EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

02.14.15

Microsoft Reportedly Uses Patent Blackmail Against Android to Force Samsung to Spread Microsoft Spyware (Incorporated Into Android) (Updated)

Posted in GNU/Linux, Google, Microsoft, Samsung at 4:40 pm by Dr. Roy Schestowitz

Samsung at risk of climbing back into Microsoft’s bed

Samsung Mouse

Summary: Microsoft is reportedly pressuring Samsung, by means of expensive patent lawsuits, to turn Android into “Microsoft Android” (Microsoft spyware installed by default)

THE clown called Microsoft, which claims to “love Linux”, is still attacking Linux in a big way. Usually this is done more or less covertly, so enough “useful idiots” won’t see it and even defend Microsoft.

The other day we saw Steven J. Vaughan-Nichols addressing Microsoft's attack on Android through Cyanogen. Microsoft wants the world to believe that it ‘owns’ part of Android as it even claims to be ‘licensing’ Android, despite having nothing to do with Android development. Microsoft actively attacks Android from multiple directions and as Vaughan-Nichols put it:

The only thing that makes me take Cyanogen’s plans seriously is that Amazon and Microsoft appear to be looking into investing in Cyanogen to help create an Android software eco-system that’s not under Google’s control. But, honestly, even if Amazon and Microsoft backed Cyanogen to the hilt, would that really matter?

Both companies have tried, and failed, to produce a popular smartphone. Indeed, Amazon’s Fire smartphone lost approximately $170 million.

As for Cyanogen, its most well-known efforts to contract with phone vendors ended up with Indian phone giant Micromax and Chinese company Shenzhen OnePlus Technology locked in a lawsuit in the Indian courts. McMaster also made no friends for Cyanogen when he declared that “Samsung couldn’t build a good OS if they tried.” Since Samsung is the world’s number one Android phone vendor and Kondik’s former employer, this doesn’t strike me as a way to win sales partners and influence carriers.

[...]

Only Microsoft with Windows Phone has seen even 2 percent of the mobile market. That’s not enough. Even Windows Phone fans, given the lack of support for the platform from carriers like Verizon, have given up on Windows Phone. Major companies, including Chase and Bank of America, are also no longer supporting Windows Phone.

Cyanogen will fail just like similar attempts at disrupting Android at Microsoft’s behalf. But it doesn’t make the above any less harmful.

Samsung, based on some sources, is again leaning to Microsoft, which may blackmailing the Android leader (in terms of market share) into the agenda of “Microsoft Android” (extortion by Microsoft so as to get its way, as usual).

Engadget, for instance, wrote that “[q]uite a few smartphone fans will tell you that a Samsung phone’s Achilles’ heel is its software — you’ll find a ton of (frequently unwanted) apps and features that do little besides chew up space and slow things down. You may get to wave goodbye to that cruft when the Galaxy S6 shows up, however. A SamMobile source claims that Samsung is yanking a lot of its usual pre-installed bloatware, making the GS6 “amazingly fast” compared to a weighed-down phone like the Galaxy Note 4. The titles wouldn’t go away forever, but you’d have to download in-house apps if you did want them. Instead, the focus would be on a host of included Microsoft apps: Office, OneDrive, OneNote and Skype would give you some solid productivity out of the box. It’s not clear if the Microsoft deal has any connection to a recent truce with Samsung over patent royalties, although it wouldn’t be surprising.”

Samsung was the first devices company that publicly subscribed/signed up for Microsoft’s patent attack on Linux in 2007, so we wouldn’t be shocked if Samsung indeed decided to play ball for Microsoft, much as Nokia and Facebook had attempted (both Microsoft-owned, at least in part).

Update: Mary Jo Foley is Distorting or Making Up ‘Facts’ About Microsoft’s Patent Attack on Android/Linux

An article by Paul Hill, linking to this widely-cited article, says that Microsoft is trying to hijack Android. He writes the following: “It looks like the two companies settled under the condition that Samsung will pre-load Microsoft’s apps on their Android devices.

“It’s likely that the next Samsung flagship smartphone will squarely try to appeal to corporate users as Samsung is already extremely popular with casual users. The device is expected to be launched on March 1st at Samsung’s annual ‘Unpacked’ event at the Mobile World Congress in Barcelona alongside the Galaxy S Edge, an offering with curved edges that look as though they may give quick access to apps, but for obvious reasons, this isn’t clear.”

