anyone who has had any difficulties with Fedora can come and ask for help. It’s a great opportunity to observe what things new users struggle with the most. Especially when you have such a high number of new users. What are my observations this year?

    • Debian Family

  • Devices/Embedded

Free Software/Open Source

  • 10 reasons why CIOs should consider open source software

    A recent survey shows 78 percent of companies run part or all of their operations on open source software. Indeed, open source continues to gain market traction as more companies adopt open technology to speed innovation, disrupt industries and improve overall productivity.

    Those who remain hesitant about adopting open source are in danger of being left behind. Because open source architecture lends itself to more frequent updates, and because of the openness, open source provides the freedom to innovate and mature in the way that enterprises need.

  • Kubernetes Arrives in New Flavors

    Kubernetes has taken center stage in recent days, and, as we’ve been noting in recent posts, the open source container cluster manager is heading in new directions. Google has just announced the release of Kubernetes 1.4, which makes the tool much easier to install.

    Meanwhile, Canonical has now launched its own distribution of Kubernetes, with enterprise support, across a range of public clouds and private infrastructure. It’s Kubernetes at the core, but features a number of extra bells and whistles.

  • 2016 Women in Open Source Award Winners

    We hope you enjoy and are inspired by this short video celebrating Preeti Murthy and Jessica McKellar, the winners of this year’s Red Hat Women in Open Source Awards.

  • Tech, talent and tools: The secret to monetizing open-source

    “In California during the gold rush, you didn’t make money digging for gold; you made money selling shovels,” said Mehta. A fitting metaphor for the idea that investing in talent and tools, especially tools, is how to turn a profit. The actual data, databases, algorithms and so on would be open source. Money would come from the tools to use that technology to benefit specific areas, such as automation of healthcare.

    And healthcare is a good place to start. “Big Data is all about making life cheaper, better. … If we forget about how to solve problems for humans, we’ve lost. We want to be known for enriching life,” said Mehta.

  • Changing the way we design for the web

    On the one hand, open source should mean lower cost of entry for people from poorer communities (like me, growing up). But on the other, I feel it is hard to contribute when under- or unemployed. I had a grant to work on the Web Animations API documentation, but I can’t do as much as I’d like with other animation features (motion paths, advanced timing functions) because I need to spend a lot of time working on my own business, getting paid.

    Essentially this leads to an awkward model where the only contributors are employed programmers—and when it comes to open source animation or design APIs, platforms, etc, this lack of user input really starts to show. Or, the only products with thriving open source development teams are those that have financially lucrative futures, turning the open source software (OSS) model into a capitalist one.

  • Asterisk 14 Improves Open-Source VoIP

    Digium, the lead commercial sponsor behind the Asterisk open source PBX project announced the release Asterisk 14 this week, continuing to evolve the decade old effort, making it easier to use and deploy.

  • Yahoo open-sources a deep learning model for classifying pornographic images

    Yahoo today announced its latest open-source release: a model that can figure out if images are specifically pornographic in nature.

    The system uses a type of artificial intelligence called deep learning, which involves training artificial neural networks on lots of data (like dirty images) and getting them to make inferences about new data. The model that’s now available on GitHub under a BSD 2-Clause license comes pre-trained, so users only have to fine-tune it if they so choose. The model works with the widely used Caffe open source deep learning framework. The team trained the model using its now open source CaffeOnSpark system.

    The new model could be interesting to look at for developers maintaining applications like Instagram and Pinterest that are keen to minimize smut. Search engine operators like Google and Microsoft might also want to check out what’s under the hood here.

    “To the best of our knowledge, there is no open source model or algorithm for identifying NSFW images,” Yahoo research engineer Jay Mahadeokar and senior director of product management Gerry Pesavento wrote in a blog post.

  • Events

  • Web Browsers

    • Chrome

      • CloudReady by neverware

        I thought I would put together a quick “installation” review of a product called CloudReady by neverware. What is CloudReady? CloudReady is basically a project to bring Chromium OS to those who would like to convert traditional laptops into Chromebook-like devices. I stumbled on them several months ago and finally decided to see how hard it was to install Chromium OS and how functional it actually was as a Chromebook-like device. I have a few low end (netbook-like) devices and I have been trying to figure out how I could make them functional for my boys, I thought this might be the solution.

    • Mozilla

      • Mozilla tells Firefox OS devs to fork off if they want to chase open web apps vision

        The Mozilla Foundation’s Firefox development team has decided enough is enough and will stop supporting Windows XP and Vista in March 2017 and also bin Firefox OS.

        The OS first. In this post Mozillans Ari Jaaksi and David Bryant, respectively the head of connected devices and veep for platform engineering, write that “By the end of 2015 Mozilla leadership had come to the conclusion that our then Firefox OS initiative of shipping phones with commercial partners would not bring Mozilla the returns we sought.”

        That decision means that “as of the end of July 2016 have stopped all commercial development on Firefox OS.”

  • SaaS/Back End

    • Cloudera Delivers Release Built on Apache Spark 2.0, and Advances Kudu

      Cloudera, focused on Apache Hadoop and other open source technologies,has announced its release built on the Apache Spark 2.0 (Beta), with enhancements to the API experience, performance improvements, and enhanced machine learning capabilities.

      The company is also working with the community to continue developing Apache Kudu 1.0, recently released by the Apache Software Foundation, which we covered here. Kudu is an open source columnar storage engine built for the Apache Hadoop ecosystem designed to enable flexible, high-performance analytic pipelines. Taken together, Cloudera’s new tools are giving it more diverse kinds of presence on the Big Data scene.

      Cloudera claims it was the first Hadoop big data analytics vendor to deliver a commercially supported version of Spark, and has participated actively in the open source community to enhance Spark for the enterprise through its One Platform Initiative. “With Spark 2.0, organizations are better able to take advantage of streaming data, develop richer machine learning models, and deploy them in real time, enabling more workloads to go into production,” the company reports.

    • Cloudera Delivers Enterprise-Grade Real-Time Streaming and Machine Learning with Apache Spark 2.0 and Drives Community Innovation with Apache Kudu 1.0
    • Vendors Pile on Big Data News at Strata

      Cloudera, Pentaho and Alation are among vendors making Big Data announcements at this week’s Strata event.

      Vendors big and small are making news at this week’s Strata + Hadoop event as they try to expand their portion of the Big Data market.

      Cloudera highlighted a trio of Apache Software Foundation (ASF) projects to which it contributes. Among them is Spark 2.0, which benefits from a new Dataset API that offers the promise of better usability and performance as well as new machine learning libraries.

    • New alliances focus on open-source, data science empowerment

      How can data science make a true market impact? Partnerships, particularly amongst open source communities. As IBM solidifies its enterprise strategies around data demands, two new partnerships emerge: one with Continuum Analytics, Inc., advancing open-source analytics for the enterprise; and another with Galvanize, initiating a Data Science for Executives program.

      Continuum Analytics, the creator and driving force behind Anaconda — a leading open data science platform powered by Python — has allied with IBM to advance open-source analytics for the enterprise. Data scientists and data engineers in open-source communities can now embrace Python and R to develop analytic and machine learning models in the Spark environment through its integration with IBM’s DataWorks Project.

      The new agreement between IBM and Galvanize, which provides a dynamic learning community for technology, will offer an assessment, analysis and training element for Galvanize’s Data Science for Executives program. This program empowers corporations to better understand, use and maximize the value of their data. The program will support IBM’s DataFirst Method, a methodology that IBM says provides the strategy, expertise and game plan to help ensure enterprise customers’ succeed on their journey to become a data-driven business.

    • Apache Spot: open source big data analytics for cyber
  • Oracle/Java/LibreOffice

    • TDF Releases Fresh Update to LibreOffice 5.2

      The Document Foundation today announced the availability of LibreOffice 5.2.2, the second update to the “fresh” 5.2 family. “LibreOffice 5.2.2, targeted at technology enthusiasts, early adopters and power users, provides a number of fixes over the major release announced in August.” These fixes include the usual number of import/export/filter fixes as well as a lot of interface adjustments and a few crashes.

      One of the more interesting import bugs fixed had first been reported 4 1/2 years ago. In version 3.5.0 when importing RTF files with several tables the formatting isn’t retained in all cases. The original reporter said this included column widths and placement. Comments updated the report throughout several versions on various systems. The bug sat for another year before being bumped and eight months later a patch was committed. After further input and more adjustments, Miklos Vajna committed patches for several versions including today’s 5.2.2.

  • Pseudo-Open Source (Openwashing)

  • BSD

    • OpenBSD 6.0 Limited Edition CD set (signed by developers)

      Five OpenBSD 6.0 CD-ROM copies were signed by 40 developers during the g2k16 Hackathon in Cambridge, UK.

      Those copies are being auctioned sequentially on ebay.

      All proceeds will be donated to the OpenBSD Foundation to support and further the development of free software based on the OpenBSD operating system.

  • FSF/FSFE/GNU/SFLC

    • Licensing resource series: Free GNU/Linux distributions & GNU Bucks

      When Richard Stallman set out to create the GNU Project, the goal was to create a fully free operating system. Over 33 years later, it is now possible for users to have a computer that runs only free software. But even if all the software is available, putting it all together yourself, or finding a distribution that comes with only free software, would be quite the task. That is why we provide a list of Free GNU/Linux distributions.

      Each distro on the list is commited to only distributing free software. With many to choose from, you can find a distro that meets your needs while respecting your freedom.

      But with so much software making up an entire operating system, how is it possible to make sure that nothing nasty sneaks into the distro? That’s where you, and GNU Bucks come in.

    • Friday Working together for Free Software Directory IRC meetup: September 30th
    • August and September 2016: photos from Pittsburgh and Fresno
    • Libre Learn Lab: a summit on freely licensed resources for education

      Libre Learn Lab is a two-day summit for people who create, use and implement freely licensed resources for K-12 education, bringing together educators, policy experts, software developers, hardware hackers, and activists to share best practices and address the challenges of widespread adoption of these resources in education. The 2nd biennial conference is Saturday, October 8th, and Sunday, October 9th, at the MIT Tang Center.

      The keynote addresses will be delivered by the FSF’s own Richard M. Stallman, former Chief Open Education Advisor Andrew Marcinek and founder of HacKIDemia Stefania Druga. At the event, there will be a special tribute to Dr. Seymour Papert (the father of educational computing) by Dr. Cynthia Solomon.

  • Programming/Development

    • Machine Learning with Python

      I first heard the term “machine learning” a few years ago, and to be honest, I basically ignored it that time. I knew that it was a powerful technique, and I knew that it was in vogue, but I didn’t know what it really was— what problems it was designed to solve, how it solved them and how it related to the other sorts of issues I was working on in my professional (consulting) life and in my graduate-school research.

      But in the past few years, machine learning has become a topic that most will avoid at their professional peril. Despite the scary-sounding name, the ideas behind machine learning aren’t that difficult to understand. Moreover, a great deal of open-source software makes it possible for anyone to use machine learning in their own work or research. I don’t think it’s an overstatement to say that machine learning already is having a huge impact on the computer industry and on our day-to-day lives.

Leftovers

  • Salesforce tries to block Microsoft’s LinkedIn acquisition

    Microsoft made a splash earlier this year when it announced the largest acquisition in its history, signing an agreement to buy LinkedIn for $26.2 billion. But now, Salesforce is trying to convince the European Union to block the deal.

    Salesforce Chief Legal Officer Burke Norton will argue to the EU’s competition authority that Microsoft’s control of LinkedIn’s dataset following an acquisition would be anticompetitive. EU competition chief Margarethe Vestager said in January that her agency would be looking directly at whether a company’s use of data is bad for competition, and these complaints seem aimed squarely at those comments.

    “Microsoft’s proposed acquisition of LinkedIn threatens the future of innovation and competition,” Norton said in a statement on Thursday. “By gaining ownership of LinkedIn’s unique dataset of over 450 million professionals in more than 200 countries, Microsoft will be able to deny competitors access to that data, and in doing so obtain an unfair competitive advantage.”

  • The Rise of the Helpful Operational Bots: ChatOps

    While some of the concepts surrounding ChatOps has been around for a long time, it is fair to say that the idea only really began to get traction within technical communities when Jesse Newland gave a talk on ChatOps at Github during PuppetConf 2012. Since 2012 we have seen a growth in interest in the new use of bots within operations.

  • Facebook Video Metrics Crossed The Line From Merely Dubious To Just Plain Wrong

    What happened here is actually pretty subtle, so bear with me. Facebook distinguishes “plays” from “views” — with the former being every single play of the video, including those auto-plays that you scroll straight past and never even look at, and the latter being only people who actually watched the video for three seconds or longer. Of course, there are still a million ways in which this metric is itself broken (I’ve certainly let plenty of videos play for more than three seconds or even all the way through while reading a post above or below them) but the distinction is a good one. All of the more detailed stats are based on either plays or views (mostly views) and are clearly labeled, but the one metric at issue was the “Average Duration of Video Viewed.” This metric could be fairly calculated as either the total amount of time from all plays divided by the total number of plays, or the same thing based only on time and number of views — but instead, it was erroneously being calculated as total play time divided by total number of views. In other words, all the second-or-two autoplays from idle newsfeed scrollers were being totalled up, and that time was being distributed among the smaller number of people who stayed on the video for more than three seconds as part of their average duration, leading to across-the-board inflation of that figure.

  • Journalist Tom Henderson on Cloud Vendor Lock-In

    This video is not technically about free or open source software, but it’s 100 percent about the danger of falling victim to proprietary vendors and their habit of making it hard to leave their sweet embrace once they get their paws on you. The Network World column by Tom Henderson that generated this interview is titled, The Many Dimensions of Cloud Value, and is subtitled, “Put your snorkels on: The marketing for cloud services is getting deep.” So is the marketing for many other proprietary something-as-a-something offerings ranging from operating systems to (obviously) cloud platforms.

  • Science

    • Why Deep Learning Is Suddenly Changing Your Life

      Over the past four years, readers have doubtlessly noticed quantum leaps in the quality of a wide range of everyday technologies.

      Most obviously, the speech-recognition functions on our smartphones work much better than they used to. When we use a voice command to call our spouses, we reach them now. We aren’t connected to Amtrak or an angry ex.

  • Health/Nutrition

    • Bayer Makes Deal With GMO Giant Monsanto

      That preemption bill was similar to other anti-local democracy measures peddled by the American Legislative Exchange Council (ALEC).

      From fracking bans to minimum wage and GMO labeling, ALEC and its politicians have successfully driven preemption efforts with its “model” legislation throughout different parts of the country at the behest of giant corporations.

      An Oregonian who leads a group with ties to Monsanto claimed he authored the bill, but as Lisa Arkin of the Pesticide Action Network North America noted both the Oregon bill and the ALEC bill share the same name and have the same core operative language and effect: “A local government may not enact or enforce a . . . measure, including but not limited to an ordinance, regulation, control area, or quarantine, to inhibit or prevent the production or use of agricultural seed, flower seed . . . or vegetable seed or products of agricultural seed, flower seed . . . or vegetable seed.”

      After the Oregon bill was introduced in 2013, it was taken to ALEC’s 40th anniversary meeting in Chicago, as the “Preemption of Local Agricultural Laws Act,” which is known as the “Monsanto Protection Act,” by its foes.

    • More Than 9 in 10 People Breathe Bad Air, W.H.O. Study Says

      The World Health Organization said Tuesday that 92 percent of people breathe what it classifies as unhealthy air, in another sign that atmospheric pollution is a significant threat to global public health.

      A new report, the W.H.O.’s most comprehensive analysis so far of outdoor air quality worldwide, also said about three million deaths a year — mostly from cardiovascular, pulmonary and other noncommunicable diseases — were linked to outdoor air pollution. Nearly two-thirds of those deaths are in Southeast Asia and the Western Pacific region, compared with 333,000 in Europe and the Americas, the report said.

      “When you look out through the windows in your house or apartment, you don’t see the tiny little particles that are suspended in the air, so the usual perception is that the air is clean,” Rajasekhar Balasubramanian, an air quality expert at the National University of Singapore who was not involved in the study, said in a telephone interview on Tuesday.

      “But the W.H.O. report is a clear indication that even in the absence of air pollution episodes, the concentrations of particles suspended in the air do exceed what’s considered to be acceptable from a health viewpoint,” he said.

      In previous studies, the W.H.O. estimated that more than eight in 10 people in urban areas that monitored air pollution were breathing unhealthy air and that about seven million deaths a year were linked to indoor and outdoor pollution.

  • Security

    • Linaro organisation, with ARM, aims for end-end open source IoT code

      With the objective of producing reference software for more secure connected products, ranging from sensors and connected controllers to smart devices and gateways, for the industrial and consumer markets, Linaro has announced LITE: Collaborative Software Engineering for the Internet of Things (IoT).

      Linaro and the LITE members will work to reduce fragmentation in operating systems, middleware and cloud connectivity solutions, and will deliver open source device reference platforms to enable faster time to market, improved security and lower maintenance costs for connected products. Industry interoperability of diverse, connected and secure IoT devices is a critical need to deliver on the promise of the IoT market, the organisation says. “Today, product vendors are faced with a proliferation of choices for IoT device operating systems, security infrastructure, identification, communication, device management and cloud interfaces.”

    • An open source approach to securing The Internet of Things
    • Addressing the IoT Security Problem

      Last week’s DDOS takedown of security guru Brian Krebs’ website made history on several levels. For one, it was the largest such reported attack ever, with unwanted traffic to the site hitting levels of 620 Gbps, more than double the previous record set back in 2013, and signalling that the terabyte threshold will certainly be crossed soon. It also relied primarily on compromised Internet of Things devices.

    • Linaro beams LITE at Internet of Things devices

      Linaro launched a “Linaro IoT and Embedded” (LITE) group, to develop end-to-end open source reference software for IoT devices and applications.

      Linaro, which is owned by ARM and major ARM licensees, and which develops open source software for ARM devices, launched a Linaro IoT and Embedded (LITE) Segment Group at this week’s Linaro Connect event in Las Vegas. The objective of the LITE initiative is to produce “end to end open source reference software for more secure connected products, ranging from sensors and connected controllers to smart devices and gateways, for the industrial and consumer markets,” says Linaro.

    • Don’t Trust Consumer Routers

      Another example of why you shouldn’t trust consumer routers. d-link

      It isn’t just this specific d-link router. We’ve seen the same issues over and over and over with pretty much every non-enterprise vendor.

      Plus we don’t want our devices used by crackers to DDoS Brian Krebs anymore, right?

      We are Linux people. We CAN do this ourselves.

    • D-Link DWR-932 router is chock-full of security holes

      Security researcher Pierre Kim has unearthed a bucketload of vulnerabilities affecting the LTE router/portable wireless hotspot D-Link DWR-932. Among these are backdoor accounts, weak default PINs, and hardcoded passwords.

    • The Cost of Cyberattacks Is Less than You Might Think

      What’s being left out of these costs are the externalities. Yes, the costs to a company of a cyberattack are low to them, but there are often substantial additional costs borne by other people. The way to look at this is not to conclude that cybersecurity isn’t really a problem, but instead that there is a significant market failure that governments need to address.

    • NHS trusts are still using unsupported Windows XP PCs

      AT LEAST 42 National Health Service (NHS) trusts in the UK still run Microsoft’s now-defunct Windows XP operating system.

      Motherboard filed Freedom of Information requests with more than 70 NHS hospital trusts asking how many Windows XP machines they use. 48 replied within the allotted time, and a whopping 42 of them admitted that they still use the operating system that reached end-of-life status in April 2014.

      Some of the culprits include East Sussex Healthcare, which has 413 Windows XP machines, Sheffield’s Children’s hospital with 1,290, and Guy’s and St Thomas’ NHS Trust in London with an insane 10,800 Windows XP-powered PCs.

      23 replied to Motherboard’s quizzing about whether they have an extended support agreement in place and, unsurprisingly, the majority said that they do not.

    • Friday’s security advisories
    • ICANN grinds forward on crucial DNS root zone signing key update

      The Internet Corporation for Assigned Names and Numbers is moving — carefully — to upgrade the DNS root zone key by which all domains can be authenticated under the DNS Security Extensions protocol.

      ICANN is the organization responsible for managing the Domain Name System, and DNS Security Extensions (DNSSEC) authenticates DNS responses, preventing man-in-the-middle attacks in which the attacker hijacks legitimate domain resolution requests and replaces them with fraudulent domain addresses.

      DNSSEC still relies on the original DNS root zone key generated in 2010. That 1024-bit RSA key is scheduled to be replaced with a 2048-bit RSA key next October. Although experts are split over the effectiveness of DNSSEC, the update of the current root zone key signing key (KSK) is long overdue.

    • Cybersecurity isn’t an IT problem, it’s a business problem

      The emergence of the CISO is a relatively recent phenomenon at many companies. Their success often relies upon educating the business from the ground up. In the process, companies become a lot better about how to handle security and certainly learn how not to handle it.

      As a CIO, knowing the pulse of security is critical. I oversee a monthly technology steering committee that all the executives attend. The CISO reports during this meeting on the state of the security program. He also does an excellent job of putting risk metrics out there, color coded by red, yellow, and green. This kind of color grading allows us to focus attention on where we are and what we’re doing about it.

  • Defence/Aggression

    • Congress May Rewrite Saudi 9/11 Law After Veto Override

      The two top Republicans in Congress said they’re prepared to rewrite legislation allowing victims of the Sept. 11 attacks to sue Saudi Arabia — less than 24 hours after Congress took the extraordinary step of overriding President Barack Obama’s veto of the measure to make it law.

      Both House Speaker Paul Ryan and Senate Majority Leader Mitch McConnell said that the measure could have unintended consequences — including the fact that it could leave U.S. soldiers open to retaliation by foreign governments.

      “I would like to think there’s a way we can fix so that our service members do not have legal problems overseas while still protecting the rights of the 9/11 victims,” Ryan told reporters Thursday, one day after his chamber voted 348-77 to override the veto.

      McConnell also said he was worried about unintended consequences of the measure, saying changes to the law might be needed.

      “It’s worth further discussing,” he told reporters Thursday. “It was certainly not something that was going to be fixed this week.”

    • Arab responses to 9/11 bill point to US interventions abroad

      Others support the bill, but point out that the U.S. is meanwhile backing a Saudi-led intervention in Yemen that has led to the deaths of thousands of civilians there.

      Two Arabic hashtags were trending on Twitter when the bill was passed, one referring directly to the Justice Against Sponsors of Terrorism Act, or JASTA, and the other simply titled: #TheAmericanTerrorism.

      Some Arabic Twitter users shared a photo montage that depicted U.S. military actions in Japan and Vietnam, as well as naked Iraqi prisoners in Abu Ghraib prison being humiliated by smiling U.S. troops. It read: “Japan, Vietnam, Iraq, Afghanistan can’t wait for JASTA to be implemented so they can, in turn, prosecute the U.S.”

      Another shared a 2005 Pittsburgh Post-Gazette editorial cartoon of a young boy on his father’s lap watching an image of the Hiroshima mushroom cloud and asking: “Which terrorist group did that?”

      One post shared more than 750 times included a clip with Arabic subtitles of stand-up American comedian Eddie Griffin talking about U.S. interventions in Iraq and Afghanistan, saying these wars are about “money, money, money.”

      The criticism, of course, is nothing new, says Eurasia Group’s Director for the Middle East and North Africa Ayham Kamel.

      “The Middle East, as a region where the U.S. has been dominant, has always been critical of U.S. policy,” he said.

    • Pakistan threatens to DESTROY India with nuclear bomb as atomic enemies edge to the brink of war

      PAKISTAN’S Defence Minister has threatened to “destroy” India – after India said on Thursday it had carried out “surgical strikes” on suspected militants preparing to infiltrate from Pakistan-ruled Kashmir.

      The strikes, which were a response to shots fired across the de facto border through the disputed Himalayan territory, could lead to a military escalation between the two nuclear-armed neighbours – risking a ceasefire agreed in 2003.

  • Transparency/Investigative Reporting

    • ‘We Believe in What We’re Doing’

      WikiLeaks is now 10 years old. SPIEGEL met with founder Julian Assange, 45, to discuss the whistleblower platform’s achievements and whether recent criticism leveled at the site is justified.

      SPIEGEL: Mr. Assange, 10 years after the founding of WikiLeaks, the whistleblower platform is again being criticized. WikiLeaks is said to have put millions of Turkish voters in danger. What is your response?

      Assange: A few days after the publication of internal emails from the Democratic National Committee, an entirely false story was put out that we had published the names, addresses and phone numbers of all female voters in Turkey. It is completely false. And it was and is simple to check. Power factions fight back with lies. That’s not surprising.

      SPIEGEL: Quite a few German journalists have long sympathized with WikiLeaks and also with Edward Snowden. But they aren’t impressed with the publishing of the DNC emails. Are you campaigning on behalf of Donald Trump?

      Assange: Our publication of the DNC leaks has showed that the Democratic National Committee had effectively rigged the primaries in the United States on behalf of Hillary Clinton against Bernie Sanders. That led to the resignation of leading members of the DNC, including its president Debbie Wasserman Schultz.

      SPIEGEL: People within the Clinton campaign have suggested that the DNC emails were given to you by the Russian secret service.

      Assange: There have been many attempts to distract from the power of our publications. Hillary Clinton is the favorite to win. As always, most media aligns with the presumptive winner even though their claimed societal virtue is to investigate those in power.

      SPIEGEL: The fact is, WikiLeaks is damaging Clinton and bolstering Trump.

      Assange: We’re not going to start censoring our publications because there is a US election. Our role is to publish. Clinton has been in government so we have much more to publish on Clinton. There is a lot of naivety. The US presidency will continue to represent the major power groups of the United States — big business and the military — regardless of who the talking head is.

      SPIEGEL: If someone submitted internal documents from the Trump campaign or the Republican Party, you would publish that as well?

      Assange: Yes, of course. That’s what we do.

    • CIA Took Three Years To Reject FOIA Request For Criteria For Rejecting FOIA Requests

      Curious about what criteria the CIA have for determining if they “can neither confirm nor deny” something? So did Jason Smathers, who back in 2010 filed one of MuckRock’s earliest requests for exactly that. Six years later, he still doesn’t know.

      Smathers first filed in October 2010 – to the agency’s credit, they only took a mere two months to get back to him.

    • Government Agencies Apparently Not Interested In Following Congressional Directives On Overclassification

      I’m not sure what this says about government transparency. Maybe it doesn’t say anything useful. Maybe it’s just the mixed signals we can expect from agencies only willing to make the most minimal transparency efforts. Or maybe it says something about the momentum of even slowly-moving large objects. A bureaucracy has a large turning radius and asking it to suddenly change its ways means you have to lower your expectations as to how “suddenly” should be defined. Whatever it says, it’s nothing good.

      Overclassification is a government-wide problem. Legislation has been passed to fix it. While the government expects the private sector to get right on it when laws are passed, it obviously cuts itself a lot more slack when faced with internal legislative redirection.

  • Environment/Energy/Wildlife/Nature

    • Climate justice meets racism: Standing Rock was decades in the making

      Attack dogs and waves of arrests by police in riot gear could look like isolated incidents of overreaction to the activism stemming from the Standing Rock reservation. But for the Lakota Sioux who live in these marginalized hillsides, the escalated militarization behind their battle against the Dakota Access pipeline is a situation decades in the making.

      North Dakota is not the whitest state in America, but it’s arguably the most segregated. More than 60 percent of its largest minority population, Native Americans, lives on or near reservations. Native men are incarcerated or unemployed at some of the highest rates in the country. Poverty levels for families of the Standing Rock tribe are five times that of residents living in the capital city, Bismarck. In Cannon Ball, the heart of the tribal community, there are rows of weathered government homes, but no grocery store. Tucked behind a lonely highway, this is where mostly white farmers and ranchers shuttle to and from homesteads once belonging to the Sioux.

    • Most people alive today set to witness dangerous global warming in their lifetime, scientists warn

      The world could hit two degrees Celsius of warming – the point at which many scientists believe climate change will become dangerous – as early as 2050, a group of leading experts has warned.

      In a report called The Truth About Climate Change, they said many people seemed to think of global warming as “abstract, distant and even controversial”.

      But the planet is now heating up “much faster” than anticipated, said Professor Sir Robert Watson, a former chair of the Intergovernmental Panel on Climate Change and one of the authors of the report.

      If their analysis is correct, it means the majority of people alive today will experience what it is like to live on a dangerously overheated planet.

    • 9 wonders of the world set to vanish forever: How many have you ticked off?

      This month, we learned that Spain was facing the prospect of becoming the first European Union member state to have a natural World Heritage Site make Unesco’s “danger list”. The Doñana coastal wetlands in Andalucía – home to the endangered Iberian lynx – is said to be under threat from a mining and dredging plan, as well as 1,000 illegal wells in the area.

      But it’s just one among a number of incredible sites the world over that, according to Unesco, could be lost forever. Here are just a few World Heritage Sites in Unesco’s danger zone that you might need to scrub off the bucket list.

    • To Reduce Haze and Save Indonesia’s Forests, Address the Root Cause of Fires

      Over the past few months we have seen heated debates over the problem of Indonesian forest fires and the associated haze in neighboring countries like Singapore. A new law in Singapore permits the prosecution of companies deemed to be responsible for causing such fires, and speculation about how the El Nino phenomenon might lead to particularly intense fires in the next month have drawn global attention to the issue.

      Three years ago, President Susilo Bambang Yudhoyono made a pledge to dedicate the remainder of his term in office to protect Indonesia’s environment and forests. Over the last three years he has done just that — with the historic moratorium on new logging concessions implemented in 2011, which has since been extended to May 2015. This policy has helped to protect more than 63 million hectares of primary forest and peat land, equivalent to an area larger than the landmass of Malaysia and the Philippines combined, and helped to lower Indonesia’s deforestation rate from 1.2 million hectares per year between 2003 and 2006, to between 450 and 600 thousand hectares per year since 2011. We also see the private sectors in the region stepping up their zero-deforestation commitments, including from the pulp and paper and palm oil industries.

    • Fires driving deforestation in Indonesia’s Leuser Ecosystem

      Indonesia’s Leuser Ecosystem lost 4,097 hectares of forest cover in the first six months of 2016, according to Forest, Nature and Environment of Aceh (HAkA), an NGO. At the same time, 187 fire hotspots were recorded in the nationally protected area during the period.

      “The hotspots overlay the forest cover loss in Aceh,” HAkA’s Agung Dwinurcahya said at a press conference in Jakarta. “For example, the high number of hotspots in Aceh Timur is the main contributor to deforestation in Aceh Timur.”

      Leuser, home to one of the Southeast Asian country’s last great swaths of intact rainforest, lies in Indonesia’s westernmost Aceh and North Sumatra provinces. It’s the only place in the world where orangutans, rhinos, elephants and tigers coexist in the wild.

    • Seven Popular Foods That Might Disappear Because of Climate Change

      Throughout history, different types of food have surged and dropped in popularity, and some foods that existed at one point just aren’t around anymore. But we’re not talking about foods that aren’t popular, quite the opposite in fact. Some of our favorite foods and drinks could be considered “endangered” because the places where they are grown are being severely impacted by climate change. If this isn’t proof that we need to do something about climate change, I don’t know what is. To start off, here are a few foods that are part of our everyday lives that might not be around for long.

  • Finance

    • In Wells Fargo Case, News Really Did Happen To An Editor

      Several years after I returned to New York from Oregon, I made a strange discovery. Bank accounts I was certain I had closed were inexplicably racking up service charges. It seemed bizarre, particularly because I had gone in person to a newly opened local branch of my West Coast bank to make sure the accounts were shut down.

      The failure to pay these charges (bills were sent to my old address and never caught up with me) resulted in penalties and a report to a credit agency. After an increasingly frustrating series of exchanges at the local branch, the bank agreed to wipe out the charges but said I would have to deal with the credit agencies on my own.

      It seemed outrageous, and as the editor in chief of an investigative news operation, I thought about asking Paul Kiel, ProPublica’s crack reporter on bank shenanigans, to take a look.

      But then I stopped myself.

      There’s an old saying in the journalism business for this sort of thinking: News is what happens to an editor.

      As with so many newsroom aphorisms, it’s meant to be proclaimed with an eye roll and a tone of deep sarcasm. Reporters view editor-generated stories as the bane of their existence, and not without reason. Random events and pet peeves are not often a great starting point for serious stories.

    • People born in the 1980s are HALF as wealthy in their thirties as people a decade older

      People born in early Eighties were around half as wealthy at age 30 as their counterparts who were born in the Seventies, analysis shows.

      The children of the “Baby Boomer” generation, currently in their early 30s, have an average net household wealth of £27,000 each a report by the Institute for Fiscal Studies, a think tank showed.

      By comparison the median wealth of those born in the 1970s had £53,000 on average by the same age. The figure takes into account housing, financial and private pension wealth.

    • Wealth of people in their 30s has ‘halved in a decade’

      People in their early 30s are half as wealthy as those now in their 40s were at the same age, a report finds.

      Today’s 30-something generation has missed out on house price increases and better pensions, according to research by the Institute for Fiscal Studies.

      Those born in the early 1980s have an average wealth of £27,000 each, against the £53,000 those born in the 1970s had by the same age, said the IFS.

      They will also find it harder to amass wealth in the future, it added.

      The think tank found that people born in the early 1980s were the first post-war group not to have higher incomes in early adulthood than those born in the preceding decade.

    • Children of Thatcher era have half the wealth of the previous generation

      The children of the Thatcher era have reached adulthood with half as much wealth as the previous generation, finds a major study published today.

      The report from the Institute of Fiscal Studies concludes people born in the early 1980s are the first post-war generation to suffer smaller incomes in early adulthood than those born 10 years before.

      A toxic mix of low interest rates and the calamitous crash of 2008 mean it is much harder to accumulate wealth, leaving them with meagre pensions and a lower rate of home ownership.

    • Basic Income — A concrete and financed proposal for Sweden

      I have now translated my proposal for basic income for Sweden, which I presented in Swedish some time ago.

      Although the proposal as such is strictly about Sweden and Swedish conditions, I am hoping that the reasoning and design principles I have applied may be of interest to basic income activists in other Nordic and European countries as well. In many ways, the welfare systems we have today are basically quite similar, and many of the problems we face are the same as well.

    • Portugal threatened with first treaty claim

      A Mexican company has threatened to bring a €42 million investment treaty claim against Portugal over a cancelled deal to privatise part of Lisbon’s public transport system.

      Grupo Autobuses de Oriente (ADO) announced last week that it had served a notice of dispute to the Portuguese government under the Mexico-Portugal bilateral investment treaty after negotiations proved “fruitless”.

      If the dispute reaches arbitration, it would be the first known investment treaty case that Portugal has faced – as well as a rare example of a Latin American multinational invoking a BIT to protect investments in a European state.

      The dispute relates to two “sub-concession agreements” that ADO, through its Spanish subsidiary Avanza, signed with Portugal’s then centre-right government under Prime Minister Pedro Passos Coelho in June 2015.

  • AstroTurf/Lobbying/Politics

    • Gary Johnson Is Not the Third-Party Candidate You’re Looking For

      With Hillary Clinton failing to provide a genuine voice for the 99% against Donald Trump’s bigoted fake-populism, a left-wing third-party candidate like Jill Stein can act as an important pole of attraction for a section of workers and youth sick and tired of the status quo. But Stein isn’t the only third-party challenger to Trump and Clinton. Gary Johnson, the former Republican governor of New Mexico, is running for president under the Libertarian Party. Johnson has been consistently outpolling Stein, and some polls even show Johnson beating Stein among former Bernie Sanders supporters.

      Given his polling results, Johnson may appear to be the best bet for building a viable challenge to the two-party system. And Johnson has a number of progressive positions on certain isolated issues, such as support for the legalization of marijuana and opposition to government surveillance. But, as socialists, we have to be clear that Gary Johnson, and libertarian politics in general, are a dead end for anyone trying to build a voice for the 99%.

    • Hacked Audio Reveals Hillary Clinton Sees Herself Occupying “Center-Left to Center-Right”

      In the hacked recording of a private conversation with campaign donors in February, Hillary Clinton distanced herself from progressive goals like “free college, free healthcare” and described her place on the political spectrum as spanning from the center-left to the center-right.

      Clinton has been inconsistent in the past about espousing political labels. She has at times touted herself as stalwart liberal. For instance, she said last July: “I take a backseat to no one when you look at my record in standing up and fighting for progressive values.” But a few months later, she told a group in Ohio: “You know, I get accused of being kind of moderate and center. I plead guilty.”

      The newly disclosed comments came in audio, apparently from hacked emails, that was revealed this week by the Washington Free Beacon, a conservative blog run by a Republican communications strategist. Clinton was speaking at a Virginia fundraiser hosted by Beatrice Welters, the former U.S. ambassador to Trinidad and Tobago, and her husband Anthony Welters, the executive chairman of an investment consulting firm founded by former Clinton aid Cheryl Mills.

      Clinton’s opponent at the time, Sen. Bernie Sanders, was pointing to successful programs in Norway and Sweden, which provide universal daycare, family leave, and government sponsored healthcare and college education, as policies that he would seek to adopt.

  • Censorship/Free Speech

    • Palestinians boycott Facebook over ‘censorship’

      Palestinian activists have recently launched a campaign to boycott Facebook after the popular social-media platform blocked several Palestinian accounts and deleted numerous posts – at Israel’s request – for alleged “incitement”.

      Earlier this week, campaigners – using the hashtag #FBCensorsPalestine – called on supporters to refrain from posting on Facebook between 8 p.m. and 10 p.m. (Jerusalem time) on Sept. 25.

      Hussam al-Zayegh, the campaign’s Gaza-based spokesman, told Anadolu Agency that the initiative had been launched in response to what he described as Facebook’s “pro-Israel bias”.

      According to al-Zayegh, the world’s most popular social-networking site is actively working to undermine Palestinian activists and journalists who rely on Facebook to help spread their message.

    • Palestinian Activists Are Angry About Alleged Facebook Censorship

      Palestinian activists are running an online campaign to hold Facebook accountable after the social media giant deleted a number of pro-Palestine posts and suspended several Palestinian journalists’ accounts.

      Quds News Network and other publications launched the hashtag #FBCensorsPalestine on Friday, when news emerged that seven Palestinian journalists associated with popular outlets in Israeli-occupied Palestinian territories had their accounts shut down for “violating community guidelines.”

      According to the seven journalists, four of whom work for Shehab News Agency and three of whom work for Quds, Facebook provided no further explanation of what standards were violated.

    • Donald Trump and the Return of Seditious Libel

      In 1733, New York printer John Peter Zenger began publishing the eighth newspaper in the American colonies, and the first willing to venture criticism of the government. The New-York Weekly Journal was the second paper in a city of 10,000 or so people, 1700 of them slaves.

      As we are reminded in Richard Kluger’s comprehensive new book, “Indelible Ink,” the first full-length account of Zenger’s travails, by 1735, Zenger (and the likely editor of his paper, James Alexander) had so offended Britain’s royal governor of New York and New Jersey, William Cosby, that Cosby brought suit against Zenger for seditious libel—the crime of criticizing the government. Under the law then in effect in Britain and its colonies, truth was not a defense to this charge. The leading legal treatise of the day explained that “since the greater appearance there is of truth in any malicious invective, so much the more provoking it is.” And: “The malicious prosecution of even truth itself cannot… be suffered to interrupt the tranquility of a well-ordered society.” This was deemed especially the case with true attacks on those in power, as they would have “a direct tendency to breed in the people a dislike of their governors and incline them to faction and sedition.”

    • Thoughtless and dangerous EU approach to free speech online

      There is a lot of ambiguity when it comes to the EU cooperation with Facebook, Twitter, Youtube/Google and Microsoft to censor the Internet – the Joint Referral Platform.

      On the one hand, it has been marketed as a tool to stop »radicalization« that could lead young people to religiously motivated violence, e.g. terrorism or joining the Islamic State in the Middle East.

      On the other hand, in documents and speeches the EU is totally focused on this project to stem »illegal online hate speech«, e.g. when it comes to racism and Islamophobia.

      On that account, what is deemed to be »illegal« adds to the confusion. Incitement to violence is clearly and reasonably within this definition. But when it comes to the broader definition of hate speech, laws vary between EU member states.

    • Chinese Communism’s Anniversary Shines Light On Censorship — In America

      Due to SAPPRFT restrictions, all American movie scripts are vulnerable to “requested” changes or self-censorship based on the Communist Party’s wishes.

    • Popular YouTuber Experiments With WebTorrent to Beat Censorship

      A popular YouTuber is experimenting with torrent-based technology in order to take control of his content and avoid third-party censorship. Bluedrake says that the potential for freedom when using WebTorrent “blows his mind” and has already carried out tests to get the project underway.

    • Banned Book Week brings awareness to censorship, individual choices

      Banned Books Week is from Sept. 25 to Oct. 1.

      This year will be the 34th anniversary of Banned Books week. The last week of September) will be when words will attempt to overthrow unnecessary censorship.

      After all, in the words of Laurie Anderson “censorship is the child of fear and the father of ignorance.”

      The heat-wave surrounding censorship of books sent the media in a frenzy in the 1980s, urging society to fight against authority, ensuring that there would be a change in social behavior and moral values.

    • Orwell 2016: Censorship in the age of social media

      If George Orwell is watching from above, he must be impressed. In his novel 1984, what was meant as a cautionary tale against government control and intellectual obscurantism, seems to have come to pass without our full knowledge.

      Where have our media taken us?

      To be brutally honest, I would say down the yellow brick road and around the tree a few times over already. As our world has become more and more dependent on media, we have opened ourselves up to the bite of censorship, control and the ever-evolving deity which is ‘social trend’.

      In other words, our need to be “connected” has pretty much left us dependent on information technology.

    • Singapore court sends teen blogger back to jail for criticising religion
    • Singapore rebel teen jailed for anti-religion posts
    • Singapore Teen Gets 6 Weeks in Jail for ‘Intending to Wound’ God’s Feelings
    • Teen blogger jailed in Singapore for insulting Muslims, Christians
  • Privacy/Surveillance

    • The “Pardon Snowden” Case Just Got Stronger

      Yesterday, the Department of Justice Inspector General (DoJ IG) issued a long overdue Congressionally-mandated report on FBI compliance with the PATRIOT Act’s Section 215 “business records” provision between 2012 and 2014. It is the first such report issued that covers the initial period of Edward Snowden’s revelations about widespread domestic mass surveillance by the federal government. Since his indictment for leaking the information to the press, Snowden’s lawyers have argued that he should not be prosecuted under the WW I-era Espionage Act because his revelations served the public interest.

    • Intel Community To Institute Actual Whistleblower Award For ‘Speaking Truth To Power’

      The Intelligence Community is looking to reward whistleblowers for “speaking truth to power.” No, seriously. Steven Aftergood of Secrecy News has posted a recent Intel Community announcement [PDF] that looks to fold a whistleblower honor into the community’s existing awards program.

      This is part of the intel community’s cautious foray into the harsh sunlight of transparency — itself a response to a presidential directive that our nation’s spies head outside for a bit and expose themselves a bit.

      The award may as well be called the “Snowden.” But the wording makes it explicit Snowden himself will never be eligible to receive the honorific fruits of his whistleblowing.

    • How Bulk Interception Works

      Mobile digital devices are ever more ubiquitous, generating new forms of data in quantities that continue to grow exponentially. Moreover, the costs of storing data have decreased drastically, and continue to do so every year. Most importantly, the technical means of combining datasets and analyzing this vast trove of data have advanced so rapidly that what were previously considered meaningless or incoherent types and amounts of data can now produce incredibly revelatory analyses. Metadata is structured in such a way that computers can search through it for patterns faster and more effectively and learn more about us than similar searches through the actual content of our communications.

    • The secret smartphone war over the struggle for control of the user

      There’s a war going on behind closed doors for control of your smartphone. It’s between the phone makers and the operators, but it’s not over privacy or data or cost – it’s over you.

      The battles are raging over who owns the consumer and your phone: is it the buyer or the manufacturer? And is the smartphone a device you purchase, or a service you pay for monthly?

      The boom years for the industry, when a smartphone was a user’s first, are long gone in developed nations with most smartphones now sold to people who already have one. In the US and UK market penetration has hit roughly 85%. This means the growth a phone maker needs each year can only come at the expense of a competitor. And that has changed how the manufacturers see the market.

      Marina Koytcheva, director of forecasting at CCS Insight says: “After years of analysts and commentators talking about mobile phone market peaking within the visible horizon, it has now reached that point.”

      The research firm expects total mobile phone sales to decline by 1.3% this year over last, with smartphones accounting for almost three-quarters of the market and up only 4.1% globally.

  • Civil Rights/Policing

    • Cops Dodge 4th Amendment By Phoning In ‘Anonymous’ Tips; Watch Their Drug Bust Vanish After They’re Exposed

      The two horses called in tips twice, resulting in searches of two residences. Despite costing them a nice drug bust and successful prosecution, both the DA (Shane Scanlon) and the Chief of Police (Carl Graziano) are defending not only the faux tipsters’ actions, but their work as law enforcement officers as well.

    • NYPD sent undercover officers to Black Lives Matter protest, records reveal

      Legal papers filed by the New York police department reveal that the department sent its own undercover officers to protests led by Black Lives Matter after the death of Eric Garner. The NYPD documents also show that it collected multimedia records about the protests.

      The NYPD disclosed its undercover operations in response to a group of New York attorneys requesting records under the state freedom of information law. The department has thus far declined to provide the records requested. But its descriptions in August court filings of the records it is refusing to release provide new details about its monitoring of protests at Grand Central Station:

      The first set contains “multimedia records” relating to the petitioners’ request for “pictures, videos, audio recordings, data, and metadata” collected or received by the NYPD at the Grand Central Station protests, which Black Lives Matter groups are still leading, according to the NYPD response.

      The second “consists entirely of communications between and among NYPD undercover officers and their handlers”, pertaining to the protests. According to a 22 August NYPD Memorandum of Law, these undercover communications “consist primarily of immediate impressions concerning ongoing events”.

    • FBI, DOJ And Their Forensic Scientists State They’ll Continue Using Discredited Junk Science To Put People Behind Bars

      For dozens of years, criminal prosecutions have relied on junk science. Forensic science, properly applied, can actually provide matches that identify suspects. But it’s not properly applied. In the hands of the DOJ, forensic evidence examination is a closed loop. Outside scientists have been granted access to the DOJ’s DNA work, but everything else — from fingerprints to hair samples — has been locked away in the government’s database.

      Still, the DOJ insists its science is solid, something it bases on confirmation bias. The matches determined in its forensic labs are “scientifically certain” because the DOJ’s expert witnesses have said so in court. Not only are outside scientists locked out of examining evidence and forensic processes, but defense lawyers are as well.

      The DOJ has finally decided to dial back its “scientific certainty” a bit by issuing guidance instructing its experts to not make this claim in court. This follows years of bogus matches being presented as sure things by forensic experts in court, leading to an unknown number of false convictions. This step back is a step forward for an agency that is mostly unwilling to admit to any mistakes or wrongdoing.

    • Video released shows officers shooting 6-year-old

      A Louisiana judge released body cam video Wednesday showing officers firing multiple rounds into a car, unknowingly striking and killing a 6-year-old boy.
      The incident, which happened in September 2015, resulted in the indictments of two marshals on second degree murder and second degree attempted murder charges.

      The marshals began pursuing the car after they witnessed an argument between a man and his girlfriend in front of a local bar, a source told CNN. Officers moved to detain the man, identified as Christopher Few, who took off in his car.
      The pursuit ended in gunfire on a dead-end street in Marksville, Louisiana.

    • Massachusetts Detective who Threatened to Murder Teens and Plant Drugs Won’t Be Fired or Charged

      A Springfield, Massachusetts narcotics detective has been placed on leave for 60 days, but not fired, after videos surfaced showing him threatening to murder two teenagers and plant drugs on them — videos which have cast doubt on the detective’s numerous drug cases.

      Detective Gregg A. Bigda was caught on video on February 26 at the Palmer Police Department, where he interrogated two teenagers, who along with a third teen were suspected of stealing an undercover police car outside a pizza shop, when he made the threats, according to a report on MassLive.com.

    • New Jersey Woman Forced into Mental Facility for Video Recording Courthouse

      It was a beautiful day in Freehold, New Jersey, so Jen Coombs decided to do First Amendment audits at the Monmouth County jail and courthouse to see how well officials there would respect her right to record in public.

      The New Jersey woman who runs a Facebook page called Time to Stand – New Jersey ended up forced into a mental facility against her will for four days. Not that it kept her from doing another First Amendment audit on the same courthouse upon her release.

      It all started on September 15, 2016 when Coombs made her way around the public areas of the facility and was approached within minutes by two jail employees who seemed determined to snatch the camera out of her hand before even asking her what she was doing.

      It wasn’t just her camera they were after. Coombs was immediately placed in handcuffs and her car keys were taken. Police then used her keys to find her parked car.

      Officials did not stop at just running her tags to get her information though. They used the keys to open her car and rummage around inside in an apparent search for something, anything, to charge her with.

    • Christian boy, 16, facing DEATH PENALTY for offending Muslims in Facebook post

      The boy has been arrested and charged with blasphemy after a photo of the Kaaba in Mecca, one of the holiest sites in Islam, appeared on his profile.

      A Muslim man told police the image, which was part of an alleged derogatory post against Islam on the boy’s profile, was insulting and sacrilegious.

      The black cube-shape is built around an ancient stone at the centre of Islam’s most sacred mosque Al-Masjid al-Haram in Mecca, Saudi Arabia.

      Locals reportedly claimed the image showed the Kaaba with a pig’s head on top.

    • Is It Still An Anonymous Tip If It’s Me?

      In Lackawanna County, Pennsylvania, two police officers found a way to get around one of those annoying loopholes that prevent them from locking up people who are guilty, guilty, GUILTY!!! The loophole is known to the rest of us as “The Fourth Amendment,” which states (among other things) “that no warrant shall issue except upon probable cause.”

      Detective Harold Zech and Lawrence Spathelf didn’t have probable cause to search the homes of Albert McCullough and Dakeem Booker, so they made their own. They phoned in “anonymous” tips to McCullough’s and Booker’s parole officers, who searched their and found some heroin.

    • New Guantánamo intelligence upends old ‘worst of the worst’ assumptions

      The “Dirty 30” probably weren’t all Osama bin Laden bodyguards after all. The “Karachi 6” weren’t a cell of bombers plotting attacks in Pakistan for al-Qaida. An Afghan man captured 14 years ago as a suspected chemical weapons maker was confused for somebody else.

      An ongoing review shows the U.S. intelligence community has been debunking long-held myths about some of the “worst of the worst” at Guantánamo, some of them still held today. The retreat emerges in a series of unclassified prisoner profiles released by the Pentagon in recent years, snapshots of much larger dossiers the public cannot see, prepared for the Periodic Review Board examining the Pentagon’s “forever prisoner” population.

    • DEA’s Army of 18,000 Informants Pocketed $237 Million Over Five Years

      It’s no secret that the Drug Enforcement Administration relies heavily on an army of confidential sources — men and women compelled, coerced, or enticed to share information with law enforcement, sometimes to alleviate their own legal troubles, sometimes for cash.

      Precisely how those relationships play out, however, is often shrouded in secrecy.

      A recently published audit by the Department of Justice has now offered a startling glimpse behind the scenes of those operations, revealing a world in which hundreds of millions of dollars have been doled out to thousands of informants over the last five years. Those informants include package delivery personnel, bus company employees, and Transportation Security Administration agents moonlighting as drug war spies — all operating with abysmal oversight and scant evidence of return on investment.

    • Military-Style Raid Ends Native Prayer Against Dakota Pipeline

      Up to 21 people were arrested during a peaceful prayer service.

      North Dakota police with military-style equipment surrounded Native Americans gathered in prayer against the construction of the Dakota Access pipeline on Wednesday, disrupting their plan to cross sacred and treaty-protected land in protest of a project they fear will destroy their livelihood.

    • U.S. Court Of Appeals Upholds Ruling That New Hampshire’s Silly Ballot Selfie Ban Violated The First Amendment

      You may recall that roughly a year ago, a federal judge struck down a New Hampshire law that made “ballot selfies” illegal. The state had essentially updated its laws revolving around limiting the ability to sell votes or influence the public through depicting who a person voted for to include criminalizing anyone that took a picture of their completed ballot and shared it on social media. The state had said that allowing that sort of thing encouraged voter corruption, with the idea that ballot selfies would be used as a form of proof that a bought vote had been completed, or might otherwise be used to influence other members of the public as to how to vote. It was a strange theory, given how unlikely it would be for a corrupted voter to post evidence of his or her corruption on Facebook, not to mention that stating that a person essentially couldn’t engage in a form of political speech via a picture was flatly unconstitutional. The federal judge agreed.

    • Border Patrol Agent Caught Watching Porn On The Job Blames The Internet Filter For Not Stopping Him

      We talk about porn filters occasionally here at Techdirt. Usually those discussions revolve around how useless and easily circumvented those filters are, even as the more clueless in government insist that we need more of this non-filtering filtering. This is not one of those stories. Instead, it is the story of one of the most tone-deaf individuals with a penchant for excuse-making I’ve ever come across.

      We start with Gizmodo, a website that used to be owned by Gawker Media until a rich guy decided to show America exactly what a rich guy with a lot of money could do and had Gawker shut down, presumably then diving into a pile of gold coins and rubbing hundred dollar bills on his nipples. Gizmodo recently filed an FOIA request to get at documents involving the misuse of computer equipment with the Department of Homeland Security. The site was hoping to see if there were any cases of overreach and abuse of technology by the department. Instead, it uncovered four cases of people watching porn, including one really special case involving a border patrol agent that simply would not stop looking at porn while on the job.

  • Internet Policy/Net Neutrality

    • Ridiculously Stupid: 4 State Attorneys General File Totally Bogus Lawsuit Against Internet Transition

      Okay, this is really dumb. What is it about state attorneys general making totally bullshit claims? It seems to happen with fairly consistent frequency. The latest is that four state AGs (from Arizona, Texas, Oklahoma and Nevada) have filed a lawsuit to stop the IANA transition. If you don’t recall, we’ve written about this a bunch. A bunch of people are up in arms over something they don’t seem to understand. The IANA transition is a good thing. It’s not the US government handing over the internet to Russia and China as you may have heard. It’s the Commerce Department severing an almost entirely symbolic link between it and a very specific internet governance capability concerning top level domains. And it’s important to complete the transition because other countries (including Russia and China) keep pointing to this symbolic link as a reason for why they should have more say in internet governance. Getting rid of the link keeps the internet functioning as it has for decades — and takes away a weapon from Russia and China. More importantly, going back on the transition now actually gives even more ammo to Russia and China, allowing them to point to unilateral actions by the US gov’t to block a process that everyone had agreed upon earlier.

      Anyway, to the actual lawsuit. It’s dumb. It’s really dumb. If you live in Arizona, Texas, Oklahoma or Nevada, you should be embarrassed for your Attorneys General. Elect better ones next time, please. First of all, they have no standing whatsoever to file this lawsuit. The IANA/top level domain system is not those states. They have no claim here other than “HEY LOOK! POLITICAL FOOTBALL THAT WE CAN GRANDSTAND OVER!” That does not give them standing. The best they can come up with for claiming standing is… uh… “hey, we have some websites.” No, really.

    • Judge Says No Way To Attorneys General Looking To Block IANA Transition

      Well, this isn’t much of a surprise, but following the ridiculous last minute attempt to block the IANA transition by four state attorneys general (who have absolutely no standing or argument), a judge has flatly denied their request for an injunction meaning that the transition is a go for midnight tonight, barring any really last minute unforeseen methods to block it (or a desperate leapfrog to an appeals court).

      Having spent part of the morning responding to clueless conspiracy theorists on my earlier post, I’m sure you’re going to hear the standard ridiculous lizard people warnings about how this is enabling “the UN” or “leftists” and “globalists” to “takeover” the internet and how it will allow China to build the “Great Firewall” into the core functioning of the internet. None of that is even remotely true. What happens tonight at midnight is… nothing, basically. ICANN, which has managed the IANA function through its multistakeholder process for almost two decades… will continue to do so. Nothing changes. The only “change” is that the US Commerce Dept. no longer has to issue a contract to ICANN for the IANA functions. And that’s it.

    • Net Neutrality: BEREC on the Right Path, Let’s Keep the Pressure on

      Net Neutrality is one of central challenge in the application of fundamental rights in the digital space. Too often it has been only considered as a technical or commercial issue, but it has serious impact on the real exercise of right to freedom of speech, right to information and on how the society build and think of itself; but also has important impacts on industrial and commercial issues. La Quadrature du Net has followed this issue since its start in the European debate circa 2009 by trying to defend a definition and wording in EU law of a strict Net Neutrality, protecting users and guaranteeing opportunities of development in a sane digital environment. As the BEREC guidelines for the Telecom Regulation adopted in October 2015 have been published, it is time to come back on the few years of campaign and to present the next fights and challenges for fundamental rights.

      La Quadrature du Net has defended, since 2009 and the first announces of EU works on Net Neutrality, an approach based on the defence of fundamental rights: to secure Net Neutrality, it is to defend the access of all to the Internet network, it is to allow to receive and send information with the same condition for all, it is to guarantee technical condition to a free and fair exercise of freedom of speech and information.

      It was not self-evident: as soon as the subject was within the speeches of Telecom operators and big digital companies, everything was made to consider Net Neutrality only from the perspective of financing Internet traffic and not as a major issue for the balance of the network that determines the quality of access and circulation of the information and services for the users as a whole.

    • A Massive Cable Industry Disinformation Effort Just Crushed The FCC’s Plan For Cable Box Competition

      Back in February the FCC proposed a new plan to bring competition to the cable box. Under the plan, cable providers would need to provide their programming to third party hardware vendors without the need for a CableCARD. The goal? Bring some competition to bear on a stagnant, captive market, resulting in cheaper, more open, and higher quality cable boxes. But because the plan would demolish $21 billion in rental fees while eroding sector control, the cable industry launched one of the most unprecedented lobbying and disinformation efforts I’ve ever seen in 16 years of covering the sector.

      Politicians loyal to the cable industry wrote letters lambasting the FCC for “jeopardizing the incredible evolution of video distribution services,” falsely comparing the idea to Popcorn Time. A flood of editorials magically began appearing in newspapers country wide claiming the FCC’s plan would boost piracy, hurt consumer privacy, and even “steal the future.” The cable sector even trotted out Jesse Jackson, who claimed in a horribly misleading op-ed that increased cable box competition was akin to the “snarling dogs, water hoses and church bombings” of America’s racist history. Seriously.

  • DRM

    • Racing Game Developers Sacrifice Playability On The Altar Of Anti-Piracy, Deliver Laggy Mess To Paying Customers

      So much for the advantages of PC gaming. Build a rig to your specifications and company reps tell you to use bog-standard settings to keep from being tripped up by anti-piracy and anti-hacking asset checks. If gamers wanted a one-size-fits-all gaming experience, they’d have settled for the console version. And there’s no guarantee that will work. The problem has been linked to on-the-fly decryption of game assets, which isn’t going to be solved in all cases by using default video settings.

      There’s a fix on the way but it’s tough to see how the developers are going to get around built-in asset checks that run through Windows EFS. There’s no easy “switch” to turn that off. While I understand developers are concerned about software piracy and cheaters/hackers ruining the online experience of honest players, there’s simply nothing to be gained by irritating those who’ve spent perfectly functional money on deliberately-broken software.

  • Intellectual Monopolies

    • Time To Talk Digital Issues At WTO With Focus On Developing Countries, Forum Hears

      Now is the time for those who want to bring new voices to the digital trade and general trade debate involving the World Trade Organization, says an adviser to a leading security think tank in Switzerland.

      “If the objective is for trade policy to effectively bring in non-traditional voices this is a perfect time for that to take place,” Nick Ashton-Hart, a consultant and associate fellow for the Geneva Centre for Security Policy said at the WTO’s 27-29 September Public Forum yesterday.

    • Uber hires former Google licensing executive in what could be a familiar pre-IPO play

      In a major move in the licensing community, former Google patent executive Kurt Brasch has moved to Uber as senior manager, patents. He joins an IP team led by fellow former Google employee Michael Meehan who jumped ship in February of this year.

      Brasch left Google earlier in the summer as the search giant let go of most of the legacy licensing team that it had picked up through its 2012 acquisition of Motorola Mobility.

      At Google he played a role in the Patent Purchase Promotion and its recent industry-wide successor IP3; helped launch the Patent Starter Program designed to encourage start-ups to join the License on Transfer Network; and led the team behind the 2014 cross licence with Cisco. That series of successes last year led this blog to name him as one of the IP personalities of 2015.

    • Gurry Speaks On Allegations For First Time As WIPO Members Discuss Actions

      Heading into next week’s annual UN World Intellectual Property Organization General Assemblies, WIPO member states are considering a report from the United Nations investigations office regarding allegations of wrongdoing made involving WIPO Director General Francis Gurry. And for first time since the allegations arose, Gurry has offered his defence. Spoiler alert: he neither confirmed nor denied it but raised questions about the legality of sharing the report with member states.

    • Trademarks

      • Supremes to rule on feds’ trademark censorship

        The U.S. Supreme Court has agreed to review the case alleging improper government censorship of a trademark for a band named The Slants, a precedent that also likely will impact significantly the current fight over the Washington NFL team’s name, the Redskins.

        According to the Rutherford Institute, which filed a friend-of-the-court brief in support of the band’s name, the censorship “openly discriminates against speech on the basis of content and viewpoint, violating the most fundamental constitutional guarantees to freedom of expression under the First Amendment.”

        The Asian-American dance rock band sued after the federal government, through its U.S. Patent and Trademark Office, censored them.

      • Can you trademark an offensive name or not? US Supreme Court to decide

        The Supreme Court on Thursday said it would decide, once and for all, whether federal intellectual property regulators can refuse to issue trademarks with disparaging or inappropriate names.

        At the center of the issue is a section of trademark law that actually forbids the US Patent and Trademark Office (USPTO) from approving a trademark if it “consists of or comprises immoral, deceptive, or scandalous matter; or matter which may disparage or falsely suggest a connection with persons, living or dead, institutions, beliefs, or national symbols, or bring them into contempt, or disrepute.”

09.29.16

Links 29/9/2016: Russia Moving to FOSS, New Nmap and PostgreSQL Releases

Posted in News Roundup at 8:53 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Microsoft is no longer Russia’s first choice of technology provider

    Moscow plans to open the replacement cycle by swapping Exchange and Outlook for email systems developed by New Cloud Technologies and distributed by by state-run carrier Rostelecom PJSC, Bloomberg reports. The software will be eventually deployed to as many as 600,000 computers.

    The city is also considering dropping Windows and Office, but state officials are still looking into alternatives, says Moscow’s head of information technology Artem Yermolaev.

    Putin has been pushing for technological independence after American corporations were forced to sever ties with major Russian institutions following the annexation of Crimea back in 2014.

    To actively encourage the adoption of local solutions, Putin’s internet czar German Klimenko has plans to raise taxes on Western tech companies operating within Russia.

  • Moscow Drops Microsoft on Putin’s Call for Self-Sufficiency

    Moscow city will replace Microsoft Corp. programs with domestic software on thousands of computers in answer to President Vladimir Putin’s call for Russia’s authorities to reduce dependence on foreign technology amid tensions with the U.S. and Europe.

    The city will initially replace Microsoft’s Exchange Server and Outlook on 6,000 computers with an e-mail system installed by state-run carrier Rostelecom PJSC, Artem Yermolaev, head of information technology for Moscow, told reporters Tuesday. Moscow may expand deployment of the new software, developed by Russia’s New Cloud Technologies, to as many as 600,000 computers and servers, and may also consider replacing Windows and Office, Yermolaev said.

  • Why Microsoft is getting the cold shoulder from Moscow

    Since the German city of Munich decided to ditch Microsoft Windows and Office, a growing number of European agencies have followed suit – from France’s national police force to the Italian military.

    The latest authority to turn its back on Microsoft is reportedly Moscow City Hall, which is transferring employee email from Microsoft Exchange Server and Outlook to the Russian-built MyOffice Mail.

    About 6,000 Moscow state employees will be switched over, including teachers, doctors and civil servants. If the move is a success, the city will consider shifting 600,000 PCs and servers away from Microsoft, and may also replace Windows and Office, according to Bloomberg.

  • Moscow will replace Microsoft’s products with local offerings

    Microsoft might lose a whole city of customers in Russia. According to Bloomberg, Moscow will begin replacing Redmond’s products with homegrown software as a result of Vladimir Putin’s urging to stop depending on foreign tech. Artem Yermolaev, the city’s head of information technology, told reporters that Moscow will begin by dropping Microsoft’s Exchange Service and by replacing Outlook on 6,000 computers with state-run carrier Rostelecom PJSC’s email system. Authorities are looking to deploy the email software to as many as 600,000 computers in the future. They might even replace Windows and the Office suite entirely, though there seems to be no solid plan for that at the moment.

  • Desktop

    • Alphabet’s Plans to Create Android PCs Should Make Microsoft a Little Nervous

      Four years after Microsoft (MSFT) first tried to give the world unified PC/mobile operating systems via the dual fiascoes known as Windows 8 and Windows RT, Alphabet’s (GOOGL) Google appears set to take its own stab at the concept. And there are reasons to think the company will see a measure of success.

      Citing “two independent and reliable sources,” Android Police reports Google plans to launch a notebook in the third quarter of 2017 that will likely be the first new device to showcase Andromeda, a version of Android that will integrate many features associated with Google’s Chrome OS PC operating system.

      The notebook will reportedly be called the Pixel 3, and carry a $788 price. Its feature set reportedly include a 12.3-inch display, an Intel (INTC) processor, a glass trackpad, a tablet mode and stylus support.

    • 4 of the Best Linux Distros for Windows Users

      For the past year Microsoft has offered free upgrades to their latest operating system, Windows 10. This was mainly due to the fact that Windows 8 and 8.1 were poorly received, especially when compared to Windows 7. Unfortunately the free upgrade period has passed, so if you want to give Windows 10 a try, you’ll have to dig into your wallet to do it. If your faith in the tech giant has waned over the years, you’re not alone. The latest versions of Windows have all been heavily criticized, proving that they have been a far cry from the world dominance of Windows XP.

      If you’re one of the many people turned off by the latest iterations of Windows, the jump to Linux might look very appealing. Unfortunately, a new OS often comes with a steep learning curve. Windows, with the exception of the fumble that was 8, has more or less looked and behaved the same for years. Having to re-learn everything can be a daunting task, one that could pressure you into staying with Windows forever.

      However, you do have options. There are many different distributions of Linux out there, with some aiming to replicate the look and feel of Windows. The goal of this is to make transitioning relatively painless. With Linux boasting improved hardware support, long term stability and a wider range of software applications, there is no better time to try it out!

    • Microsoft Applications and Services chief Qi Lu leaves the company [Ed: Microsoft exodus)

      Lu has been heading up the Applications and Services Group — the unit that has encompassed the Office applications team and the Bing search team.

      In an email to employees on September 29, CEO Satya Nadella announced Lu was leaving so as to recover from “health conditions caused by a prior injury.” (A couple of other reports, including the Wall Street Journal’s, say Lu’s injury was related to a biking accident.)

      Lu will continue to act as a “personal advisor” to Nadella and Microsoft Founder Bill Gates after his recovery, but he won’t be returning in his former role, Nadella said in his mail.

  • Server

    • Linux servers deliver greater performance and efficiency ‘than available on any x86-based server’
    • What are configuration management tools?

      For most people, computers don’t stay the same. Software is added, removed, and updated. Configurations are changed. Think about the changes you’ve made to your computer since the first time you booted it up. Now imagine making those changes to 10, 100, or 1,000 more computers. Configuration management tools are what make implemententing and enforcing these changes possible.

    • 5 new OpenStack tutorials and guides
    • Ericsson: The Journey to a DevOps Future in SDN

      There are big transformations going on in the world today that are driving rapid changes to the business of networks, said Santiago Rodriguez, VP of Engineering and head of the product development unit SDN & Policy Control at Ericsson, in his keynote Tuesday at OpenDaylight Summit.

      “Society is transforming, the way we do business is transforming, and accordingly the way we build our networks is transforming,” Rodriguez said.

      The three pillars of this network transformation include: 5G, virtualization and open source.

    • OpenDaylight sets product quality label, metrics for SDN solutions

      Initial OpenDaylight-based products expected to receive the “Powered by OpenDaylight” mark are offerings from Brocade, Ericsson, HPE, Inocybe and Serro.

    • Telstra Sees Quadrupled Data Capacity by 2020

      The latter service led Telstra to re-think its fiber deployment strategy, choosing to use pre-provisioned fiber connections to data centers in advance of customer demand, because the company knew that demand was coming, Blackall said. The strategy worked well with Telstra’s acquisition of Pacnet, which had already deployed SDN capabilities to connect its 27 points of presence around Asia.

    • The Tiny Internet Project, Part I

      As LJ readers well know, Linux drives many of the technologies we use every day, from smart TVs to Web servers. Linux is everywhere—except most homes and classrooms.

      That’s a problem if we want to help breed the next generation of engineers and computer scientists. In fact, if teenagers (or any other group of curious individuals) want to learn about Linux, they often must rely on a geeky friend or parent willing to show them the way.

      This three-part series seeks to change that by offering a way for anyone to learn about Linux by building what is essentially a tiny, self-contained Internet. Using old equipment and free software, you’ll build a private network (with your own domain name), build Web sites, set up an e-mail server, install and use a database, and set up a Linux distro mirror.

      Read more

  • Kernel Space

    • Graphics Stack

    • Benchmarks

      • Ubuntu 16.10 Doesn’t Change Much With Performance, Clear Linux Still Leads In Most Tests

        Given yesterday’s Ubuntu 16.10 final beta release ahead of the official “Yakkety Yak” debut in two weeks, I decided to run some benchmarks of Ubuntu 16.10 compared to Ubuntu 16.04.1 LTS on the same system plus also throwing in the Intel Clear Linux distribution given it tends to be one of the most performant.

        For those that haven’t yet tried out Ubuntu 16.10 nor followed its development, GCC 6.2 is now the default compiler in place of GCC 5.4 from Ubuntu 16.04 LTS. Mesa 12.0.3 provides the stock graphics drivers and Linux 4.8 is the stock kernel.

      • DDR4 Memory Speed Tests With The Core i7 6800K On Ubuntu Linux

        A few days ago I posted my first Core i7 6800K benchmarks under Ubuntu Linux compared to various other CPUs. Out of requests from some premium members, here are some straight-forward memory clocking tests of the i7-6800K on Ubuntu 16.04 LTS with the Linux 4.8 kernel. Tests were done from dual-channel DDR4 up through quad-channel DDR4 at DDR4-3000MHz.

  • Applications

  • Desktop Environments/WMs

    • GNOME Desktop/GTK

      • GNOME Calendar Pencils In Great New Features

        GNOME Calendar is one of the few decent desktop calendaring apps available on Linux — and it’s going to get better.

      • The future of GNOME Calendar

        Today, the Calendar Team had the first meeting in history. Isaque, Lapo, Renata, Vamsi and I attended it, and the meeting was extremely productive! In fact, we were able to sketch out the general direction that GNOME Calendar will head towards.

  • Distributions

    • Endless OS 3: Linux for the Net Less

      In the West, we take the Internet for granted. Oh, we may grumble about a slow connection, but that’s a first-world problem. For many, however, the Internet is a “maybe” thing. For those users, Endless’s Endless OS 3, may be just what they need.

    • New Releases

      • Qubes OS 3.2 has been released!

        I’m happy to announce that today we’re releasing Qubes OS 3.2!

        This is an incremental improvement over the 3.1 version that we released earlier this year. A lot of work went into making this release more polished, more stable and easier to use than our previous releases.

        One major feature that we’ve improved upon in this release is our integrated management infrastructure, which was introduced in Qubes 3.1. Whereas before it was only possible to manage whole VMs, it is now possible to manage the insides of VMs as well.

      • Security-Oriented Qubes OS 3.2 Improves the Integrated Management Infrastructure

        Today, September 29, 2016, Joanna Rutkowska announced the general availability of the second point release of the Qubes OS 3 stable series of the security-oriented and open-source Linux-based computer operating system.

        Qubes OS 3.2 is a maintenance release, which means that it mostly adds general fixes and improvements to various of the distribution’s core components and functionalities, including the integrated management infrastructure that was introduced as part of the previous update, Qubes 3.1, allowing users to also manage the “insides” of a virtual machine.

      • Alpine Linux 3.4.4 Is Out, Ships with Linux Kernel 4.4.22 LTS, OpenSSL Patches

        Today, September 28, 2016, Alpine Linux creator and lead developer Natanael Cop has the pleasure of announcing the release of the fourth maintenance update to the latest stable Alpine Linux 3.4 server-oriented operating system series.

        Alpine Linux 3.4.4 is out as the most advanced version, powered by the recently released, long-term supported Linux 4.4.22 kernel and bringing up-to-date components to make your Alpine Linux-based server(s) more stable and reliable than ever. Most of the core components have been updated, but the most important one is OpenSSL 1.0.2j, which received the latest security fixes, just like in the rest of the GNU/Linux distros.

    • Red Hat Family

      • Software Company Red Hat banks on India to hit $ 5 billion turnover in 5 years

        Red Hat, the open-source software company, said its India business was growing at more than double the rate of the overall company and would be an important contributor to its target of reaching $5 billion in the next five years.

        Red Hat has over $2 billion in annual revenue currently and grew over 21% in constant currency last year. Open-source software is freely available, so Red Hat’s business model depends on customers paying for the support and service it offers and not on license fees, making the company’s offerings typically cheaper than proprietary software. “India is one of our fastest growing markets. Red Hat does really when there is net new infrastructure to be set up. And the rapid pace of development that India is seeing sets really well with our offerings,” James Whitehurst, CEO of Red Hat, told ET.

      • Red Hat claims headway in Asia, bets big on container and hybrid cloud

        While the smallest in terms of revenue contribution, Asia is Red Hat’s fastest growing region and is likely to continue its upwards trajectory as emerging markets roll out new infrastructure.

        Developing nations in the region were embarking on many net new infrastructure projects, rather than replacement for existing technology, and open source would be involved in a large share of such projects. The decisions on which technology to deploy would rarely be between proprietary or open source, but rather on which open source vendor to go with or to do so internally, said Red Hat President and CEO Jim Whitehurst.

      • Finance

      • Fedora

        • Node.js 6.x LTS coming to EPEL 7

          Node.js® is a JavaScript runtime built on Chrome’s V8 JavaScript engine. It uses an event-driven, non-blocking I/O model that makes it lightweight and efficient. Its package ecosystem, npm, is the largest ecosystem of open source libraries in the world. You can read more about Node.js at the project website.

        • Switched to HTTPS

          Perhaps you already noticed it, I have switched all the sites for a secured browsing using HTTPS.

          So, new addresses are:

          https://blog.remirepo.net/ for this Blog (with an automatic and permanent redirection)
          https://forum.remirepo.net/ for the Forum (with an automatic and permanent redirection)
          https://rpms.remirepo.net/ for the Repository, but classical address stay available.

        • Fedora Hubs: Getting started

          Fedora Hubs provides a consistent contributor experience across all Fedora teams and will serve as an “intranet” page for the Fedora Project. There are many different projects in Fedora with different processes and workflows. Hubs will serve as a single place for contributors to learn about and contribute to them in a standardized format. Hubs will also be a social network for Fedora contributors. It is designed as one place to go to keep up with everything and everybody across the project in ways that aren’t currently possible.

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu’s Shuttleworth Explains Why Not All Containers are the Same

            Mark Shuttleworth, the founder of Ubuntu Linux, was an early backer of OpenStack as well as containers. This week, Shuttleworth’s company Canonical announced new commercial support for Kubernetes, which is a widely deployed container orchestration and management engine.

            In an interview with Datamation Shuttleworth emphasized that it’s important to understand the different use cases for containers and what the different types of container systems are all about.

          • Ubuntu Linux 16.10 ‘Yakkety Yak’ Beta 2 open source OS now available for download
          • Canonical Jumps On The Container Management Bandwagon With A Commercial Kubernetes Offering
          • ​Ubuntu’s new take on Kubernetes
          • When two tribes go to war: Docker Swarm on the left, easier-to-install Kubernetes on the right
          • Canonical Launches Commercial Support for Kubernetes
          • Canonical Releases Snapcraft 2.18 Tool for Creating Snaps in Ubuntu 16.04 LTS

            Canonical, through Sergio Schvezov, announced the release of yet another maintenance update to the Snapcraft open-source utility that helps application developers package their apps as Snaps.

          • Ubuntu Budgie Remix 16.10 Beta 2 Officially Released with Budgie Desktop 10.2.7

            Softpedia was informed today, September 29, 2016, by David Mohammed from the budgie-remix project about the availability of the second and last Beta release of the upcoming Ubuntu Budgie Remix 16.10 operating system.

            Coming hot on the heels of yesterday’s Ubuntu 16.10 (Yakkety Yak) Final Beta release, Ubuntu Budgie Remix 16.10 Beta 2 is based on most of the GNU/Linux and Open Source technologies used in Ubuntu 16.10, such as systemd 231 and Linux kernel 4.8, but it’s built around the latest version of the beautiful Budgie desktop environment created by the Solus Project.

          • Budgie-Remix Makes Progress With Ubuntu 16.10 Base, Beta 2 Released

            Budgie-Remix, the unofficial Ubuntu spin making use of the Budgie Desktop, has released its 16.10 Beta 2 milestone following this week’s Yakkety Yak Beta 2 release.

            Budgie-Remix is re-based to the latest Ubuntu 16.10 Yakkety package changes. In addition, a number of the Budgie-0Remix packages have been working their way into Debian proper and thus are available to Ubuntu 16.10 users via the official channels. Now available this way is the budgie-desktop package, Moka icon theme, Faba icon theme, and the Arc theme. The Ubuntu repository has also pulled in the Budgie artwork and wallpaper packages too.

          • Yakkety Yak Final Beta Released
          • Canonical Launches Commercial Support for Kubernetes

            Canonical, the lead commercial vendor behind the open-source Ubuntu Linux operating system, is getting into the Kubernetes market. Canonical now offers a freely available implementation of Kubernetes as well as commercial-support options.

            “I have no doubt that Kubernetes will be one of the major container co-ordination systems,” Mark Shuttleworth, founder of Ubuntu, told ServerWatch.

          • [How To] Build an Ubuntu Controlled Sous-Vide Cooker

            I’ll be honest with you from the off: I had zero idea what sous-vide cooking was before I started writing this post. Wikipedia dutifully informs me that’s Sous-Vide is a style of cooking that involves a vacuum, bags, and steam.

          • Flavours and Variants

            • Ubuntu Studio 16.10 to Offer an Up-to-Date Multimedia Oriented Linux Distro

              We reported earlier today, September 28, 2016, on the availability of the Final Beta (Beta 2) development milestone of the upcoming Ubuntu 16.10 (Yakkety Yak) operating system and its official derivatives.

              We’ve already talked here about what’s new in the Beta 2 of Ubuntu MATE 16.10, Lubuntu 16.10, and Kubuntu 16.10, and now we would like to tell you a little bit about Ubuntu Studio 16.10, which promises to offer users an up-to-date multimedia oriented Linux-based operating system.

              That’s right, it looks like today’s Ubuntu Studio 16.10 (Yakkety Yak) Beta 2 snapshot comes with all the latest software releases and a bunch of new apps that you might need for audio, video, or graphics processing jobs. But first, we need to tell you that Ubuntu Studio 16.10 is powered by a low-latency Linux 4.8 kernel.

            • Ubuntu GNOME 16.10 Beta 2 Released with Many Apps from the GNOME 3.22 Stack

              As part of yesterday’s Ubuntu 16.10 (Yakkety Yak) Final Beta launch, some of the opt-in flavors received their Beta 2 release, including Ubuntu GNOME 16.10, about which we would like to tell you all about in this article.

            • Linux Mint’s XApps to Get Screen Blanking, Sublime-like Search Bar Lands for Xed

              We already know that work on Linux Mint 18.1, the next major release of the popular Ubuntu-based operating system loved by many users, already begun, and Clement Lefebvre shares with us today some of the improvements coming to XApps.

            • Mintbox Mini Pro

              MintBox Mini Pro

              The new model is called “Mintbox Mini Pro”, it’s just as small as the original Mintbox Mini but with much better specifications.

            • Mintbox Mini Pro Linux Mini PC Launches For $395

              This week a new version of the popular Mintbox Mini Linux PC has been launched for $395 in the form of the Mintbox Mini Pro which is now equipped with 120 GB of SSD mSATA together with 64-bit AMD A10-Micro6700T system-on-a-chip with Radeon R6 graphics and features 8GB of DDR3L.

              The latest Mintbox Mini Pro is shipped preloaded with the awesome Linux Mint 18 operating system and includes a microSD card slot a serial port, and a micro SIM card reader.
              The new Mintbox Mini Pro is the same size as the original and measures 4.3 x 3.3 x 0.9 inches in size and weighs in at around 255g. The Linux mini PC incorporates a fanless design and features an all-metal case made of aluminium and zinc.

  • Devices/Embedded

    • Expandable, outdoor IoT gateway runs Android on i.MX6

      VIA’s “Artigo A830” IoT gateway runs Android on an i.MX6 DualLite SoC and offers HDMI, GbE, microSD, numerous serial and USB ports, plus -20 to 60° operation.

      As the name suggests, the VIA Technologies Artigo A830 Streetwise IoT Platform is designed for outdoor Internet of Things gateway applications. These are said to include smart lockers, vending machines, information kiosks, and signage devices that run “intensive multimedia shopping, entertainment, and navigation applications.” The outdoors focus is supported with an extended -20 to 60°C operating range, as well as surge and ESD protection for surviving challenges such as a nearby lightning strike.

    • Raspberry Pi Announces PIXEL Desktop Environment

      Today the Raspberry Pi Foundation formally announced the Raspberry Pi PIXEL, their own desktop that will be used in future Raspbian spins.

      PIXEL is short for Pi Improved Xwindows Environment, Lightweight desktop. PIXEL is derived from the LXDE desktop environment but with both appearance and fundamental changes, including some new applications.

    • Raspberry Pi Foundation Unveils New LXDE-Based Desktop for Raspbian Called PIXEL

      Today, September 28, 2016, Raspberry Pi Foundation’s Simon Long proudly unveiled a new desktop environment for the Debian-based Raspbian GNU/Linux operating system for Raspberry Pi devices.

      Until today, Raspbian shiped with the well-known and lightweight LXDE desktop environment, which looks pretty much the same as on any other Linux-based distribution out there that is built around LXDE (Lightweight X11 Desktop Environment). But Simon Long, a UX engineer working for Raspberry Pi Foundation was hired to make it better, transform it into something that’s more appealing to users.

    • MintBox Mini updated with faster AMD SoC and 8GB RAM

      CompuLab’s Linux Mint flavored MintBox Mini Pro mini-PC updates the Mini with an AMD A10 Micro-6700T, plus BT 4.0, mini-PCIe, and twice the RAM and storage.

      The CompuLab built, $395 MintBox Mini Pro, which ships with the Linux Mint 18 Cinnamon distribution, updates the $295 MintBox Mini with a lot more performance and features in the same compact 108 x 83 x 24mm footprint. That’s considerably smaller than earlier collaborations between CompuLab and the Linux Mint project, such as the circa-2013 MintBox 2.

    • Phones

      • Android

        • ​Google beats back Oracle again in Java Android case

          To recap, Oracle claimed the 37 Java application programming interface (API) packages Google used to develop Android are covered by copyright. Of course, that’s not really the issue. True, the the US Federal Circuit Court of Appeals foolishly ruled that APIs could be copyrighted. But the US District Court for the Northern District of California ruled in May 2016 that Google’s use of the Java APIs were not subject to copyright licensing fees. Instead, Android’s use of the APIs was covered by “fair use.”