It has been clear that Microsoft would try hard to make Android users dependent on OOXML and other Microsoft traps, but ZDNet, which is owned by CBS, continues to distort some facts and we must respond to that. The company’s Microsoft booster (one of many) Mary Jo Foley promotes the infiltration by saying that “SamMobile claims the Galaxy S6 will remove pre-installed Samsung apps like S Voice, S Health, S Note and Scrapbook. These will be replaced by Microsoft apps like OneDrive, OneNote, the new standalone Office mobile apps and Skype.”

Putting aside the crucial observation that this is not yet confirmed (see context above and bear in mind that SamMobile is scarcely known and hasn’t acquired reputation), she adds some nonsense to it all by not introducing the full history of Microsoft and Samsung, including that old patent deal which apparently was more to do with FAT than anything else. ZDNet posts a summary [1] linking to the booster’s [2] biased claims that add to the unsubstantiated smear, repeating the lie that has Microsoft portrayed as making billions out of Android, despite there being no concrete evidence (it’s most likely that scaring OEMs is the goal). Given the patterns of Microsoft propaganda in ZDNet, we are not too shocked to see this. We do need to respond to these perceptions that are propagated to damage Android/Linux. These perceptions are mostly created and spread by sources that are aligned with Microsoft, as we’ve demonstrated in past years.

Related/contextual items from the news:

  1. Top Android news of the week: Shipments drop, Android Wear not big, royalty battle ends

    The suit against Samsung over royalty payments for Microsoft’s patents has been settled. It involved payments to Microsoft that Samsung had stopped paying due to claims that the former’s purchase of Nokia’s handset business was a breach of the royalty agreement.

    Neither company disclosed terms of the settlement.

  2. Microsoft, Samsung settle contract dispute over Android patent payments

    Samsung is one of about two dozen companies selling Android, Chrome OS and/or Linux devices that are paying patent-royalty licensing fees to Microsoft.

Software Patents Continue Their Demise in The United States After Alice Ruling

Posted in America, Law, Patents at 4:21 pm by Dr. Roy Schestowitz

No Constitutional rights to patent

Stone book

Summary: Court cases which serve to highlight the end of an era of software patents to all

Software patents are a terrifying concept. One can become an infringer and very quickly get sued (in bulk even) for merely typing one’s own ideas on a keyboard. When it comes to the United States, things are at least improving. This lawyers’ site has just shared the outcome of another case involving software patents where the patents lost in a big way. Moreover, it’s the most zealous pro-software patents court that ruled against software patents. As the site puts it, “The Federal Circuit on Monday rejected software company E-Lynxx Corp.’s bid to revive claims in a $50 million lawsuit accusing InnerWorkings Inc., Cirqit.com Inc. and others of infringing patents for products that help choose the lowest bidder from a variety of vendors.”

In other uplifting news: “As patent reform moved into the political spotlight during the last Congress, one patent that kept coming up was the “online shopping cart.” It seemed to resonate as a technology that clearly shouldn’t have been patented.

“By the time it started being brought up in Congressional hearings, though, the shopping cart patent was dead. Its owner, Soverain Software, was beaten when computer retailer Newegg won an appellate ruling invalidating its patents and throwing out the $2.5 million jury verdict against it.”

Excellent! It’s a step in the right direction and by precedence it will pave the way for similar rulings to come. This isn’t about patent trolls; rather, it is about patent scope.

TechDirt just covered a study which claims to have busted the myth about hoarding ideas. Remember that patents were (way back in the days) a very different animal. There was a different rationale well before computers even existed. Patents were in some sense about increase in sharing and collaboration. That’s what patents were about all at first, at the very beginning. It was about dissemination of knowledge (publication) in exchange for a temporary monopoly, ensuring knowledge is not completely lost in the interest of profit/protectionism by secrecy. Another myth is being addressed at Patent Progress these days, tackling the misconception about Constitutional rights to patents:

Congress was granted the power to promote progress of “science and useful arts” in a particular way. While Congress has the power to grant patents, it has no obligation to do so, which means that there is no constitutional right to a patent.

Patents should be granted (if ever at all) when there is empirical evidence that doing so would be collectively beneficial. All that software patents seem to have brought about is a circus of patent trolls, patent blackmail, removal of key features from programs, and retardation of startups. Many studies have been showing that the net outcome of software patents is overwhelmingly negative and US policy will hopefully be evidence-based as opposed to lawyers-driven and monopolies-steered.

Obsession With Branded Bugs in Free Software, Not Bugging by Proprietary Software

Posted in Free/Libre Software, Microsoft, Security at 4:01 pm by Dr. Roy Schestowitz

Discussions revolve around brands, not objectivity

Rebranded

Summary: The bogus ‘debate’ about bugs, where built-in bugs (like wiretapping, bugging, and back doors in proprietary software) are conveniently overlooked

DESPITE acknowledging that Free software is more secure than proprietary software, Veracode recently turned opportunistic. It was using bugs with "branding" to promote itself and it wasn’t alone.