        • Google’s Open Source Fuchsia OS: The Mystery Linux Distro

          Few things are more tantalizing than a good mystery, and Google is making waves for an open source-centric mystery that may end up having profound implications. It all started in August when an extensive and unusual code repository for a new operating system called Fuchsia was discovered online, and now the growing source code set is on GitHub.

          Thus far, Google officials have been mostly mum on the aim of this operating system, although they have made a few things clear in chat forums. Two developers listed on Fuchsia’s GitHub page — Christopher Anderson and Brian Swetland — are known for their work with embedded systems. The Verge, among other sites, has made a few logical deductions about the possible embedded systems focus for Fuchsia: “Looking into Fuchsia’s code points gives us a few clues. For example, the OS is built on Magenta, a “medium-sized microkernel” that is itself based on a project called LittleKernel, which is designed to be used in embedded systems,” the site reports.

          The GitHub postings that confirm that Fuchsia is based on Magenta are particularly notable because Magenta has had applications in the embedded systems space. Here are some direct quotes: “Magenta is a new kernel that powers the Fuchsia OS. Magenta is composed of a microkernel as well as a small set of userspace services, drivers, and libraries necessary for the system to boot, talk to hardware, load userspace processes and run them, etc. Fuchsia builds a much larger OS on top of this foundation.”

        • As Blackberry pulls out of handset business it has some big patent strategy calls to make
        • Luna Launcher turns your Android phone into a kid-friendly device

          On the fence about whether your child is old enough for their own smartphone? A new app called Luna Launcher can help you warm to the idea, by offering a simple way to limit access to select apps and actions, including who they can call or text – a list you can restrict to family members, for example. Of course, because of the way it needs to interact with your phone’s operating system in order to restrict access, Luna Launcher is only available on Android.

        • Google delays launch of Android Wear 2.0 to next year

          Google’s next-generation smartwatch platform, Android Wear 2.0, will not be seeing the light of day this year. The company announced today that it is delaying the launch of the update, which was originally scheduled for this fall, to sometime in early 2017.

          Instead of launching the final version this fall, Google is extending the developer preview program for Android Wear 2.0, and today it’s releasing the third preview of the platform for developers. The company says that it is using the extra time to fine tune the software via feedback from developers, and it will have another preview build released before the end of the year. Today’s version adds a number of new features, most notable of which is the Play Store for smartwatches.

        • Moto Z series and G4 Plus getting Android 7.0 Nougat update in Q4
        • Android Wear watches aren’t connecting to the iPhone 7
        • Many Android Wear watches aren’t working with the iPhone 7
        • Google Maps gains new voice commands on Android
        • OnePlus 3 Android 7.0 Nougat update is in the works
        • Huawei will introduce its next flagship on November 3
        • This is Google Cloud and G Suite
        • Exchange email down for Android and iOS users

          Microsoft Exchange mobile users on Android and iOS users have been unable to access emails on their phones due to a planned shift away from its Exchange Active Sync (EAS) protocol.

          The issue first appeared yesterday and is still affecting users.

          One customer got in touch to say: “Exchange Mobile device access seems to be up the Swanny for iOS and Android users.” They quipped: “Fortunately neither of the Windows Mobile users are affected.”

        • Latest Fitbit Blaze firmware update finally makes the tracker worth buying

          The Fitbit Blaze is a deceptive little fitness tracker. It may look like a smartwatch on the surface, but dive a little deeper and you’ll find it’s actually missing most of the smartwatch-y features we’ve come to expect from fitness tracker/smartwatch hybrids. When we reviewed the Blaze a few months ago, the lack of third-party notification support and poor selection of watch faces were some of our biggest gripes with this tracker. Thankfully Fitbit has finally heard our cries and released a new update that fixes these issues.

        • Android Wear watches aren’t connecting to the iPhone 7

          One of Android Wear’s biggest strengths is it that the platform is designed to be cross compatible with Android and iOS. However, a number of consumers are reporting that they can’t connected a range of Android Wear smartwatches up to the new iPhone 7 or iPhone 7 Plus.

        • Multiple Android Wear smartwatches are not pairing with the iPhone 7
        • Google Allo rockets past 5 million downloads
        • BlackBerry to stop developing its own hardware, will rely on manufacturing partners instead
        • How to copy music to your Android phone
        • Spaces v1.7 adds capability to save posted images [APK Download]
        • Firefox Aurora arrives on the Play Store in “unreleased” state
        • Mercedes and Kia add new Android Auto models

          Buying a new car comes with myriad of considerations. Is it fuel efficient? Is it safe? Will it play nicely with my phone? People sometimes neglect the last one, but you’re going to be carrying the phone literally every time you get in the car, so why not make sure? Mercedes and Kia seem to get that. They’ve added support for Android Auto to a ton of new cars today.

        • Sony Xperia X Compact review: Small Android is still good, but not much better

          Sony’s Xperia X Compact is basically the newest version of the Z5 Compact that hit the US earlier this year. But just because it’s a newer version of the (comparatively) tiny handset doesn’t mean it’s an upgrade in every way. Sony is pushing the camera sensors in the X Compact and the flagship-level XZ, as well as new features like five-axis image stabilization and HDR photo mode. Sony knows cameras, so we know the shooter in the X Compact will at least be competent. However, it has to be good enough to encourage photography buffs to shell out $499 for this unlocked handset while delivering solid performance across the board as well.

        • How I Use Android: Android Central Editor Emeritus Phil Nickinson

          In the meantime, I was able to convince Phil to step out of his metaphorical kitchen for a few minutes to chat about how he uses Android in his day-to-day life. This is a man who has seen and used practically every Android device over the past several years, after all — and a fair number of apps and customization tools, to boot.

          So what devices does someone with so much knowledge carry around in his own trousers, and how does he make the most of what they have to offer?

          Enough with the suspense already. In his own words, this is how Phil Nickinson uses Android.

        • Best Android Phones Under 5.7 Inches

          There’s no question that Samsung hit a home run with its Galaxy S7 line. We already think the smaller GS7 is the best phone under 5.2 inches, and the larger, curved-screen Galaxy S7 edge is our pick for the best phone under 5.7 inches. Why? It takes everything we love about the smaller phone and makes it bigger — but not too much.

Free Software/Open Source

  • But is it safe? Uncork a bottle of vintage open-source FUD

    Most of the open source questioners come from larger organisations. Banks very rarely pop up here, and governments have long been hip to using open source. Both have ancient, proprietary systems in place here and there that are finally crumbling to dust and need replacing fast. Their concerns are more oft around risk management and picking the right projects.

    It’s usually organisations whose business is dealing with actual three dimensional objects that ask about open source. Manufacturing, industrials, oil and gas, mining, and others who have typically looked at IT as, at best, a helper for their business rather than a core product enabler.

    These industries are witnessing the lighting fast injection of software into their products – that whole “Internet of Things” jag we keep hearing about. Companies here are being forced to look at both using open source in their products and shipping open source as part of their business.

    The technical and pricing requirements for IoT scale software is a perfect fit for open source, especially that pricing bit. On the other end – peddling open source themselves – companies that are looking to build and sell software-driven “platforms” are finding that partners and developers are not so keen to join closed source ecosystems.

    These two pulls create some weird clunking in the heads of management at these companies who aren’t used to working with a sandles and rainbow frame of mind. They have a scepticism born of their inexperience with open source. Let’s address some of their trepidation.

  • Real business innovation begins with open practices

    To business leaders, “open source” often sounds too altruistic—and altruism is in short supply on the average balance sheet. But using and contributing to open source makes hard-nosed business sense, particularly as a way of increasing innovation.

    Today’s firms all face increased competition and dynamic markets. Yesterday’s big bang can easily become today’s cautionary tale. Strategically, the only viable response to this disruption is constantly striving to serve customers better through sustained and continuous innovation. But delivering innovation is hard; the key is to embrace open and collaborative innovation across organizational walls—open innovation.

    Open source communities’ values and practices generate open innovation, and working in open source is a practical, pragmatic way of delivering innovation. To avoid the all-too-real risk of buzzword bingo we can consider two definitions of “innovation”:

    creating value (that serves customer needs) to sell for a profit; or
    reducing what a firm pays for services.

  • Minijail: Running Untrusted Programs Safely by Jorge Lucangeli Obes, Google
  • Minijail: Google’s Tool To Safely Run Untrusted Programs

    Google’s Minijail sandboxing tool could be used by developers and sysadmins to run untrusted programs safely for debugging and security checks, according to Google Software Engineer Jorge Lucangeli Obes, who spoke last month at the Linux Security Summit. Obes is the platform security lead for Brillo, Google’s Android-based operating system for Internet-connected devices.

    Minijail was designed for sandboxing on Chrome OS and Android, to handle “anything that the Linux kernels grew.” Obes shared that Google teams use it on the server side, for build farms, for fuzzing, and pretty much everywhere.

    Since “essentially one bug separates you and any random attacker,” Google wanted to create a reliable means to swiftly identify problems with privileges and exploits in app development and easily enable developers to “do the right thing.”

    The tool is designed to assist admins who struggle with deciding what permissions their software actually needs, and developers who are vexed with trying to second guess which environment the software is going to run in. In both cases, sandboxing and privilege dropping tends to be a hit or miss affair.

    Even when developers use the privilege dropping mechanisms provided by the Linux kernel, sometimes things go awry due to numerous pitfalls along that path. One common example Obes cited was trying to ride a switch user function that will drop-root and then forgetting to check the result of the situation relief, or setuid function, afterwards.

  • Intel and Cloudera Give Apache an Open Source Data/Security Tool

    For the past year, we’ve taken note of the many Big Data projects that the Apache Software Foundation has been elevating to Top-Level Status. The organization incubates more than 350 open source projects and initiatives, and has squarely turned its focus to Big Data and developer-focused tools in recent months. As Apache moves Big Data projects to Top-Level Status, they gain valuable community support.

    Recently, the foundation announced that Apache Kudu has graduated from the Apache Incubator to become a Top-Level Project (TLP). Kudu is an open source columnar storage engine built for the Apache Hadoop ecosystem designed to enable flexible, high-performance analytic pipelines. And, Apache Twill has graduated as well. Twill is an abstraction over Apache Hadoop YARN that reduces the complexity of developing distributed Hadoop applications, allowing developers to focus more on their application logic. In another Apache-related Big Data move, Cloudera and Intel have announced that they’ve contributed a new open-source project to the Apache Software Foundation targeted at using Big Data analytics and machine learning for cybersecurity.

  • Twitter Open Sources Stream Processing Engine Heron

    Twitter announced the open sourcing of Heron, a stream-processing engine that is a successor to Apache Storm. Heron is backwards compatible with Apache Storm, which eases its adoption amongst developers. Heron has replaced Apache Storm as the stream data processing engine inside Twitter due to its scalability, debug-ability, ability to work in a shared cluster infrastructure and better performance. A comprehensive list of features is listed in the documentation.

  • Events

    • PyCon 2016

      I come from a place where everyone worships competitive coding and thus cpp, so the experience of attending my first pycon was much awaited for me.

      This year’s PyCon India happened in Delhi and i along with a couple of my friends reached on 23rd September, the first day. We were a bit late but it was all right because, we didn’t miss anything.

    • What do you have to say? Share it at LibrePlanet 2017
    • LibrePlanet returns March 25-26, 2017, call for proposals for annual free software conference now open

      LibrePlanet is an annual conference for free software enthusiasts. The conference brings together software developers, policy experts, activists and computer users to learn skills, share accomplishments and face challenges to software freedom. Newcomers are always welcome, and LibrePlanet 2017 will feature programming for all ages and experience levels.

      This year, the theme of LibrePlanet is “The Roots of Freedom.” This encompasses the historical “roots” of the free software movement — the Four Freedoms, the GNU General Public License and copyleft, and a focus on strong security and privacy protections — and the concept of roots as a strong foundation from which the movement grows.

      “LibrePlanet is an impactful, exciting free software conference. Attendance has grown each year, yet the community-minded atmosphere has grown even stronger,” said John Sullivan, executive director of the FSF.

    • The Linux Foundation Announces Session Lineup for MesosCon Asia

      The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the schedule for MesosCon Asia, taking place November 18-19 in Hangzhou, China.

    • Tencent: Transforming Networks with SDN

      “SDN can really transform the way we do networks,” said Tom Bie, VP of Technology & Operation of Data Center, Networking and Server, Tencent, during his Wednesday keynote address at the Open Daylight Summit. The China telecom giant should know about the issues of massive scale networks: they have more than 200 million users for QQ instant messaging, 300 million users of their payment service, and more than 800 million users of their VChat service. Bie noted that Tencent also operates one of the largest gaming networks in the world, along with video services, audio services, online literature services, news portals, and a range other digital content services.

    • The Second Wave of Platforms, an Interview with Cloud Foundry’s Sam Ramji

      In today’s world of platforms, services are increasingly connected. In the past, PaaS offerings were pretty much isolated. It’s that new connected infrastructure that is driving the growth of Cloud Foundry, the open source, service-oriented platform technology.

      Sam Ramji is CEO of Cloud Foundry, which is holding its European event in Frankfurt this week. At the conference, we spoke with Ramji to discuss, among other topics:

  • Web Browsers

    • Mozilla

      • This Week In Servo 79

        In the last week, we landed 96 PRs in the Servo organization’s repositories.

        Promise support has arrived in Servo, thanks to hard work by jdm, dati91, and mmatyas! This does not fully implement microtasks, but unblocks the uses of Promises in many places (e.g., the WebBluetooth test suite).

        Emilio rewrote the bindings generation code for rust-bindgen, dramatically improving the flow of the code and output generated when producing Rust bindings for C and C++ code.

        The TPAC WebBluetooth standards meeting talked a bit about the great progress by the team at the University of Szeged in the context of Servo.

      • Servo Web Engine Now Supports Promises, Continues Churning Along

        It’s been nearly two months since last writing about Mozilla’s Servo web layout engine (in early August, back when WebRender2 landed) but development has kept up and they continue enabling more features for this next-generation alternative to Gecko.

        The latest is that Servo now supports JavaScript promises. If you are unfamiliar with the promise support, see this guide.

        The latest Servo code has improvements around its Rust binding generator for C and C++ code plus other changes.

      • Announcing Rust 1.12

        The Rust team is happy to announce the latest version of Rust, 1.12. Rust is a systems programming language with the slogan “fast, reliable, productive: pick three.”

        As always, you can install Rust 1.12 from the appropriate page on our website, and check out the detailed release notes for 1.12 on GitHub. 1361 patches were landed in this release.

      • Rust 1.12 Programming Language Released

        Rust 1.12 has been released as the newest version of this popular programming language with a focus on “fast, reliable, productive: pick three.”

  • SaaS/Back End

  • Databases

    • Riak TS for time series analysis at scale

      Until recently, doing time series analysis at scale was expensive and almost exclusively the domain of large enterprises. What made time series a hard and expensive problem to tackle? Until the advent of the NoSQL database, scaling up to meet increasing velocity and volumes of data generally meant scaling hardware vertically by adding CPUs, memory, or additional hard drives. When combined with database licensing models that charged per processor core, the cost of scaling was simply out of reach for most.

      Fortunately, the open source community is democratising large scale data analysis rapidly, and I am lucky enough to work at a company making contributions in this space. In my talk at All Things Open this year, I’ll introduce Riak TS, a key-value database optimized to store and retrieve time series data for massive data sets, and demonstrate how to use it in conjunction with three other open source tools—Python, Pandas, and Jupyter—to build a completely open source time series analysis platform. And it doesn’t take all that long.

    • PostgreSQL 9.6 released

      PostgreSQL 9.6, the latest version of the world’s leading open source database, was released today by the PostgreSQL Global Development Group. This release will allow users to both scale up and scale out high performance database workloads. New features include parallel query, synchronous replication improvements, phrase search, and improvements to performance and usability, as well as many more features.

    • PostgreSQL 9.6 Officially Released With Parallel Query Support
  • Oracle/Java/LibreOffice

    • LibreOffice Office Suite Celebrates 6 Years of Activity with LibreOffice 5.2.2

      Today, September 29, 2016, Italo Vignoli from The Document Foundation informs Softpedia via an email announcement about the general availability of the first point release of the LibreOffice 5.2 open-source and cross-platform office suite.

      On September 28, the LibreOffice project celebrated its 6th anniversary, and what better way to celebrate than to push a new update of the popular open source and cross-platform office suite used by millions of computer users worldwide. Therefore, we would like to inform our readers about the general availability of LibreOffice 5.2.2, which comes just three weeks after the release of LibreOffice 5.2.1.

      “Just one day after the project 6th anniversary, The Document Foundation (TDF) announces the availability of LibreOffice 5.2.2, the second minor release of the LibreOffice 5.2 family,” says Italo Vignoli. “LibreOffice 5.2.2, targeted at technology enthusiasts, early adopters and power users, provides a number of fixes over the major release announced in August.”

    • LibreOffice at 6, New Souped up Mint Mini

      September 28 was the official birthday for LibreOffice and Italo Vignoli looked back at some of the milestones for the project. Elsewhere, the Ubuntu family got new betas and Clement Lefebvre announced a new Mintbox Mini. Jack M. Germain reviewed Panther OS and Ryan Lynch recommended four distributions for Windows users.

      Happy Birthday LibreOffice! It was officially six years ago September 28 that The Document Foundation and LibreOffice were announced. The project consisted of former OpenOffice.org developers and volunteered who feared the worst after its sale to Oracle. Since that time, LibreOffice has grown and matured into an award winning Open Source office suite. Group photos taken at the LibreOffice conference at Brno were also shared including one of the attendees who were there on day one, as Bjoern Michaelsen explained. Although they were the seed, the project has grown to hundreds of contributors from all over the world. Italio Vignoli said the project attracted new developers every month for 72 straight months. He also said tomorrow begins the LibreOffice 5.3 developmental cycle, which is planned for release in January 2017.

    • Merging Communities
    • Happy 6th Birthday, LibreOffice
    • LibreOffice 5.2.2 Now Available to Download
  • Pseudo-Open Source (Openwashing)

  • BSD

    • FreeBSD 11.0-RELEASE Needs To Be Respun Due To Security Issues

      The delayed FreeBSD 11.0 release just suffered another last-minute set-back. While “FreeBSD 11.0-RELEASE images” were distributed to FTP mirrors and the official announcement expected today, these images need to be re-spun to contain some security fixes and thus pushing back the official release.

      Glen Barber noted today on the mailing list, “Although the FreeBSD 11.0-RELEASE has not yet been officially announced, many have found images on the Project FTP mirrors. However, please be aware the final 11.0-RELEASE will be rebuilt and republished on the Project mirrors as a result of a few last-minute security fixes we feel are imperative to include in the final release.”

    • FreeBSD 11.0 Operating System Lands October 5 Due to Last-Minute Security Issues

      A few minutes ago, Glen Barber informed the FreeBSD community that they should not hurry and install the ISO images of the FreeBSD 11.0 operating system made available a few days ago on the official FTP mirrors.

      These images aren’t safe to use and contain various security vulnerabilities that need to be fixed before the FreeBSD Project will officially unveil the final release of the FreeBSD 11.0 operating system in the coming days. According to the release schedule, FreeBSD 11.0 should hit the streets later today, September 29, 2016.

      However, until then the FreeBSD development team is hard at work patching those nasty security issues and rebuilding the final ISO images, which will be made available on the respective FTP mirrors later today as FreeBSD 11.0-RELEASE-p1. If you’re already running FreeBSD 11.0-RELEASE, you will soon be provided with instructions to safely update your system

    • OpenBSD Founder Calling For LLVM To Face A Cataclysm Over Its Re-Licensing

      For over one year there’s been talk of LLVM pursuing a mass relicensing from its University of Illinois/NCSA Open Source License, which is similar to the three-clause BSD license, to the Apache 2.0 license with explicit mention of GPLv2 compatibility. As mentioned in that aforelinked article, this re-licensing is moving ahead.

  • FSF/FSFE/GNU/SFLC

    • Free Software Directory meeting recap for September 23rd, 2016
    • Don’t be a stranger to GIMP, be GIMP…

      I can try and do more coding, more code reviewing, revive designing discussions… that’s cool, yet never enough. GIMP needs more people, developers, designers, community people, writers for the website or the documentation, tutorial makers… everyone is welcome in my grand scheme!

      Many of my actions lately have been towards gathering more people, so when I heard about the GNOME newcomers initiative during GUADEC, I thought that could be a good fit. Thus a few days ago, I had GIMP added in the list of newcomer-friendly GNOME projects, with me as the newcomers mentor. I’ll catch this occasion to remind you all the ways you can contribute to GIMP, and not necessarily as a developer.

  • Public Services/Government

    • EC approves Slovenia courts data exchange solution

      First CEF AS4-compliant b2b solution developed as open source by a public administration

      The European Commission has tested and approved Laurentius, an eDelivery court documents and case exchange solution compliant with the AS4 profile of the OASIS ebMS standard. In September, Laurentius passed all tests by the EC’s Connecting Europe Facility (CEF) for its so-called “e-SENS AS4 conformant solutions”.

  • Programming/Development

    • SDL 2.0.5 Is Readying For Release: Relative Mouse Mode For Wayland/Mir, Audio Capture

      SDL 2.0 point releases have ranged from being a few months apart to as much as two years apart. Fortunately, SDL 2.0.5 is now being put together for release just nine months after SDL 2.0.4.

      With the Mercurial repository, Sam Lantinga bumped the version in preparation for the SDL 2.0.5 release. The SDL 2.0.5 release hasn’t officially happened yet, but it should be here soon.

  • Standards/Consortia

    • Open standards default at Slovenia supreme court

      The use of open ICT standards is an IT requirement at Slovenia’s Supreme Court, responsible for the IT support of the entire court system in the country. The Supreme Court’s IT department has a strong preference for the development of modular, reusable software solutions. This strategy provides agility and flexibility, says Bojan Muršec, director of IT.

      The focus on open standards frees up the IT department to concentrate on the business, Muršec says. The IT department takes the modular approach serious: the first reusable module ever developed by the court – a court documents dispatch and delivery system – is re-used by all IT systems across the courts. “Making everything reusable prevents creation of silos in the organisation”, the IT director says.

      A positive side effect of the IT strategy is that the court uses mostly open source software solutions. This in turn helps to keep IT costs down, says the IT director, who estimates that the court saves EUR 400 to 500 thousand per year on licence fees: “The cost of proprietary licences always goes up.”

    • Why there is no CSS4 – explaining CSS Levels

      We had CSS1, and CSS2. We even had CSS2.1 and we then moved onto CSS3 – or did we? This post is a quick explanation of how CSS is versioned today.

      CSS versions 1 and 2 were monolithic specifications. All of CSS was included in one massive document. Selectors, positioning, colour – it was all in there.

      The problem with monolithic specifications is that in order to finish the spec, every component part also has to be finished. As CSS has grown in complexity, and new features are added, it doesn’t make sense to draw a line at which all work is stopped on all parts of CSS in order to declare that CSS version finished. Therefore, after CSS2.1 all the things that had been part of the 2.1 specification were broken down into modules. As the new CSS modules included all that had gone before plus any new features, they all came into being at Level 3. Hence CSS3, and people like me who understood CSS as a single specification referred to the group of Level 3 modules as “CSS3”.

Leftovers

  • Science

    • 6 Ways Driverless Cars Are Going To Kill Lots Of People

      You’ve probably read a few articles about driverless cars over the past couple of years. The technology is coming along quickly, with fleets of test cars already on the roads in some states. It seems like soon we’ll achieve the American dream of stuffing our faces and texting all we want while still managing to avoid public transportation.

      But the reality is quite different. We’re diving into this technology a little too quickly and ignoring all the warning signs about how we are going to screw up on the way to Driverless Car Utopia.

  • Health/Nutrition

    • Reporter who quit on air to fight for cannabis legalization could face prison

      Charlo Greene did not plan to curse on live television, but on 22 September 2014, the words came pouring out.

      Then a reporter for KTVA, a station in Alaska, Greene ended her segment on marijuana by revealing that she was a proponent of legalization – and was the owner of the Alaska Cannabis Club, the subject of her news report.

      “Fuck it, I quit,” she said, before abruptly walking off camera. The 26-year-old’s stunt shocked her colleagues and made her a viral sensation overnight.

    • Marijuana Arrests Are At a 20-Year Low

      Marijuana-related arrests are the lowest they’ve been in 20 years, but someone’s still getting busted for weed a little more than once every minute.

      According to new statistics released by the FBI on Monday, there were 574,641 arrests in 2015 for marijuana possession, which is the lowest it’s been since 1996. Between 2011 and 2014, possession arrests hovered above 600,000. And since possession arrests peaked at 800,000 in 2007, that’s a 25 percent decrease.

      As pot gets increasingly normalized, with 10 states considering medical or adult use marijuana legalization in this year’s election, law enforcement may be less likely to see it as a threat. The divide between federal and state laws is also becoming an increasingly absurd policy to enforce. Even Hillary Clinton mentioned in Monday’s debate that the prevalent prison sentences for nonviolent crimes, like marijuana possession, are unnecessary.

      The drop in weed possession arrests likely results from from adult use policies in places like Colorado, where all marijuana-related arrests have plummeted in recent years, Paul Armentano, deputy director of the National Organization for the Reform of Marijuana Laws, told Motherboard. “The recent decline in arrests in New York City, as well as in other major metropolitan areas that have imposed decriminalization ordinances in recent years, is also likely playing a role in this nationwide decline.”

    • House passes waterways bill with Flint aid

      The House easily passed a major waterways bill on Wednesday that included a bipartisan compromise to address the drinking-water crisis in Flint, Mich.

      A late-night deal on Flint aid helped resolve Democratic opposition to a stop-gap spending bill that lacked emergency funding for the city, paving the way for Senate passage of a continuing resolution earlier in the day and ending the threat of a government shutdown.

      In a 399-25 vote, House lawmakers approved the Water Resources and Development Act (WRDA), which authorizes dozens of water-related infrastructure projects around the country.

      Lawmakers adopted numerous amendments during floor debate, including one from Reps. Dan Kildee (D-Mich.) and John Moolenaar (R-Mich.) that would authorize up to $170 million for Flint.

      “We decided we don’t want to create brinksmanship. That doesn’t do anybody any good,” House Speaker Paul Ryan (R-Wis.) said Wednesday at the Economic Club of Washington, D.C.

    • Farming mega-mergers threaten food security, say campaigners

      When an Indian farmer plants his cotton crop, there’s at least a 75% chance the seeds have been been bought from a company owned by Monsanto. If a Latin American farmer sprays insecticide on her genetically engineered soya beans, the chemical is more than likely to have been provided by German chemical and drugs company Bayer or by US firm Dupont.

      And when African farmers add chemicals to their maize fields or plant it’s odds-on that they have come from Swiss company Syngenta.

      Until recently, six or seven global agri-food businesses competed with each other for a share of the world market for seeds and chemicals. But if EU and US regulators allow a series of mega-mergers to take place, within months just three companies will be left in control of nearly 60% of the world’s seeds, nearly 70% of the chemicals and pesticides needed to grow food and nearly all of the world’s GM crop genetic traits.

    • Should Kratom Be Banned? Here’s What the Experts Say

      While lots of people reading this are patiently waiting for marijuana legalization to finally reach their state — most likely passing the time by smoking marijuana — lots of others are about to see Prohibition show up at their door for the first time. They are the “kratom” users. That’s a plant-based painkiller which some people describe as “herbal heroin.” It was, up until now, completely legal. I first used it back in 2009 — not because I was in pain, but because I wanted to get high without failing a drug test (like many painkillers, you can also take it for fun). Then, a couple of years ago, I introduced kratom to someone who does live with chronic pain — Cracked contributor Marina Reimann.

  • Security

    • security things in Linux v4.5
    • Time to Kill Security Questions—or Answer Them With Lies

      The notion of using robust, random passwords has become all but mainstream—by now anyone with an inkling of security sense knows that “password1” and “1234567” aren’t doing them any favors. But even as password security improves, there’s something even more problematic that underlies them: security questions.

      Last week Yahoo revealed that it had been massively hacked, with at least 500 million of its users’ data compromised by state sponsored intruders. And included in the company’s list of breached data weren’t just the usual hashed passwords and email addresses, but the security questions and answers that victims had chosen as a backup means of resetting their passwords—supposedly secret information like your favorite place to vacation or the street you grew up on. Yahoo’s data debacle highlights how those innocuous-seeming questions remain a weak link in our online authentication systems. Ask the security community about security questions, and they’ll tell you that they should be abolished—and that until they are, you should never answer them honestly.

      From their dangerous guessability to the difficulty of changing them after a major breach like Yahoo’s, security questions have proven to be deeply inadequate as contingency mechanisms for passwords. They’re meant to be a reliable last-ditch recovery feature: Even if you forget a complicated password, the thinking goes, you won’t forget your mother’s maiden name or the city you were born in. But by relying on factual data that was never meant to be kept secret in the first place—web and social media searches can often reveal where someone grew up or what the make of their first car was—the approach puts accounts at risk. And since your first pet’s name never changes, your answers to security questions can be instantly compromised across many digital services if they are revealed through digital snooping or a data breach.

    • LibreSSL and the latest OpenSSL security advisory

      Just a quick note that LibreSSL is not impacted by either of the issues mentioned in the latest OpenSSL security advisory – both of the issues exist in code that was added to OpenSSL in the last release, which is not present in LibreSSL.

    • Record-breaking DDoS reportedly delivered by >145k hacked cameras

      Last week, security news site KrebsOnSecurity went dark for more than 24 hours following what was believed to be a record 620 gigabit-per-second denial of service attack brought on by an ensemble of routers, security cameras, or other so-called Internet of Things devices. Now, there’s word of a similar attack on a French Web host that peaked at a staggering 1.1 terabits per second, more than 60 percent bigger.

      The attacks were first reported on September 19 by Octave Klaba, the founder and CTO of OVH. The first one reached 1.1 Tbps while a follow-on was 901 Gbps. Then, last Friday, he reported more attacks that were in the same almost incomprehensible range. He said the distributed denial-of-service (DDoS) attacks were delivered through a collection of hacked Internet-connected cameras and digital video recorders. With each one having the ability to bombard targets with 1 Mbps to 30 Mbps, he estimated the botnet had a capacity of 1.5 Tbps.

      On Monday, Klaba reported that more than 6,800 new cameras had joined the botnet and said further that over the previous 48 hours the hosting service was subjected to dozens of attacks, some ranging from 100 Gbps to 800 Gbps. On Wednesday, he said more than 15,000 new devices had participated in attacks over the past 48 hours.

    • Security updates for Thursday
    • How 1.5 Million Connected Cameras Were Hijacked to Make an Unprecedented Botnet

      Last week, hackers forced a well-known security journalist to take down his site after hitting him for more than two days with an unprecedented flood of traffic.

      That cyberattack was powered by something the internet had never seen before: an army made of more than one million hacked Internet of Things devices.

      The hackers, whose identity is still unknown at this point, used not one, but two networks—commonly referred to as “botnets” in hacking lingo—made of around 980,000 and 500,000 hacked devices, mostly internet-connected cameras, according to Level 3 Communications, one of the world’s largest internet backbone providers. The attackers used all those cameras and other unsecured online devices to connect to the journalists’ website, pummeling the site with requests in an attempt to make it collapse.

    • NHS Hospitals Are Running Thousands of Computers on Unsupported Windows XP

      Hospitals across England are running thousands of out-of-date Windows XP machines, potentially putting patient data and other sensitive information at risk.

      Motherboard has found that at least 42 National Health Service (NHS) trusts in England are still using the Windows XP operating system, with many of them confirming that they no longer receive security updates for the software. Legal experts say that the NHS hospitals may be in breach of data protection regulations.

      “If hospitals are knowingly using insecure XP machines and devices to hold and otherwise process patient data they may well be in serious contravention of their obligations,” Jon Baines, Chair of the National Association of Data Protection and Freedom of Information Officers (NADPO), wrote in an email.

      In April 2014, Microsoft officially ended support for Windows XP, meaning that the company would no longer release security patches for the aging operating system. Any vulnerabilities discovered after that date would therefore be left for hackers to exploit. Governments and businesses could pay Microsoft for a custom extended support deal; the Crown Commercial Service, which is sponsored by the Cabinet Office, spent £5.5 million ($9 million) to continue receiving updates for the public sector, including for the NHS. That agreement ended in April 2015 and was not renewed.

    • Linux.Mirai Trojan causing mayhem with DDoS attacks

      A Trojan named Linux.Mirai has been found to be carrying out DDoS attacks.

      The malicious program first appeared in May 2016, detected by Doctor Web after being added to its virus database under the name Linux.DDoS.87. The Trojan can work with with the SPARC, ARM, MIPS, SH-4, M68K architectures and Intel x86 computers.

  • Defence/Aggression

    • Does Free College Threaten Our All-Volunteer Military?

      Does free college threaten our all-volunteer military? That is what writer Benjamin Luxenberg, on military blog War on the Rocks says. But the real question goes deeper than Luxenberg’s practical query, striking deep into who we are as a nation.

      Unlike nearly every other developed country, which offer free or low cost higher education (Korea’s flagship Seoul National University runs about $12,000 a year, around the same as Oxford), in America you need money to go to college. You need the bucks for tuition and books, and for most students, you need the bucks to not work full-time for a couple of years. Typical of America’s top end schools, Harvard charges $63,000 for tuition, room, board and fees. That’s more than a quarter of a million dollars for a degree. Even a state school wants $40,000 a year.

    • White House Is Profoundly Wrong About the Most Embarrassing Thing Senate Has Done

      The White House reacted harshly to the Senate’s overwhelming vote on Wednesday to override President Obama’s veto of a bill that would enable the family members of 9/11 victims to sue the Kingdom of Saudi Arabia in U.S. Courts.

      Press Secretary Josh Earnest called it “the single most embarrassing thing the United States Senate has done possibly since 1983.”

      As it happens, the White House’s principled opposition to the bill was based on its worry that it would open the door to lawsuits from foreigners accusing the U.S. government of crimes, possibly including the killing of hundreds of thousands of people in Iraq and Afghanistan, torture, deaths of innocent people with drones, and global mass surveillance.

      That makes Earnest’s comment the single most hyperbolic thing he’s said since — well — ever.

    • ‘Peace With Justice Is Still a Long Way Away’ – CounterSpin interview with Mario Murillo on Colombian accords

      The peace deal signed between the government of Colombian President Juan Manuel Santos and the FARC, the largest and oldest insurgency in Latin America, is historic. More than 50 years of fighting have killed more than 220,000 Colombians, overwhelmingly poor civilians. These years have seen executions, disappearances, detentions, torture. The violence has forced some 7 million people from their homes, the largest number of internally displaced people in the world.

    • Forget Blairite Propaganda. Sierra Leone was not Blair’s “Good War”.

      This was my speech to the World Beyond War conference at American University, Washington DC on 24 September.

    • Is Your Nation The Exceptional One?

      Nations such as this just don’t have what it takes to be Exceptional. They may have a few nice traditions that mark them out from other nations, and may even be very nice people. But Exceptional? Get out of here!

    • Can Russia Learn From Brazil’s Fate?

      Everyone should read Engdahl’s article. He reports that part of the attack on Rousseff stemmed from Brazil’s economic problems deliberately created by US credit rating agencies as part of Washington’s attack to down grade Brazilian debt, which set off an attack on the Brazilian currency, the cruziero.

      Brazil’s financial openness made Brazil an easy target to attack. One might hope that Vladimir Putin would take note of the cost of “economic openness.” Putin is a careful and thoughtful leader of Russia, but he is not an economist. He has confidence in neoliberal Elvira Nabiulina, Washington’s choice to head the Russian central bank. Nabiulina is unfamiliar with Modern Monetary Theory, and her commitment to “economic openness” leaves the Russian economy as exposed as Brazil’s to Washington destabilization. Nabiuina believes that the assault on the ruble is due to impersonal “global market forces,” not to Washington’s financial clout.

    • British Parliament Confirms Libya War Was Based On Lies … Turned Nation Into a “Shit Show” … Spread Terrorism

      The UK Parliament just confirmed what the alternative media has been saying for years.

      Specifically, a new report from the bipartisan House of Commons Foreign Affairs Committee – based on interviews with all of the key British decision-makers, review of documents, and on-the-ground investigations in Africa – found that the Libyan war was based on lies, that it destroyed the country, and that it spread terrorism far and wide.

    • Trump Promises No First Nuclear Strike, Sort of; New Bill Would Make it Illegal

      Donald Trump tried to ease fears about his finger being on the nuclear button during Monday night’s presidential debate, declaring that “I would certainly not do first strike.” He added: “Once the nuclear alternative happens, it’s over.”

      But moments later, the Republican presidential nominee seemed to backpedal, claiming that he “can’t take anything off the table.”

      Two members of Congress don’t want Trump to have the option.

      Responding to the majority of Americans who say they would not trust Trump with the nuclear arsenal, Sen. Edward Markey, D-Mass, and Rep. Ted Lieu, D-Calif., introduced legislation Tuesday that would bar the president from conducting a nuclear strike unless Congress had issued a formal declaration of war.

    • Clinton’s Faulty New Scheme to ‘Fight’ ISIS

      Even as Hillary Clinton pushes a new scheme for defeating ISIS, the reality is that contradictory U.S. policies in the Mideast that she helped formulate are fueling the growth of jihadi extremism, writes Daniel Lazare.

    • Congress overrides Obama’s veto of 9/11 bill

      Families of those killed in the terror attacks on 9/11 are now legally allowed to sue Saudi Arabia, after Congress voted Wednesday to override President Barack Obama’s veto of the legislation, the first override of his presidency.

      The votes by the House and Senate were overwhelming. Members of both parties broke into applause on the House floor after the vote.

      The Senate approved the override on a 97-1 vote, with Senate Minority Leader Harry Reid the lone Senator voting to sustain the president’s veto. Hours later, the vote in the House was 348-77, with one Democratic member voting “present.”

      White House spokesman Josh Earnest said aboard Air Force One before the House had voted that the Senate’s override is the “single most embarrassing thing the Senate has done since 1983,” referring to the last time the Senate overrode a veto by such a large margin.

    • Barack Obama brands Congress decision on Saudi 9/11 lawsuits bill ‘a mistake’

      Barack Obama says Congress is making a “mistake” and setting “a dangerous precedent” by passing a bill that would allow families of 9/11 victims to sue the Saudi government for damages.

      Both the Senate and the House of Representatives voted by an overwhelming majority to override the President’s veto of the Justice Against Sponsors of Terrorism Act (JASTA).

      The votes on Wednesday afternoon were the first time in the whole of Mr Obama’s presidency that he has been overruled by Congress.

      And speaking on CNN in the wake of the decision, Mr Obama warned that it left the US exposed to lawsuits from people around the world who have been affected by American foreign policy.

    • 9/11 bill veto override angers Saudi Arabia, Gulf nations: We “will stand by Saudi Arabia in every way possible”

      Saudi Arabia’s lobbying and warnings to Congress were not enough to blunt the passing of legislation allowing families of Sept. 11 victims to sue the kingdom for the attacks.

      The oil-rich country, which has a long but often troubled relationship with Washington, maintains an arsenal of diplomatic and commercial tools it could respond with.

      They include curtailing official contacts, pulling billions of dollars from the U.S. economy, and persuading its close allies in the six-member Gulf Cooperation Council it dominates to scale back counterterrorism cooperation, investments and U.S. access to important regional air bases.

    • Sudanese government ‘killing hundreds of civilians with chemical weapons attacks’ in Darfur – Amnesty

      The Sudanese government has been accused of launching chemical weapon attacks on its own civilians, killing hundreds of people including scores of children, in what would be a dramatic escalation of the Darfur conflict.

      Amnesty International says it has compiled the first credible body of evidence to suggest the forces of President Omar al-Bashir bombed swathes of the crisis-hit Jebel Marra region with chemical agents.

      The charity has released before-and-after satellite images, photographs of horrific burn wounds on children and evidence from more than 200 interviews, and called for a United Nations investigation.

      Chemical weapons attacks on the African continent in the post-war era have been extremely rare, and even the accusation that it has carried them out could represent a major setback for Sudan’s improving relations with the international community.

      But it also serves to highlight the ongoing armed conflict in Darfur that, since the peak of the violence and international attention in 2003, has continued to rage more or less unnoticed.

  • Environment/Energy/Wildlife/Nature

    • Palm oil company with links to Tory donors accused of failing to prevent ‘thousands of acres’ of rainforest being destroyed

      A palm oil company with links to Tory party donors and friends of David Cameron has been accused of failing to prevent massive fires devastating the rainforest.

      The firm, called Astra Agro Lestari, is a subsidiary of multi-billion dollar conglomerate Jardine Matheson, which owns major retail outlets, a string of luxury hotels and construction firms – as well as selling second-hand cars – mostly in Asia.

      Jardines is largely controlled by the well-connected Keswick family, descendants of its founders as an opium trader in 19th century China.

      David Cameron’s father Ian was a friend of the Keswicks and worked as a stockbroker to the family. In the 1980s, the future Prime Minister briefly worked at the company’s office in Hong Kong.

    • Trump’s Campaign Is Trying to Cover Up His Lies About Climate Change

      In a delicious turn of events at this week’s presidential debate, Donald Trump received his comeuppance over a four-year-old tweet in which he denounced climate change.

      On stage, his opponent, Hillary Clinton, referenced the tweet from 2012, and remarked that “Donald Trump thinks that climate change is a hoax perpetrated by the Chinese.” His reply? An easily fact-checked lie. “I did not. I do not say that,” he scrambled to say, like a child who’s been caught with his hand in the cookie jar.

    • Finnish firm creates roofing with integrated solar cells

      A Finnish sheet metal manufacturer has teamed up with MiaSolé, an American company that manufactures thin-film photovoltaic products. The film is integrated into the roofing material at Virte’s Turku factory.

      CEO Jaakko Virtanen is excited about integrated solar electricity systems.

      “I’ve dreamed of building materials that would themselves generate electricity, from roofs, windows and wall. Now that’s becoming a reality,” he tells Yle.

    • Earth is locked into 5 degrees Celsius of global warming? Not so fast.

      On Tuesday, a new climate study sent media outlets into a frenzy. News articles declared that Earth was “locked into” 5 Celsius degrees of warming – an exceptionally dire forecast, since most climate scientists warn that a boost of just 2 degrees C. would be catastrophic.

      But fortunately for coral reefs and coastal communities, scientists now say that prediction was wrong.

      It was Gavin Schmidt, director of NASA’s Goddard Institute for Space Studies, who led the charge. Dr. Schmidt was perhaps the most vocal of a group of prominent dissenters, all of whom insist that the actual committed warming estimate hovers around 0.5-1 degrees C. That number, while still significant in terms of global effects, is a far cry from the initial findings. So what caused the discrepancy: bad science or bad science journalism?

  • Finance

    • Passengers in Uber’s self-driving cars waived right to sue for injury or death

      Anyone requesting an Uber ride in a 12-sq mile area in the center of Pittsburgh might now be randomly allocated a self-driving Ford Fusion rather than a human-operated vehicle.

      But passengers riding in Uber’s computer-controlled cars today might be surprised at just how experimental the technology is. According to documents obtained by the Guardian under public records laws, until as recently as June anyone not employed by Uber riding in one of its autonomous vehicles (AVs) had to sign a legal document waiving the company of any liability for their injury or death.

      One senior Pittsburgh police officer signed a waiver on 23 June: “I acknowledge that some or all of the AVs in which I ride are in a development phase, are experimental in nature, and that riding in an AV may involve the potential for death, serious injury, and/or property loss.”

      The document was required by Uber’s Advanced Technologies Center (ATC), a research hub that in early 2015 hired dozens of robotics experts from nearby Carnegie Mellon University. Since then the ATC has been working furiously to catch up with the likes of Google and Tesla in self-driving technology – a task Uber CEO Travis Kalanick has described as “basically existential for us”.

    • The Questions That Should Be Being Asked About Trump’s Tax Returns

      A lot has been said about Trump’s refusal to make his tax returns public. But despite the volume of commentary, it’s not clear the right questions even are being asked.

      Trump claims he can’t release his returns because he’s under audit. At some level, that’s a legitimate concern. It would hardly be fair if thousands of tax professionals who oppose Trump politically helped the IRS by publishing their own analyses of the returns. Ultimately, however, it’s a phony excuse.

      But rather than challenge the logic behind Trump’s refusal to release returns, a series of questions should be asked:

      First, what tax years are under audit? Does it go back beyond 2012? If not, can the 2011 return be released? After all, the statute of limitations on the audit of that year has passed, so there’s no exposure to Trump by releasing that return. If not 2011, how about 2010?

      Second, why haven’t the audit notices been released? An audit notice is a short, generic letter from the IRS stating that a taxpayer’s return has been selected for examination. There’s nothing so sensitive in such a generic notice that it could not be made public. At this point, Trump has not even offered up this most basic evidence that he is really even under audit. Why hasn’t proof been demanded?

    • Brexit – who has the power to change UK law?

      Another way of seeing the inconsistency of the Government argument is this. If the Crown has the power to leave the EU without Act of Parliament, then it has always had it. The Referendum Act contains no provision that alters the constitutional position – it provided for a referendum on EU membership, defining the question to be asked, but without specifying what was to be done with the result. For that reason it is often referred to as “advisory”. Therefore, if the Government has the power to take the UK out of the EU today, then it equally had the power one year ago. But I do not think anyone would have seriously argued before the Referendum that the Government could take the UK out of the EU under prerogative power without any Parliamentary approval.

    • Britain’s backdoor to EU influence

      The U.K. has launched a behind-the-scenes diplomatic effort to influence EU affairs during the Brexit process by offering to lend officials to two small countries that will hold the bloc’s presidency next year.

      Britain gave up its six-month slot in the rotating presidency calendar, which had been scheduled for the second half of 2017, after other countries felt it would be inappropriate to have the U.K. setting the political agenda for a union it had voted to leave. But soon after the June referendum, London began hedging its bets by trying to position officials in Malta and Estonia, which will take their turns in the presidency next year.

  • AstroTurf/Lobbying/Politics

    • Donald Trump’s Roger Rabbit Moment

      As usual, what may have been most important is what went unsaid. The phrase “income inequality” came up only once, and that was from moderator Lester Holt. There was little mention of education or health care; some talk of energy policy but almost nothing on global warming other than Clinton’s reference to Trump claim that climate change is a hoax perpetrated by the Chinese (last night he denied ever saying it, but he has).

      And absolutely no mention of the ruinous influence of money in politics, which in retrospect made it a bit jarring that when Bill and Chelsea Clinton entered the debate auditorium they sat next to Vernon Jordan, a close family friend and adviser, certainly, but also senior counsel at Akin Gump, the biggest and most profitable lobbyist in Washington, prime peddlers of influence and privilege on Capitol Hill.

    • NYT Makes Bill Clinton’s Sex Life the Lead Story–Without Mentioning Trump’s

      Now we know how candidates can get a piece of information featured in the lead story of the New York Times: They just need to declare that they aren’t going to talk about it during a national debate.

      Thus Donald Trump’s cryptic last-minute debate comment—”I was going to say something…extremely rough to Hillary, to her family, and I said to myself, ‘I can’t do it. I just can’t do it. It’s inappropriate. It’s not nice’”—was unfolded into a piece in the top right corner of the Times‘ front-page (9/27/16), arguably the most valuable journalistic real estate in the United States, about Bill Clinton’s extramarital affairs.

    • Lester Holt Asks Zero Questions About Poverty, Abortion, Climate Change

      Presidential debates do as much to illustrate corporate media priorities as they do to showcase the candidates. They provide a snapshot into what the media, in this case represented by NBC’s Lester Holt, prioritizes as issues worthy of discussion.

      A week before the debate, Comcast-owned NBC announced the topics, and one could already tell we weren’t going to be in for a substantive evening: “Achieving prosperity,” “America’s direction” and “securing America.” This generic approach lead to a generic debate that focused mostly on horserace disputes and vague, open-ended questions about taxes and jobs.

      Holt didn’t ask any questions about the following topics: poverty, abortion, climate change, immigration, healthcare, student debt, privacy, LGBTQ rights or drug policy. (NBC reported before the debate that abortion and immigration were two of the policy issues that voters were most interested in, as indicated by Google searches, along with the economy and police shootings.)

      What was discussed: jobs, Trump’s tax returns, who did or didn’t support the Iraq War, raising taxes on the rich, race (framed mostly in a way that pandered to Trump’s theme of a country in disarray), Russian cyberattacks, ISIS, Obama’s birth certificate, Clinton’s physical appearance and whether the candidates would accept the election results.

    • Blow-by-Blow Analysis of the Decisive Moment of the Debate – through the eyes of a former debate coach

      I wasn’t planning to do a second blog about ‘the debate’ but two days after it, as we start to await the first polling to show its impact, I feel the need to write one more blog. I do believe this debate decided the election. I think many will come back to look at that Monday night as the time when Trump folded, and some will also see the brilliance of how Hillary skewered Trump and trapped him to make that debate far worse for Trump than it might have been. So, with the very rare opportunity for me to write a debate review on this blog, why not do something more serious about the blow-by-blow. How did it go? Lets get into the weeds. How did Hillary demolish Trump. I am using the full recording of the debate via Real Clear Politics which had the ABC network feed.

      Trump needed to remain Presidential throughout the first debate, he’d then get something near a tie. Hillary had to clearly win the debate, a tie was not good enough, she was expected to be the superior debater and had to now deliver.

    • Stein trolls Johnson on world leaders gaffe, also fails to name world leaders

      May, Stédile, and Corbyn, however, aren’t technically world leaders, as none holds a top position in their country’s government. May is a member of the Canadian House of Commons. Stédile is an economist and member of Brazil’s Landless Rural Workers Movement, which he helped found. Corbyn is the leader of the Labour Party in Britain.

      Johnson, sitting with Libertarian vice presidential nominee Bill Weld, was asked by MSNBC’s Chris Matthews to “name one foreign leader that you respect and look up to.” Johnson couldn’t name any.

    • Sunday Paper Q&A: Jill Stein

      You may not realize it, but there are actually two women running for president this year. In addition to Hillary Clinton, the first female major-party candidate, voters also have the choice to elect Jill Stein, who represents the Green Party.

      Stein is a practicing physician and an environmental health advocate. While her low polling numbers prevented her from participating in the first debate, Stein remains committed to her campaign. She exclusively sat down with us for this week’s Sunday Paper Q&A to explain why she’s motivated to stay in the race.

    • Endorsement: Libertarian Gary Johnson for president

      Today this newspaper does something it has never done in its 143-year history: endorse someone other than the Republican candidate in a presidential contest.

      Since its founding in 1873, The Detroit News has backed a Republican every time it has made a presidential endorsement (three times we have sat on the sidelines — twice during the Franklin Roosevelt elections and in the 2004 Bush/Kerry contest).

      We abandon that long and estimable tradition this year for one reason: Donald J. Trump.

      The 2016 nominee offered by the Republican Party rubs hard against the editorial board’s values as conservatives and Americans. Donald Trump is unprincipled, unstable and quite possibly dangerous. He can not be president.

    • Gary Johnson tries to get past ‘brain freeze’ with Detroit newspaper’s endorsement

      But Johnson’s self-described “Aleppo moment” on Wednesday night’s MSNBC town hall proved irresistible for critics and rivals. Jill Stein, the Green Party candidate who has fallen even further back in polls than Johnson, took the opportunity on Thursday to name the foreign leaders she admired — if anyone was curious. (No one she mentioned is currently serving as the head of government in any country.)

    • Politico Tries to Play Gotcha with Jill Stein’s Comments on Gary Johnson’s ‘World Leader’ Gotcha

      Last night on MSNBC, Chris Matthews asked Gary Johnson to name three foreign leaders that he admired. Rather than rejecting the question for its implicitly pro-government bias and as a silly thing to ask someone running for president, Johnson tried to answer by listing former Mexican president Vicente Fox and blanked on the name, saying it was another “Aleppo moment.” (Maybe soon they’ll be calling them Gary Johnson moments)

      Within minutes, social media was ablaze with users who probably couldn’t name a world leader (except maybe for Justin Trudeau, who’s become something of a favorite of social media progressives) claiming that Johnson couldn’t name a foreign leader at all, when the question was about leaders you respected.

      [...]

      Responding to my comment based on Twitter, Stein suggested that Politico was “just trying to play gotcha to distract from their favored candidate’s awful foreign policy record.” It’s hard to disagree with that assessment.

  • Censorship/Free Speech

    • Singapore jails teen blogger Amos Yee for anti-religion posts
    • Amos Yee gets 6 weeks’ jail for wounding religious feeling
    • Amos Yee gets 6 weeks’ jail for wounding religious feelings
    • Amos Yee pleads guilty to 3 charges
    • Jordan Imposes Media Blackout on Christian Writer’s Assassination as Protests Erupt

      Jordanian authorities imposed a blackout on the country’s press and social media Monday, preventing any coverage of the murder of the Christian writer shot dead outside an Amman court as protesters called for the government’s resignation.

      The censorship order by the Jordanian judiciary came after the murder of Nahed Hatter as he arrived at the city’s Palace of Justice on Sunday, accused of sharing a satirical cartoon on Facebook and of breaching the country’s blasphemy laws.

    • Montreal Muslim school president was ‘devastated’ by feminist’s criticisms, slander trial hears

      Quebec’s long-running debate over secularism and the place of religious minorities moved into the courtroom Monday as a slander trial opened against an outspoken critic of Islamic fundamentalism.

      A crowd of supporters, including two who arrived from France, filled the room to hear the case against Djemila Benhabib, who is being sued by a private Muslim school after she likened its teaching to the instruction received in terrorist training camps in Pakistan and Afghanistan.

      Benhabib, who was born in Ukraine but spent much of her childhood in Algeria, was invited on to a Montreal radio show in 2012 after writing a blog post about the Muslim School of Montreal.

      Benhabib told 98.5 FM host Benoît Dutrizac that she was shocked by what she found on the school’s website.

      Koranic verses being taught to children were “extremely violent” and “misogynistic,” she told Dutrizac in a recording played in the court. She said the school offers students “an indoctrination worthy of a military camp in Afghanistan or Pakistan.” The school, she said, “is creating fundamentalist activists who in a few years will be demanding accommodations and all sorts of bizarre things … We are an extremely long way from citizenship, from the values that belong to our society.”

    • Migrants Are Racist to Blonde Women, Swedish Ethics Professor Says

      Professor of Ethics Ann Heberlein has argued that blonde people in Sweden are subjected to racist abuse and violence from “people with a non-European appearance”.

      Ms. Heberlein, who appears regularly on Swedish Radio’s “Thoughts for the Day” and “Philosophical Room”, says blonde and Swedish victims of this racism choose to stay silent because “anti-racist” left wingers say that as a “privileged” group, ethnic Swedes have no right to complain.

      The professor at Lund University describes the racist abuse hurled at white women in Sweden, with phrases like “Svenne (meaning ethnic Swede) whore” and “bloody racist whore” shouted at them by people with migrant backgrounds.

    • Singapore jails teenager for hurting God’s feelings

      Amos Yee, a 17-year-old blogger in Singapore, is to spend six weeks in jail for “wounding religious feelings.” It is his second such jail term: he spent a month in jail last year for criticizing Christianity.

    • Donald Trump Happily Repeating Lie About Google Autocomplete Suppressing Negative Hillary News

      While politics isn’t generally a topic we dive into around here, technology policy and issues certainly are. And, since presidential election cycles infect every conceivable topic like a wine stain spreading across your favorite couch, we’ve talked about the two mainstream candidates quite a bit recently. And I get the complaints from all sides against both candidates, but it’s become somewhat breathtaking to watch Donald Trump build a campaign in large part on nonsensical and easily debunked conspiracy theories, such as how the planned internet governance transition will cede control of the web to China and Russia, or that our current sitting President might be a secret communist Muslim clay-person, but maybe not.

      And, of course, there is the constant claim of victim-hood at the hands of that damned liberal establishment, which now apparently includes Google. Some background for you is in order. Over the summer, a really dumb video went viral after claiming to show that Google was manipulating autocomplete searches to keep any bad press out of the results for searches about Hillary Clinton. Compared with Bing, for instance, Google’s autocomplete failed to finish off a search for “Hillary Clinton cr” with “Hillary Clinton crimes”, instead completing as “Hillary Clinton Crimea.” While your drunk uncle lost his goddamned mind over a conspiracy surely proven, Google chimed in to note that it specifically designed its autocomplete feature to keep disparaging results from anyone’s name, not just Hill-Dog’s. This was easily shown by putting in “Donald Trump cr”, which likewise autocompleted as “Donald Trump Crimea.”

      And that really should have been the end of that. But, because Donald Trump’s campaign isn’t one to pass on a good chem-trails story, its candidate tried to deflect a general panning of his debate performance by repeating this already disproved accusation.

    • Censorship is Killing the Spirit of Social Media

      Take Twitter, for example. The online social networking service is often criticized for not protecting its users and allowing pretty much anything on its platform. Because it does allow anything on its platform and that’s part of why people love it so much.

      Twitter is also kind of like a filing cabinet that records and preserves our digital history for us. You can go to Twitter, search a hashtag and find photos, articles and all the opinions you could ever want to hear on a particular moment from (recent) history. That’s pretty cool, when you think about it. But what’s not cool is finding tweets that you never saw, tweets that seemingly disappeared even though the 140-characters were typed.

      Twitter has been caught removing tweets, hiding tweets and deleting trending hashtags. Such accusations have opened the doors to how such a prominent platform—which sources the news for over half the population-gets away with censorship before our very eyes.

      It was just a few months ago that Twitter was accused of censoring tweets under ‘#DNCLeak’ during the WikiLeaks e-mail debacle. In this particular scenario, conservative Twitter users accused the platform of removing the hashtag from the trending bar, despite it displaying an estimated 250,000 tweets about the leaked employee e-mails from the Democratic National Committee.

      On the other side of the political spectrum, of course, is the whole Milo Yiannopoulos situation, which involves permanent censorship in the form of banning. Another accusation comes from Trump supporters, which say the social platform concealed his tweets asking for campaign donations.

      But is this censorship? Or is it just the work of a flawed algorithm?

    • HRC concerned about censorship of publications

      The Human Rights Commission(HRC) has released a statement regarding Freedom of Expression in relation to Cayman’s Prohibited Publications Order.

      The statement has been released during World Banned Books Week which is held each year, the last week in September and is recognised by the American Libraries Association. During the week, attention is focused on freedom of expression in relation to reading and the issue of censorship. In the Cayman Islands censorship of reading materials is found in the Prohibited Publications Order (under the Penal Code) which first came into effect in the Cayman Islands in 1977.

    • Censorship: Facebook Deleted 100,000 ‘Hate Posts, Insults’ in Just One Month

      Facebook revealed that within the last month it deleted 100,000 posts by German users for containing “hate”, but Justice Minister Heiko Maas has blasted the figure as too low.

      At a conference in Berlin, Maas said that to be accountable, social networks must publish the number of posts contested by users. The Justice Minister’s remarks implied that complainants on social media are valid judges of what constitutes criminal speech, something usually only determined by a court.

    • BANNED TOGETHER: A CENSORSHIP CABARET Set for Banned Books Week in NYC
    • Wallace students read banned books aloud to draw attention to censorship
    • Distributed Censorship or Extortion? The IoT vs Brian Krebs
  • Privacy/Surveillance

    • UK Government Says Smart Meters Can Definitely Be Trusted Because GCHQ Designed Their Security

      The idea behind smart meters — that detailed information about how you consume electricity will allow you to use power more efficiently and thus cut your bills and your home’s carbon emissions — is a good one in theory. And yet smart meters are still not used very widely, even in countries like the UK, where the government has a strategy to install millions of them by 2020. Actually, the likely savings by users are small, but smart meters also promise to allow the electricity industry to lower salary costs by carrying out meter readings remotely, which is one reason why it is so keen on the idea. Another is because smart meters make it is easy to cut off someone’s supply if they don’t pay their bills.

      The slow uptake of smart meters seems in part to be due to public concerns about security. People are worried that their smart meter will spy on them, sending back information to electricity companies that might be intercepted and used for targeted burglary when they are away. Similarly, there are fears that if the smart meter control system were compromised, domestic electricity supplies might be at risk on a large scale.

      One of UK Parliament’s most important committees, the one monitoring science and technology, has just published a report into the UK smart meter roll-out, offering recommendations for ways to speed it up.

      [...]

      has reported, one of the worst features of the UK’s Investigatory Powers Bill that is currently wending it way through Parliament is that it creates a legal framework to allow GCHQ and the other intelligence agencies to hack into any kind of equipment in order to carry out surveillance. Of course, that’s really rather easy when you were the one who designed its security systems.

    • FBI’s Controversial Surveillance Program Declined After Snowden

      The FBI’s use of a controversial program that collected Americans’ phone records decreased significantly after Edward Snowden exposed it to the world in 2013, a new report has found.

      The program allows the FBI to get access to phone records—but not the content of phone calls—with permission from the Foreign Intelligence Surveillance Court. Between 2012 and 2014, that court approved 561 so-called “business records orders,” but that number dropped from a nine-year high of 212 in 2012 to 170 in 2014, a nearly 20 percent decrease, according to a review by the Justice Department’s inspector general.

      The number fell again in 2015 to 142 orders. Snowden’s revelations helped fuel a change in U.S. law that ended the government’s practice of collecting and storing the phone records. Now, the government must request the information from phone companies.

    • Canadian Bank Prohibits Giving Passwords to Police

      While waiting for ten minutes on “hold” to make an appointment with my local branch of Scotiabank, I had time read through the new “Digital Services Agreement. Most of the eighteen pages were unremarkable, but a couple of things stood out.

      When you click “Accept”, you are agreeing to not give your password to police if they ask!

    • WhatsApp refuses to delete user data in India after court ruling

      Changes to WhatsApp’s data sharing rules are causing more controversy this week. The company refuses to comply with a court order from India’s Delhi High Court, which requested that the company delete any and all data collected by users who opted out of the company’s new privacy policy before September 25th.

      Since WhatsApp announced that it would be sharing some user data, including phone numbers, with Facebook, the app has come in for some serious critisism for undermining consumer privacy in India. These changes were made under the guise of cutting down on spam and improving services, but a good portion of users remain unconvinced.

    • EU clamps down on sale of surveillance tech to despotic regimes

      The European Commission has set out new measures to stop European companies exporting surveillance gear to despotic regimes. The proposal would also partially relax the rules on exporting cryptography tools.

      The proposal to overhaul the EU’s export controls on dual-use products—powerful technologies such as crypto software or rocket engines that can be used for good or evil—was presented on Wednesday (PDF) and includes a new human rights dimension.

      “It’s not a revolution. It’s an evolution of our current structure,” a commission source told Ars. “The foundation that is already there, is fairly solid, but this new proposal is more efficient, and will reduce the cost of the control, both for authorities at national level and also for the industries that have to apply for licenses.”

      “This new human security dimension comes from a conviction that our export controls should also enable us to prevent the misuse of items that are used to violate human rights. The types of technologies we are talking about, surveillance, etc., do not fit clearly within the current military regulation,” the source continued.

    • Apple Logs Your iMessage Contacts — and May Share Them With Police

      Apple promises that your iMessage conversations are safe and out of reach from anyone other than you and your friends. But according to a document obtained by The Intercept, your blue-bubbled texts do leave behind a log of which phone numbers you are poised to contact and shares this (and other potentially sensitive metadata) with law enforcement when compelled by court order.

      Every time you type a number into your iPhone for a text conversation, the Messages app contacts Apple servers to determine whether to route a given message over the ubiquitous SMS system, represented in the app by those déclassé green text bubbles, or over Apple’s proprietary and more secure messaging network, represented by pleasant blue bubbles, according to the document. Apple records each query in which your phone calls home to see who’s in the iMessage system and who’s not.

      This log also includes the date and time when you entered a number, along with your IP address — which could, contrary to a 2013 Apple claim that “we do not store data related to customers’ location,” identify a customer’s location. Apple is compelled to turn over such information via court orders for systems known as “pen registers” or “trap and trace devices,” orders that are not particularly onerous to obtain, requiring only that government lawyers represent they are “likely” to obtain information whose “use is relevant to an ongoing criminal investigation.” Apple confirmed to The Intercept that it only retains these logs for a period of 30 days, though court orders of this kind can typically be extended in additional 30-day periods, meaning a series of monthlong log snapshots from Apple could be strung together by police to create a longer list of whose numbers someone has been entering.

      The Intercept received the document about Apple’s Messages logs as part of a larger cache originating from within the Florida Department of Law Enforcement’s Electronic Surveillance Support Team, a state police agency that facilitates police data collection using controversial tools like the Stingray, along with conventional techniques like pen registers. The document, titled “iMessage FAQ for Law Enforcement,” is designated for “Law Enforcement Sources” and “For Official Use Only,” though it’s unclear who wrote it or for what specific audience — metadata embedded in the PDF cites an author only named “mrrodriguez.” (The term “iMessages” refers to an old name for the Messages app still commonly used to refer to it.)

    • Terrorism Directive: European Parliament to Cowardly Surrender to Outrageous Security Call

      For a few months, the European Parliament has been discussing a directive aimed at updating the European legislation on combating terrorism. After a vote in the LIBE Committee, MEPs agreed to send the text directly to a trialogue discussion; this reduces opportunities for a democratic debate on an issue that bears strong consequences for fundamental rights.
      Today, Wednesday 28 September, the third trialogue between the European Parliament, the European Commission and the Council of the European Union is to take place. Faced with the deadlock organised by European institutions, La Quadrature du Net emphasises the dangers of this text.

    • Allo: Snowden Says New Google App Could Become Tool For Police Surveillance

      Google recently released a new messaging application called Allo that it calls “revolutionary,” but whistleblower Edward Snowden warns that the app could be used for government surveillance.

      Radio Sputnik’s Loud & Clear spoke with Professor Bryan Ford, leader of the Decentralized/Distributed Systems lab at the Swiss Federal Institute of Technology in Lausanne, about the app and its potential impact on personal privacy.

    • Why Edward Snowden (NSA Whistleblower) Just Warned People Not to Use Google’s New Chatting App

      According to Edward Snowden, if you want to avoid giving law enforcement the green light to check out all your communications, don’t use it.

      “What is #Allo? A Google app that records every message you ever send and makes it available to police upon request,” the whistleblower tweeted.

      Tech giant Google has been working hard to infiltrate the virtual chatting world, launching Spaces, Duo, and most recently, Allo, all in the past couple of months.

      On its site, Allo is described as “a smart messaging app that helps you say more and do more. Express yourself better with stickers, doodles, and HUGE emojis & text. Allo also brings you the Google Assistant, preview edition.”

  • Civil Rights/Policing

    • For Latinos, the Problem Isn’t Trump—It’s Trumpismo

      Anyone watching this year’s elections knows that Latinos are going to play a critical role. The Age of LatinX is upon us. Without a doubt, LatinXs will play a determinate role in these important elections. As the presidential candidate for the Green Party, I take seriously the urgently critical role of the Latino vote in the 2016 elections. That’s why our campaign continues the work of raising LatinX and other issues.

      In an election where some are depressed because they see no path other than one that winds between two obsolete but deadly choices, this is a race to the bottom between the “lesser evil” and the “greater evil,” Hillary Clinton and Donald Trump. Such a choice starkly reflects the problems Latinos and we all face, ones that reach far and beyond Donald Trump. Trump’s candidacy is a virulent symptom of a far more sinister problem infecting our entire political system, something every community, including Latinos, experiences in very particular ways, regardless of their political affiliation.

      Growing numbers of Latinos are among the millions who helped push the question—“How do I vote for Jill Stein?”—as a top Google search term for our campaign after Monday’s debate. LatinXs have heard our message and are acting on their desire for change. I am confident and see every day on the campaign trail that even more are preparing to join us in this election. Our presidential platform is packed with the policies and positions—student debt forgiveness, free college education, fair trade, not free trade, labor rights, racial justice and police reform, a Green New Deal, and others—that we all know are necessary, and that Latinos especially have good reason to be concerned with.

    • The Military Logic of Punishing Chelsea Manning’s Suicide Attempt

      Last week, imprisoned whistle-blower Chelsea Manning was sentenced to 14 days in solitary confinement as punishment for her suicide attempt in early July at the prison barracks at Fort Leavenworth. The Fort Leavenworth disciplinary panel could not explicitly punish Manning for attempted suicide. Completed suicide is not a disciplinary violation and, to be guilty of attempting a crime, it’s necessary for the act which is attempted to be one. They disciplined her instead under a charge known as “conduct which threatens,” stating that Manning’s attempt to die interfered with “orderly running, safety, good order and discipline, or security” of the facility. (She is also being disciplined for possessing an unauthorized book). The whistle-blower stated that she was driven to suicide over the prison’s then-failure to appropriately treat her gender dysphoria. Why Manning injuring herself is deemed a threat to the facility’s functioning says much about the nature of that place’s function, says much about the true function of prisons.

      Before 1823 in England, according to early common law, if a person committed suicide, they would be posthumously punished. The body would be buried at the crossroads of a highway, impaled by a stake, often with a stone laid over the face (to prevent resurrection as a ghost or vampire). The deceased’s property would be forfeited to the king. Suicide was criminal because sovereignty over life and death did not then reside with the individual but with God, and with his chosen earthly emissary, the king. And since suicide was deemed an ungodly, criminal act, so too was an attempt—at times punishable by hanging. There’s no contradiction here: To execute a person who has herself tried to die is still punishment, not wish fulfillment. It’s the punishment of removing every last shred individual sovereignty; it’s the state’s reminder of where sovereignty really resides. Current state punishment of attempted suicide, in its rare cases like Manning’s, serves the same purpose.

    • Does The FTC Get To Ignore Section 230 Of The CDA?

      The case involves weight loss products, including colon cleanses, vended by LeanSpa. To generate more sales, LeanSpa hired LeadClick to act as an affiliate marketing manager. LeadClick coordinated promotion of LeanSpa’s products with LeadClick’s network of affiliates. Some affiliates promoted the products using fake news sites, with articles styled to look like legitimate news articles and consumer comments/testimonials that were fake. Apparently, all of this added up to big business. LeanSpa paid LeadClick $35-$45 each time a consumer signed up for LeanSpa’s “free” trial (which was a negative billing option). LeadClick shared 80-90% of these sign-up fees with affiliates and kept the remainder for itself. In total, LeadClick billed LeanSpa $22M, of which LeanSpa paid only $12M. Still, LeanSpa turned into LeadClick’s top customer, constituting 85% of its eAdvertising division’s sales.

    • An Ongoing Lack Of Technical Prowess Is Resulting In Bad Laws, Bad Prosecutions, And Bad Judicial Decisions

      Everyone in government is talking cyber-this and cyber-that, even though a majority of those talking don’t have the technical background to back up their assertions. This leads to dangerous lawmaking. The CFAA, easily one of the most abused computer-related laws, came into being thanks to some skittish legislators who’d seen one too many 80′s hacker films. (“WarGames,” to be specific.)

      Faulty analogies have led to other erroneous legislative conclusions — like the comparison of email to snail mail — which has led to the government treating any unopened email as “abandoned” and accessible without a warrant.

      But the problem goes further than the legislative branch. The executive branch hasn’t been much better in its grasp of technical issues, and the current slate of presidential candidates guarantees this won’t change for at least another four years.

      The judicial branch has its own issues. On both sides of the bench, there’s very little technical knowledge. As more and more prosecutions become reliant on secretive, little-understood technical tools like cell tower spoofers, government-deployed malware, and electronic device searches, unaddressed problems will only multiply as tech deployment ramps up and infusions of fresh blood into the judicial system fail to keep pace.

    • Court Dumps Cops’ Complaint They Were Unfairly Treated After Shooting Two Unarmed Suspects 47 Times

      In 2012, Cleveland police officers engaged in perhaps the most one-sided “shootout” ever with two suspects at the tail end of an (unauthorized) police chase. By the time it was over, officers had fired 139 bullets into a vehicle they had trapped in a school parking lot. Twenty-three of those hit the driver. Twenty-four hit the passenger. Both vehicle occupants were killed.

      One officer — Michael Brelo — apparently thought he was starring in his own action film. He unloaded 49 rounds in just over 20 seconds while standing on the hood of the stopped vehicle. All told, more than 75 Cleveland PD vehicles joined the chase/shooting. At the end of a yearlong investigation, 63 officers were suspended for their participation. Six officers were charged.

      The genesis of the horrific debacle was nothing more than a car backfiring. One cop mistook this for a gunshot and all hell broke loose. No weapons were recovered from the vehicle.

      One of the stranger offshoots of the infamous shootings was a lawsuit filed by several Cleveland police officers who took part in the chase. In their view, they were punished more harshly than African American officers who also participated in the unauthorized pursuit.

    • Help Me Choose a Nominee for the Hugh Hefner First Amendment Award

      The Hugh M. Hefner First Amendment Awards were established in 1979 to honor individuals who have made significant contributions to protect the First Amendment rights of Americans. They are looking for nominees for this year’s awards, and I’d like to send them a name.

    • Agent who interrogated Abu Zubaydah: ‘Where we went wrong as a nation’

      “His case represents the A to Z of where we went wrong as a nation,” said former FBI agent Ali Soufan, who interrogated some of the most prized captives of the war on terror, and considered Abu Zubaydah “a high-ranking terrorist” at his capture. “In a way, it was the original sin that led to the institutionalization of the so-called Enhanced Interrogation Techniques.”

    • Police Brutality Is a Campaign Issue, So Departments Ignore It on Social Media

      There’s zero doubt that police forces across the nation are caught between the crosshairs of politics and systemic racism; their losses and crimes either championed or hurriedly swept beneath the rug on the campaign trail.

      Both Hillary Clinton and Donald Trump addressed race relations in the United States as a symptom of a larger criminal justice problem. Trump went as far as to call America’s legacy of police brutality a matter of “law and order,” mirroring the strategic oversimplification of racism that has contributed to the killings of 285 black and Hispanic people by police officers in 2016 alone.

      But despite desperate efforts by citizens to document the unlawful abuse of minorities by officers, police departments still wield considerable control over their images and public messages. Thanks to social media sites like Facebook and Twitter, police are attempting to humanize themselves online, whether or not they’re physically repairing their relationships with America’s communities.

    • Russian journalist arrested for ‘illegal’ voting after exposing fraud in Duma elections

      An award-winning journalist who exposed voting fraud during Russia’s parliamentary elections has himself been arrested for alleged fraud.

      Denis Korotkov, a correspondent for the independent news website Fontanka, was scheduled to appear in court in St Petersburg on Wednesday on charges of “illegally obtaining a ballot”.

      But campaigners say Mr Korotkov was working undercover to expose vote rigging in the Duma elections, which have provoked international concern, and is now being harassed for his work.

      Mr Korotkov documented how he posed as a voter on 18 September and was given a sticker by polling station officials, who then arranged for him to be transported around St Petersburg with others to cast multiple ballots for specified candidates.

    • Denmark reverses course on refugee ‘child brides’

      Specifically, the agency concluded that the separate living quarters would violate the UN’s Convention on the Rights of the Child and Article 8 of the European Convention on Human Rights, which guarantees the right to one’s “private and family life”.

      Josephine Fock, an MP for The Alternative who raised the issue with DIS, cheered the reversal.

      “It is completely outrageous. We are talking about people who have fled to Denmark who are being split from each other. Some of them have children together and investigating individual [asylum] cases takes an unbelievably long time,” Fock told Metroxpress.

      In January, the Integration Ministry obtained an overview of the Danish asylum system that revealed that there are currently 27 minors who have spouses or partners. According to an earlier report in Metroxpress, there are two married 14-year-old girls at Danish asylum centres. One is married to a 28-year-old man, while the other is pregnant and has a 24-year-old husband.

    • [Older] Woman who mocked burka goes into hiding after online trolls offer bounty for her murder

      In a controversial article, Lejla Colak said forcing women to wear the Islamic headscarf was like forcing them to strap a sex toy to their heads.

      Twisted online trolls have launched a sick hate campaign against the Bosnian reporter, offering a cash prize if anyone kills or rapes her.

      One social media user, reportedly a member of the Bosnian army, wrote: “Are there any volunteers to rape lovely Lejla? I will personally pay for it.”

    • When ‘Yelling Commands’ Is the Wrong Police Response

      The story out of El Cajon, Calif., a San Diego suburb, had an eerie familiarity: The police respond to a person exhibiting some kind of disturbing behavior, but the subject — perhaps lost in his own, altered world — does not comply with the usual commands, does not heed the standard warnings, acts in a way that seems to invite danger, and ends up dead.

      An officer in El Cajon fatally shot a man identified as Alfred Olango on Tuesday, after Mr. Olango’s sister called 911 for help because he was acting erratically. The police released a still frame from a bystander’s video showing Mr. Olango, 30, mirroring the shooting stance of the officer facing him — feet apart, hands clasped and pointed at the officer. But one man had a gun and the other, it turned out, did not.

      “I called for help; I didn’t call you guys to kill him,” the sister wailed on a Facebook video recorded by a bystander.

      Far too little is known about what happened in El Cajon to judge the officer’s conduct, law enforcement experts and advocates for mentally ill people say. But the police use of force — sometimes lethal — against those with diminished mental capacity is distressingly common. The experts and advocates say that while training and practices have improved in the last generation, officers in many agencies still receive little or no education in how to recognize and deal with people who may not behave rationally.

      Like other police uses of force, confrontations involving people with diminished mental capacity have increasingly been caught on video and turned into national news. In July, officers in Sacramento shot and killed a man who was walking and running in the street, gesticulating wildly, and who refused to obey orders to drop the knife he was holding or to lie down.

    • Stand in solidarity with imprisoned writers in Saudi Arabia

      English PEN is continuing to hold monthly vigils in support of imprisoned writers Raif Badawi, Waleed Abulkhair and Ashraf Fayadh. Please join us to show them they have not been forgotten.

      English PEN has been holding regular vigils outside the Saudi Embassy in London in support of imprisoned blogger Raif Badawi and his lawyer Waleed Abulkhair since January 2015 when Badawi was first flogged for his peaceful activism. While Badawi has not been flogged since, he is continuing to serve a ten-year prison sentence, while Abulkhair is serving 15 years in prison for his human rights activism.

      PEN is also continuing to call for the immediate release of Palestinian poet and artist Ashraf Fayadh. Originally sentenced to death, Fayadh is now serving 8 years in prison and, like Badawi, continues to have the threat of hundreds of lashes looming over him.

      Please join us on Friday 30 September from 9 – 10am for a peaceful vigil at the Saudi Arabian Embassy in London. Activists are asked to meet at the Curzon Street entrance to the Embassy. (note: the postal address of the Embassy is 30-32 Charles Street, Mayfair, London).

    • Teen boy in Saudi Arabia arrested for “unethical behaviour” after flirty chat with YouTube teen girl star

      Abu Sin (his name means “toothless”) and Christina Crockett jokingly declared their love for one another in a silly YouNow stream that has since been uploaded to YouTube. They struggled through language barriers and acted like goofy young people.

      Evidently, being a cute kid is a crime in Saudi Arabia, where the 19 year old internet goofball lives.

      A Saudi attorney told Okaz newspaper the videos violate the country’s interpretation of Sharia law and internet regulations. Abu Sin could face up to three years in prison.

    • Man hit by tram after mass brawl breaks out between migrants in Vienna

      At least 20 people were involved in the fight, believed to have been between a group of Chechen and Turkish migrants, in the Austrian capital of Vienna on Tuesday evening.

      Austrian media reported that the trouble started when a Chechen man approached a group of 15 Turkish men socialising in an internet cafe and told them to be quiet.

      A brawl ensued, spilling out of the cafe and into the streets of the city’s Favoriten district.

      There was reports that one man was armed with a knife.

      Vienna is also home to a large population of Chechen migrants.

    • Interview: John Kiriakou On Supporting Jeffrey Sterling So He Doesn’t Die In Prison

      Former CIA officer John Kiriakou, who served a prison sentence at a federal prison in Loretto, Pennsylvania, joined Shadowproof managing editor Kevin Gosztola to talk about the case of former CIA officer Jeffrey Sterling, which they have both followed closely.

      Kiriakou’s reporting describes how officials at the Englewood federal prison, where Sterling is confined, failed to give him proper medical treatment for heart attack symptoms. Gosztola recently exchanged letters with Sterling and published a report on how the Bureau of Prisons is failing him.

      During the interview, Kiriakou shares his experiences with prison medical care and how all too often those who need care are denied proper treatment. He talks about how the Bureau of Prisons thinks prisoners like Sterling are malingering, which means they are lying about and faking serious health problems. He also describes why it is so important for a person in this situation to have outside support.

      Sterling has demanded the prison give him access to an outside doctor so that he can have his severe heart problems addressed.

    • Inside the Chicago Police Department’s secret budget

      When the clerk called Willie Mae Swansey’s case in a crowded courtroom last February, the 72-year-old approached the judge slowly, supporting herself with a four-pronged cane. It had been a busy afternoon in the Daley Center’s civil forfeiture courtroom, with more than a dozen quick hearings and a pair of trials preceding her own. The crush of defense lawyers and hopeful claimants had thinned by the time Swansey stepped up to the bench. She steadied herself beside a prosecutor and stood with a stately straightening of her back.

      Swansey was here to reclaim her car. The Chicago Police Department had seized the 2001 Chrysler PT Cruiser two years prior, arresting the driver, Swansey’s son, and charging him with manufacturing or delivering 15 to 100 grams of heroin. The car had been impounded ever since. Swansey herself was never charged with a crime, and it was her name, not her son’s, on the title. All the same, the Cook County state’s attorney’s office had agreed with CPD that the vehicle, which the office valued at $1,400, was worth keeping for good.

      [...]

      “I’m a poor black woman,” Swansey says. “I don’t have no money for an attorney.” Instead, she continued to represent herself.

      At her next appearance in May, she informed the court that her son’s criminal case was over. He had pleaded guilty, and having been under house arrest for 745 days, he was credited with time served and put on probation, according to county records.

      So on June 30, Swansey’s trial date finally arrived, two years and four months after CPD took her car. She had brought her son with her to court to testify that he had taken her keys without her knowledge. But the judge she saw that day, Paul Karkula, didn’t want to hear from him, she says.

      Instead, Swansey recalls, “The judge said, ‘I can’t give you back your car, because it would be right back on the road with drugs.’ ” (Karkula declined to comment for this story.)

      The decision struck Swansey as racist and deeply unfair. Swansey says she watched as four other cases that day were called and resolved, including one involving a wheelchair-bound white woman with a case very similar to hers. This woman got her car back, Swansey says. She did not.

    • How I Taught A Jury About Trolls, Memes And 4Chan — And Helped Get A Troll Out Of Jail

      A few weeks ago, CNN had a story on how a jury failed to convict Peter Wexler, an unemployed IT worker, who had been arrested and spent nearly a year in jail (without bail) for writing some mean stuff on his blog. He was literally arrested for five blog posts (which came with 20 criminal charges, as they had multiple charges on each post) and was facing up to 15 years in jail for those posts. Ken “Popehat” White blogged briefly about it, noting that it was a huge First Amendment win in a case where the defense team included one of his partners, Caleb Mason (along with lawyer Marri Derby, who was appointed by the court to represent Wexler through the Criminal Justice Act). It’s also a case that involved… me. I was an expert witness in the case, brought in to explain to the jury the nature of internet discourse, including how trolls quite frequently say outrageous things to get attention, and how it’s (for better or worse) not that uncommon to see people post angry rants on the internet, or to talk about how certain people should die, or to photoshop famous people into weird scenarios.