“FOSS has some bugs, whereas proprietary software is a bug.”Several opportunistic firms, including Black Duck, are appearing in the press again, exploiting “branding” of few bugs in FOSS to sell proprietary stuff. Veracode is again doing it and Black Duck’s latest FUD piece is resurfacing yet again, as very recently noted by us after its placement had been pushed by IDG — an extensive network which gives this proprietary firm a platform as author on FOSS matters. “Black Duck Software presents 5 tips for a secure enterprise relationship with open source,” says IDG, but since when is Black Duck an authority in the area? It’s a proprietary software firm.

FOSS has some bugs, whereas proprietary software is a bug. It’s bugging. We recently wrote about Outlook being ousted as a surveillance platform and amid revelations about the NSA’s spying on EU Parliament Outlook (the ‘app’) is reportedly banned. To quote a British report: “The EU Parliament has blocked politicians from using the Microsoft mobile Outlook app in the wake of security and privacy concerns centred on the siphoning of corporate credentials to a third party, according to reports.

“The Parliament’s IT department, DG ITEC, has reportedly told staff to delete the app and reset corporate email passwords if it was used.”

Nevertheless, the jingoistic Microsoft Peter (Peter Bright) tries to paint Microsoft as “cool” while it is “shutting down a[nother] competitor” as a source put it to us, citing this article:

Microsoft on Wednesday confirmed its purchase of mobile calendar app Sunrise.

This will immediately become a PRISM-included surveillance app. Reading reports about it helps show that the security issue is proprietary software, especially Microsoft’s (the NSA’s top ally). It oughtn’t be so shocking that Black Duck, which is strongly connected to Microsoft, would hastily and repeatedly overlook Microsoft’s ill effect on software, turning software into bugs, wiretapping everyone.

02.13.15

Links 13/2/2015: Krita 2.9 and Calligra 2.9 Betas, Ubuntu in Drones

Posted in News Roundup at 6:35 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • How we used an open source meme generator to promote our journalism

    One of the tasks of a digital team in any major news organisation is to make the newsroom more efficient. We leverage new technologies in ways that haven’t been done before, and at a pace that’s challenging to keep up with. At The Times and Sunday Times, our team is constantly on the lookout for ways of improving our editorial workflow, and ensuring we get the very best from our great quality journalism.

  • With Joyent’s Blessings, and New Members, The Node.js Foundation Takes Shape

    A foundation can do a lot for an open source project. Just look at The OpenStack Foundation or The Linux Foundation. This week, Node.js, the very popular server-side JavaScript framework that is used for building and running websites and online applications, got its own foundation. Among other things, that means that Joyent will no longer solely govern Node.js. The foundation should help the project gain more contributions and develop more quickly.

  • Enterprise Software 2015: Mobility, Cloud and Open Source

    The economy is looking up mean that business budgets will likely see healthy growth in the new year. Forrester is predicting 4 to 6 percent growth for 2015 global IT budgets, reaching $620 billion. Much of the growth in spending will go towards technology like analytics, mobile, as-a-service, and enterprise applications like ERP and CRM. The US will lead IT spending, followed by India and the UK.

  • I Do Not Fear the Greeks Bearing Gifts

    Free software is particularly well-suite to Greece because it is a small market compared to those for the anglophone or francophone worlds, say. That means software is unlikely to be produced in regional versions as a priority. Open source, of course, can be modified by anyone, allowing localised versions of existing free software to be produced easily. All of these considerations apply elsewhere, especially among smaller countries, and it has always been something of a mystery to me why they don’t embrace open source more readily.

  • Hortonworks Teams With Others on Hadoop Data Governance Framework
  • Hortonworks and Hitachi Data Systems partner to deliver Apache Hadoop to the enterprise
  • Meet Myriad, a new project for running Hadoop on Mesos

    What he means is that companies will no longer have to run Hadoop on one set of resources, while running the web servers, Spark and any other number of workloads on other resources managed by Mesos. Essentially, all of these things will now be available as data center services residing on the same set of machines. Mesos has always supported Hadoop as a workload type — and companies including Twitter and Airbnb have taken advantage of this — but YARN has appeal as the default resource manager for newer distributions of Hadoop because it’s designed specifically for that platform and, well, is one of the foundations of those newer distributions.