      I’ve avoided writing about the case up until now, mostly because of my involvement. And since Wexler was found not guilty on some charges, while the other charges resulted in a hung jury (the jury foreperson said that they voted 8 to 4 to acquit on those other charges), there’s a chance there may be a second trial. So recognize that it’s a case that I may still have future involvement in — and where I’m choosing my words carefully (the prosecutors in the case tried to take some of my posts on Techdirt out of context to attack my credibility, and it’s possible that could happen again — though I will admit to some confusion over being asked, twice, on the stand if I consider myself “an advocate for internet freedom,” as if that were a bad thing).

  • Internet Policy/Net Neutrality

    • FCC Postpones Vote on Set-Top Box Reform in a Blow to Chairman Wheeler

      The Federal Communications Commission on Thursday postponed a vote on its highly-anticipated proposal to increase competition in the video “set-top box” market after the chairman of the agency failed to secure the necessary votes to approve the plan.

      The delay amounts to a humbling setback for FCC Chairman Tom Wheeler, who had made reforming the $20 billion set-top box market a centerpiece of his pro-consumer agenda. With 40 days to go before a presidential election that will determine the makeup of the FCC going forward, the fate of the reform measure is now in doubt.

      As recently as Thursday morning, the vote was still scheduled, but Wheeler was ultimately unable to come to an agreement with his fellow Democratic commissioner Jessica Rosenworcel, who had previously raised concerns about his plan, and who represents the key swing vote at the five-member agency.

      “Commissioner Rosenworcel came to Chairman Wheeler’s office with a bunch of edits on the order, and those edits were unacceptable to his office,” according to a person familiar with the matter. “And that led to an impasse. As of 8 a.m. this morning the vote was on, and then by 9 a.m. the vote was pulled.”

    • FTC won’t give up fight against AT&T unlimited data throttling
    • The FCC Wants To Know Why Journalists Had To Pay $200 For WiFi At Presidential Debate
  • DRM/Broadcast

    • Don’t Hide DRM in a Security Update

      Over 10,000 of you have joined EFF in calling on HP to make amends for its self-destructing printers in the past few days. Looks like we got the company’s attention: today, HP posted a response on its blog. Apparently recognizing that its customers are more likely to see an update that limits interoperability as a bug than as a feature, HP says that it will issue an optional firmware update rolling back the changes that it had made. We’re very glad to see HP making this step.

      But a number of questions remain.

      First, we’d like to know what HP’s plans are for informing users about the optional firmware update. Right now, the vast majority of people who use the affected printers likely do not know why their printers lost functionality, nor do they know that it’s possible to restore it. All of those customers should be able to use their printers free of artificial restrictions, not just the relatively few who have been closely following this story.

    • 46 California Cities Join Rush To Impose ‘Netflix Tax’

      Last year, Chicago proudly declared that the city would be expanding its 9% amusement tax (traditionally covering book stores, music stores, ball games and other brick and mortar entertainment) to online streaming services and cloud computing. While Chicago was hungrily pursuing the $12 million in additional revenue the expanded tax would provide, it ultimately faced a lawsuit questioning the legality of Chicago’s move. The ongoing lawsuit by the Liberty Justice Center claims Chicago violated city rules by not holding a full vote on the changes, and is violating the Internet Freedom Tax Act.

      Legal or not, Chicago’s push to impose a Netflix tax has opened the floodgates.

    • What Cord Cutting? Cable Sector Hiked TV Prices 40% In Last Five Years

      We’ve noted time and time again that the cable and broadcast industry could compete with cord cutting by lowering prices, it just chooses not to. Even with last quarter seeing the biggest quarterly defection by paying subscribers ever recorded, time and time again you’ll see sector sycophants proclaim that cord cutting either doesn’t exist, or has been violently over-hyped and isn’t worth taking seriously. In fact, most sector executives still believe that the shift away from traditional cable will magically end once Millennials start procreating (protip: it won’t).

      As such, they’ve continued to raise cable TV rates at an absurd rate in the belief that they can keep milking the legacy cable TV cash cow in perpetuity. And while broadcasters certainly take the lion’s share of the blame for raising the cost of programming, you’d be hard pressed to find a cable TV provider that isn’t making things worse by also saddling consumers with misleading fees for nothing and soaring cable box, modem, and other hardware rental costs.

      The end result is users paying 40% more for cable TV than they did just five years ago. In fact the average cable bill is now $103.10 per month, an increase of 4% in the past year. And while the cable sector is quick to proclaim that this just reflects the “increased value” of cable TV, the reality is that most cable ops are trimming back overall channels to try and offset the bloated, soaring cost of sports programming.

  • Intellectual Monopolies

    • UN Panel Report On Access To Medicines Seen As Holding Potential For Change

      Speakers at a side event to the United Nations General Assembly last week commended a new report on access to medicines prepared by a high-level panel hand-chosen by the UN secretary general as containing fresh ideas and the potential to bring change to a longstanding problem.

      The breakfast dialogue, entitled, The Role of Health Technology: Innovation & Access in the 2030 Agenda for Sustainable Development, was organised on 23 September by the UN Secretary General’s High-Level Panel on Access to Medicines, whose report was released last week (IPW, United Nations, 14 September 2016).

    • WIPO staff council legal rep demands immediate removal of Gurry after distribution of misconduct report [Ed: about time?]

      The legal counsel to the World Intellectual Property Organisation’s Staff Council has called for the immediate removal of Francis Gurry as the UN agency’s director general and the lifting of his diplomatic immunity so that he might face possible criminal investigation or civil proceedings over the findings of a report into alleged misconduct that was delivered to the Chair of the WIPO General Assemblies in February.

      The demand is contained in a letter sent to “All Ambassadors and Permanent Representatives to the United Nations and other International Organizations in Geneva” yesterday. IAM has obtained a copy of the letter and has verified that it is authentic.

      The letter was sent following the distribution earlier this week of a heavily redacted version of the findings of an investigation, carried out by the UN’s Office of Internal Oversight Services (OIOS), into a series of allegations originally levelled at Gurry by the former deputy director general of the organisation James Pooley back in April 2014. Although the OIOS submitted its findings in February it is only now that WIPO member states have been able to see a copy of the report – albeit one in which large chunks have been blacked out.

    • Signs Of Changing Trends In FTAs’ IP Chapters, Speakers Say At WTO

      On intellectual property, the EU has published factsheets and position papers on what they would like to see in the agreement, she said. One of the focuses of those documents is raising awareness on the benefits of IP, and “we regret that the focus is not also on the human right to access information,” she said.

    • Trademarks

      • Lee v. Tam: Supreme Court Takes on the Slants

        In the case, Simon Tam is seeking to register a mark on his band name “The Slants.” The USPTO refused after finding that the mark is disparaging toward individuals of Asian ancestry.

      • US Supreme Court to hear Slants case

        The US Supreme Court has granted cert in Lee v Tam, the case involving Asian-American band The Slants and the issue of offensive trade marks.

        The issue presented is: “Whether the disparagement provision of the Lanham Act, 15 USC 1052(a), which provides that no trademark shall be refused registration on account of its nature unless, inter alia, it ‘[c]onsists of . . . matter which may disparage . . . persons, living or dead, institutions, beliefs, or national symbols, or bring them into contempt, or disrepute’ is facially invalid under the Free Speech Clause of the First Amendment.”

    • Copyrights

      • YouTube Hires Music Executive as a Liaison to the Industry

        For the last year, the music industry has been waging a bitter war against YouTube, accusing the popular video site of paying too little in royalties. The conflict has often seemed tribal, with record companies and stars on one side, and Silicon Valley on the other.

        Now, YouTube has brought over a major player from the music side.

        Lyor Cohen, who got his start in the early days of hip-hop and went on to top executive positions at Def Jam and the Warner Music Group — earning a reputation as the most tenacious force in any deal — has joined YouTube as the service’s global head of music, YouTube announced on Wednesday.

        It is the latest effort by a tech company to fortify itself by hiring a music insider. Two years ago, Apple bought Beats, which was founded by Dr. Dre and the producer Jimmy Iovine; in June, Spotify hired Troy Carter, the former manager of Lady Gaga.

        In a statement, Robert Kyncl, YouTube’s chief business officer, suggested that Mr. Cohen’s role was, to some degree, to be a bridge to the music world.

      • Kim Dotcom’s Extradition Appeal Concludes, Will He Get a “Fair Go”?

        After more than four weeks the extradition appeal hearings of Kim Dotcom and his former Megaupload colleagues have concluded. In his closing arguments, Dotcom’s lawyer urged the court to carefully weigh the facts and give his client a “fair go,” which he says the District Court failed to do. However, even if the High Court sides with the defense, the case is still far from over.

      • Dotcom Petitions Appeals Court For Rehearing Over Seized Millions

        Last month, the 4th Circuit Court of Appeals rejected efforts by Kim Dotcom to regain control over millions of dollars in assets seized by the US Government. Yesterday, Dotcom’s legal team petitioned the Court for a rehearing and rehearing en banc on the issues of forfeiture of assets and fugitive disentitlement.

09.28.16

Links 28/9/2016: Alpine Linux 3.4.4, Endless OS 3.0

Posted in News Roundup at 7:47 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Open source is not to blame for a lack of industry standards

    Carol Wilson wrings her hands over the “boring” nature of open source standardization, declaring that “Open source processes can take the fun out of everything, particularly technology wars.” Putting aside for a minute the irony of expecting standards to ever be anything more than mind-numbingly dull, Wilson’s larger argument misses the point.

    The problem with open source standards aren’t that they’re boring; it’s that they’re largely the same as the proprietary standards that preceded them. In practice, this presents no problem at all.

  • Down the rabbit hole, part 2: To ensure security and privacy, open source is required

    If my goal is to secure all of my computing devices, I need access to the source code in order to do a complete and effective security appraisal of the software I am running.

    It really is that simple. The need for open source software, in this case, has nothing to do with any ethical implications of software freedom—nor do the benefits of open source to software developers enter into this discussion. But having access to the source code is an undeniable benefit in ensuring the security of a piece of software.

  • Linaro organisation, with ARM, aims for end-end open source IoT code
  • Linaro start open-source development for IoT on ARM Cortex-M
  • ARM open source group address IoT software confusion

    Linaro has worked with ARM, Canonical, Huawei, NXP, RDA, Red Hat, Spreadtrum, STMicroelectronics, Texas Instruments and ZTE on the new IoT software, as part of what it calls the Linaro IoT and Embedded (LITE) Segment Group.

    Group says it wants to address the design problems created by the proliferation of choices for IoT device operating systems, security infrastructure, identification, communication, device management and cloud interfaces.

    It hopes to be able to reduce fragmentation in operating systems, middleware and cloud connectivity software, through the creation of open source device reference platforms.

    Initial technical work will be focused on delivering an end to end, cross­vendor solution for secure IoT devices using the ARM Cortex-­M architecture.

  • Open Source Community Continues Fight Against Cybercrime with Apache Spot (incubating)
  • Apache Spot Aims to Fetch Open Network Insights

    The project formerly known as Open Network Insights moves to the Apache Software Foundation and gets a new name—Apache Spot. It now includes support for DNS and Proxy in addition to Netflow.

    The Open Network Insight (ONI) project, backed by Cloudera, Intel and others and focused on helping organizations use big data for security insights, became generally available earlier this year. The ONI project is now being donated to the Apache Software Foundation (ASF)—home to Hadoop and many big data efforts—and is now getting a new life as the Apache Spot project.

  • Meet Apache Spot, a new open source project for cybersecurity

    Hard on the heels of the discovery of the largest known data breach in history, Cloudera and Intel on Wednesday announced that they’ve donated a new open source project to the Apache Software Foundation with a focus on using big data analytics and machine learning for cybersecurity.

    Originally created by Intel and launched as the Open Network Insight (ONI) project in February, the effort is now called Apache Spot and has been accepted into the ASF Incubator.

    “The idea is, let’s create a common data model that any application developer can take advantage of to bring new analytic capabilities to bear on cybersecurity problems,” Mike Olson, Cloudera co-founder and chief strategy officer, told an audience at the Strata+Hadoop World show in New York. “This is a big deal, and could have a huge impact around the world.”

  • Meet Apache Spot, a new open-source project for cybersecurity
  • Strata + Hadoop World: Apache Spot looks to tackle cybersecurity
  • Cloudera Approves First Grant Applications for Precision Medicine Initiative
  • Cloudera Broadens its Collaboration with Thorn to Include Software and Services to Fight Child Sexual Exploitation
  • Open source storage hits the mainstream

    Open source storage has gained mainstream acceptance in high performance computing, analytics, object storage, cloud (OpenStack) and NAS use, but can it crack the enterprise?

  • Rogue Wave Improves Support for Open Source Software with IBM
  • Rogue Wave Software to improve open-source software support with IBM

    Rogue Wave Software announces it is working with IBM to help make open source software (OSS) support more available. This will help provide comprehensive, enterprise-grade technical support for OSS packages.

  • Vendors and Customers Gettin’ Open Sourcey With It

    Basically, “open source enablement” seems to be about teaching customers how to embrace open source principles, both in terms of internal processes as well as external communities and ecosystems. As I’ve worked with many engineering and product teams over the years, I’ve seen many open source initiatives fail to reach their potential because of ingrained cultural obstacles that usually manifest in the form of corporate inertia that blocks forward progress.

  • Digium Announces Asterisk 14 Open Source Communications Software

    Digium®, Inc., the Asterisk® Company, today at its annual AstriCon users and developers conference, announced Asterisk 14, the next major release of the world’s most popular open source communications platform. Asterisk 14 continues the track of previous major releases, such as Asterisk 12 and Asterisk 13, by offering developer- and administrator-focused features and capabilities to simplify the scaling and deployment of Asterisk within large, service-based ecosystems.

  • Announcing the open source release of MORI, from Chalkbeat

    In 2014, Chalkbeat developed and started using a WordPress plugin for tracking impact. We called it MORI — Measures of Our Reporting’s Influence. As we wrote then, MORI grew out of one of our key beliefs: Journalists can make a difference, but the ability to measure the difference we make can multiply our impact over time. If we can document how, why, when, and where we made a difference, we are more likely to repeat our success.

    The quantitative data we track in MORI lets us see the big picture of how our work affects the world, beyond raw readership analytics; the qualitative narrative we record helps us tell the story. Our editorial teams can put important impacts in the hands of our fundraising team and others to turn around and share with the broader education community.

  • ODL: Open Source Hastens Software Usability

    Open Daylight Summit — Open source is connecting users and developers more intimately, and that’s a good thing, OpenDaylight Executive Director Neela Jacques said here today.

    In kicking off the OpenDaylight Summit, Jacques said the ability of users and developers to work side-by-side is evolving, and helping drive the faster pace at which open source can bring solutions to the industry.

    “Users can sit next to the developers of the code they use, and the interaction doesn’t go one way,” he said. “The real difference is the way users interact with developers. This is why we are able to get production-grade solutions so much faster than you ever would in proprietary world.”

  • Web Browsers

    • Mozilla

      • Mozilla has “stopped all commercial development of Firefox OS”

        Remember when Mozilla said it was ceasing development of Firefox OS for smartphones, but that it wasn’t giving up on the browser-based operating system altogether? Yeah, now the organization has pretty much thrown in the towel.

        After shifting the focus from phones to smart TVs and other Internet of Things products for a while, Mozilla senior engineering program manager Julie McCracken says development of the operating system was “gradually wound down” and that as of the end of July Mozilla has “stopped all commercial development of Firefox OS.

      • Firefox’s Test Pilot Program Launches Three New Experimental Features

        Earlier this year we launched our first set of experiments for Test Pilot, a program designed to give you access to experimental Firefox features that are in the early stages of development. We’ve been delighted to see so many of you participating in the experiments and providing feedback, which ultimately, will help us determine which features end up in Firefox for all to enjoy.

        Since our launch, we’ve been hard at work on new innovations, and today we’re excited to announce the release of three new Test Pilot experiments. These features will help you share and manage screenshots; keep streaming video front and center; and protect your online privacy.

  • Pseudo-Open Source (Openwashing)

  • FSF/FSFE/GNU/SFLC

    • GNU Tools Cauldron 2016, ARMv8 multi-arch edition

      That is what my England trip for the GNU Tools Cauldron was, but that only seemed to add to the pleasure of meeting friends again. I flewin to Heathrow and started on an almost long train journey to Halifax,with two train changes from Reading. I forgot my phone on the trainbut the friendly station manager at Halifax helped track it down andgot it back to me. That was the first of the many times I forgotstuff in a variety of places during this trip. Like I discovered thatI forgot to carry a jacket or an umbrella. Or shorts. Or full lengthpants for that matter. Like I purchased an umbrella from Sainsbury’s but forgot to carry it out. I guess you got the drift of it.

  • Standards/Consortia

    • FAQ: What’s so special about 802.11ad Wi-Fi?

      Here are the broad strokes about 802.11ad, the wireless technology that’s just starting to hit the market.

    • 2.5 and 5 Gigabit Ethernet Now Official Standards

      In 2014, multiple groups started efforts to create new mid-tier Ethernet speeds with the NBASE-T Alliance starting in October 2014 and MGBASE-T Alliance getting started a few months later in December 2014. While those groups started out on different paths, the final 802.3bz standard represents a unified protocol that is interoperable across multiple vendors.

      The promise of 2.5 and 5 Gbps Ethernet is that they can work over existing Cat5 cabling, which to date has only been able to support 1 Gbps. Now with the 802.3bz standard, organizations do not need to rip and replace cabling to get Ethernet that is up to five times faster.

      “Now, the 1000BASE-T uplink from the wireless to wired network is no longer sufficient, and users are searching for ways to tap into higher data rates without having to overhaul the 70 billion meters of Cat5e / Cat6 wiring already sold,” David Chalupsky, board of directors of the Ethernet Alliance and Intel principal engineer, said in a statement. “IEEE 802.3bz is an elegant solution that not only addresses the demand for faster access to rapidly rising data volumes, but also capitalizes on previous infrastructure investments, thereby extending their life and maximizing value.”

Leftovers

  • Yahoo Mail is down for some across the UK and Europe

    POOR OLD Yahoo can’t catch a break after users reported that its webmail service appears to be down.

    Some here at the INQUIRER are unable to access Yahoo Mail, while others have flocked to Twitter to moan that it’s not currently accessible.

  • Science

    • Never forget a face? You might be a super recogniser

      Your recognition skills are supported by a complex network of brain regions that rapidly develop during infancy and childhood, finally peaking at the age of 30.

    • Google swallows 11,000 novels to improve AI’s conversation

      When the writer Rebecca Forster first heard how Google was using her work, it felt like she was trapped in a science fiction novel.

      “Is this any different than someone using one of my books to start a fire? I have no idea,” she says. “I have no idea what their objective is. Certainly it is not to bring me readers.”

      After a 25-year writing career, during which she has published 29 novels ranging from contemporary romance to police procedurals, the first instalment of her Josie Bates series, Hostile Witness, has found a new reader: Google’s artificial intelligence.

      “My imagination just didn’t go as far as it being used for something like this,” Forster says. “Perhaps that’s my failure.”

    • The Power Paradox: The Surprising Science of How We Gain and Lose Influence

      What causes us to mishandle the power paradox, Keltner argues, is our culture’s traditional understanding of power — a sort of time-capsule that no longer serves us. Predicated on force, ruthlessness, and strategic coercion, it was shaped by Niccolò Machiavelli’s sixteenth-century book The Prince — but it is as antiquated today as the geocentric model of the universe that dominated Machiavelli’s day. What governs the modern world, Keltner demonstrates through two decades of revelatory studies, is a different kind of power — softer, more relational, predicated on reputation rather than force, measured by one’s ability to affect the lives of others positively and shift the course of the world, however slightly, toward the common good.

    • How a Pythagoras Cup works

      His YouTube channel is packed with similarly excellent videos wherein lab assistant Neil is persuaded to execute unnerving experiments. (previously.)

  • Health/Nutrition

    • CDC whistleblower claims agency has been using wrong Zika test

      In the midst of the fight to control Zika, the top public health agency in the United States has been engaged in an intense internal debate about the best way to test whether someone has been infected with the mosquito-borne virus.

      At the center of the debate at the Centers for Disease Control and Prevention is one of the leading experts on Zika virus. Robert Lanciotti is chief of the CDC lab responsible for developing tests to diagnose viral diseases such as Zika that are transmitted by mosquitoes, ticks and fleas.

  • Security

    • Security advisories for Wednesday
    • Facebook, Uber, Slack, and Pandora Pros Praise Free Security Tools

      Proponents of open source software argue that by letting passionate developers get involved and tweak underlying code, the tools they create are stronger and more reliable. Plus, for companies looking to bolster their digital defenses, the software has the added benefit of being free.

    • LibreSSL 2.5
    • LibreSSL 2.5 Released With New Features, iOS Support

      LibreSSL 2.5.0 is available today as the newest version of this growing fork of OpenSSL led by the OpenBSD project.

      LibreSSL 2.5′s libtls implementation now supports ALPN and SNI while handling four cipher suite groups, there is tightened error handling in some areas, support for OCSP intermediate certificates, initial support for Apple’s iOS platform, and a variety of other fixes and functionality improvements.

    • A quick fix for stupid password reset questions

      It didn’t take 500 million hacked Yahoo accounts to make me hate, hate, hate password reset questions (otherwise known as knowledge-based authentication or KBA). It didn’t help when I heard that password reset questions and answers — which are often identical, required, and reused on other websites — were compromised in that massive hack, too.

      Is there any security person or respected security guidance that likes them? They are so last century. What is your mother’s maiden name? What is your favorite color? What was your first pet’s name?

    • French hosting provider hit by DDoS close to 1TBps

      A hosting provider in France has been hit by a distributed denial of service attack that went close to one terabyte per second.

      Concurrent attacks against OVH clocked in at 990GBps.

      The attack vector is said to be the same Internet-of-Things botnet of 152,464 devices that brought down the website of security expert Brian Krebs.

      OVH chief technology officer Octave Klaba tweeted that the network was capable of attacks up to 1.5TBps.

    • Latest IoT DDoS Attack Dwarfs Krebs Takedown At Nearly 1Tbps Driven By 150K Devices

      If you thought that the massive DDoS attack earlier this month on Brian Krebs’ security blog was record-breaking, take a look at what just happened to France-based hosting provider OVH. OVH was the victim of a wide-scale DDoS attack that was carried via network of over 152,000 IoT devices.

      According to OVH founder and CTO Octave Klaba, the DDoS attack reached nearly 1 Tbps at its peak. Of those IoT devices participating in the DDoS attack, they were primarily comprised of CCTV cameras and DVRs. Many of these types devices’ network settings are improperly configured, which leaves them ripe for the picking for hackers that would love to use them to carry our destructive attacks.

  • Defence/Aggression

    • Senate Votes to Override Obama Veto on 9/11 Victims Bill

      A sweeping bipartisan majority in the Senate on Wednesday rejected President Obama’s veto of legislation that would allow families of those killed in the Sept. 11, 2001, terrorist attacks to sue Saudi Arabia for any role in the plot, all but assuring that Mr. Obama would suffer the first override vote of his presidency.

      The vote was 97 to 1, with only Senator Harry Reid, Democrat of Nevada, siding with the president.

      With the House nearly certain to follow the Senate later on Wednesday, the 9/11 bill will become law in a remarkable yet complicated bipartisan rebuke. Still, the measure itself remains contentious, and even some of those who cast a vote against Mr. Obama conceded that they did not fully support it.

      Mr. Obama’s greatest allies on Capitol Hill, who have labored for nearly eight years to stop most bills he opposes from even crossing his desk, turned against him, joining Republicans in the remonstrance.

    • Orlando Terror Attack ‘Triggered’ by Pentagon Drone Strike

      The domestic terrorist behind the Orlando nightclub massacre was motivated by a Pentagon drone strike in Iraq a month before the shooting, according to police transcripts made public last week.

      Conversations between Omar Mateen and an Orlando police negotiator on June 12 were kept secret by FBI and local police until Friday. The secrecy contributed to misleading media accounts of the terrorist’s motives in the days after the killings.

      The transcripts were released by Orlando police Friday after a Florida court hearing held in response to a lawsuit filed by several news organizations.

      Mateen killed 49 people during the attack on the Pulse, a gay nightclub, and wounded 53 others. Police eventually stormed the club and killed Mateen in a shootout after talks aimed at convincing him to surrender failed.

    • Senate overwhelmingly votes to override Obama veto on 9/11 bill

      The Senate voted overwhelmingly on Wednesday to override President Obama’s veto of legislation allowing lawsuits against foreign sponsors of terrorism, setting up an almost certain and historic defeat for the White House on the bill.

      The House is expected to follow suit within hours, making it the first veto of Obama’s presidency that has been overturned by Congress.

      Obama vetoed the legislation Friday because he said the bill — known as the Justice Against Sponsors of Terrorism Act, or JASTA — would infringe on the president’s ability to conduct foreign policy. It was the 12th veto of his presidency.

    • After 9/11 Bill, Could Saudi Arabia Really Sell All Its U.S. Assets?

      It’s easier to make a $750 billion threat than carry it out.

      The Senate on Tuesday unanimously passed a bill that would allow families of 9/11 victims to sue Saudi Arabia for its alleged connection to the attacks, pushing the kingdom one step closer to having to follow through on its pledge to sell hundreds of billions of dollars of United States assets that could be frozen by the courts. Carrying out that divestment pledge will be a long, difficult, complicated and likely costly process.

      “The idea that they could just flip a switch and sell them all, it just doesn’t compute,” George Pearkes of Bespoke Investment Group, an independent research firm, told HuffPost. “It’s just too much. No one’s going to be able to take that risk off your book,” Pearkes said, using the industry term for a portfolio.

      “You’re going to lose money doing it because everyone knows you’re going to do it, and … it immediately has an impact on your currency and balance of payments,” he added, noting that the Saudi currency is pegged to the U.S. dollar and the kingdom continually receives dollars for its oil exports.

    • US Senate Overrides Obama’s Veto – Chaos Imminent

      The Saudis have promised to pull their assets out of USA, hundreds of $billions in treasury bills and many other investments. 2016 could undo the tidy recovery USA has made in Obama’s term. Even a gradual withdrawal could lower the value of the dollar, raise interest rates, ding the stock-market, possibly trigger a nuclear arms race in the region and raise the price of gold.

    • Armed Forces personnel suspected of IS ties comprise just 1pct of militants detected

      Armed Forces personnel suspected to be involved with Islamic State (IS) make up just one per cent of militants detected by authorities so far.

      Defence Minister Datuk Seri Hishammuddin Hussein said despite the low number, the Ministry takes the matter seriously and has ordered that comprehensive action be taken to curtail the terrorist group’s ideology from spreading to security personnel.

      He said the Armed Forces Religious Corps and Royal Intelligence Corps have been tasked to detect soldiers who show interest in extremist groups, and warn members of the security forces against terrorism.

      The initiative includes educating soldiers on the true meaning of Islam and jihad.

      Hishammuddin, who spoke to reporters after launching the 40th Pacific Armies Management Seminar at a hotel here earlier today, however, did not reveal the exact number of soldiers who have been detected to be influenced by IS.

  • Transparency/Investigative Reporting

    • Journalists must fork over $200 for Wi-Fi at presidential debate

      News organizations attending Monday evening’s presidential debate must pay $200 for a “Secure Wireless Internet Connection” at Hofstra University in New York state. The debate is set to begin at 9pm Eastern.

      While profiteering during a high-profile occasion such as this is not unheard of—$15 for a patch cable?—what’s worse is that event staff at Hofstra University are reportedly using a $2,000 device to actively scan for hotspots and other ad-hoc Wi-Fi networks.

    • FCC official: “Something’s not right” with Wi-Fi at Monday’s debate

      One of the members of the Federal Communications Commission, Jessica Rosenworcel, has asked the agency to investigate the Monday evening ban on journalists’ Wi-Fi personal hotspots at the presidential debate held at Hofstra University.

      As Ars reported on Monday evening, the host venue demanded that journalists pay $200 to access the event’s Wi-Fi and were told to shut down their own hotspots or leave the debate. At least one photo, taken by Kenneth Vogel of Politico, showed a handheld device that was being used to scan for and locate “rogue” Wi-Fi networks.

  • Environment/Energy/Wildlife/Nature

    • The world passes 400ppm carbon dioxide threshold. Permanently

      Because carbon pollution has been increasing since the start of the industrial revolution and has shown no signs of abating, it was more a question of “when” rather than “if” we would cross this threshold. The inevitability doesn’t make it any less significant, though.

      September is usually the month when carbon dioxide is at its lowest after a summer of plants growing and sucking it up in the northern hemisphere. As fall wears on, those plants lose their leaves, which in turn decompose, releasing the stored carbon dioxide back into the atmosphere. At Mauna Loa Observatory, the world’s marquee site for monitoring carbon dioxide, there are signs that the process has begun but levels have remained above 400 ppm.

      Since the industrial revolution, humans have been altering this process by adding more carbon dioxide to the atmosphere than plants can take up. That’s driven carbon dioxide levels higher and with it, global temperatures, along with a host of other climate change impacts.

  • Finance

    • BEANO: Brexit Existing As Name Only

      This speech follows the recent statement of the Chancellor of the Exchequer that EU funding will be guaranteed until 2020.

      Could it be that the United Kingdom is not heading for a Hard Brexit or a Soft Brexit, but a Brexit existing as a name only?

      Could there be a BEANO Brexit?

    • Greece asks for suspension of TTIP negotiations

      Temporary suspension of negotiations on the Transatlantic Partnership Trade and Investment (TTIP) asked the Minister of Economy, Development and Tourism, George Stathakis, the Council of Foreign Affairs Ministers for Trade, held today in Bratislava.

      The Minister stressed that in the negotiations on the TTIP «has not seen any progress in sensitive European issues” regarding reciprocity in the liberalization of public procurement, the shipping issues, farm products with a geographical indication, the protection of consumers against genetically modified products, and complex environmental protection issues.

      It acknowledged that the TTIP is a major political issue for the European Union and that this time there are a number of important issues pending. Closed the placement of saying “need a new framework for negotiations, a new start on a new basis and at the appropriate time.”

    • Saudi Arabia’s monarch cuts ministers’ pay by 20%

      Saudi Arabia cancelled bonus payments for state employees and cut ministers’ salaries by 20 per cent, steps that further spread the burden of shoring up public finances to a population accustomed to years of government largesse.

      The government also decided to suspend wage increases for the lunar year starting next month and curbed allowances for public-sector employees, according to royal decrees and a cabinet statement published by state media.

      The salaries of members of a legislative body that advises the monarchy were cut by 15 per cent.

  • AstroTurf/Lobbying/Politics

    • Clinton campaign in ‘panic mode’ over Florida black voters

      To kill Donald Trump’s chances of capturing the White House, Hillary Clinton needs to win Florida. And to do that, she needs a big minority turnout.

      But Democrats are beginning to worry that too many African-American voters are uninspired by Clinton’s candidacy, leading her campaign to hit the panic button this week and launch an all-out blitz to juice-up voter enthusiasm.

      Bill Clinton, once nicknamed the “first black president,” embarks on a North Florida bus tour Friday in an attempt to draw African-American crowds. At the same time, Clinton herself will host events in Broward and St. Lucie counties, which have black populations higher than the statewide average.

    • 5 Conspiracy Theories That PROVE This Election Is The Worst

      The 2016 presidential election is well on its way to cementing its place in history’s annals of crazy. But do you know who finds it even crazier? Crazy people! Conspiracy nutjobs and other tinfoil hat cases follow political news too, and just as is the case with everyone else, there are candidates they do and don’t like. As such, the dark, sticky underbelly of the internet is inundated with madcap election theories that are somehow even more far-fetched than the accusations the actual candidates have been throwing around.

    • Michael Moore to Clinton supporters: Trump ‘won’

      Documentary filmmaker Michael Moore is telling Democratic presidential nominee Hillary Clinton’s supporters to treat the first presidential debate of 2016 as a Donald Trump victory and to not get complacent.

      Moore took to Twitter Tuesday, arguing that Clinton had “too much preparation, too much class,” and he wished she had gone “full throttle” on Trump, the Republican presidential nominee.

    • FBI silent on pending Clinton perjury probe

      FBI Director James Comey on Wednesday refused to provide the House Judiciary Committee with any clue about whether the bureau will comply with a request to investigate Hillary Clinton for perjury.

      “You cannot tell us whether you are indeed investigating?” Chairman Bob Goodlatte (R-Va.) asked during a hearing on FBI oversight.

      Comey said he would not comment on a pending referral.

      “When do you expect you will be able to tell us?” Goodlatte asked.

      “I don’t know,” Comey said.

      Goodlatte, along with Oversight Committee Chairman Jason Chaffetz (R-Utah), in July issued a criminal referral to U.S. District Attorney Channing Phillips, asking him to investigate whether Clinton lied to Congress during her marathon 11-hour testimony before the Select Committee on Benghazi.

    • I sold Trump $100,000 worth of pianos. Then he stiffed me.

      At Monday night’s debate, Donald Trump was called out for stiffing the people who work for him. Trump has been accused of failing to pay hundreds of contractors. And so far, he hasn’t seemed very sorry. When asked about failing to pay someone by Hillary Clinton this week, Trump replied, “Maybe he didn’t do a good job and I was unsatisfied with his work.”

      I take that attack personally. I’m one of the many small business owners who’ve been used by Trump, exploited and forced to suffer a loss because of his corporation’s shady practices.

      My relationship with Trump began in 1989, when he asked me to supply several grand and upright pianos to his then-new Taj Mahal casino in Atlantic City. I’d been running a music store for more than 30 years at that point, selling instruments to local schools and residents. My business was very much a family affair (my grandsons still run the store). And I had a great relationship with my customers — no one had ever failed to pay.

    • Jill Stein EXCLUSIVE: The debate through the Green Party lens

      Despite the efforts to silence the competition for the two establishment parties by excluding us from the televised presidential debates, we were able to reach millions of voters with our message using the open Internet and a cutting edge social media campaign.

      The debates sponsored by the Commission on Presidential Debates (CPD), a front group created by the Democratic and Republican parties to fool the American public, are anti-democratic. The two parties should not have the power to decide that their opponents cannot debate. That is not what democracy looks like.

      When the CPD was founded by former chairs of the Democratic and Republican National Committees, both made it clear their goal was to keep challengers out of the debate. Republican Frank Fahrenkopf, who remains a co-chair, indicated at the news conference that the CPD was “not likely to look with favor on including third-party candidates in the debates.”

      The NY Times quoted Democrat Paul Kirk, who was more blunt: “As a party chairman, it’s my responsibility to strengthen the two-party system.” Kirk’s successor as co-chair is Michael McCurry, former press secretary for Bill Clinton. The arbitrary criteria set by the secretive CPD are not designed to exclude “non-viable candidates”, but rather to prevent any candidate outside the Democratic-Republican duopoly from becoming viable in the eyes of the public.

    • Bernie Sanders’s brother to fight David Cameron’s seat for Green party

      Larry Sanders, the older brother of Democrat politician Bernie Sanders, is hoping to emulate his sibling’s success by standing for the Green party in David Cameron’s Oxfordshire seat.

      Bernie Sanders gave Hillary Clinton an unexpectedly tough fight in the Democratic presidential primaries, riding a wave of idealism among a predominantly young voter base.

      Now his brother Larry, 82, a retired social worker and former Green party councillor, plans to attempt a similar feat for the Greens in the byelection for the rock-solid Conservative constituency of Witney.

      It will be a tall order. “It hasn’t always been the richest turf for the Green party,” a party spokesman said. To become MP for Witney, he would have to overturn Cameron’s 22,700-vote majority in a seat where the last Green candidate won just 5.1% of the vote.

    • The Great Debate That Never Was

      If the Green Party’s Jill Stein had been allowed in this week’s presidential debate, it would have transformed the discussion and altered the race. That’s why Democrats and Republicans kept it a duopoly-only affair. “The only circumstances in which either Trump or Clinton can muster a minimally compelling argument, is against each other.” Thanks to Democracy Now!, we got a glimpse at what a real debate might be like. Clinton and Trump would lose.

  • Censorship/Free Speech

  • Privacy/Surveillance

  • Civil Rights/Policing

    • AP: Across US, police officers abuse confidential databases

      No single agency tracks how often the abuse happens nationwide, and record-keeping inconsistencies make it impossible to know how many violations occur.

      But the AP, through records requests to state agencies and big-city police departments, found law enforcement officers and employees who misused databases were fired, suspended or resigned more than 325 times between 2013 and 2015. They received reprimands, counseling or lesser discipline in more than 250 instances, the review found.

      Unspecified discipline was imposed in more than 90 instances reviewed by AP. In many other cases, it wasn’t clear from the records if punishment was given at all. The number of violations was surely far higher since records provided were spotty at best, and many cases go unnoticed.

    • Justice Department Is Fighting Fired FBI Agent’s Use of Whistleblower Defense

      John Parkinson, an Iraq War veteran who led a special operations unit in FBI’s Sacramento field office, first filed whistleblower complaints almost a decade ago when he became concerned with his coworkers’ behavior. He identified a colleague as having “a career-long pattern of soliciting prostitutes,” who used an FBI’s surveillance plane to travel to Reno to pay for sex. He alleged another colleague had a porn habit, even viewing explicit material at work. At one point, Parkinson removed furniture from an FBI office to keep it from getting soiled by the colleague, according to court documents.

      After filing his complaint, Parkinson found himself the subject of what he says was a retaliatory investigation, and was eventually fired. He has been fighting that decision for the past four years through a Kafkaesque maze of courts and internal appeals.

      On Monday, his attorneys filed a brief to the U.S. Federal Circuit Court of Appeals arguing for his right to raise a whistleblower retaliation defense.

    • Letter From CIA Whistleblower Jeffrey Sterling Details Federal Prison’s Scandalous Treatment

      Dear Jeffrey,

      I have followed your case closely, and I have also read recent updates from John Kiriakou, whose case I also covered extensively. I published his prison letters from FCI Loretto. Thank you for taking the time to answer some questions I have about your current struggle to obtain proper medical treatment for your heart condition.

      As of September 26, what is your current condition? What symptoms do you continue to endure? How critical do you believe it is that FCI Englewood take your symptoms seriously and grant you access to proper medical treatment? In other words, what do you need FCI Englewood to do for you now?

      How has your condition changed over the past months, and how responsive are officers within FCI Loretto to your insistence or requests for medical treatment? When you complain about pain, how long does it take until you finally see a doctor or medical professional?

      I understand you are expected to exhaust the administrative process before going outside this system to force the prison to give you proper medical treatment. What do you think of this process?

      I also recognize you, and your wife, Holly, have attempted other actions to convince the prison to take care of your urgent medical needs. What have you tried and what effect do you believe these actions have had?

      John Kiriakou reported on August 28 that Warden Deborah Denham had reversed her decision and would put a request into the “Bureau of Prisons Regional Office in Denver” that you “be taken to an outside cardiologist for testing.” Did you get to see a cardiologist? Is that how you found out you had high levels of Troponin?

    • The Proper Channels For Whistleblowing Still Mostly A Good Way For Messengers To Get Shot

      Whistleblower protections offered by the federal government are great in theory. In practice, they’re a mess. This administration has prosecuted more whistleblowers than all previous administrations combined. The proper channels for reporting concerns are designed to deter complaints. Those that do use the proper channels are frequently exposed by those handling the complaints, leading to retaliatory actions that built-in protections don’t offer an adequate remedy for.

      Perhaps the ultimate insult is that the proper channels lead directly to two committees that have — for the most part — staunchly defended agencies like the NSA against criticism and any legislative attempts to scale back domestic surveillance programs. The House and Senate Intelligence Committees are the “proper channels,” whose offered protections can only be seen as the hollowest of promises, especially after the House Intelligence Committee’s lie-packed response to calls for Snowden’s pardon.

      What the federal government offers to whistleblowers is a damned if you do/don’t proposition. Bypass the proper channels and brace yourself for prosecution. Stay within the defined lanes and expect nothing to change — except maybe your security clearance, pay grade, or chances of advancement within the government.

  • Internet Policy/Net Neutrality

    • ISP Feebly Tries To Defend Usage Caps By Comparing Them To…Oreos

      Earlier this month, we noted how Netflix had complained to the FCC about broadband usage caps, quite-correctly noting they’re little more than price hikes on uncompetitive markets. Netflix also was quick to highlight how caps can be used anti-competitively against streaming video providers, something the FCC opened the door to when it decided to turn a blind eye to the practice of zero rating (or exempting your own or a paid partners’ content from counting against the cap). As such, Netflix urged the FCC to finally crack down on usage caps using its authority under Section 706 of the Telecom Act.

    • AT&T Sues Nashville To Keep Google Fiber At Bay

      We’ve been talking about how the latest front in the battle for better broadband competition is the boring old utility pole. As Susan Crawford highlighted last month, getting permission from an ISP that owns a city’s utility poles can be a slow, bureaucratic nightmare, since the incumbent ISP has every incentive to stall would-be competitors. As such, Google has been pushing for “one touch make ready” proposals that use an insured, third-party contractor agreed to by all ISPs to move any ISP’s gear during fiber installs (often a matter of inches).

      But again, because this would speed up Google Fiber’s time to market, incumbent ISPs like Comcast, AT&T, Frontier and Time Warner Cable have all been fighting these reform efforts. Excuses provided by the ISPs range from claims that such reform violates their Constitutional rights, to unsubstantiated claims that such a policy would result in massive new internet service outages. AT&T has taken things one step further, and has been suing cities like Louisville for passing such reform laws.

  • Intellectual Monopolies

    • 10 highlights from the MARQUES Annual Conference in Villaitana

      Indigenous rights, EU trade mark reforms, geographical indications, design rights and much more were discussed at the recent MARQUES Annual Conference.

    • Trademarks

    • Copyrights

      • BBC iPlayer: New TV licence rules come into force

        All viewers who use the iPlayer to watch any BBC programmes must now be covered by a TV licence after new rules came into force on Thursday.

        Previously, iPlayer users only needed a licence if they were using the service to watch live broadcasts.

        That meant it was legal to watch programmes after broadcast on catch-up without paying the annual £145.50 fee.