  • A new open source big data framework

    MapR and Mesosphere are announcing a new open source big data framework (called Myriad) that allows Apache YARN jobs to run alongside other applications and services in enterprise and cloud datacentres.

  • New open-source Myriad project unifies Apache YARN and Apache Mesos resource management
  • ONF expands open-source software development

    The Open Networking Forum (ONF), a non-profit organisation dedicated to accelerating the adoption of open Software-Defined Networking (SDN), has announced the appointment of Saurav Das as principal system architect, and the establishment of a new project to build upon the OpenFlow Configuration and Management Protocol (OF-CONFIG) to support Open vSwitch (OVS). Saurav’s contributions to ONF and the announcement of this project build on the organisation’s open-source software efforts that began with the OpenFlow Driver competition, followed by ONF SampleTap and the Segment Routing project SPRING-OPEN, all of which were completed in 2014. Open-source software is a key route to developing de factor standards and fostering interoperability, both of which are ONF goals.

  • Google releases open-source tool for evaluating cloud performance

    This week Google announced it would provide a cloud computing performance evaluator called PerKit Benchmarker. The evaluation tool is hosted on the open-source collaboration site Github, and will allow users of the Google Cloud Platform, Amazon’s AWS, and Microsoft’s Azure to measure their current provider’s performance against industry-established benchmarks.

  • Open Source Node.js To Get its Own Foundation

    Node.js, the popular open-source, server-side JavaScript runtime project, will soon be governed by an independent foundation, its chief commercial sponsor announced this week.

  • SaaS/Big Data

    • Hortonworks dishes out Hadoop for HDS: Mmmm, open source with big vendor gravy

      HDS will offer open-source data muncher Hadoop to the enterprise after doing a deal with Hortonworks.

      Hadoop distributor Hortonworks has signed an agreement with HDS to jointly promote and support the software. HDS can now deliver Hortonworks’ Data Platform (HDP), Hadoop in other words, to its enterprise customers.

      Hortonworks strategic marketing veep John Kreisa offered this canned quote: “The strategic agreement also provides a joint engineering commitment for the two companies on current and future projects that will help make Hadoop enterprise-ready.”

  • Databases

    • Sisense, Simba Partner Around MongoDB NoSQL Business Analytics

      Hadoop has made lots of big data headlines by now. But in a reminder that it is only part of the open source big data story, Sisense and Simba partnered this week to deliver data analytics via MongoDB, the open source NoSQL platform, which is increasingly importance in production big data use.

  • Oracle/Java/LibreOffice

    • VirtualBox 4.3.22 Brings Support for Linux Kernel 3.19, X.Org Server 1.17, Windows 10 Preview

      That was pretty fast! It looks like Oracle knows what it is doing and just updated its awesome VirtualBox virtualization software, which we have to admit that we use every day here on Softpedia to test all sorts of distributions of GNU/Linux and many other Linux-related applications, to version 4.3.22, bringing initial support for the recently released Linux kernel 3.19.

  • Funding

  • Public Services/Government

    • How open source delivers for government

      Amid the well-deserved hype around the impact of cloud technology and big data analytics, it is possible that casual industry watchers may have missed the real story behind the recent wave of IT re-architecting.

      Enabling many of these recent, powerful trends is a newly validated embrace of open source software technology. The movement to OSS solutions is empowering system designers and solution architects to re-examine methodologies that evolved out of the legacy proprietary, closed source software license model. Put simply, OSS allows developers of IT systems to create better results and cut costs.

  • Licensing

    • CC BY 4.0 and CC BY-SA 4.0 added to our list of free licenses

      The Creative Commons Attribution 4.0 International and Attribution-ShareAlike 4.0 International licenses are now on our list of free licenses for works of practical use besides software and documentation.

      We have updated our list of Various Licenses and Comments about Them to include the Creative Commons Attribution 4.0 International license (CC BY 4.0) and the Creative Commons Attribution-ShareAlike 4.0 International license (CC BY-SA 4.0). Both of these licenses are free licenses for works of practical use besides software and documentation.

      CC BY 4.0 is a noncopyleft license that is compatible with the GNU General Public License version 3.0 (GPLv3), meaning you can combine a CC BY 4.0 licensed work with a GPLv3 licensed work a larger work that is then released under the terms of GPLv3.

  • Openness/Sharing

Leftovers

  • Commuter disruption after motorist drives car on to tram tracks in Wythenshawe

    The white Fiat drove on to the line at Baguley this afternoon, causing delays to services between Cornbrook and Manchester Airport.