        But the TV licence requirements have now been extended to include catch-up, online premieres and online-only shows.

      • Cloudflare: We Can’t Shut Down Pirate Sites

        As one of the leading CDN and DDoS protection services, Cloudflare is used by millions of websites across the globe.

        This includes thousands of “pirate” sites, including The Pirate Bay, who rely on the U.S. based company to keep server loads down.

        Copyright holders are generally not happy that Cloudflare is doing business with these sites. While most stop at complaining, adult entertainment outfit ALS Scan took the matter to court.

Links 28/9/2016: New Red Hat Offices, Fedora 25 ‘Frozen’

Posted in News Roundup at 6:11 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Linux Users v Windows Users, Debian Mourns Another

    The Debian project today shared the news of the passing of a long time contributor on September 17. In other news, the Linux Journal offered a free digital copy of their September 2016 magazine. Bruce Byfield compared Linux users to Windows users and My Linux Rig spoke to elementary OS founder Daniel Foré about his “Linux Setup.”

  • Asian Penguins turn failed program into a Linux success

    The Community School of Excellence (CSE) Asian Penguins are the world’s first and only Linux user group based in a Hmong charter school. A failed Windows laptop program at the school was turned by the Asian Penguins into a Linux success.

    Stu Keroff is the technology coordinator at the Community School of Excellence, a middle school located in St. Paul, Minnesota. He is a licensed elementary education and middle school social studies teacher, and a long-time Linux enthusiast. Stu founded and advises the Asian Penguins.

  • Free Today: September Issue of Linux Journal (Retail value: $5.99)
  • Desktop

    • 7 Ways Linux Users Differ from Windows Users

      To casual users, one person at a keyboard looks much the same as any other. Watch for a while, however, and the differences start to emerge — and whether they are using Linux or Windows is the least of them.

      The fact is, Linux users are different from Windows users in attitude as much as their choice of operating system. Originating as a Unix-type operating system and in opposition to Windows, Linux has developed an expectation and a philosophy in direct opposition to those promoted by Windows. Although many new Linux users have come directly from Windows, average Linux users simply do not react in the same way as Windows users.

    • Microsoft paid me $650 to scrub Windows 10 from my grandpa’s PC, says man

      Microsoft has paid the relative of an Alzheimer’s patient for having to scrub his PC clean of Windows 10.

      Jesse Worley said he’d received a cheque for $650 from Microsoft – seen by The Register – which he told us he’d received after threatening the giant with court action over an unwanted Windows 10 upgrade.

      Tech consultant Worley sought payment from the vendor for the 10 hours it took to rebuild his grandfather’s custom-build PC, re-installing Windows 7 to resemble Windows XP, in order to banish Windows 10.

      However, Worley – inspired by the case of a Californian woman over the unauthorised upgrade of her PC to Windows 10 – told The Reg he wasn’t interested in the money.

      He’d wanted to Microsoft to acknowledge it had slipped up with its notorious Get Windows 10 (GWX) nagware notifications, which he branded “deliberately misleading”.

      “Had Microsoft not gone out of their way to be deceptive, my grandfather pretty clearly wouldn’t have been updated to Windows 10,” he said.

    • Why kid hackers should have a Linux computer

      Kids these days are quite amazing in how fast they learn how to use computers. And what better system for a young hacker than a Linux computer? A writer at Medium recently shared the story of how his young nephew got his very own Linux computer.

  • Server

    • ​Kubernetes 1.4: One DevOps tool to rule all the containers
    • Kubernetes 1.4 promises to make container orchestration easier, more powerful
    • Canonical Releases ‘Core’ Kubernetes Container Distribution
    • Canonical launches Kubernetes public beta distribution
    • Canonical steps up enterprise courtship with Kubernetes bundle
    • Kubernetes 1.4 makes container orchestration bigger — and simpler
    • Canonical Expands Enterprise Container Portfolio with Commercially Supported Distribution of Kubernetes
    • Strategies for Running Stateful Applications in Kubernetes: Volumes

      Mesosphere DC/OS emphasizes running transactional workloads alongside cloud-native applications. Robin Systems, one of the container management companies, is aiming to containerize Oracle and other enterprise databases. The Kubernetes container orchestration engine is gearing up to run stateful workloads through a new concept called Pet Sets, which is a pod of stateful containers. Pet Sets was introduced as an alpha feature in Kubernetes 1.3, released in July.

      Kubernetes abstracts the underlying infrastructure building blocks into compute, storage and networking. When developers and operations teams get started with Kubernetes, they typically get exposed to objects such as pods, labels, services, deployments and replica sets, which provide a mechanism to deal with compute and networking. When it comes to persistence in Kubernetes, users should get familiar with the concepts of volumes, persistent volumes, persistent volume claims (PVC) and the upcoming Pet Sets.

      This article will be a first in a series that discusses the strategies and use cases for each of the storage choices available in Kubernetes. In this chapter, we will take a closer look at volumes, that provide the easiest migration path to Kubernetes.

    • Docker Doubles Down on Microsoft Windows Server [Ed: recall “DockerCon 2015 Infiltrated by Microsoft”]

      Docker for Windows debuts alongside a new commercial support relationship with Microsoft.
      For the most part, the Docker container phenomenon has been about Linux, with the majority of all deployments on Linux servers. But that could soon be changing as Docker Inc. today is announcing the general availability of Docker Engine on Windows Server 2016, alongside a new commercial support and distribution agreement with Microsoft.

      Docker containers rely on the host operating system for certain isolation and process elements in order to run. On Linux, those elements have always been present as part of the operating system, but the same was not true for Windows, which has required several years of joint engineering effort between Docker Inc. and Microsoft.

    • Hadoop Sandboxes and Trials Spread Out

      We all know that there is a skills gap when it comes to Hadoop in the Big Data market. In fact, Gartner Inc.’s 2015 Hadoop Adoption Study, involving 284 Gartner Research Circle members, found that only 125 respondents who completed the whole survey had already invested in Hadoop or had plans to do so within the next two years. The study found that there are difficulties in implementing Hadoop, including hardship in finding skilled Hadoop professionals.

    • Use models to measure cloud performance

      When I was young, I made three plastic models. One was of a car—a ’57 Chevy. Another was of a plane—a Spitfire. And a third was of the Darth Vader TIE Fighter. I was so proud of them. Each one was just like the real thing. The wheels turned on the car, and the plane’s propeller moved when you blew on it. And of course, the TIE Fighter had Darth Vader inside.

      When I went to work on the internet, I had to measure things. As I discussed in my last post, Measure cloud performance like a customer, when you measure on the internet you need to measure in ways that are representative of your customers’ experiences. This affects how you measure in two ways. The first is the perspective you take when measuring, which I talked about last time. The second way is the techniques you use to perform those measurements. And those techniques are, in effect, how you make a model of what you want to know. Those childhood plastic models turn out to offer some solid guidance after all.

    • ODPi Adds Apache Hive to Runtime Specification 2.0

      Today, ODPi announced that the ODPi Runtime Specification 2.0 will add Apache Hive and Hadoop Compatible File System support (HCFS). These components join YARN, MapReduce and HDFS from ODPi Runtime Specification 1.0

      With the addition of Apache Hive to the Runtime specification, I thought it would be a good time to share why we added Apache Hive and how we are strategically expanding the Runtime specification.

    • Ubuntu’s OpenStack on IBM’s Big Iron

      If I were Red Hat I would be looking over my shoulder right now; it appears that Ubuntu might be gaining. In just a few years the Linux distribution has gone from being non-existent in the enterprise to being a powerhouse. This is especially true in the cloud, where it’s a dominant force on both sides of the aisle. Not only is it the most deployed operating system on public clouds, its version of OpenStack accounts for over half of OpenStack cloud deployments, used by the likes of Deutsche Telekom, Bloomberg and Time Warner Cable.

  • Kernel Space

  • Applications

    • Linux and Open Source Hardware for IoT

      Most of the new 21 open source software projects for IoT that we examined last week listed Linux hacker boards as their prime development platforms. This week, we’ll look at open source and developer-friendly Linux hardware for building Internet of Things devices, from simple microcontroller-based technology to Linux-based boards.

      In recent years, it’s become hard to find an embedded board that isn’t marketing with the IoT label. Yet, the overused term is best suited for boards with low prices, small footprints, low power consumption, and support for wireless communications and industrial interfaces. Camera support is useful for some IoT applications, but high-end multimedia is usually counterproductive to attributes like low cost and power consumption.

    • nginx

      Case in point: I’ve been using the Apache HTTP server for many years now. Indeed, you could say that I’ve been using Apache since before it was even called “Apache”—what started as the original NCSA HTTP server, and then the patched server that some enterprising open-source developers distributed, and finally the Apache Foundation-backed open-source colossus that everyone recognizes, and even relies on, today—doing much more than just producing HTTP servers.

      Apache’s genius was its modularity. You could, with minimal effort, configure Apache to use a custom configuration of modules. If you wanted to have a full-featured server with tons of debugging and diagnostics, you could do that. If you wanted to have high-level languages, such as Perl and Tcl, embedded inside your server for high-speed Web applications, you could do that. If you needed the ability to match, analyze and rewrite every part of an HTTP transaction, you could do that, with mod_rewrite. And of course, there were third-party modules as well.

    • Etcher Image Writer Is Now Better Than Ever

      Back in may we spotlighted Etcher, a stylish open-source USB image writer app for Windows, macOS and Linux.

      In the months since our feature the app has released a over 10 small beta updates, with Etcher 1.5 Beta being the most recent release at the time of writing.

    • Audacious 3.8 released

      Audacious 3.8 was released on September 21, 2016.

    • New Version of Audacious Music Player Released

      A new version of Audacious, a popular lightweight audio player, is now available for download.

      Audacious 3.8 introduces a small set of features, including the ability to run more than one instance of the app at the same time. Quite why… no idea.

      New audtool commands have been added, including stream recording toggles, and cue sheet support is said to be “more seamless”.

    • Rambox Puts All Your Favorite Messaging Services In One App

      Rambox is a free, open-source messaging and email app that groups all your favourite web apps into one easy-to-manage window.

      Sound familiar?

      We’ve highlighted apps like Rambox before, with Franz and the Gmail-specific Wmail being but two.

    • Stylish Markdown Editor ‘Typora’ Is Now Available for Ubuntu

      In the market for a desktop markdown editor for Linux? You may have helped but notice that you’re rather spoilt for choice. From Abricotine and Scratch to Simplenote, Springseed and Remarkable. Even Gedit can render markdown with the right plugin! With so much choice it can be difficult to know which app to pick.

    • YoutPlayer Floats Your Fave YouTube Videos on The Desktop [Ed: just an Electron app]

      Looking for a neat-o way to play YouTube playlists on your desktop, outside your browser? Take a looksie at Yout, an Electron app that lets you add and watch YouTube playlists on your desktop, floating window stylee. Yout is not the most user-friendly of apps.

    • Instructionals/Technical

    • Games

      • Avoid the pile-up in ‘Clustertruck’, a first-person platformer with day-1 Linux support, it’s great

        We have been steadily getting more 3D “beat the timer” games where you’re up against others times, which is great because they really can be fun. I do love getting competitive in certain games, especially with some of my Steam friends and friends in the wider community. Games like this recently have been something I’ve been repeatedly going back to for a break from life.

        Clustertruck is not only about beating the times of other people, but it’s also a “the floor is lava” game, so if you touch the floor you have to start again. The really funny thing is that the safe pads are moving trucks you have to keep up with. You can at least grab onto the back of a truck if you just about touch it, so it’s not always instant death.

      • Fusion 3, the next generation game engine and editor from Clickteam will support Linux

        The difference between their tools and others, is the event system. Instead of needing to program every single line, you can stack up events and link them together to create a game. It works quite well and I’m pretty excited to give Fusion 3 a go on Linux myself to see what random games I can create for fun.

      • SteamOS 2.93 Brewmaster Beta Adds New Security Fixes from Debian GNU/Linux 8.6

        Valve’s SteamOS 2 gaming operating system is still getting goodies, and it looks like a new Beta update has been pushed on September 26, 2016, to the brewmaster_beta channel for public beta testers.

        That’s right, SteamOS 2.93 Brewmaster Beta is here to replace the previous build announced earlier this month, SteamOS 2.91 Brewmaster Beta, and add the latest security fixes and updates from upstream. This means that SteamOS is now officially based on the recently released Debian GNU/Linux 8.6 “Jessie” operating system.

        “SteamOS brewmaster update 2.93 pushed to brewmaster_beta. Corrects a build issue where the last kernel updates were not actually included. Also updates from the Debian 8.6 release[www.debian.org] and the usual security fixes,” says John Vert, Valve engineer, in the release announcement.

      • There Are Around 2,000 Steam Linux Games Available
      • Steam now has above 2,500 Linux & SteamOS games available

        I’ve seen some posts on reddit and across the wider net about Steam hitting around 2,000 games for Linux. The truth is the number is actually quite a lot higher.

        People seem to be using SteamDB numbers which aren’t up to date. The problem here is that SteamDB is unofficial and a manual process for people to let them know a game works. So you need to own the game and manually tell them, which makes their numbers rather different to the reality.
        Note: SteamDB do truly excellent work, this isn’t a bash attempt, but to let people know how they work and how their list is different.

        The other problem is that the Steam Search when filtering only for Games and only for Linux is still incorrect. It actually lists games that are due soon, or due this month and haven’t released yet. It also still lists games that haven’t updated their release date that were supposed to release before today, but didn’t actually release yet.

      • ‘Farabel’, a turn based strategy game is officially coming to Linux after a days work

        The developers of Farabel [Official Site, Steam, itch] sent word that their game is now officially coming to Linux. They asked for testers and in a single day got the game working properly on Linux and it’s now official.

      • RADV Vulkan Driver Can Now Correctly Render Talos Principle
      • The Talos Principle now renders correctly in ‘radv’, the open source AMD Vulkan driver

        Good news for Vulkan and AMD GPU fans, as David Airlie has put up a new blog post letting us know that The Talos Principle now renders correctly in this new open source AMD Vulkan driver.

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

    • GNOME Desktop/GTK

      • GNOME 3.22 Supports Flatpak Cross-Linux Distribution Framework

        GNOME 3.22, the second major update this year to the GNOME desktop environment, debuted Sept. 21—and since then, has made its way into the repositories of Linux distributions, including Fedora and openSUSE. Much as was the case with the GNOME 3.20 update earlier this year, many of the changes in the latest iteration of the popular open-source desktop environment are incremental. Among the most significant capabilities in GNOME 3.22 is support for the Flatpak framework, which is designed to allow an application to be installed on various Linux distributions. The GNOME Builder integrated development environment (IDE) can now also be used by developers to build Flatpak-compatible applications. Flatpak is an alternative approach to Snappy, which provides similar capabilities and was originally developed by Ubuntu. The GNOME Files application continues to evolve and, in this release, adds new capabilities that enable users to open compressed files automatically. Files also enables users to compress files easily in common compression formats. Additionally, Files gained the ability to batch rename files and folders on a user’s system. Here’s a look at the key features of the GNOME 3.20 desktop update.

      • [GNOME Maps:] Planning a trip
  • Distributions

    • The Linux Setup – Daniel Foré, elementary OS

      Daniel is the founder of elementary OS, the distribution that’s famous for its own look. Daniel came to Linux through a love of customizing Windows XP, so it’s no surprise he also came to appreciate the flexibility of Linux. Interestingly, especially given the strong visual aesthetic of elementary, Daniel’s favorite app is the Scratch text editor!

    • New Releases

      • Solus Gets MATE 1.16 Desktop Environment and Linux Kernel 4.7.5, Up-to-Date Apps

        Joshua Strobl from the Solus Project published a new installation of the distribution’s weekly newsletter, This Week in Solus 36, to inform Solus users about the latest software updates and other important changes in the Linux OS.

      • Proxmox VE 4.3 released

        Proxmox Server Solutions GmbH today announced the general availability of Proxmox Virtual Environment 4.3. The hyper-converged open source server virtualization solution enables users to create and manage LXC containers and KVM virtual machines on the same host, and makes it easy to set up highly available clusters as well as to manage network and storage via an integrated web-based management interface.

        The new version of Proxmox VE 4.3 comes with a completely new comprehensive reference documentation. The new docu framework allows a global as well as contextual help function. Proxmox users can access and download the technical documentation via the central help-button (available in various formats like html, pdf and epub). A main asset of the new documentation is that it is always version specific to the current user’s software version. Opposed to the global help, the contextual help-button shows the user the documentation part he currently needs.

      • Proxmox VE 4.3 Officially Released with New Reference Documentation, Updated GUI

        Today, September 27, 2016, Proxmox Server Solutions GmbH proudly announced the immediate availability of the Proxmox VE (Virtual Environment) 4.3 open source, Linux-based hyper-converged server virtualization solution.

        The biggest new feature of the Proxmox VE 4.3 release appears to be a new reference documentation that users can download in various formats, including as EPUB, PDF or HTML, helping newcomers get started with Proxmox much faster. However, it looks like it is based on the Debian GNU/Linux 8.6 “Jessie” and Ubuntu 16.04 LTS (Xenial Xerus) operating systems, running LXC 2.0 and Linux kernel 4.4 LTS.

    • OpenSUSE/SUSE

    • Red Hat Family

      • How Red Hat is making money on the public cloud with a hybrid approach

        Red Hat hasn’t traditionally played much of a part in public clouds, a fact its CEO Jim Whitehurst underscored in Red Hat’s recent earnings call. Though the company is now dabbling in a true elastic/consumption-based delivery and pricing model via OpenShift, Red Hat remains a primarily on-premises business that only feints toward a true cloud model in terms of service delivery.

        Ironically, the hybrid cloud may be the trend that gets Red Hat fully planted in the public cloud.

      • Red Hat Software Adding Fort Point Offices

        The new location will include an immersive briefing center for visiting executives, the first East Coast location for the company’s innovation labs and a new engineering lab, which will augment Red Hat’s 175,000-square-foot engineering and product headquarters in Westford. The engineering lab will provide collaborative space to take advantage of Boston’s tech ecosystem, Raleigh, North Carolina-based Red Hat said in a statement.

      • Finance

      • Fedora

        • Fedora Join meetings to begin this week

          We’ve had the Fedora Join SIG around for a bit now, but we haven’t been very active. Recently we’ve seen an increase in community members willing to participate in the SIG, and in combination with the work that CommOps is doing to improve the “joining experience” for newbies, we thought that it’s a good time to gain some traction.

        • Fedora 25 Alpha and processing.

          Is simple to use. You can used with java also with python and android mode.
          Come with many examples and tutorials.
          Today I tested with Fedora 25 alpha.

        • Fedora 24 — The Best Distro for DevOps?

          If you have been to any DevOps-focused conferences — whether it’s OpenStack Summit or DockerCon — you will see a sea of MacBooks. Thanks to its UNIX base, availability of Terminal app and Homebrew, Apple hardware is extremely popular among DevOps professionals.

          What about Linux? Can it be used as a platform by developers, operations, and DevOps pros? Absolutely, says Major Hayden, Principal Architect at Rackspace, who used to be a Mac OS user and has switched to Fedora. Hayden used Mac OS for everything: software development and operations. Mac OS has all the bells and whistles that you need on a consumer operating system; it also allows software professionals to get the job done. But developers are not the target audience of Mac OS. They have to make compromises. “It seemed like I had to have one app that would do one little thing and this other app would do another little thing,” said Hayden.

        • Fedora 25 Goes Into Beta Freeze Today, New Features Need To Be Completed

          Today is a big day along the Fedora 25 schedule and stepping towards its official debut in November.

          The Fedora 25 Beta freeze is today ahead of the planned beta release on 11 October. Also very important is today’s the 100% code complete deadline for Fedora 25 changes.

        • Fedora 25 Beta Freeze
        • Fedora 25 Linux Beta Might Land on October 11, 2016, Beta Freeze Now in Effect

          Fedora Project’s Mohan Boddu announced on September 26, 2016, that the upcoming Fedora 25 Beta milestone, which is scheduled for release next month on the 11th, is now officially in freeze stage.

          Fedora 25 is the next major release of the Red Hat-sponsored computer operating system for power users and anyone else who wants a well-designed Linux-based OS. It has been in development since July 2016, and the Alpha snapshot has hit the streets on August 30, after being delayed by a week due to some nasty regressions and bugs that have been patched quickly.

          The next stop in the Fedora 25 Linux development cycle is the Beta, which, according to the official release schedule, is now in freeze state. The Beta Freeze stage means that developers won’t be allowed to add any other features to the upcoming Beta release, but only to fix blockers and other annoyances that might not offer users a quality product.

    • Debian Family

      • Debian Project mourns the loss of Kristoffer H. Rose

        Kristoffer was a Debian contributor from the very early days of the project, and the upstream author of several packages that are still in the Debian archive nowadays, such as the LaTeX package Xy-pic and FlexML. On his return to the project after several years’ absence, many of us had the pleasure of meeting Kristoffer during DebConf15 in Heidelberg.

      • Derivatives

        • Parsix GNU/Linux 8.5 “Atticus” to Reach End of Life on September 30, 2016

          The Parsix GNU/Linux developers announced that the end-of-life status is approaching fast for the Parsix GNU/Linux 8.5 “Atticus” operating system, urging users to upgrade to the latest release immediately.

          Dubbed Atticus and based on the Debian GNU/Linux 8.5 “Jessie” operating system, Parsix GNU/Linux 8.5 was unveiled seven months ago, on February 14, 2016. Running the long-term supported Linux 4.1.17 kernel injected with TuxOnIce 3.3 and BFS patches, it was built around the GNOME 3.18 desktop environment with the GNOME Shell 3.18.3 user interface.

          The end of life (EOL) will be officially reached on September 30, 2016, which means that users of the Parsix GNU/Linux 8.5 “Atticus” operating system will no longer receive security and software updates. Therefore, they are urged today to upgrade to the latest, most recent version of the Debian-based distribution, Parsix GNU/Linux 8.10 “Erik.”

        • Canonical/Ubuntu

          • Ubuntu 16.10 Final Beta Officially Released with Linux Kernel 4.8, Download Now

            Delayed six days, the Final Beta release of the upcoming Ubuntu 16.10 (Yakkety Yak) operating system launched today, September 28, 2016, as the final development snapshot in the series.

            Today’s Final Beta is in fact the first Beta pre-release version of Ubuntu 16.10, and the only development milestone that you’ll be able to test if you want to see what’s coming to the next major release of Ubuntu Linux. However, we can tell you that it is powered by Linux kernel 4.8, contains up-to-date applications, and still uses the Unity 7 UI.

            “The Ubuntu team is pleased to announce the final beta release of Ubuntu 16.10 Desktop, Server, and Cloud products. Codenamed “Yakkety Yak”, 16.10 continues Ubuntu’s proud tradition of integrating the latest and greatest open source technologies into a high-quality, easy-to-use Linux distribution. The team has been hard at work through this cycle, introducing new features and fixing bugs,” reads the announcement.

  • Devices/Embedded

Free Software/Open Source

  • GitHub open-sources internal load-balancing software

    GitHub will release as open source the GitHub Load Balancer (GLB), its internally developed load balancer.

    GLB was originally built to accommodate GitHub’s need to serve billions of HTTP, Git, and SSH connections daily. Now the company will release components of GLB via open source, and it will share design details.

  • GE, Bosch and open source could bring more IoT tools

    Partnerships that could shape the internet of things for years are being forged just as enterprises fit IoT into their long-term plans.

    A majority of organizations have included IoT as part of their strategic plans for the next two to three years, IDC said last week. No one vendor can meet the diverse IoT needs of all those users, so they’re joining forces and also trying to foster broader ecosystems. General Electric and Germany’s Bosch did both on Monday.

    The two companies, both big players in industrial IoT, said they will establish a core IoT software stack based on open-source software. They plan to integrate parts of GE’s Predix operating system with the Bosch IoT Suite in ways that will make complementary software services from each available on the other.

  • Industrial IoT leaders work towards interoperability and open source collaboration
  • GE and Bosch Sign Agreement for Interoperability and Open Source Collaboration
  • Free PPMP from Bosch makes Industry 4.0 open for all
  • Open source tools can help small businesses cut costs and save time

    Imagine if there was a global community of tech experts who were independently building and improving digital tools that you could use for free. Tools that could help you provide a service for, and communicate with, your customers.

    Well, there is. The open source community is made up of amateur and professional computer coders who work on publicly available computer code. Businesses can then take these lines of code from websites such as Github, to use in their software, products and services.

    Open source projects are helping small businesses all over the world to save time and money.

  • OPNFV Colorado platform bolsters open source NFV efforts

    The Linux Foundation’s Open Platform for NFV project claims its third platform release targets accelerating development of NFV apps and services

    The telecom market’s continued move towards integrating network functions virtualization received a boost as the Linux Foundation’s Open Platform for NFV project released its latest Colorado platform release, the third from the open source-based organization.

  • Open-source NFV Project delivers third platform release

    The OPNFV Project, an open source project that facilitates the development and evolution of Network Functions Virtualization (NFV) components across various open source ecosystems through integration, deployment, and testing today announced the availability of OPNFV Colorado, the project’s third platform release.

  • Inocybe Technologies Launches Community Version of their Open Networking Platform
  • Open Source Getting on My Nerves

    Open source people are generally not dirt dishers, however. Take Phil Robb of OpenDaylight , where he is senior technical director. Robb was on that MANO panel in Denver, and he spoke to me shortly afterward in an interview on ODL’s new Boron software release. I specifically asked him about the “messy MANO situation” right now.

    His response was frustratingly calm. “I would equate the MANO space with where the controller space was three years ago,” he says. “One of the great things about open source is that real code is going to be up, going to be used, stuff will work or it will fall over. But we’ll fail fast and move on.” (See Carriers Driving ODL’s Boron Release.)

    So having multiple versions in process isn’t a bad thing, Robb says, because it might be that one approach works better for a set of use cases than another. What the industry will come around to “sooner rather than later” is that one approach likely addresses the broadest set of use cases and will be more widely adopted, while others address niches and either are used alongside the major approach or incorporated into it.

  • GENIVI Alliance launches new open source vehicle simulator project
  • Choosing the right metrics for your project

    Last month we discussed setting goals for your community metrics program. These goals serve as a constant reminder of what you want to achieve in the program and should be used as metrics themselves when deciding exactly what you are going to measure.

    This month we’ll document a basic strategy for deciding what to measure, and give examples of specific community metrics we’ve used in practice. Using our knowledge of our community and the goals we previously came up with, we’ll make sure the metrics we choose are relevant.

  • An Open Source Shopping Cart Can Boost Your Online Commerce Efforts
  • Open Source Projects Must Work Together to Survive

    Open source software is in danger of being beaten at its own game by upstart services that are tightly integrated, less complex, and easier to use. That message was at the heart of the cautionary tale told by Stephen O’Grady in his keynote at this year’s ApacheCon North America in May.

    O’Grady, Principal Analyst & Cofounder of RedMonk, recalled his years as a systems integrator, pointing out that open source software took a big bite out of the enterprise software market when it became more accessible and easier to use.

  • Contributing to an Open Source Project

    If you’re interested gaining some tips and insights into how to contribute to open source, this video of a presentation given on September 19 at the JavaOne conference in San Francisco by Gunnar Wagenknecht, a software engineer at Salesforce, and Wayne Beaton, director at the Eclipse Foundation, might be useful to you.

  • Facebook Debuts Open Source Detection Tool for Windows

    Facebook debuted the open source tool in 2014 as cross-platform, but for the last two years it was only supported on Ubuntu, CentOS, and Mac OS X operating systems. Facebook isn’t the biggest Windows shop, but the company confirmed in March that because so many users were asking for it, it was building a version of the tool for Windows 10.

  • Events

    • Report for Software Freedom Day 2016 – China Academy Science

      This year I am asked to present SFD in China Academy Science by the company, so unlucky I am not proper to deliver a Fedora talk then. I bring some DVDs and stickers there, as well as a roll up poster. However there are people asking questions about Fedora so finally I still do some Q&A after the event.

      SFD in China Academy Science this year is hold in Huairou Campus, suburbs of Beijing. So with another Red Hatter, Shiyang, we took train there. Their campus is not easy to find and by the time we arrived at the event it’s 10 minutes before the start of the event.

      Talks started on 2:00 PM. After the hostess introduced the event, Shiyang is the first to talk. He introduces the basic usage of Git and Github. During the Q&A part of his talk, I found that in fact most students not paying much attention to distributions already. They are just users of Linux.

    • OpenDaylight Symposium 2016
    • Keynote: Join or Die! – Stephen O’Grady, Principal Analyst & Cofounder, RedMonk
  • Web Browsers

    • Mozilla

      • B2G OS and Gecko Annoucement from Ari Jaaksi & David Bryant

        In the spring and summer of 2016 the Connected Devices team dug deeper into opportunities for Firefox OS. They concluded that Firefox OS TV was a project to be run by our commercial partner and not a project to be led by Mozilla. Further, Firefox OS was determined to not be sufficiently useful for ongoing Connected Devices work to justify the effort to maintain it. This meant that development of the Firefox OS stack was no longer a part of Connected Devices, or Mozilla at all. Firefox OS 2.6 would be the last release from Mozilla. Today we are announcing the next phase in that evolution. While work at Mozilla on Firefox OS has ceased, we very much need to continue to evolve the underlying code that comprises Gecko, our web platform engine, as part of the ongoing development of Firefox. In order to evolve quickly and enable substantial new architectural changes in Gecko, Mozilla’s Platform Engineering organization needs to remove all B2G-related code from mozilla-central. This certainly has consequences for B2G OS. For the community to continue working on B2G OS they will have to maintain a code base that includes a full version of Gecko, so will need to fork Gecko and proceed with development on their own, separate branch.

      • Firefox 53 Will Drop Support for Windows XP and Windows Vista

        Software companies are one by one giving up on Windows XP support for their products, and now it appears that it’s Mozilla’s turn to switch the focus to newer versions of Windows.

        Firefox 53 will be the first version of the browser which will no longer support Windows XP and Windows Vista, so users who haven’t yet upgraded to Windows 7 or newer will have to either stick with Firefox 52 or move to a different browser.

      • Boot 2 Gecko Being Stripped From Mozilla’s Codebase

        At the end of 2015 Mozilla effectively put an end to Firefox OS / Boot 2 Gecko by concluding things weren’t working out for Mozilla Corp and their commercial partners to ship Firefox OS smartphones. All commercial development around it has since stopped and they are now preparing to strip B2G from the mozilla-central code-base.

        The news to report on now is that Ari Jaaksi and David Bryant have announced, “Today we are announcing the next phase in that evolution. While work at Mozilla on Firefox OS has ceased, we very much need to continue to evolve the underlying code that comprises Gecko, our web platform engine, as part of the ongoing development of Firefox. In order to evolve quickly and enable substantial new architectural changes in Gecko, Mozilla’s Platform Engineering organization needs to remove all B2G-related code from mozilla-central. This certainly has consequences for B2G OS. For the community to continue working on B2G OS they will have to maintain a code base that includes a full version of Gecko, so will need to fork Gecko and proceed with development on their own, separate branch.”

  • SaaS/Back End

  • CMS

    • Open source application portal adds new ITS applications for download

      The Open Source Application Development Portal (OSADP) web-based portal provides access to and supports the collaboration, development, and use of open-source ITS-related applications. The OSADP has added a number of new ITS-related applications that are available free to the public, including:

  • Public Services/Government

    • Wyoming’s open source enterprise code library a secret no more

      Wyoming’s 250-person Enterprise Technology Services (ETS) group knew it had a good thing in its Enterprise Extensible Code Library, but it chose to keep things under wraps outside of the state until last week when members of that team attended an annual confab for state government CIOs.

      It was at the National Association of State Chief Information Officers (NASCIO) convention in Orlando that the ETS code library project was honored with a Recognition Award for Enterprise IT Management Initiatives, and the inquiries from other states and organizations started streaming in.

  • Openness/Sharing/Collaboration

    • Inside the Drone Journalism Lab’s open source operations manual

      Across the world, journalists are increasingly using drone technology to augment their reporting at a fairly inexpensive price.

      In order to help journalists become more adept drone users, the University of Nebraska-Lincoln’s Drone Journalism Lab recently released a free operations manual online.

      The manual, produced by Matt Waite, founder of the Drone Journalism Lab, is open source and Creative Commons licensed.

    • Open Source Malaria’s First Paper

      Open Source Malaria (OSM) publishes its first paper today. The project was a real thrill, because of the contributors. I’d like to thank them.

      Skepticism about open source research is often based on assumptions: that people will be too busy or insufficiently motivated to participate, or that there will be a cacophony of garbage contributions if a project is open to anyone. I’m not sure where such assumptions come from – perhaps people look first for ways that things might fail. We can draw upon many experiences of the open source software movement that would suggest such assumptions are poor. We can draw on successful examples of open collaboration in other areas of science, such as the Human Genome Project and the projects it has spawned, as well as examples in mathematics and astrophysics. This OSM paper addresses open source as applied to drug discovery, i.e. experimental, wet lab science in an area where we normally expect to need secrecy, for patents. It is based on the experience of 4-5 years of work and describes the first series examined by OSM.

    • Open Access/Content

Leftovers

  • Video claiming drilling into iPhone 7 will reveal hidden headphone port goes viral

    A video claiming that users can add a headphone socket to the iPhone 7, which only has a Lightning port, by drilling into the bottom of their phone has been watched almost 10m times.

    The prank video shows a man drilling a 3.5mm hole into the bottom left edge of the iPhone 7 held in a vice. It points to the row of small holes on the left side that replaced the headphone socket present on the iPhone 6S and claims that drilling into the second hole on the left reveals a hidden socket.

    Once the hole has been drilled the video shows an iPhone 7 playing music, although the sound comes out of the speakers, not the white headphones now inserted in the DIY hole.

  • Tempers flare in Venice as angry protesters block cruise ships

    Hundreds of demonstrators have taken to the water in Venice to protest against visiting cruise ships, as relations between tourists and locals reach a new nadir.

    Flare-waving protestors used gondolas and small boats to prevent cruise ships, including a vessel belonging to Thomson, from passing through the lagoon on Sunday.

    During peak season some 30,000 cruise ship passengers disembark in Venice every day, which locals claim is ruining their city, both environmentally and culturally.

  • Disney Is Working With an Adviser on Potential Twitter Bid

    Walt Disney Co. is working with a financial adviser to evaluate a possible bid for Twitter Inc., according to people familiar with the matter.

    After receiving interest in discussing a deal, Twitter has started a process to evaluate a potential sale. Salesforce.com Inc. is also considering a bid and is working with Bank of America on the process, according to other people, who asked not to be named because the matter is private.

    Representatives for Twitter and Disney didn’t respond to requests for comment.

    Speculation that Twitter will be sold has been gathering steam in recent months, including last week’s news of Salesforce’s interest, given the social-media company’s slumping stock and difficulties in attracting new users and advertising revenue. Disney, the owner of ABC and ESPN, could obtain a new online outlet for entertainment, sports and news. Jack Dorsey, chief executive officer of Twitter, is on the board of Disney.

  • Science

    • Archaelogists discover 200-year-old underground pub in Manchester

      Archaelogists have discovered a 200-year-old underground pub during building work on a office building in central Manchester.

      Excavators discovered untouched bottles full of of brandy and crockery branded with the 18th-century landlord of the Astley Arms.

      Archaelogists were brought to the site of a future 13-storey skyscraper as part the planning process and found the remains of houses as well as the pub.

  • Security

    • Tuesday’s security updates
    • New Open Source Linux Ransomware Divides Infosec Community

      Following our investigation into this matter, and seeing the vitriol-filled reaction from some people in the infosec community, Zaitsev has told Softpedia that he decided to remove the project from GitHub, shortly after this article’s publication. The original, unedited article is below.

    • Fax machines’ custom Linux allows dial-up hack

      Party like it’s 1999, phreakers: a bug in Epson multifunction printer firmware creates a vector to networks that don’t have their own Internet connection.

      The exploit requirements are that an attacker can trick the victim into installing malicious firmware, and that the victim is using the device’s fax line.

      The firmware is custom Linux, giving the printers a familiar networking environment for bad actors looking to exploit the fax line as an attack vector. Once they’re in that ancient environment, it’s possible to then move onto the network to which the the printer’s connected.

      Yves-Noel Weweler, Ralf Spenneberg and Hendrik Schwartke of Open Source Training in Germany discovered the bug, which occurs because Epson WorkForce multifunction printers don’t demand signed firmware images.

    • Google just saved the journalist who was hit by a ‘record’ cyberattack

      Google just stepped in with its massive server infrastructure to run interference for journalist Brian Krebs.

      Last week, Krebs’ site, Krebs On Security, was hit by a massive distributed denial-of-service (DDoS) attack that took it offline, the likes of which was a “record” that was nearly double the traffic his host Akamai had previously seen in cyberattacks.

      Now just days later, Krebs is back online behind the protection of Google, which offers a little-known program called Project Shield to help protect independent journalists and activists’ websites from censorship. And in the case of Krebs, the DDoS attack was certainly that: The attempt to take his site down was in response to his recent reporting on a website called vDOS, a service allegedly created by two Israeli men that would carry out cyberattacks on behalf of paying customers.

    • Krebs DDoS aftermath: industry in shock at size, depth and complexity of attack

      “This attack didn’t stop, it came in wave after wave, hundreds of millions of packets per second,” says Josh Shaul, Akamai’s vice president of product management, when Techworld spoke to him.

      “This was different from anything we’ve ever seen before in our history of DDoS attacks. They hit our systems pretty hard.”

      Clearly still a bit stunned, Shaul describes the Krebs DDoS as unprecedented. Unlike previous large DDoS attacks such as the infamous one carried out on cyber-campaign group Spamhaus in 2013, this one did not use fancy amplification or reflection to muster its traffic. It was straight packet assault from the old school.

    • iOS 10 makes it easier to crack iPhone back-ups, says security firm

      INSECURITY FIRM Elcomsoft has measured the security of iOS 10 and found that the software is easier to hack than ever before.

      Elcomsoft is not doing Apple any favours here. The fruity firm has just launched the iPhone 7, which has as many problems as it has good things. Of course, there are no circumstances when vulnerable software is a good thing, but when you have just launched that version of the software, it is really bad timing.

      Don’t hate the player, though, as this is what Elcomsoft, and what Apple, are supposed to be doing right.

      “We discovered a major security flaw in the iOS 10 back-up protection mechanism. This security flaw allowed us to develop a new attack that is able to bypass certain security checks when enumerating passwords protecting local (iTunes) back-ups made by iOS 10 devices,” said Elcomsoft’s Oleg Afonin in a blog post.

    • After Tesla: why cybersecurity is central to the car industry’s future

      The news that a Tesla car was hacked from 12 miles away tells us that the explosive growth in automotive connectivity may be rapidly outpacing automotive security.

      This story is illustrative of two persistent problems afflicting many connected industries: the continuing proliferation of vulnerabilities in new software, and the misguided view that cybersecurity is separate from concept, design, engineering and production.

      This leads to a ‘fire brigade approach’ to cybersecurity where security is not baked in at the design stage for either hardware or software but added in after vulnerabilities are discovered by cybersecurity specialists once the product is already on the market.

    • Sloppy programming leads to OpenSSL woes
    • OpenSSL Fixes Critical Bug Introduced by Latest Update

      OpenSSL today released an emergency security update after a patch in its most recent update issued last week introduced a critical vulnerability in the cryptographic library.

    • The Internet Of Poorly Secured Things Is Fueling Unprecedented, Massive New DDoS Attacks

      Last week, an absolutely mammoth distributed denial of service (DDoS) attack brought down the website of security researcher Brian Krebs. His website, hosted by Akamai pro bono, was pulled offline after it was inundated with 620Gbps of malicious traffic, nearly double the size of the biggest attack Akamai (which tracks such things via their quarterly state of the internet report) has ever recorded. Krebs was ultimately able to get his website back online after Google stepped in to provide DDoS mitigation through its Project Shield service.

    • Trump Offers More Insight On His Cybersecurity Plans: 10-Year-Old Relatives Vs. 400-lb Bedroom Dwellers

      Look, anyone who refers to cybersecurity or cyberwarfare as “the cyber” is probably better off not discussing this. But Donald Trump, in last night’s debate, felt compelled to further prove why he’s in no position to be offering guidance on technological issues. And anyone who feels compelled to portray hackers as 400-lb bedroom dwellers probably shouldn’t be opening their mouth in public at all.

      With this mindset, discussions about what “the Google” and “the Facebook” are doing about trimming back ISIS’s social media presence can’t be far behind. Trump did note that ISIS is “beating us at our game” when it comes to utilizing social media. Fair enough.

    • New, stronger crypto standard lacks backward compatibility

      The Internet Engineering Task Force is on the verge of approving a new standard for encrypted internet traffic that will make the web a safer place to shop, bank and browse — but it could also break a lot of stuff for people who don’t update their browsers. Transport Layer Security, or TLS, is an encryption protocol that works with web browsers. It’s the math, and the shared standards, that underlie the green padlock users see — the symbol which gives users the confidence that they are connected to the right site and is private enough to share personal or financial data. TLS supersedes SSL, or Secure Sockets Layer — a protocol dating back to 1995 that has proven to be thoroughly broken. But the latest TLS version was finalized in 2008 and in recent years has been the subject of many high profile attacks and newly discovered bugs.

  • Defence/Aggression

    • Duterte ‘about to cross the Rubicon’ with US, wants alliances with Russia & China

      Philippines President Rodrigo Duterte has reiterated his intention to distance his country from the US, its former colonial master, saying he is about to pass “the point of no return” with the US.

      “I am about to cross the Rubicon between me and the US,” the controversial Pacific leader told reporters, without elaborating.

      Duterte reiterated that the Philippines would seek closer ties with Russia and China, the two nations that challenged American ambition for global leadership. But, he added, the ties with the US would not be broken completely, only driven to a point that would allow Manila to have an independent policy.

    • Carter: Afghanistan War Supplemental Request Coming in November

      Defense Secretary Ash Carter plans to present Congress with a request for a supplemental spending measure to fund US troops in Afghanistan come November, he said Monday.