  • Security

  • Defence/Police/Secrecy/Aggression

    • Chris Matthews Calls for ‘Rambo Kind of Stuff’ as Response to Real-World Violence

      In response to Matthews’ call for “bombing the hell out of them,” Sheehan does make an important point about ISIS’s well-publicized display of violence, which is “they did this for a purpose.” The purpose he proposes–”They’re doing this to try to intimidate us so that we go home”–is implausible, since ISIS surely knows that the United States, like most countries, generally responds to violence with more violence. It’s much more likely that ISIS, like the Al-Qaeda movement it springs from, believes spectacular acts of terror will draw a military response from the United States that will help it to build its movement (Extra!, 7/11). But at least Sheehan is thinking of violence as being part of a political strategy rather than as a form of emotional release, as Matthews seems to see it:

    • Nagging questions on US role in Mamasapano mission

      Questions persist over the true role of the United States in the events leading up to the deadly encounter in Mamasapano and in the immediate aftermath.

      Did the US provide all or part of the intelligence that formed the basis for the ill-fated Special Action Force operation?

      Were its operatives involved in the planning of the mission and in its execution?

    • Protesters call for Aquino resignation

      “The blood debt of the US which include the genocide of 1.5 million Filipinos in the Filipino-American war remain unpaid and their atrocities continue to spiral up. They’re even using Filipino troops as pawns in their interventionist terror war such as what happened the covert SAF operation Mamasapano,” said Charisse Bañez, national spokesperson of the League of Filipino Students.

      Vencer Crisostomo, Anakbayan National Chair, said that Aquino “sacrificed his own troops in the name of the US war on terror.”

      “This disastrous collaboration between Aquino and the US is a disrespect to all the victims of the Filipino genocide during Filipino-American War,” said Crisostomo.

  • PR/AstroTurf/Lobbying

  • Privacy

    • Instrumentalizing Fear to Control Encrypted Communications is Dangerously Anti-Democratic

      Recent Paris attacks have triggered a wave of securitarian discourse and dangerous upcoming legislative measures that are spreading way beyond France. Increased control of communications online, surveillance, attacks against anonymous speech and encryption are already on the table, under the pretence of fighting an invisible enemy in a perpetual war.

    • Facebook and “Corporate Friends” Threat Exchange?

      Fahwad Al-Khadoumi (nsnbc) : Facebook teamed up with several corporate “friends” to adapt Facebook’s in-house software to identify cyber threats and their source with other corporations. Countering cyber threats sounds positive while there are serious questions about transparency when smaller, independent media fall victim to major corporation’s unwillingness to reveal the source of attacks resulted in websites being closed for hours or days. Transparency, yes, but for whom?

    • Court upholds NSA snooping

      The challenge against the controversial Upstream program was tossed out because additional defense from the government would have required “impermissible disclosure of state secret information,” Judge Jeffrey White wrote in his decision.

    • New York Times columnist David Carr has died. Here is his last interview, with Edward Snowden

      David Carr, the 58-year-old media columnist for the New York Times, collapsed suddenly at the newspaper’s office this evening and died after being rushed to the hospital.

      Carr was previously the editor-in-chief of Washington City Paper and the author of a memoir, Year of the Gun, about his recovery from drug addiction and cancer while raising two young daughters.

    • SOCIALIZE THE DATA CENTRES!

      Technology companies can enact all sorts of political agendas, and right now the dominant agendas enforce neoliberalism and austerity, using centralized data to identify immigrants to be deported, or poor people likely to default on their debts. Yet I believe there is a huge positive potential in the accumulation of more data, in a good institutional—and by that I mean political—setup. Once you monitor one part of my activity and offer me some proposals or predictions about it, it’s reasonable to suppose your service would be better if you also monitored my other activities. The fact that Google monitors my Web searches, my email, my location, makes its predictions in each of these categories much more accurate than if it were to monitor only one of them. If you take this logic to its ultimate conclusion, it becomes clear you don’t want two hundred different providers of information services—you want just one, because the scale-effects make things much easier for users. The big question, of course, is whether that player has to be a private capitalist corporation, or some federated, publicly-run set of services that could reach a data-sharing agreement free of monitoring by intelligence agencies.

    • David Carr, Influential New York Times Media Columnist, Dead At 58

      New York Times columnist David Carr, one of the most incisive and influential writers on the media business, died Thursday night after collapsing in the paper’s midtown Manhattan newsroom. He was 58.

      Times executive editor Dean Baquet informed staff of the death of their “wonderful, esteemed colleague” in a newsroom memo.

      [...]

      Earlier Thursday, Carr moderated a TimesTalk on the National Security Agency leaks with Edward Snowden, and journalists Glenn Greenwald and Laura Poitras. Within hours, he was dead.

  • Civil Rights

  • DRM

    • Keurig Delivers DRM in a Cup

      Who would’ve thought it possible that digital rights management (DRM) would come to the coffee business? Well, it has. Believe it or not, Keurig now includes DRM on their coffee makers. Why? To keep users from using anything but Keurig coffee pods on their machines, of course. You know, just like the DRM used by some printer manufacturers to keep you coming back (and coming back) for their branded replacement ink cartridges instead of opting for the much cheaper store brand.

  • Intellectual Monopolies

    • The secret business plan that could spell the end for SMEs

      Despite its extensive implications, TTIP has generated relatively little coverage, not least because negotiations are shrouded in secrecy and conducted primarily with corporate lobbyists, who have minimal obligations to the public interest. So clandestine are the talks that the few MEPs that are granted access can only view the plans in their original documentation, in a secure location, with the threat of espionage charges if they try to make copies or share the details with the public.

02.12.15

Links 12/2/2015: ChaletOS, Linux 3.20 Features

Posted in News Roundup at 9:11 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Five ways open source middleware can impact unmanned systems

    Traditionally thought of as intelligence, surveillance, reconnaissance (ISR), or kinetic action platforms, unmanned systems are now filling roles such as command and control communications, meteorological survey, and resupply, and explosive ordnance disposal platforms. Historically, these platforms have been developed and fielded as standalone systems built by different vendors with unique and often proprietary payloads, control mechanisms and data formats. But this process has created limitations on interoperability and increased costs, leading the DoD to look at other, more viable options, including commercially supported open source middleware.

  • The privacy differential – why don’t more non-US and open source firms use the NSA as marketing collateral?

    The shockwaves generated by Edward Snowden’s revelations of the close collaboration between US tech giants such as Microsoft and Apple and the NSA are still reverberating through the industry. Those disclosures, together with related ones such as the involvement of the NSA in industrial espionage, as well as the asymmetric nature of US law when it comes to gathering data from foreign individuals, present something of an open goal for non-US technology companies – or so one might have thought.

    On the face of it, then, it is surprising that non-US technology firms and others that can distance themselves from the US law are not proclaiming this fact more loudly. After all, there must be a considerable number of organisations that would dearly love to locate their data as far away from the attentions of the NSA as possible.

  • The Good, the Bad and the Ugly of why I don’t always work in the open

    When you choose not to work in the open, what are your reasons? Are they Good, Bad or Ugly? What are your suggestions for how those of us who want to work more in the open can all do better?

  • Joyent: Never mind those other forkers, Node.js has a foundation now, too

    The popular, open source Node.js JavaScript runtime engine is getting a new foundation to manage its development, in a move that could help mend the recent schism in the project’s community.

  • Google’s new open-source PerfKit framework watches cloud application performance

    Google’s latest foray into the open-source realm is a framework it’s calling “PerfKit,” which is designed to measure application performance in the cloud, the company announced Wednesday.

  • Open source data-driven discovery at the NASA Jet Propulsion Laboratory

    The Apache Software Foundation has, since those early days, been at the forefront of challenging problems. Within the context of this article, the ASF has both fostered, and continues to host keynote scientific projects such as Apache OODT (a Top Level Project at the ASF which originally came from NASA’s Jet Propulsion Laboratory), to recently incubating projects such as Singa (an efficient, scalable and easy-to-use distributed platform for training deep learning models used currently within Deep Convolutional Neural Network and Deep Belief Network as examples).

  • Web Browsers

    • Mozilla

      • A Watershed Moment to Protect the Free and Open Web

        Corporations that seek to control the Web, massive government and corporate surveillance, chilling effects on free expression — all of these issues will be harder to address if the next billions coming online think that the Internet exists solely within the walled gardens of platforms like Facebook and WhatsApp. The greatest danger is people relinquishing their control to gatekeepers that get to decide the rules about what we see and what we create.

      • Cities need to be able to earn digital badges

        When I first heard of Mozilla Open Badges, my heart skipped a beat. Wisely implemented, digital badges can help individuals and communities focus their energies on worthy goals.

  • SaaS/Big Data

  • Databases

    • Nice kitty: MongoDB 3.0 (with Tiger Inside)

      The open source cross-platform document-oriented database company MongoDB has reached version 3.0 this month.

      The new iteration sees significant changes in its storage layer performance and scalability.