      However, Carter would not give a sense of how large the monetary request may be, saying only that there is a “range” that the department’s budgetary experts are considering.

    • Jordanian writer on trial for ‘anti-Islam’ cartoon shot dead outside court

      A gunman on Sunday killed prominent Jordanian writer Nahed Hattar outside a court where he was facing charges for sharing a cartoon deemed offensive to Islam, state news agency Petra reported.

      Hattar was struck by three bullets before the assailant was arrested, said Petra. Witnesses told AFP that a man had opened fire in front of the court in Amman’s Abdali district.

      The 56-year-old Christian was arrested on August 13 after posting a cartoon mocking jihadists on his Facebook account.

      He was charged with inciting sectarian strife and insulting Islam before being released on bail in early September.

    • Writer Charged With Insulting Islam Is Killed as Extremism Boils Over in Jordan

      Some of the most extreme elements in Jordan made clear in recent weeks that Nahed Hattar should pay for a provocative cartoon he posted online depicting a bearded man in bed with two women ordering God to bring him cashews and wine.

      So when Mr. Hattar, 56, a prominent writer from a Christian family, showed up at a court on Sunday to face criminal charges of insulting Islam, at least one man with a gun decided a trial was not enough. As three bullets ripped through the writer in front of the courthouse, Jordan’s simmering tensions boiled over.

    • France: What Is Hidden Behind the “Burkini Ban”

      In Sisco, Corsica, on August 13, a group of Muslim men arrived on a beach in the company of women wearing “burkinis” (full-body bathing costumes). The Muslim men firmly asked the tourists on the beach to leave and posted signs saying “No Entry”. When a few teenagers resisted, the Muslim men responded with a harpoon and baseball bats. The police intervened — but it was just the beginning.

      In the following days, on beaches all over France, Muslim men showed up, accompanied by women in burkinis, and asking beachgoers to leave. Tourists packed up and fled. Several mayors of seaside resorts decided to ban the bathing costume, and the “burkini ban” scandal was born.

      Some politicians said that banning the burkini “stigmatized” Muslims and infringed on their “human rights” to wear whatever they liked. Other politicians, including Prime Minister Manuel Valls and former President Nicolas Sarkozy, called the burkini a “provocation”, and asked for a law to ban it. The Council of State, the highest legal institution, eventually declared that banning the burkini was against the law; the ban was lifted.

      What is important to explain is what lies behind the “burkini ban.”

      Thirty years ago, France was a country where Islam was present but where Islamic demands were virtually absent and Islamic veils were rare.

      Then, in September, 1989, in a northern suburb of Paris, three female students decided to attend high school with their heads covered by a scarf. When the dean refused, the parents, with the support of newly created Muslim associations, filed a complaint. The parents won.

    • One dead and three injured in Malmo shooting as bomb found outside primary school

      Witnesses reported hearing 20 gunshots fired in bursts of three during a football derby at around 7pm local time between Malmö FF and Helsingborgs IF on Sunday.

      One eyewitness claimed the shots were fired by people in an Audi which drove off at high speed.

      Police found shell casings at the scene in Censorgatan and say the suspects may have escaped by moped – four people were injured, including one who was shot in the head.

    • Liberals’ MP hit by hate messages
    • India Says Pakistan Believes Terror Will Bring Territory

      Pakistan continues to believe terrorist attacks will allow it to obtain territory it covets in Jammu and Kashmir, India’s foreign minister said Monday.

      In her speech before the U.N. General Assembly, Sushma Swaraj also rejected accusations made by Pakistan’s prime minister from the same podium last week that India violates human rights, calling them “baseless.”

      She said India has a man in custody “whose confession is a living proof of Pakistan’s complicity in cross-border terror. But when confronted with such evidence, Pakistan remains in denial.”

      “It persists in the belief that such attacks will enable it to obtain the territory it covets,” Swaraj said. “My firm advice to Pakistan is: abandon this dream. Let me state unequivocally that Jammu and Kashmir is an integral part of India and will always remain so.”

    • Pakistani journalist suing US for killing his son, brother in drone attack

      A Pakistani journalist has sued the United States government in Pakistani courts alleging that the Central Intelligence Agency (CIA) had killed his brother and a son in a drone strike in the tribal region of the country in 2009.

      According to Karim Khan, his brother and the son were innocent and had no terror links at all. His brother Asif Iqbal had Masters degree in Modern Languages and was a teacher at a local school. The 16-year-old son, Zahinullah, was a student of grade 10.

      In an interview with Al Jazeera, Khan vowed to pursue the case against the CIA and the US government. “We would show their tyrannous face to the whole world…that’s all. They cannot bring back my brother or my son…but I will fight against them as far as I can,” he said.

      Since 2004, the Central Intelligence Agency has conducted over 400 drone attacks in Pakistan, killing about 3,000 people. The London-based Bureau of Investigative Journalism claims that at least 966 civilians, including 207 children were also among those killed by the drones.

  • Environment/Energy/Wildlife/Nature

    • Evolution of global temperature over the past two million years

      Reconstructions of Earth’s past climate strongly influence our understanding of the dynamics and sensitivity of the climate system. Yet global temperature has been reconstructed for only a few isolated windows of time, and continuous reconstructions across glacial cycles remain elusive. Here I present a spatially weighted proxy reconstruction of global temperature over the past 2 million years estimated from a multi-proxy database of over 20,000 sea surface temperature point reconstructions. Global temperature gradually cooled until roughly 1.2 million years ago and cooling then stalled until the present. The cooling trend probably stalled before the beginning of the mid-Pleistocene transition3, and pre-dated the increase in the maximum size of ice sheets around 0.9 million years ago. Thus, global cooling may have been a pre-condition for, but probably is not the sole causal mechanism of, the shift to quasi-100,000-year glacial cycles at the mid-Pleistocene transition. Over the past 800,000 years, polar amplification (the amplification of temperature change at the poles relative to global temperature change) has been stable over time, and global temperature and atmospheric greenhouse gas concentrations have been closely coupled across glacial cycles. A comparison of the new temperature reconstruction with radiative forcing from greenhouse gases estimates an Earth system sensitivity of 9 degrees Celsius (range 7 to 13 degrees Celsius, 95 per cent credible interval) change in global average surface temperature per doubling of atmospheric carbon dioxide over millennium timescales. This result suggests that stabilization at today’s greenhouse gas levels may already commit Earth to an eventual total warming of 5 degrees Celsius (range 3 to 7 degrees Celsius, 95 per cent credible interval) over the next few millennia as ice sheets, vegetation and atmospheric dust continue to respond to global warming.

    • Singaporeans are choking on smoke floating over from Indonesia – here’s why this is happening

      Every year, forest fires from Indonesia choke a swathe of Southeast Asia with a smoky haze for weeks. This phenomenon harms the planet and angers neighbors. It is also a health hazard.

      So what is fueling this? The world’s desire for palm oil.

      The edible oil is used in cookies, noodles and other packaged foods as well as soaps, shampoos, lipsticks and many other consumer goods.

      Farmers in Indonesia, the world’s biggest supplier of the commodity, often illegally burn the world’s oldest rainforest or use fire to clear old oil palms on existing plantations, and the smoke from the flames drifts across Singapore and Malaysia.

  • Finance

    • Dingell seeks transparency in trade deal negotiations

      Automakers such as Ford Motor Co. and Fiat Chrysler oppose the deal, in part because it doesn’t go far enough in addressing currency manipulation by other nations. Michigan lawmakers have suggested the state has lost tens of thousands of jobs in part because of currency manipulation by China, Japan and other countries.

      The office of U.S. Trade Representative Michael Froman declined to comment on Dingell’s bill.

      Froman’s office has highlighted its transparency efforts regarding TPP, including the publication of detailed summaries of U.S. objectives in negotiating the agreement; the solicitation of public input on negotiating priorities; and the holding of public hearings to gather input on the negotiations.

    • TTIP: Negotiations ‘in the void’

      Negotiations on the Transatlantic Trade and Investment Partnership (TTIP) are forging ahead, despite opposition from a number of countries. And the American elections are almost certain to compromise the deal. EurActiv France reports.

      Despite attempts by citizens and several governments to derail TTIP, EU member states have confirmed their aim of finalising the free trade deal with Canada (CETA) and pushing ahead with talks with the United States, despite the approaching elections.

    • Ministers aim to wrap up services trade deal in early December

      Countries negotiating an international agreement on trade in services plan to meet in early December to try to finalize the deal, U.S. Ambassador to the World Trade Organization Michael Punke told reporters on Monday.

      The Trade in Services Agreement (TiSA), which would provide stronger international rules for sectors such as communications and banking, is being negotiated among 23 WTO members, including the 28-country European Union, that account for 70 percent of global services trade.

      “The TiSA ambassadors met today and agreed to a ministers’ meeting on Dec. 5 and 6 in Geneva to conclude TiSA,” Punke said, adding: “Establishing 21st century trade rules for services, for 70 percent of the globe’s services economy, is a big deal.”

  • AstroTurf/Lobbying/Politics

    • Asymmetry between the major parties fries the circuits of the mainstream press

      On the eve of the first debate between Donald Trump and Hillary Clinton, I thought I would write down some of the precepts and maxims I have used to understand press behavior during this long and startling campaign season. If I have done this right, you should be able to test the usefulness of my list in the final six weeks of the U.S. election. (And during coverage of the debates!)

      A word on how I came up with this list. I’ve been a close reader and critic of campaign coverage American-style since 1988. That’s eight “cycles,” as people in the industry say. After I started PressThink in 2003, I could write about the gatekeepers without their permission — hurray for blogging! — and so my pace increased during the 2004, 2008, and 2012 elections. This year I have done a little less at my blog (eight pieces since May 2015, plus one for the Washington Post) and put more into the real time conversation on Twitter, which includes most of the people doing campaign coverage, as well as the heaviest users of it.

    • Fact Check: Has Trump declared bankruptcy four or six times?

      Trump’s companies have filed for Chapter 11 bankruptcy protection, which means a company can remain in business while wiping away many of its debts. The bankruptcy court ultimately approves a corporate budget and a plan to repay remaining debts; often shareholders lose much of their equity.

      Trump’s Taj Mahal opened in April 1990 in Atlantic City, but six months later, “defaulted on interest payments to bondholders as his finances went into a tailspin,” The Washington Post’s Robert O’Harrow found. In July 1991, Trump’s Taj Mahal filed for bankruptcy. He could not keep up with debts on two other Atlantic City casinos, and those two properties declared bankruptcy in 1992. A fourth property, the Plaza Hotel in New York, declared bankruptcy in 1992 after amassing debt.

      PolitiFact uncovered two more bankruptcies filed after 1992, totaling six. Trump Hotels and Casinos Resorts filed for bankruptcy again in 2004, after accruing about $1.8 billion in debt. Trump Entertainment Resorts also declared bankruptcy in 2009, after being hit hard during the 2008 recession.

    • 24 Arrested Outside Hofstra University While Demanding An Open Presidential Debate

      Hundreds protested the exclusion of alternative ideas and candidates from the first presidential debate

    • Colin Kaepernick: ‘Embarrassing’ that Donald Trump, Hillary Clinton are candidates

      Colin Kaepernick watched “a little bit” of Monday’s presidential debate, and he didn’t come away impressed with either candidate.

      [...]

      “It was embarrassing to watch that these are our two candidates,” Kaepernick told reporters Tuesday. “Both are proven liars and it almost seems like they’re trying to debate who’s less racist.

      “And at this point … you have to pick the lesser of two evils. But in the end, it’s still evil.”

  • Censorship/Free Speech

  • Privacy/Surveillance

    • When cyber gets physical: why we need the NSA [Ed: This shallow article (must enable JS) conflates cyberdefence with mass surveillance (which is what NSA does)]
    • Kuwait lawyers fight world’s first mandatory DNA sampling law

      Lawyers in Kuwait have issued a legal challenge to the only law in the world forcing citizens and visitors to give samples of their DNA to the government.

      The Kuwait government has said that the law is needed to combat terrorism. DNA testing is reportedly due to begin within weeks.

      When the law was passed in July last year, Adel AbdulHadi of the Kuwaiti law firm Adel AbdulHadi & Partners and his colleagues began researching and drafting their challenge to it. Their principal argument is that the law violates privacy and human rights provisions in the country’s own constitution, as well as those enshrined in international treaties to which Kuwait is a signatory.

    • Local Lawyers Challenge New Kuwaiti Law Creating Mandatory DNA Database Of All Citizens And Visitors
    • Snowden movie ‘preposterous’, says former NSA deputy director

      The former deputy director of the National Security Agency has taken issue with Oliver Stone’s biopic of one-time NSA employee Edward Snowden.

      Speaking to National Public Radio, Chris Inglis, who retired in 2014 after 28 years at the agency, said the film’s narrative “was a gross mischaracterisation of what NSA’s purposes are. And a gross exaggeration of Edward Snowden’s own particular role in that. To the point where you could come away from looking at that movie, saying, ‘Why are 50,000 people at the NSA dead wrong? And one is absolutely correct?’”

      An NSA deputy director does feature in the film, played by Patrick Joseph Byrnes, and commissions Snowden to lead an important project in Hawaii.

    • Military pressing for broader surveillance mandate

      New legislation is being prepared at the Ministry of Defense for inclusion in a broader package of laws aimed at upgrading surveillance by security officials that would include the possibility of monitoring data carried by cables crossing the country.

      At present, Finland does not have a law providing the military with a mandate to carry out these kinds of intelligence operations. The new legislation in the works will include this, and spell out oversight of intelligence gathering and the division of duties among various officials and agencies.

      The Finnish military has a signals intelligence unit known as the Finnish Intelligence Research Establishment which organizationally falls under the Air Force.

      The head of Finnish military intelligence services, Major General Harri Ohra-aho told Yle that operations are not only concerned with information gathering about the military picture in the region, but also with assessing social developments.

      “We don’t count tanks, rather create a broad analysis of the situation in our vicinity. Technological advances are changing the security environment,” said Ohra-aho.

    • Swiss endorse new surveillance powers

      Swiss voters have given a strong approval to a law on new surveillance powers for the intelligence agencies.

      The new law would allow the authorities to tap phones, snoop on email and deploy hidden cameras and bugs.

      It would help Switzerland catch up with other countries, supporters say.

      Opponents have feared it could erode civil liberties and put Swiss neutrality at risk by requiring closer co-operation with foreign intelligence agencies.

      Some 65.5% of voters agreed to accept the proposal. It will allow the Federal Intelligence Service and other agencies to put suspects under electronic surveillance if authorised by a court, the defence ministry and the cabinet.

    • Microsoft goes AI crazy: Now Office 365 can track what you really get up to in meetings

      At its annual Ignite conference this week in Atlanta, GA, Microsoft is showing off new AI features across its core products for the enterprise. According to CEO Satya Nadella, this AI-everywhere strategy amounts to Microsoft “democratizing AI” for everyone to solve the world’s most pressing challenges.

      “To do this, we’re infusing intelligence into everything we deliver, from the agent to applications, services and infrastructure,” said Nadella.

  • Civil Rights/Policing

    • A New Intelligence Award for “Reporting Wrongdoing” [Ed: this is a trap]

      Professional integrity may be welcome everywhere, but “speaking truth to power” is rarely welcomed by “power.” Often it is not even acknowledged as “truth.” (Apparently, the IC envisions itself here as the domain of truth, and not of power. Or will those who challenge the IC leadership itself be eligible for the new award?) Meanwhile, “reporting wrongdoing” often seems to end badly for the reporter, as the frequency of whistleblower reprisal claims indicates.

    • House Intelligence Panel Gets Dozens of Whistleblower Complaints Every Year

      Critics of leakers have often argued that whistleblowers have legitimate channels through which they can report their grievances, but in the murky world of intelligence, it’s hard to know how many complaints are filed, and what, if anything, happens as a result. Now, the House Permanent Select Committee on Intelligence says it sees “dozens” of such complaints every year.

      The committee will not disclose details on individual cases, however.

      “We receive whistleblower-type complaints both through the [Intelligence Community inspector general] — which includes complaints filed through the Intelligence Community Whistleblower Protection Act — and via individuals who approach the committee directly,” said Jack Langer, communications director for Committee Chair Rep. Devin Nunes, R-Calif. Those complaints number in the “dozens” each year, he added.

      The legal process for whistleblowing has been at the center of renewed debate following public disclosures made by Edward Snowden in 2013. Snowden, who worked as an NSA contractor, insists he tried to raise complaints internally, but eventually gave up on the system, for fear of reprisal or dismissal.

    • Torture and False Testimony Leaves Mexico on a Journey to Nowhere

      For many in Mexico, the disappearance of 43 young students from the Ayotzinapa teaching college two years ago remains a painful emblem of a profound national failure—the failure of the state to protect its own people. Among other things, the case highlighted collusion among drug gangs, local politicians, and police, the failure of federal authorities to carry out a credible investigation, and—glaringly—the degree to which torture remains part of the standard operating procedure of criminal investigation.

      Take the case of Patricio Reyes Landa, an alleged member of the Guerrero Unidos criminal gang. Two years ago, Mexico’s attorney general called a press conference and showed a video in which Reyes Landa and three other suspects demonstrated how they supposedly threw the students’ ashes in a river, after incinerating their bodies at a garbage dump. Now, Reyes Landa and some 90 other suspects detained during the investigation say they were tortured into making false confessions about what they did or saw.

  • Internet Policy/Net Neutrality

    • Verizon Claims Nobody Wants Unlimited Data, Wouldn’t Be Profitable Anyway

      Back in 2011, Verizon and AT&T eliminated unlimited wireless data plans, instead pushing users toward share data allotments and overage fees as high as $15 per gigabyte. And while the companies did “grandfather” many of these unlimited users at the time, both companies have made at art form out of harassing or otherwise annoying these customers until they convert to costlier shared plans. And despite the fact that such overage-fee-based plans confuse the living hell out of most customers (who have no idea what a gigabyte is), both companies continue to insist that customers don’t actually want unlimited data.

  • DRM

    • EFF calls on HP to disable printer ink self-destruct sequence

      HP Inc. should apologize to customers and restore the ability of printers to use third-party ink cartridges, the Electronic Frontier Foundation (EFF) said in a letter to the company’s CEO yesterday.

      HP has been sabotaging OfficeJet printers with firmware that prevents use of non-HP ink cartridges and even HP cartridges that have been refilled, forcing customers to buy more expensive ink directly from HP. The self-destruct mechanism informs customers that their ink cartridges are “damaged” and must be replaced.

    • Demand that HP make amends for its self-destructing printers [SIGN AND SHARE!]

      I’ve written an open letter to HP CEO Dion Weisler on behalf of the Electronic Frontier Foundation, asking him to make amends for his company’s bizarre decision to hide a self-destruct sequence in a printer update that went off earlier this month, breaking them so that they would no longer use third-party ink cartridges.

      The letter points out that this is bad business — and it’s also bad for security. HP printers have previously been shown to be vulnerable to malware that spreads through sneaky codes in documents you print, that can steal your private data, raid your network, and become part of website-killing botnets.

      HP hid its self-destruct sequence in a software update, making future updates — like those that patch this kind of defect — suspect, and decreasing the likelihood that HP’s customers will install them.

      Worse still: HP can use Section 1201 of the DMCA to threaten security researchers who reveal similar defects, and to attack competitors who restore full functionality to your printer.

    • Capcom Releases DRM For Street Fighter 5, Promptly Rolls It Back When It Screws Legitimate Customers

      It should be quite clear by now that DRM is a fantastic way for video game makers to keep people from playing their games. Not pirates, though. No, those folks can play games with DRM just fine, because DRM doesn’t actually keep piracy from being a thing. No, I’m talking about legitimate buyers of games, who in example after example after example suddenly find that the games they bought are unplayable thanks to DRM tools that work about as well as the American political system. And yet DRM still exists for some reason, as game makers look for some kind of holy grail piece of software that will turn every past pirate into a future dollar sign.

      This search for the perfect DRM continues, as we have just the latest story of DRM gone wrong. This story of the Street Fighter V DRM, though, is a special kind of stupid because it was put in place via a software update release, meaning that a game that worked perfectly one day was bricked the next.

  • Intellectual Monopolies

    • Copyrights

      • Copyright Theft Is Grounds For Deportation, Board Says
      • Immigration Board Says You Can Be Deported For Copyright Infringement

        While we still wait to see if Kim Dotcom can be taken against his will from another country into the US for “copyright infringement” claims, apparently the DOJ has also decided that it can work the other way. The Justice Department’s Board of Immigration Appeals has said that people can be deported for copyright infringement. Apparently the law (the Immigration and Nationality Act) says that non-citizens can be deported if they commit crimes “involving moral turpitude” but had never weighed in on whether or not copyright infringement counted.

        [...]

        To be fair, this was a case of criminal copyright infringement, and not civil copyright infringement — and the board noted that because criminal copyright infringement requires the showing of “willfulness,” it suffices for the “moral turpitude” question. The person in question, Raul Zaragoza-Vaquero, had been arrested for selling 800 copied CDs to an RIAA investigator. He received 33 months in prison and had to pay $36,000… and was then told he had to leave the country.

      • EFF White Paper Hopes To Educate Cops On The Difference Between An IP Address And A Person

        Judges have pointed out to copyright trolls on multiple occasions that an IP address is not a person. Trolls still labor under this convenient misconception because they have little else in the way of “proof” of someone’s alleged infringement.

        Unfortunately, law enforcement agencies also seem to feel an IP address is a person — or at least a good indicator of where this person might be found. This assumption leads to blunders like ICE raiding a Tor exit node because it thought an IP address was some sort of unique identifier. After having IP addresses explained to it by the EFF, ICE returned the seized hard drives and promised to make the same mistake in the future.

        In another case, the Seattle PD raided a Tor exit node in search of a person downloading child porn. It didn’t find the target it was looking for, but went ahead and demanded passwords so it could search files and logs at the unfortunate citizen’s home before realizing it had the wrong person.

        The EFF is kind of sick of having to explain the difference between an IP address and a person to government entities. It has put together a white paper [PDF] that should be required reading anywhere government employees feel compelled to act on “evidence” as useless as IP addresses.

      • The EU’s Proposed Copyright Directive Is Likely To Be A Wonderful Gift — For US Internet Giants

        Even if the Copyright Directive manages to pass through the EU legislative system without any changes — which seems unlikely — Google would be in a strong position, because it already has the content ID technology in place that will allow it to comply. Although McNamee suggests that as a result Google would be “uniquely placed to license such software to European internet providers,” it’s more likely that it would keep it for its own exclusive use. However, the US company Audible Magic would doubtless be more than happy to license its widely-used content identification system as an alternative. And irrespective of whether it’s based on technology from Google or from Audible Magic, it’s hard to see how this outcome helps the European tech industry.

09.27.16

Links 27/9/2016: Lenovo Layoffs, OPNFV Third Software Release

Posted in News Roundup at 6:56 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • My Experiences Converting Users To GNU/Linux

      My wife, TLW, runs GNU/Linux with few problems. She uses a tablet, an Odroid-C2 ARMed thick client, and a big notebook all running Debian GNU/Linux or Ubuntu and her Android/Linux smartphone and her scanner and printer all deal with Beast, my GNU/Linux server. I have her file-system plugged in via NFS so she can do IT in bed, in front of the TV, on TV, or in her office and all her thousands of pictures, documents, scans etc. are all in the same place.

      She doesn’t even have much problem using Ubuntu or XFCE4 on Debian because she mostly uses the same applications all day long. It just works for her and memories of That Other Operating System are fading. She was locked to a single thick client with limited capabilities in those Dark Days. She had repeated crashes and malware. Today, her issues with IT are things like changing the name of a file on the FTP server or how to scan a light image or…, real problems, not problems M$ causes billions of people every day.

    • Shame on Microsoft for Leaving Surface Pro Customers in the Dark

      When Microsoft came out with its first batch of Surface tablets a few years ago, the company took a bath on them. It didn’t help that they were conceived around the unpopular Windows 8 and the now-defunct Windows RT and that the prospects for the OS were in question. After Microsoft wrote off $900 million on its money-losing Surface business, the deathwatch was on. But the Intel-based Surface Pro and Surface Pro 2 showed a glimmer of hope, and Microsoft finally delivered a solid hit with the Surface Pro 3. After that water­shed release, the Surface division is now an important business that brings in more than $1 billion revenue per quarter. Yet Microsoft isn’t showing much appreciation toward the customers who helped put its Surface business on solid footing.

  • Server

    • DevOps: All Development, No Database

      Since the last time I touched working code in a production environment, it’s no exaggeration to say that no part of the development process remains untouched. Over the last decade plus, effectively every aspect of the application development process has been scrutinized, rethought and in many cases reinvented. From version control to build systems to configuration and deployment to monitoring, modern development’s toolchain is multi-part and sophisticated.

      As it must be. Processes that work for code released in cycles measured in months cannot be expected to handle workflows measured in days or minutes.

      For all that the process of developing software has evolved, however, the database remains curiously overlooked. Consider the example of Cloud Native. Describing a modern, typically legacy-free approach to building applications appropriate for cloud environments, the term Cloud Native has gone from informal descriptor to accepted industry shorthand in short order – to the extent that it has its own technical foundation.

      If we look at the membership of that foundation, the CNCF, it would appear that the roster includes no database vendors at the Platinum or Gold membership levels, at least if you assume Google’s involvement is around Kubernetes and not tools such as BigQuery. Of the 41 silver members, meanwhile, two can be considered database vendors: Crunchy and Treasure Data.

  • Lenovo

    • Microsoft, Lenovo Accused Of Blocking Linux On Signature Edition PCs

      Laptops today are increasingly powerful. Right now, if you get a new laptop, the probability is that it comes with the new Windows 10 operating system but there are some people that prefer to have a choice when it comes to OS selection. While some people are fine with Windows 10, there are those who might want to have a dual OS system running. A few people who bought Lenovo laptops like the Yoga 900, 910S, and 710S, found that Lenovo was blocking Linux.

    • What you missed in tech last week: HP’s ink ban, Lenovo vs Linux, Yahoo mega-hack

      LAST WEEK was a controversial one in the world of technology, and HP, Lenovo, Microsoft and Yahoo all faced a backlash from pissed off customers.

    • Motorola, Lenovo lay off over a thousand more people
    • New Lenovo layoffs at Moto, company has now lost over 95% of employees in four years

      Speaking to Droid-life, both sources inside the company and Motorola itself confirmed today that Lenovo has conducted a brutal round of layoffs at Moto. According to DL, over 50% of Motorola’s existing US staff have lost their jobs. A 20-year veteran of the company allegedly posted on Facebook that he had been laid off, so it looks like Lenovo is cutting deep at the device-maker.

      One source told them that over 700 employees would be asked to leave of the over 1200 Motorola currently employs. No doubt Lenovo hopes to cut costs by integrating much of Motorola’s software and hardware development into its own smartphone unit. Sensible or not, it’s still rather sad to watch the once-proud brand slowly be swallowed by The Great Lenovo Monster. The lack of critical or consumer hype around the company’s new Moto Z line hasn’t helped matters, and while the refreshed Moto G franchise was generally well-received, it’s the expensive phones that make the money, and I have a hard time believing the Z series is a runaway sales success.

    • Lenovo Courts Devs WIth Moto Z Source Code Release

      Lenovo, which owns Motorola, last week released the kernel source code for the Moto Z Droid smartphone on Github. The move follows the company’s posting of the Moto Z Droid Moto Mods Development Kit and Moto Mods on Github this summer. This is the first kernel source code made available for the Moto Z family of devices. Releasing the kernel source code seems to be another step in Lenovo’s attempt to get devs to build an iPhone-like ecosystem around the Moto Z family. The Z family is modular.

  • Kernel Space

    • The Linux Foundation Partners with Girls in Tech to Increase Diversity in Open Source

      One of the great strengths of open source is that it provides opportunities for everyone. Regardless of background, age, gender, race, ethnicity, nationality, sexual orientation or religion, everyone can benefit from and contribute to some of the most important technologies ever developed.

      Yet we know that many groups remain underrepresented in the open source community, which is why The Linux Foundation engages in efforts such as providing diversity scholarships for our training and events and sponsoring organizations such as Women Who Code, Code.org, Blacks in Technology, All Star Code and more.

    • Linux Foundation Certified System Administrator: Muneeb Kalathil

      I started using Linux when I was in school. But at that point, I was limited to Installation and running a few commands. I really started learning and growing my interest in Linux while I was working on my degree in Computer Applications. My first distribution was Red Hat CentOS. I spent many hours learning Linux and enjoyed it.

    • Reiser4 Implements Mirror & Failover Support

      Edward Shishkin, one of the last remaining Reiser4 developers and the one who has been leading this out-of-tree file-system the past few years, has implemented logical volumes support with support for mirrors (in effect, RAID 0) and failover support at the file-system level.

      Shishkin quietly announced on Sunday, “Reiser4 will support logical (compound) volumes. For now we have implemented the simplest ones – mirrors. As a supplement to existing checksums it will provide a failover – an important feature, which will reduce number of cases when your volume needs to be repaired by fsck.”

    • security things in Linux v4.3

      When I gave my State of the Kernel Self-Protection Project presentation at the 2016 Linux Security Summit, I included some slides covering some quick bullet points on things I found of interest in recent Linux kernel releases. Since there wasn’t a lot of time to talk about them all, I figured I’d make some short blog posts here about the stuff I was paying attention to, along with links to more information. This certainly isn’t everything security-related or generally of interest, but they’re the things I thought needed to be pointed out. If there’s something security-related you think I should cover from v4.3, please mention it in the comments. I’m sure I haven’t caught everything. :)

      A note on timing and context: the momentum for starting the Kernel Self Protection Project got rolling well before it was officially announced on November 5th last year. To that end, I included stuff from v4.3 (which was developed in the months leading up to November) under the umbrella of the project, since the goals of KSPP aren’t unique to the project nor must the goals be met by people that are explicitly participating in it. Additionally, not everything I think worth mentioning here technically falls under the “kernel self-protection” ideal anyway — some things are just really interesting userspace-facing features.

    • Open Source NFV releases third platform, offers additional testing capabilities

      The OPNFV Project, an open source project set on driving the evolution of network functions virtualization (NFV) components, has made its OPNFV Colorado release available.

      As the third platform release, OPNFV Colorado includes feature enhancements across security, IPv6, Service Function Chaining (SFC), testing, VPN capabilities, and support for multiple hardware architectures.

      Specifically, OPNFV Colorado address three main areas: core feature upgrades, enhanced testing capabilities, and infrastructure and testing environment advancements.

    • Serro CEO to Participate on Prominent Keynote Industry Panel at the Linux Foundation’s Upcoming OpenDaylight Summit in Seattle
    • The Linux Foundation and edX Roll Out a Free OpenStack Cours

      The market for OpenStack training continues to surge, and training is now offered by vendors such as Mirantis and independent organizations such as The Linux Foundation. Overall training for OpenStack surged last year. According to the OpenStack Foundation, since the launch of the OpenStack marketplace in September 2013, training offerings grew from 17 unique courses in eight cities to 119 courses in 99 cities.

    • Linux Kernel 4.4.22 LTS Brings ARM and EXT4 Improvements, Updated Drivers

      Immediately after announcing the release of Linux kernel 4.7.5, renowned kernel developer and maintainer Greg Kroah-Hartman informed the community about the availability of Linux kernel 4.4.22 LTS

    • ONOS Hummingbird SDN release touts core control function improvements

      ON.Lab’s ONOS Project noted its eighth SDN platform release expands southbound and northbound protocol, legacy device support

      The telecommunications market’s choice of software-defined networking platforms continues to blossom, with the Open Networking Laboratory’s Open Network Operating System Project releasing its latest SDN platform variant under the “Hummingbird” tag.

    • The Linux State Of AMD’s Zen x86 Memory Encryption

      With AMD’s forthcoming Zen processors is support for some new memory encryption technologies that are of particular benefit for virtualized environments.

      I wrote about Linux patches for AMD memory encryption earlier this year while since then more information has come to light. At last month’s Linux Security Summit, David Kaplan presented on these technologies coming with Zen; only today I had come across the slide deck for this presentation.

      The technologies come down to Secure Memory Encryption (SME) and Secure Encrypted Virtualization (SEV). SME provides memory encryption on a per-page-table basis using AMD’s ARM-based security co-processor. AMD SME + SEV are designed against both user-access attacks and physical access attacks with a particular focus on VM / hypervisor security.

    • Improving Fuzzing Tools for More Efficient Kernel Testing

      Fuzz testing (or fuzzing) is a software testing technique that involves passing invalid or random data to a program and observing the results, such as crashes or other failures. Bamvor Jian Zhang of Huawei, who will be speaking at LinuxCon Europe, realized that existing fuzz testing tools — such as trinity — can generate random or boundary values for syscall parameters and inject them into the kernel, but they don’t validate whether the results of those syscalls are correct.

    • OPNFV Heads Down Colorado Trail

      OPNFV today issued its third software release, ending the agonizing six-month period in which folks had to pronounce and spell Brahmaputra. (See OPNFV Issues Third Software Release.)

      This latest release continues the river theme but is sensibly named Colorado: It has other advantages as well, namely support for key features such as security, IPv6, service function chaining (SFC) testing, virtual private networks and more.

      In addition, Colorado is laying some key groundwork for what lies ahead as the industry comes to terms with the MANO (management and network orchestration) dilemma, says Heather Kirksey, Open Platform for NFV Project Inc. ‘s executive director.

    • OPNFV’s Third Release Includes Security Enhancements
    • ONOS, OPNFV Introduce Latest Open SDN, NFV Releases
    • OPNFV Issues Third Software Release
    • Graphics Stack

      • X.Org’s GLAMOR 2D Performance Continues To Be Tuned

        While GLAMOR has already been around for a number of years as a means of providing generic X11 2D acceleration over OpenGL for the X.Org Server, it’s a seemingly never-ending process to optimize its code-paths for best performance. More improvements are en route for making GLAMOR 2D faster, which should especially be helpful for Raspberry Pi users making use of the VC4 driver stack on this very slow-speed hardware.

        Benefits to the GLAMOR code in the X.Org Server obviously have the potential to benefit all users of this acceleration mechanism for code going into the xorg-server code-base as opposed to an individual GL driver, but for Raspberry Pi users in particular there is some efforts ongoing by Broadcom’s Eric Anholt as well as Keith Packard’s never-ending tinkering with the X Server code. GLAMOR continues to be used by default for all AMD GCN GPUs, Nouveau for the latest generations of GPU too, VC4 2D is only supported with GLAMOR, and optionally by other DDX drivers too.

    • Benchmarks

      • Intel Core i7 6800K Benchmarks On Ubuntu + Linux 4.8

        While the Core i7 6800K has been available for a few months now, there hadn’t been any review on it since Intel hadn’t sent out any Broadwell-E samples for Linux testing this time around. However, I did end up finally buying a Core i7 6800K now that the Turbo Boost Max 3.0 support is finally coming together (at first, Intel PR said it wouldn’t even be supported on Linux) so that I can run some benchmarks there plus some other interesting items on the horizon for benchmarking. Here are some benchmarks of the i7-6800K from Ubuntu 16.04 LTS with the Linux 4.8 kernel.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Announcing the KDE Advisory Board

        With KDE having grown from a hobby project by a few volunteers 20 years ago to the large and central Free Software community it is now, our interactions with other organizations have become increasingly important for us. KDE software is available on several platforms, is shipped by numerous distributions large and small, and KDE has become the go-to Free Software community when it comes to Qt. In addition to those who cooperate with KDE on a technical level, organizations which fight for the same vision as ours are our natural allies as well.

        To put these alliances on a more formal level, the KDE e.V. hereby introduces the KDE e.V. Advisory Board as a means to offer a space for communication between organizations which are allied with KDE, from both the corporate and the non-profit worlds.

        One of the core goals of the Advisory Board is to provide KDE with insights into the needs of the various organizations that surround us. We are very aware that we need the ability to combine our efforts for greater impact and the only way we can do that is by adopting a more diverse view from outside of our organization on topics that are relevant to us. This will allow all of us to benefit from one another’s experience.

      • KDE Introduces An Advisory Board
    • GNOME Desktop/GTK

      • Behind the GNOME 3.22 Release Video

        This is less than usual. The time saving mostly stems from spending less time recording for the release video. At first thought you might think recording would be a breeze but it can be one of the most frustrating aspects of making the videos. Each cycle the GNOME community lands improvement a wide set of GNOME’s applications. So before each release I have to find some way to run a dozen of applications from master.

      • ContractPatch, Step 2: Understanding the power balance

        At the point you are presented with a job offer, your prospective employer really wants to hire you. Chances are, they’ve screened and interviewed a number of candidates and put a lot of work into the process. Your manager has thought deeply about who they want in the position and has probably imagined how it will all work out with you in the role. Both you and the hiring decision-maker(s) are probably very optimistic about what you’ll accomplish in the role and how well you’ll get along working together. At this point, no one wants to go back to the drawing board and start the process over again. You will be excited to start the new job but it’s worth taking a step back to appreciate the unusual position you are in with your new employer.

      • Epiphany Icon Refresh
  • Distributions

    • Reviews

      • Uruk GNU/Linux 1.0

        Uruk GNU/Linux appears to be a fairly young project with some lofty goals, but some rough edges and unusual characteristics. I applaud the developers’ attempts to provide a pure free software distribution, particularly their use of Gnash to provide a pretty good stand-in for Adobe’s Flash player. Gnash is not perfect, but it should work well enough for most people.

        On the other hand, Uruk does not appear to offer much above and beyond what Trisquel provides. Uruk uses Trisquel’s repositories and maintains the same free software only stance, but does not appear to provide a lot that Trisquel on its own does not already offer. Uruk does feature some add-ons from Linux Mint, like the update manager. However, this tends to work against the distribution as the update manager hides most security updates by default while Mint usually shows all updates, minus just the ones known to cause problems with stability.

        As I mentioned above, the package compatibility tools talked about on the Uruk website do not really deliver and are hampered by the missing alien package in the default installation. The build-from-source u-src tool may be handy in some limited cases, but it only works in very simple scenarios with specific archive types and build processes. Hopefully these package compatibility tools will be expanded for future releases.

        Right now I’m not sure Uruk provides much above what Trisquel 7.0 provided two years ago. The project is still young and may grow in time. This is a 1.0 release and I would hold off trying the distribution until it has time to build toward its goals.

    • New Releases

      • Black Lab Linux 8 Beta 3 Released

        The development team is pleased to announce the new Beta release of Black Lab Linux 8 – our latest OS offering to bring the best Linux desktop distribution currently on the market. This release moves the kernel and application set away from the prior LTS 14.04 base to the new 16.04 LTS base. Black Lab Linux 8 will showcase 3 desktop environments : MATE, LXDE and GNOME 3. Other improvements include:

        Full EFI support
        Kernel 4.4.0-38
        LibreOffice 5.2
        GNOME Video
        Rhythmbox
        Firefox 49
        Thunderbird
        GIMP
        Full multimedia codec support

      • Black Lab Linux 8 Beta 3 Is Out with Full EFI Support, Based on Ubuntu 16.04 LTS

        Softpedia was informed today, September 26, 2016, by Black Lab Software’s CEO Robert J. Dohnert about the availability of the third Beta development snapshot of the upcoming Black Lab Linux 8 GNU/Linux operating system.

        Black Lab Linux 8 “Onyx” Beta 3 is here approximately three weeks after the second Beta pre-release and it comes with a major change. It is no longer based on Ubuntu 14.04 LTS (Trusty Tahr), as the development team decided to switch base and move to the next Ubuntu LTS version, namely Ubuntu 16.04 LTS (Xenial Xerus).

    • OpenSUSE/SUSE

      • OpenSUSE Leap 42.2 Beta2

        Leap 42.2 Beta2 is looking pretty good, except for the problems with Plasma 5 and the nouveau driver. That’s really an upstream issue (a “kde.org” issue). I hope that is fixed in time for the final release. Otherwise, I may have to give up on KDE for that box.

    • Red Hat Family

      • Exactly What Is OpenStack? Red Hat’s Rich Bowen Explains

        You’ve probably heard of OpenStack. It’s in the tech news a lot, and it’s an important open source project. But what exactly is it, and what is it for? Rich Bowen of Red Hat provided a high-level view of OpenStack as a software project, an open source foundation, and a community of organizations in his talk at LinuxCon North America.

        OpenStack is a software stack that went from small to industry darling at warp speed. It has three major components: The compute service runs the virtual machines (VMs), and it has a networking service and a storage service, plus a dashboard to run everything. OpenStack is only six years old, and was born as a solution devised by Rackspace and NASA to solve a specific problem.

      • Red Hat’s Results Underscore its Growing Focus on OpenStack

        Late last week, Red Hat reported earnings per share of 55 cents on revenue of $600 million, beating estimates of 54 cents and $590 million, respectively. One thing that went unsaid across much of the coverage is that the company is in the midst of a major shift in its strategy toward OpenStack-based cloud computing, and it looks like service revenues and positive momentum from that effort are starting to arrive.

        “Our growth was driven in part by expanding our footprint with customers as we closed a record number of deals over $1 million, up approximately 60 percent year-over-year,” Red Hat CEO Jim Whitehurst said during his company’s earnings call. Seven of the top 30 deals had OpenStack in there, nine had RHEV,” Whitehurst said. “We had three OpenStack deals alone that were over $1 million. So I think we’re seeing really, really, really good traction there.”

      • Red Hat targets $5-b revenue in five years

        Open-source technology firm Red Hat Inc, which hit the $2-billion revenue milestone two quarters ago, is looking to achieve $2.4 billion in FY 2017 and $5 billion in the next five years.

        The company is betting on India, its second largest operation outside the US, as one of the key growth engines to help achieve its aspirational revenue goal of $5 billion by 2021.

        “India is a bright spot for Red Hat for three reasons,” Rajesh Rege, Managing Director, Red Hat India, told BusinessLine.