  • Healthcare

  • Funding

    • The Open-Source Question

      You’d be forgiven for thinking that the tech world is a loathsome hotbed of rapacious venture capitalists, airheaded trend-riders, and publicity hounds. That’s the image presented by much of the tech press, which prizes stories about the Montgomery Burnses of the tech world over ones about its more idealistic denizens.

    • Payments

      With the new website, we’ve decided to revise how we promote and handle payments. We understand that this has rubbed some people the wrong way, and in the spirit of addressing concerns, we’ve decided to write this post. Keep in mind that this was a really difficult post to right. It covers sensitive territory, and it becomes difficult to choose the right words without offending anyone. That said, here’s our best explanation:

    • Should you pay for Elementary OS?

      Elementary OS has attracted a lot of attention lately. But a controversy is brewing over how the distro developers are setting up their new site for payments by users. The Elementary OS site is being redesigned to encourage users to pay for the distro. But should the Elementary OS developers expect a payment in the first place?

    • Jahia Completed a $22.5 Million Round of Financing From Invus
    • Jahia Completed a $22.5 Million Round of Financing From Invus
    • Growth & Expansion: Jahia Receives $22.5 million Round of Funding
    • Open Source Jahia Raises $22.5M to Grow Enterprise Clients

      Jahia is getting a $22.5 million cash infusion from Invus, a New York City-based investment firm, the Geneva, Switzerland-based open source content management system (CMS) vendor announced today.

  • BSD

  • FSF/FSFE/GNU/SFLC

    • Will you be my cryptovalentine?

      Valentine’s day is this Saturday and, if you’re like us, you’re either trying to pick the right gift or wishing you had someone to exchange gifts with. We wish you luck with that. But there’s something important that you can do regardless of your relationship status:

  • Project Releases

    • CMlyst got it’s first release

      Now that Cutelyst is allowing me to write web applications with the tools I like, I can use it to build the kind of web applications I need but am not fine with using the existing ones…

    • Cutelyst 0.6.0 is released

      Cutelyst, the Qt/C++ web framework just got another step into API stabilization.

      Since 0.3.0 I’ve been trying to take the most request per second out of it, and because of that I decided to replace most QStrings with QByteArrays, the allocation call is indeed simpler in QByteArray but since most of Qt use QString for strings it started to create a problem rather than solving one. Grantlee didn’t play nice with QByteArray breaking ifequal and in the end some implicit conversions from UTF-8 were triggered.

  • Public Services/Government

    • DISA Unveils Online, Open Source Collaboration Tool for DoD

      The Defense Information Systems Agency is launching a web-based, open source collaboration tool for the Defense Department that provides webconferencing, chat and instant messaging functions for employees based in the U.S. and abroad.

  • Licensing

  • Openness/Sharing

  • Programming

    • Eric S. Raymond Calls LLVM The “Superior Compiler” To GCC

      Joining in on the heated discussion that originated over Richard Stallman voicing concerns over adding LLVM’s LLDB debugger support to Emacs, Eric S Raymond has come out to once again voice his support in favor of LLVM/Clang and express his feelings that GCC’s leading days are over.

    • Perl creator Larry Wall: Rethought version 6 due this year

      Despite criticisms such as it having a “cryptic syntax,” the Perl language has remained prominent in language popularity assessments, even if popularity has declined and a planned upgrade has been slow to appear. Designed by Larry Wall, the scripting language is suited for tasks ranging from quick prototyping to Web programming and system management tasks, and it’s part of the prominent LAMP (Linux Apache MySQL Perl/PHP/Python) open source stack. At the recent FOSDEM conference in Brussels, Wall revealed intentions to have the long-awaited Perl 6 release out in a beta version in September and generally available by December. Wall answered some questions from InfoWorld Editor at Large Paul Krill via email about what’s planned for the language and responded to criticisms.

    • Learn to crunch big data with R

      Get started using the open source R programming language to do statistical computing and graphics on large data sets

Leftovers

  • Apple’s chorus of critics: How wrong can they be?

    Your daughter comes home from school with a report card studded with A’s. You (1) give her a hug and raise her allowance or (2) ground her and tell her you know she’ll never do this well again.

    Perversely enough, too many pundits and academics have chosen option No. 2 since Apple CEO Tim Cook presented investors the company’s most recent financial report card — a fourth-quarter earnings story that featured record sales at Apple, rapid growth, and (most important) a quarterly profit that is the largest ever recorded by a publicly traded company.

  • Russian woman dies after dropping charging iPhone into bathtub

    A young Russian woman has died after her charging iPhone fell into the bathtub in her Moscow flat.

    Yevgenia Sviridenko, 24, who was originally from Omsk, more than 2,000 miles from the Russian capital, was discovered by her flatmate in the bath on Monday evening, the Komsomolskaya Pravda newspaper reported according to The Moscow Times.

  • Security

  • Defence/Police/Secrecy/Aggression

    • Barbarians are made, not born – here’s how ISIS was created by the United States

      The US destruction of Fallujah in 2004 was a prime motivation for the growth of ISIS.

    • Senate confirms new Pentagon chief

      The Senate on Thursday confirmed Ashton Carter as President Obama’s new secretary of Defense in a 93-5 vote.

      Carter, 60, will be the 25th secretary of Defense and Obama’s fourth. He is expected to be sworn into office next week

    • Obama Asks Congress to Authorize War That’s Already Started

      As the U.S. continues to bomb the Islamic State in Iraq and Syria, President Obama asked Congress today to approve a new legal framework for the ongoing military campaign.

      The administration’s draft law “would not authorize long-term, large-scale ground combat operations” like Iraq and Afghanistan, Obama wrote in a letter accompanying the proposal. The draft’s actual language is vague, allowing for ground troops in what Obama described as “limited circumstances,” like special operations and rescue missions.

      The authorization would have no geographic limitations and allow action against “associated persons or forces” of the Islamic State. It would expire in three years.

    • Ukraine arrests journalist after call to dodge draft

      Ukraine’s security service arrested a journalist on treason charges Sunday after he posted a video online urging people to dodge the country’s new military draft, his wife and officials said.

      Ruslan Kotsaba — a television journalist from the western region of Ivano-Frankivsk — was ordered held in custody for 60 days pending investigations, his wife, Uliana, wrote on Facebook.

    • Life in the Emerald City: Houthis Control Yemen, But They Don’t Yet Govern It

      Just weeks after a coup that ousted Yemen’s Western-backed government, the capital of Yemen is a city painted in green, mostly with spray paint.

      Green tree trunks, green sidewalks, green walls and even a green Ford F-350 bearing the Houthi slogan, which includes the words “Death to America,” on each side of the iconic American truck, about 340 of which the Pentagon shipped to Yemen over the past few years.

    • Endless War? Obama Sends Congress Expansive Anti-ISIS Measure 6 Months After Bombing Began

      President Obama has sent Congress a formal request to authorize military force against the Islamic State six months after the U.S. began bombing Iraq and Syria. The resolution imposes a three-year limit on U.S. operations, but does not put any geographic constraints. It also opens the door for ground combat operations in limited circumstances. The resolution’s broad language covers military action against the Islamic State as well as “individuals and organizations fighting for, on behalf of, or alongside [ISIS] or any closely-related successor entity in hostilities against the United States or its coalition partners.” The resolution also leaves in place the open-ended Authorization for Use of Military Force Congress enacted one week after the Sept. 11, 2001, which has been used to justify U.S. action in Afghanistan, Somalia, Pakistan, Yemen and beyond, and which Obama had previously called for repealing. We speak with Norman Solomon, executive director of the Institute for Public Accuracy and author of many books, including “War Made Easy: How Presidents and Pundits Keep Spinning Us to Death.”

    • Congress, Don’t Be Fooled; Obama Still Believes in Unlimited War

      PRESIDENT OBAMA is going before Congress to request authorization for the limited use of military force in a battle of up to three years against the Islamic State. On the surface, this looks like a welcome recognition of Congress’s ultimate authority in matters of war and peace. But unless the resolution put forward by the White House is amended, it will have the opposite effect. Congressional support will amount to the ringing endorsement of unlimited presidential war making.

      Whatever else they decide, the House and Senate should revise the White House initiative to guarantee that it won’t have this tragic result. First do no harm; before proceeding with a debate over the limits of our continuing military engagement, Congress should make it impossible for future presidents to evade its final decision.

    • The Seduction of Brian Williams: Embedded with the Military

      He is a liar of course, someone who did not tell the truth no matter the reason or excuse, a bad trait for a journalist. Williams lied about being RPG’ed in a helicopter over Iraq; he did not see any variant of what you can see in the photo above. And that’s not a hard thing to “misremember.”

      But if there is any reason to forgive Williams, it was that he was seduced by both his own conflation of his sad little life as a talking head and the “brave troops,” and, more clearly, by the process of embedding with the military. I know. I saw it.

    • The Minsk Peace Deal: Farce Or Sellout? — Paul Craig Roberts

      As Washington is not a partner to the Minsk peace deal, how can there be peace when Washington has made policy decisions to escalate the conflict and to use the conflict as a proxy war between the US and Russia?

    • New York City