      • Red Hat Announces Ansible Tower App for Splunk, Enabling Intelligence and Automation Enhancements
      • Finance

      • Fedora

        • Fedora 26 Linux OS to Ship with OpenSSL 1.1.0 by Default for Better Security

          Fedora Program Manager Jan Kurik informs the Fedora Linux community about a new system-wide change for the upcoming Fedora 26 operating system, namely the addition of the OpenSSL 1.1.0 libraries by default.

          It appears that current Fedora Linux releases ship with OpenSSL 1.0.2h, which has been patched with the latest security fixes, but the team decided it was time to upgrade the OpenSSL libraries (libssl and libcrypto) to a newer, more advanced branch. Therefore, Fedora 26 Linux will ship with OpenSSL 1.1.0 by default, which will have a massive impact on the overall stability and security of the OS.

          “Update the OpenSSL library to the 1.1.0 branch in Fedora to bring multiple big improvements, new cryptographic algorithms, and new API that allows for keeping ABI stability in future upgrades. We will also add compat openssl102 package so the applications and other dependencies which are not ported yet to the new API continue to work,” reads the proposal.

        • GLPI version 9.1

          GLPI (Free IT and asset management software) version 9.1 is available. RPM are available in remi repository for Fedora ≥ 22 and Enterprise Linux ≥ 5

    • Debian Family

      • Derivatives

        • Parsix GNU/Linux 8.15 “Nev” Is in the Works, to Ship with the GNOME 3.22 Desktop

          We told you the other day that the Parsix GNU/Linux development team informed the community that new security updates are available for the current stable Parsix GNU/Linux 8.10 “Erik” and Parsix GNU/Linux 8.5 “Atticus” releases.

        • Canonical/Ubuntu

          • Unimpressed with Ubuntu 16.10? Yakkety Yak… don’t talk back

            Before I dive into what’s new in Ubuntu 16.10, called Yakkety Yak, let’s just get this sentence out of the way: Ubuntu 16.10 will not feature Unity 8 or the new Mir display server.

            I believe that’s the seventh time I’ve written that since Unity 8 was announced and here we are on the second beta for 16.10.

            Maybe that’s why they named it Unity 8. Whatever the case, Unity 8 is available for testing if you’d like to try it. So far I haven’t managed to get it working on any of the hardware I use, which goes a long way to explaining why it’s not part of Ubuntu proper yet.

          • Unimpressive Yakkety Yak, Plasma 5 Issues in Leap

            Today was a rough day in Linux distro news, Scott Gilbertson reviewed the Beta of upcoming Ubuntu 16.10 saying there’s not a whole lot to recommend in this update. Neil Rickert test drove openSUSE’s latest beta and had issues with his NVIDIA. Jesse Smith couldn’t tell what was added to Uruk over base Trisquel and Gary Newell didn’t see much point to portable Porteus since most stuff didn’t work.

          • Indicator Sound Switcher Makes Switching Audio Devices on Ubuntu a Snap
  • Devices/Embedded

    • SODIMM-style i.MX7 COM features dual GbE, WiFi/BT, eMMC

      Variscite’s Linux-driven “VAR-SOM-MX7” COM is shipping with an i.MX7 Dual SoC, WiFi and BLE, dual GbE, and optional eMMC and extended temp. support.

      Variscite’s VAR-SOM-MX7 follows many other Linux-ready computer-on-modules based on NXP’s i.MX7 SoC, which combines one or two power-stingy, 1GHz Cortex-A7 cores with a 200MHz Cortex-M4 MCU for real-time processing. While most of these offer a choice of a Solo or Dual model, and the NXP/Element14 WaRP7 offers only the Solo, the SODIMM-style VAR-SOM-MX7 taps the dual-core Dual. Unlike most of these modules, but like the WaRP7 and the CompuLab CL-SOM-iMX7, Variscite’s entry offers onboard WiFi and Bluetooth, in this case Bluetooth 4.1 with BLE.

    • BeagleBone Black Wireless SBC taps Octavo SiP, has open design

      BeagleBoard.org’s “BeagleBone Black Wireless” SBC uses Octavo’s OSD335x SiP module and replaces the standard BeagleBone Black’s Ethernet with 2.4GHz WiFi and BT 4.1 BLE.

      BeagleBone Black Wireless is the first SBC to incorporate the Octavo Systems OSD335x SiP (system-in-package) module, “which integrates BeagleBone functionality into one easy-to-use BGA package,” according to BeagleBoard.org. Announced on Sep. 26, the OSD3358 SiP integrates a TI Sitara AM3358 SoC along with a TI TPS65217C PMIC, TI TL5209 LDO (low-drop-out) regulator, up to 1GB of DDR3 RAM, and over 140 passives devices including resistors, capacitors, and inductors, within a single BGA package. The Linux-driven hacker SBC also adds TI WiLink 8 WL1835MOD wireless module with 2.2 MIMO.

    • NAS-targeted Skylake Mini-ITX loads up on SATA, GbE, PCIe
    • Epiq Solutions’ Sidekiq M.2

      Following on its resounding success with its Sidekiq MiniPCIe card, wireless communications systems specialist Epiq Solutions recently added the Sidekiq M.2 state-of-the-art, small form-factor, software-defined radio (SDR) card. Epiq Solutions explains that the Sidekiq product line provides a breakthrough small form-factor SDR transceiver solution ready for integration into systems that support either MiniPCIe or now the M.2 card form factors.

    • Phones

      • Tizen

        • Samsung in talks with Russian government to distribute the Z3 to students

          Samsung had recently made another announcement in Russia by partnering with Gazprom to distribute its Tizen handsets to the company’s employees. The South korean technology giant are now looking at a new way to increase the Tizen adoption rate in Russia. The target market for the new plan is school students. Samsung are in talks with multiple government agencies to supply the Tizen Z3 smartphone to school students and this was hinted during the Internet of Things forum hosted by Moscow Tizen Association in Russia on the 22nd of September.

        • My Money Transfer App Enters BETA for Z1 and Z3
      • Android

        • 6 open source fitness apps for Android

          A key part of developing a good fitness routine is creating a solid workout plan and tracking your progress. Mobile apps can help by providing readily accessible programs specifically designed to support the user’s fitness goals. In a world of fitness wearable devices like FitBit, there are plenty of proprietary apps designed to work with those specific devices. These apps certainly provide a lot of detailed tracking information, but they are not open source, and as such, do not necessarily respect the user’s privacy and freedom to use their own data as they wish. The alternative is to use open source fitness apps.

          Below, I take a look at six open source fitness apps for Android. Most of them do not provide super detailed collection of health data, but they do provide a focused user experience, giving the user the tools to support their workouts or develop a plan and track their progress. All these apps are available from the F-Droid repository and are all licensed under the GPLv3, providing an experience that respects the user’s freedom.

        • Roku Express, Roku Premiere, and Roku Ultra announced, starting at $29.99

          Roku Inc, maker of the popular Roku line of home media players, has just refreshed their entire product lineup at once. The existing lineup of flagship Roku boxes (but not the Roku Streaming Stick) has been replaced by three new products (with upgraded models for each); the Roku Express, the Roku Premiere, and the Roku Ultra.

        • This is what the Chromecast Ultra will look like

          Google is ramping up for their major October 4th event. In addition to seeing the Pixel and the Pixel XL formally unveiled, we’re also expecting a new Chromebook and the Chromecast Ultra. Until today, we had no idea what to really expect from the new Chromecast device in terms of design, but now we’re finally getting a sneak peek.

        • Android + Chrome = Andromeda; merged OS reportedly coming to the Pixel 3

          It has been almost a year since The Wall Street Journal dropped a bomb of a scoop on the Android community, saying Chrome OS would be “folded into” Android. The resulting product would reportedly bring Android to laptops and desktops. According to the paper, the internal effort to merge these two OSes had been underway for “roughly two years” (now three years) with a release planned for 2017 and an “early version” to show things off in 2016. It seems like we’re still on that schedule, and now Android Police claims to have details on the new operating system—and its first launch device—coming Q3 2017.

        • 8 great Android features that iOS needs to steal

          Not that long ago, I used to feel sorry for Android users and their clunky, sluggish devices—the thought of giving up my iPhone never crossed my mind. Recently, though, I’ve been the one green-eyed with envy, as snazzy new Android features make my once-precious iOS handset feel old and tired by comparison.

          Below I’ve highlighted eight of the most notable Android features that iOS needs to steal (there are plenty more, mind you), from automatic power-saving mode and installing apps from the web to smarter keypad shortcuts and the ability to clear storage-hogging app caches with a single tap.

        • Google said to debut Android/Chrome OS hybrid on tablet, convertible notebook

          Google is planning hybrid devices that run both Android and Chrome OS, including one convertible laptop, and one Huawei Nexus-branded tablet, according to a new report from 9to5Google. The report backs up another from Android Police today that says a convertible notebook is on the way.

          The Andromeda project bakes Chrome OS features into Android, giving you the best of both worlds in one place, according to early reports. This would make a lot of sense for a thin, convertible laptop device like the so-called “Pixel 3” that Android Police reported this morning, which is set to be launched in Q3 2017, and which will potentially boast a 12.3-inch touchscreen display.

        • Google Andromeda hybrid Android/Chrome OS tested on Nexus 9
        • Google reportedly working on a laptop and tablet running an Android-Chrome OS hybrid

          Google is reportedly working on a new Pixel laptop that will run on the long-gestating new operating system that merges Android and Chrome OS. According to Android Police and 9to5Google, the device is known internally by the codename “Bison” or Pixel 3, and will run on what’s currently being called “Andromeda” when it sees release in Q3 2017. In addition, 9to5Google also reports that Huawei is working on a new Nexus tablet that will also run the new OS.

        • Xiaomi Mi Box Android TV appears in the wild with a $69 price tag

          A savvy buyer spotted the forthcoming Xiaomi Mi Android TV box for sale at a Wal-Mart recently, even though the company still lists the set-top box as “coming soon” on the promo page.

          Not only did this quick-thinking individual grab some pictures of the merchandise, he also uploaded an unboxing video to YouTube. Nicely done.

        • Sony Xperia Devices To Get Android 7.0 Nougat In October
        • Sony’s leaked Android Nougat update plans reveal no love for Xperia Z3
        • ColorTV launches its content recommendations on Apple TV, Android TV and more
        • Best Android Phones 5.7 inches And Over
        • Xiny Android trojan evolves to root phones and infect system processes
        • Declutter your phone for a cleaner, faster Android experience
        • Android Nougat Update Coming Soon To Motorola, Samsung & Sony: List Of Devices Include Galaxy S7, Moto Z , Xperia XZ

Free Software/Open Source

  • Adopt a pump.io server

    As most of you know, E14N is no longer my main job, and I’ve been putting my personal time, energy, and money into keeping the pump network up and running. I haven’t always done a good job, and some of the nodes have just fallen off the network. I’d like to ask people in the community to start taking over the maintenance and upkeep of these servers.

  • Prodromou: Adopt a pump.io server

    There are currently around 25 servers in the federated network initially started by Prodromou, which does not count other pump.io instances. He notes that one important exception is the identi.ca site, which is significantly larger than the rest, and which he would like to find a trusted non-profit organization to maintain.

  • What does it mean to change company culture?

    Tools are specific concrete things that a culture has decided is a way to improve a process. Buckminster Fuller has a great quote about tools and thinking: “If you want to teach people a new way of thinking, don’t bother trying to teach them. Instead, give them a tool, the use of which will lead to new ways of thinking.” In particular, DevOps tools can provide folks new ways to look at things—like delivering code into a production environment, for example. But there’s lots of examples where a new tool doesn’t influence the thinking of the people who use it, so things don’t change.

  • Why Open Beats Closed
  • Google Improves Image Recognition; Releases Project as Open Source Software

    Google says its algorithm can correctly caption a photograph with nearly 94 percent accuracy.

    The company says the improvements come in the third version of its system named Inception, with the score coming from a standardized auto-caption test named ImageNet. It reports the first version scored 89.6 percent, the second 91.8 percent and the new one 93.9 percent.

  • Contributing to Open Source Projects Not Just For the Experts

    XDA has long been a proponent of open source development, and we’ve seen it flourish over the years. In fact, it’s one of the main reasons our community has grown as fast as it has over these past 13 years, with Android’s core being the driving force. Many people desire to be part of open source and contribute but often don’t know how they can, whether because they think they lack the skills or they just don’t have the time.

  • Web Browsers

    • Mozilla

      • Firefox Reader Mode is Finally Getting a Keyboard Shortcut

        Among the changes which arrived in the September release of Firefox 49 were an enhanced set of Reader Mode features, including spoken narration and line-width spacing options. All very welcome. But the improvements aren’t stopping there. Firefox 50, which is due next month, will add another sorely needed feature: a keyboard shortcut for Reader Mode. Y

  • SaaS/Back End

    • Introduction to OpenStack by Rich Bowen

      In this talk, Rich, the OpenStack Community Liaison at Red Hat, will walk you through what OpenStack is, as a project, as a Foundation, and as a community of organizations.

  • Pseudo-Open Source (Openwashing)

  • Licensing/Legal

    • Public licenses and data: So what to do instead?

      Why you still need a (permissive) license

      Norms aren’t enough if the underlying legal system might allow an early contributor to later wield the law as a threat. That’s why the best practice in the data space is to use something like the Creative Commons public domain grant (CC-Zero) to set a clear, reliable, permissive baseline, and then use norms to add flexible requirements on top of that. This uses law to provide reliability and predictability, and then uses norms to address concerns about fairness, free-riding, and effectiveness. CC-Zero still isn’t perfect; most notably it has to try to be both a grant and a license to deal with different international rules around grants.

  • Programming/Development

    • Pairing LLVM JIT With PostgreSQL Can Speed Up Database Performance

      Using the LLVM JIT with PostgreSQL can vastly speed up the query execution performance and shows off much potential but it hasn’t been mainlined yet.

      Dmitry Melnik presented at this month’s LLVM Cauldron over speeding up the query execution performance of PostgreSQL by using LLVM. Particularly with complex queries, the CPU becomes the bottleneck for PostgreSQL rather than the disk. LLVM JIT is used for just-in-time compilation of queries.

    • LLVM Cauldron 2016 Videos, Slides Published

      The inaugural LLVM Cauldron conference happened earlier this month ahead of the GNU Tools Cauldron in Hebden Bridge, UK. All of the slides and videos from this latest LLVM conference are now available.

  • Standards/Consortia

Leftovers

  • iPhone 7 Owners Destroy Phones After DRILLING Their Own Headphone Jack

    Just one problem. It is a joke. Yet iPhone 7 owners, or those desperate for their beloved headphone jack, have been attempting to drill their own. And it isn’t ending well for any of them.

  • Traffic Is Fake, Audience Numbers Are Garbage, And Nobody Knows How Many People See Anything

    How many living, breathing human beings really read Techdirt? The truth — the most basic, rarely-spoken truth — is that we have no earthly idea. With very few exceptions, no media property big or small, new or old, online or off, can truly tell you how big its audience is. They may have never thought about it that way — after all, we all get as close as we can to what we think is a reasonably accurate estimation, though we have no way of confirming that — but all these numbers are actually good for (maybe) is relative comparisons. What does it really mean when someone says “a million people” saw something? Or ten or a hundred million? I don’t know, and neither do you. (Netflix might, but we’ll get to that later.)

    Where should we start? How about this: internet traffic is half-fake and everyone’s known it for years, but there’s no incentive to actually acknowledge it. The situation is technically improving: 2015 was hailed (quietly, among people who aren’t in charge of selling advertising) as a banner year because humans took back the majority with a stunning 51.5% share of online traffic, so hurray for that I guess. All the analytics suites, the ad networks and the tracking pixels can try as they might to filter the rest out, and there’s plenty of advice on the endless Sisyphean task of helping them do so, but considering at least half of all that bot traffic comes from bots that fall into the “malicious” or at least “unauthorized” category, and thus have every incentive to subvert the mostly-voluntary systems that are our first line of defence against bots… Well, good luck. We already know that Alexa rankings are garbage, but what does this say about even the internal numbers that sites use to sell ad space? Could they even be off by a factor of 10? I don’t know, and neither do you. Hell, we don’t even know how accurate the 51.5% figure is — it could be way off… in either direction.

  • Alton Towers fined £5 MILLION for Smiler crash which left 16 maimed and injured

    The accident on the £18million white-knuckle ride in June last year at Alton Towers, the UK’s biggest theme park, left 16 people injured.

    At Stafford Crown Court, Judge Michael Chambers QC said thousands of young people were exposed to harm on the ride.

    He said: “Many thousands of people who went on the ride since it opened in May 2013 have been exposed to harm.”

  • Alton Towers operator Merlin fined £5m over Smiler crash

    Alton Towers operator Merlin has been fined £5m for the crash on the Smiler rollercoaster.

    Sixteen people were injured in the June 2015 crash, including two teenage girls who needed leg amputations.

    In April, Merlin Attractions Operations Ltd admitted breaching the Health and Safety Act.

  • Science

    • Why data is the new coal

      Deep learning needs to become more efficient if it is going to move from using data to categorise images of cats to diagnosing rare illnesses

  • Health/Nutrition

    • VCAT rejects tobacco giant’s push to access schoolchildren smoking data

      A judge has crushed moves by a tobacco giant to access the confidential survey results of Australian schoolchildren, including information revealing their attitudes to cigarettes and alcohol.

      British American Tobacco used freedom-of-information laws to seek access to six Cancer Council Victoria files, arguing it was in the public interest to expose to scrutiny the raw material used to underpin its plain packaging position.

  • Security

    • Security advisories for Monday
    • Who left all this fire everywhere?

      If you’re paying attention, you saw the news about Yahoo’s breach. Five hundred million accounts. That’s a whole lot of data if you think about it. But here’s the thing. If you’re a security person, are you surprised by this? If you are, you’ve not been paying attention.

    • IPFire 2.19 Linux Firewall OS Patched Against the Latest OpenSSL Vulnerabilities

      Only three days after announcing the release of IPFire 2.19 Core Update 104, Michael Tremer informs the community about the availability of a new update, Core Update 105, which brings important OpenSSL patches.

    • OpenSSL security advisory for September 26

      This OpenSSL security advisory is notable in that it’s the second one in four days; sites that updated after the first one may need to do so again.

    • Canonical Patches OpenSSL Regression in Ubuntu 16.04 LTS, 14.04 LTS & 12.04 LTS

      After announcing a few days ago that a new, important OpenSSL update is available for all supported Ubuntu Linux operating systems, Canonical’s Marc Deslauriers now informs the community about another patch to address a regression.

      The new security advisory (USN-3087-2) talks about a regression that was accidentally introduced along with the previous OpenSSL update (as detailed on USN-3087-1), which addressed no less than eleven (11) security vulnerabilities discovered upstream by the OpenSSL team.

    • Patch AGAIN: OpenSSL security fixes now need their own security fixes
    • Bangladesh Bank exposed to hackers by cheap switches, no firewall: Police
    • This is the Israeli company that can hack any iPhone and Android smartphone

      If Cellebrite sounds familiar, that’s because the name of this Israeli company came up during Apple’s standoff with the FBI over breaking iPhone encryption. The agency managed to crack the San Bernardino iPhone with the help of an undisclosed company. Many people believe it was Cellebrite that came to the rescue. Meanwhile, the company revealed that it could hack just about any modern smartphone, but refused to say whether its expertise is used by the police forces of repressive regimes.

    • Reproducible Builds: week 74 in Stretch cycle
    • East-West Encryption: The Next Security Frontier?

      Microsegmentation, a method to create secure, virtual connections in software-defined data centers (SDDCs), has already emerged as one of the primary reasons to embrace network virtualization (NV). But some vendors believe that East-West encryption of traffic inside the data center could be the next stop in data-center security.

      For example, VMware says it is looking at encrypting East-West traffic inside the data center, adding another layer of security to the SDDC. Why is that important? Today, most firewalls operate on the perimeter of the data center – either guarding or encrypting data leaving the data center for the WAN. And some security products may encrypt data at rest inside the data center. But encrypting the traffic in motion between servers inside the data center – known in the business as the East-West traffic – is not something that’s typically done.

    • DHS Offers Its Unsolicited ‘Help’ In Securing The Internet Of Things [Ed: In the UK, GCHQ meddles in the Surveillance of Things in the name of 'security' while at the same time, with Tories' consent, cracking PCs]

      It’s generally agreed that the state of security for the Internet of Things runs from “abysmal” to “compromised during unboxing.” The government — despite no one asking it to — is offering to help out… somehow. DHS Assistant Secretary for Cyber Policy Robert Silvers spoke at the Internet of Things forum, offering up a pile of words that indicates Silvers is pretty cool with the “cyber” part of his title… but not all that strong on the “policy” part.

  • Defence/Aggression

    • Duterte ‘admitted complicity’ in Davao killings – WikiLeaks

      President Rodrigo Duterte dared Senator Leila de Lima on Tuesday, September 20, to prove that he was behind extrajudicial killings in Davao City when he was the mayor there.

      A confidential cable dated May 8, 2009, which was published by WikiLeaks, said that Duterte once “admitted complicity” in vigilante killings in Davao City.

      The cable, written by then-US ambassador to the Philippines Kristie Kenney, quoted statements from then Commission on Human Rights (CHR) regional director Alberto Sipaco Jr.

      Kenney wrote: “Commission on Human Rights regional director Alberto Sipaco (strictly protect) at a private meeting affirmed that Mayor Duterte knows about the killings and permits them. Recounting a conversation he once had with Duterte, who is his close friend and former fraternity brother, Sipaco said he pleaded with the Mayor to stop vigilante killings and support other methods to reduce crime, like rehabilitation programs for offenders.”

      “According to Sipaco, the Mayor responded, ‘I’m not done yet,’” Kenney said.

  • Finance

    • IBM, China UnionPay complete block chain pilot project on bank loyalty points

      IBM completed a pilot project with Chinese credit card company China UnionPay that will facilitate the sharing of loyalty bonus points among banks using block chain technology.

      Bonus points earned through purchases on bank cards have long been an effective tool to attract and encourage customers to use specific cards. But since bonus points cannot be freely exchanged among different banks, offering various rewards, many go unused.

      IBM’s collaboration with China UnionPay will enable consumers worldwide to exchange bonus points from their various banks in less than a minute to select rewards they want.

      Block chain, the underlying technology in digital currencies such as bitcoin, has become one of the hottest innovations in the financial services world. Technology companies and banks have been exploring the use of block chain in all facets of both the financial and non-financial industries.

  • AstroTurf/Lobbying/Politics

    • Why no third parties tonight? Because two parties control the process

      Tonight’s debates will take place without Green Party candidate Jill Stein and Libertarian candidate Gary Johnson. Neither met a threshold of hitting 15 percent in national polls and thus were not invited to participate.

      That threshold was set by the group that puts on the debates, the Commission on Presidential Debates (CPD). Since its inception, the CPD has been staffed by elites from the two major parties. They pick the moderators, choose the format, and set the terms for participation.

    • Vote Now: Who Won the First Clinton-Trump Debate?

      Donald Trump and Hillary Clinton met for their first presidential debate Monday, and we want to know who you think won.

      Take a moment to click the link below next to the candidate who you thought did the best at the debate at Hofstra University in New York.

    • Barroso had deeper ties to Goldman Sachs

      Jose Manuel Barroso had closer contact with Goldman Sachs during his tenure as European Commission chief than he has previously admitted, according to Portuguese media.

      Correspondence obtained by Portuguese daily Publico under a freedom of information request suggests that Barroso, who took a job with the US bank earlier this year, held unregistered meetings with Goldman’s top people.

      In one email dated 30 September 2013, Goldman boss Lloyd Blankfein thanked Barroso for their “productive discussions” and said the bank’s senior partners were delighted about their “extremely fruitful meetings”.

      Publico reported that Goldman executives were happy to suggest “on a confidential basis” changes to EU policies, which Barroso’s cabinet read “with great interest”.

    • Fear, Anxiety, and Depression in the Age of Trump

      Carol Wachs, a psychologist in private practice in Manhattan, recently started seeing an old patient again. The client had first sought treatment for anxiety following the terrorist attacks on Sept. 11. Now she was worried about a new menace: Donald Trump and his zealous supporters. The patient, Wachs says, comes from a family of Holocaust survivors, and “it feels to her like all the stories she heard from her grandparents about how things feel normal and then all of the sudden, oh my God, here we are.”

    • No Trident, no private energy companies, and a universal basic income: Momentum activists mock up manifesto for Labour

      Momentum activists have created a mock general election manifesto with suggestions that all energy companies should be nationalised, the Trident nuclear deterrent be scrapped and a universal basic income to become policy.

      The grassroots organisation established shortly after Jeremy Corbyn’s election as leader in 2015, held the session at its World Transformed festival – an event running alongside Labour’s annual conference in Liverpool.

    • What Is Jill Stein Doing During the Presidential Debate?

      Jill Stein may not be in the first presidential debate, but she’s not going to be quiet during the debates either — and neither are her supporters. They’re planning a civil disobedience rally at the debates, which they’ve warned may result in some arrests. They are also planning a live stream of their protests, along with a live stream of Jill Stein’s answering all the debate questions as they are asked, in real time.

      Here’s what you need to know.

      Stein and Ajamu Baraka are hosting a Hofstra Debate Protest and Civil Disobedience event today, starting at 2:30 p.m. and lasting through the presidential debate. You can learn more about it on the Facebook page here. Buses will leave New York City at 2:30 p.m. Eastern, one from Bryant Park in Manhattan and two from Brooklyn near Barclay’s Center. You should RSVP to make sure there’s a seat for you on the bus.

    • Jill Stein pushes to be included in debate
    • At the last presidential debate at Hofstra University, Jill Stein got handcuffed to a chair for 8 hours

      On Monday evening, former Secretary of State Hillary Clinton and real estate mogul Donald Trump will gather onstage at Hofstra University in Hempstead, New York, for the first presidential debate of the 2016 election.

      Notably absent from the debate stage will be Green Party candidate Dr. Jill Stein and Libertarian candidate former Gov. Gary Johnson—neither of whom were able to meet the 15 percent polling threshold set by Commission on Presidential Debates (CPD). Johnson will be spending the debate tweeting from Twitter’s corporate office in Manhattan. Stein will be livestreaming from a protest outside the debate venue.

      Both Stein and Johnson have lobbied hard to be included in the debates. However, the commission, which is a nonprofit organization created and controlled by the Democratic and Republican parties, have consistently rebuffed their efforts.

      For Stein, at least, this lobbying is nothing new. When she ran as the Green Party nominee four years ago, Stein staged a similar protest when President Barack Obama squared off against former Massachusetts Gov. Mitt Romney on the very same stage at Hofstra University. Stein’s goal was to make a point about how the two major parties use their institutional advantages to shut out other voices.

    • 3rd-Party Candidate Jill Stein Escorted From Hofstra by Police Before Presidential Debate

      Stein’s campaign said she will not “risk arrest” this time, because there is an outstanding warrant for her arrest over her involvement in a recent protest against a controversial pipeline project in North Dakota. Still, her campaign spokeswoman Meleiza Figueroa said they will attempt to get the “spirited demonstration … as close to the gates as possible.”

      In 2012, Stein and her running mate were arrested outside Hofstra University when they tried entering the premises during a presidential debate between President Obama and then-Republican nominee Mitt Romney.

    • Debate Commission Enforces Exclusion By Having Jill Stein Escorted Off Hofstra

      Green Party presidential candidate Jill Stein was escorted off Hofstra University’s campus just hours before the first presidential debate of the general election. The escort was part of the Commission on Presidential Debates’ exclusion of her campaign from the debate.

      At a demonstration and press conference outside the university after she was removed, Stein returned and declared, “We have a right to know who we can vote for,” and condemned the debate that will air as a “spectacle” and a “disgrace.” She claimed it would “increase the appetite for the American voter for a true politics of integrity.”

      An “Occupy The Debates” march and action including supporters took off shortly after.

      Earlier in the afternoon, according to the Stein campaign, the presidential candidate was on her way to do an interview for MSNBC. Hofstra security and Nassau County police stopped her. Two police SUVs arrived. Officers asked MSNBC for their credentials, and in fact, the campaign said the network had credentials for Stein.

      Stein did an impromptu press conference as the situation unfolded. The police then escorted her off campus, and she was instructed “not to do any more press.”

      The presidential candidate was loaded into a van. It was stopped twice before the van made it off the university campus. At one point, the Nassau deputy police chief suggested Stein was “not public enemy number one.”

    • Clinton vs. Trump: Thousands of Police, Protesters Descend on Hofstra for Highly Anticipated Presidential Debate

      Thousands of police and protesters are descending on a Long Island college Monday for the first debate in what has been a raucous presidential race. A Super Bowl-sized audience will be watching at home.

      More than 100 million people may watch the 9 p.m. debate at Hofstra University, organizers say. If so, it’d be the largest debate viewership since the Ronald Reagan and Jimmy Carter debate drew 80 million viewers back in 1980.

    • Walt Whitman on Donald Trump, How Literature Bolsters Democracy, and Why a Robust Society Is a Feminist Society

      In 1855, Walt Whitman (May 31, 1819–March 26, 1892) made his debut as a poet and self-published Leaves of Grass. Amid the disheartening initial reception of pervasive indifference pierced by a few shrieks of criticism, the young poet received an extraordinary letter of praise and encouragement from his idol — Ralph Waldo Emerson, the era’s most powerful literary tastemaker. This gesture of tremendous generosity was a creative life-straw for the dispirited artist, who soon became one of the nation’s most celebrated writers and went on to be remembered as America’s greatest poet.

      [...]

      The role of government and those in power, he argues, is not to rule by authority alone — the mark of dictatorship rather than democracy — but “to train communities … beginning with individuals and ending there again, to rule themselves.” Above all, the task of democratic leadership is to bind “all nations, all men, of however various and distant lands, into a brotherhood, a family.” Many decades before women won the right to vote and long before Nikola Tesla’s feminist vision for humanity, Whitman argues that a robust democracy is one in which women are fully empowered and included in that “brotherhood” on equal terms…

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Snowden shows the human side of Edward Snowden

      The film also explores how Snowden’s personal life is affected by the secrecy of his job, which strained the relationship with his girlfriend Lindsay. He is portrayed as torn between his personal life and the passion he has for his work. Like everyone else, Snowden had his own life outside of his work — a fact that tends to be overlooked.

    • Former NSA Deputy Director pans Snowden film

      Former NSA Deputy Director Chris Inglis called Oliver Stone’s film Snowden “a hard thing to watch.”

    • Reevaluate strategies of digital surveillance

      Mass surveillance programs collecting the metadata of millions of Americans are ineffective counterterrorism measures. They are ineffective not only because of their inability to prevent the atrocities we have seen in the last three years; but also because of their exorbitant cost. The cost of these programs is not purely calculated in dollar signs. There are the diplomatic costs, as countries learn more about U.S. surveillance of their citizens. There are the social costs, as American citizens remain largely in the dark about what the government does with their personal information, without sufficient oversight from Congress or an accessible forum to challenge this intrusion. And, finally, there are the costs to our technical systems, which have become increasingly vulnerable to abuse from other states.

    • Whistleblower story a winner

      Former National Security Agency contractor Edward Snowden blew the cover off the US government’s electronic surveillance programs.

      The former CIA and NSA employee leaked thousands of highly classified documents to the press and in doing so divided a nation. Did the hacker put America at risk by revealing top secrets or did citizens have the right to know how closely they were being monitored?

    • How ‘Snowden’ the movie could help win a pardon for Snowden the man

      The days leading up to September 16 release of director Oliver Stone’s “Snowden” looked like one long movie trailer.

      The American Civil Liberties Union and other human-right groups on Wednesday announced a campaign to win a presidential pardon for Edward Snowden, the former National Security Agency contract employee who leaked hundreds of thousands of its highly classified documents to journalists. The next day, the House Intelligence Committee released a bipartisan letter to the president that advised him against any pardon and claimed Snowden “caused tremendous damage to national security.”

      The week before, Stone had invited me to a private screening of his movie in Washington. I once worked in an NSA facility, and I’ve written about the agency for decades, so I was surprised and pleased by how successful Stone was in creating an accurate picture of life in the NSA.

    • In solidarity with Snowden: Hong Kong refugees call for pardon of NSA whistleblower
    • Hong Kong refugees protest to call for Snowden pardon
    • ‘Pardon Snowden!’ Hong Kong refugees march on US consulate (PHOTOS)
    • Hong Kong refugees march to US embassy, demand pardon for Edward Snowden
    • Edward Snowden to talk via video chat at Ohio Wesleyan

      Snowden is living in asylum in Russia, seeking to be pardoned for his actions, and still unwilling to remain silent. He is the focus of a new movie, “Snowden,” directed by Oliver Stone, and he will speak via video conference at Ohio Wesleyan University.

    • Whether or not the US pardons Edward Snowden, he shouldn’t return

      Recent weeks have seen a resurgence of an ongoing controversial discussion over whether President Obama should pardon Edward Snowden before leaving office. Russia granted Snowden asylum in 2013, after he publicly revealed that the National Security Agency (NSA) had been surveilling the American population’s communications and Internet usage without their knowledge in the name of “homeland security.”

      Even the FBI director, James Comey, has advised everyone to “take responsibility for their own safety and security” and cover their webcam up with tape. Snowden still resides in Russia, and many believe that he should now be allowed to return home.

      The new feature film, Snowden, has reignited interest in this case, and the film is looking to gain further public support for a pardon. Meanwhile, Snowden himself has asked to come home to America, in hopes for a fair trial; however, the only solace promised to him was that he wouldn’t be tortured.

      Snowden may deserve a pardon, but whether he receives one or not, he’ll never realistically be able to return to America without putting himself at serious risk. After revealing what the government is capable of — from watching citizens through their personal webcams to eavesdropping through cell phones — I doubt Snowden would feel safe in his home country anyways.

    • Edward Snowden is hero, not traitor

      To some, he is a treasonous criminal who should be brought to justice, a real Benedict Arnold. To others, he is a national hero. To me, he is a model of what it means to be a true patriot.

      For those who don’t know, Snowden worked for the National Security Agency and leaked a massive amount of confidential documents in 2013, detailing extensive government surveillance programs.

      These leaked documents were handed directly to three journalists who worked for The Guardian and The Washington Post. These publications, as well as a few others, published a multitude of articles exposing the leaked files. They revealed a comprehensive surveillance program run by the United States government.

    • ‘Snowden’ makes a statement

      “Snowden” is able to convey some extremely strong messages about trust and corruption, and it is definitely easy to see why Snowden acted the way he did. Some call him a patriot and some call him a traitor, but it’s clear to see he did what he thought was right. And after watching this film, it’s difficult to disagree.

    • Snowden awarded by Germans for ‘courage and conscience’

      The German city of Kassel has awarded American whistle-blower Edward Snowden for the “courage and conscience” that he showed in spilling US secrets.

    • NSA Zero Day Tools Likely Left Behind By Careless Operative

      Three years of unpatched holes, one of them a zero day that affects a great deal of Cisco’s networking equipment. Not only was TAO’s operation security compromised, but so were any number of affected products offered by US tech companies.

      However, investigators are still looking into the possibility that the tools were left behind deliberately by a disgruntled TAO operative. This theory looks far better on the NSA than another theory also being examined: that multiple operatives screwed up in small ways, compounding each other’s mistakes and (eventually) leading to a publich showing of valuable surveillance tools.

      As for the official, on-the-record comment… no comment. The FBI and Director of National Intelligence declined to provide Reuters with a statement.

      The NSA has long refused to acknowledge the inherent dangers of hoarding exploits and deploying them with little to no oversight. It’s unclear whether this incident will change this behavior or make it a more-forthcoming partner in the Liability Equities Process. What is has proven is that the NSA makes mistakes like any other agency — whether the tools left behind accidentally or deliberately. It’s just that when the NSA screws up, it exposes its willingness to harm American tech companies to further its own intelligence needs.

  • Civil Rights/Policing

  • Internet Policy/Net Neutrality

    • Slovakia to increase broadband coverage

      The government of Slovakia aims to increase broadband network access in the county. Together with network operators, it is mapping which parts of the country do not yet have broadband access.

      According to announcements by Informatizacia – an eGovernment and ICT advisory organisation, part of the Ministry for Investment and Computerisation, a survey is being organised involving the country’s Internet service providers, to determine which parts of the country have network speeds of less than 30Mbps. The survey will be launched in the first week of October. Four to five weeks later, the final list of Slovakia’s network white spots will be made public.

    • Web animation using CSS and JavaScript

      Animation on the web started in 1987 with the invention of the animated GIF, or Graphic Interface Format. GIFs were used mostly for advertisements on websites, but had some problems with the pixelation. Then, in the 1990s Adobe introduced Flash, a tool for animating with audio. This created a revolution and was the best way to do animation on websites for a very long time. But Flash has some issues.

      Closed source: Users must purchase Flash from Adobe and cannot make modifications to the software.

      Security: Flash allows writing and running complex scripts on websites and scripts can be written that directly access the memory of a computer.

      Performance: Flash websites can take a long time to load.

      Resource hog: Flash uses a high amount of computing resources and can actually hang or crash your system if multiple applications or flash sites are opened at the same time.

      Plugin dependency: You need to have flash plugin installed in your browser. And every month or more, you need to update it.

  • Intellectual Monopolies

    • Trademarks

      • Chicago Cubs: With Success Comes Trademark Lawsuit Against Street Vendors

        As a lifelong Cubs fan with a resume that includes going to my first game at Wrigley when I was four months old and living in Wrigleyville for several years, I can at the very least claim some expertise on the culture around the team and the stadium. For those that have not been lucky enough to visit baseball’s Mecca, the walk about up to the park consists of bar-laden streets on either Addison or Clark, with the sidewalks spilling over with fans, bar-patrons, and street vendors. Those street vendors offer innumerable wares, including t-shirts, memorabillia, and food. It’s part of the experience.

        An experience suddenly under fire by the team and Major League Baseball, which have jointly filed a federal lawsuit against some forty street vendors for trademark and counterfeit violations.

    • Copyrights

      • Help Fix Copyright: Send a Rebellious Selfie to European Parliament (Really!)

        Earlier this month, the EU Commission released their proposal for a reformed copyright framework. In response, we are asking everyone reading this post to take a rebellious selfie and send that doctored snapshot to EU Parliament. Seem ridiculous? So is an outdated law that bans taking and sharing selfies in front of the Eiffel Tower at night in Paris, or in front of the Little Mermaid in Copenhagen.

        Of course, no one is actually going to jail for subversive selfies. But the technical illegality of such a basic online act underscores the grave shortcomings in the EU’s latest proposal on copyright reform. As Mozilla’s Denelle Dixon-Thayer noted in her last post on the proposed reform, it “thoroughly misses the goal to deliver a modern reform that would unlock creativity and innovation.” It doesn’t, for instance, include needed exceptions for panorama, parody, or remixing, nor does it include a clause that would allow noncommercial transformations of works (like remixes, or mashups) or a flexible user clause like an open norm, or fair dealing.

      • The Weird Psychology Of People Fighting Those Who Resell Their Products

        Every so often, we hear a story about actions taken by someone who is just so upset about someone else doing something that it seems to border on obsessive. For example, when we hear about copyright holders who spend all their time sending DMCA takedowns — while whining about how they’re unable to produce new content and aren’t making any money from sending all those takedowns. The obvious response is: maybe stop sending all those takedowns and focus on something that’s actually productive, like creating new works and building a fan base willing to support you.

      • Toronto woman accuses theatre security guard of assault in anti-piracy take down

        When Jean Telfer went to a preview screening of a new movie Wednesday night, she didn’t expect that she’d come out with an injured shoulder and a bump on her head.

        Telfer and her friend Elaine Wong were at a Cineplex theatre at Yonge and Eglinton in Toronto for Sony Pictures Entertainment’s film The Magnificent 7. Sony had rented the theatre for the screening and hired a private security company.

        Halfway through the film, Telfer decided to leave because she found the movie to be too violent.

      • Movie Theater Security Guards Assault Women, Claim They Were Pirating Movie

        It’s well-known that the big studios and the MPAA like to indoctrinate movie theater employees into believing that there’s a horrible menace of people trying to pirate movies in the theaters, and that in some cases, they even hand out money to employees who “catch” pirates in the act. In general, all this really does is make it less enjoyable to go to the movies — and sometimes leads to elderly patrons being ejected from theaters because some kid is totally sure she’s pirating the film she’s watching.

        And the latest example is even more extreme, where private security forces apparently decided to assault a couple of Toronto women they falsely accused of pirating a showing of The Magnificent 7. One of the women, Jean Telfer, says she actually decided to leave the film early because she found it too violent. Apparently the idea that a pirate probably wouldn’t be leaving in the middle of a film didn’t occur to the geniuses Sony Pictures had specifically hired to “guard” the showing. So they tackled Telfer. Really.

      • To photocopy or not: Delhi High Courts grants universities carte blanche to photocopy for educational use

        The recent judgment of the Delhi High Court dismissing the lawsuit filed by publishers like Oxford University Press, Cambridge University Press and Francis Taylor has been received with much joy and applause from virtually all quarters of Indian academia and students. In a 94 page judgment, delivered more than 600 days after it was first reserved, the Delhi High Court has held that Section 52(1)(i) of the Copyright Act, 1957 allows for students and teachers to photocopy books and other educational material without any limit.

        The target of the lawsuit was a particular form of photocopying wherein the faculty at the Delhi School of Economics (DSE) would prescribe a reading list, usually comprising chapters from different books and a photocopying shop contracted by the university would then compile course-packs consisting of these various chapters and sell them to students, for profit. The publishers were seeking to monetise this practice by charging either the university or photocopy shop, a royalty of 50 paise per copyrighted page that was copied – a fair bargain, given the photocopier too was getting 50 paise per page. This is a business model followed in most western universities because it is unreasonable to expect students to buy an entire book for a single chapter.

        The High Court obviously disagreed with the publishers and there appears to be nobody in Indian academia who disagrees with this decision. Rather we’ve been told that the decision restores a “balance” to copyright jurisprudence and that it will facilitate access to knowledge. Unfortunately nobody explains the economics of this balancing act.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts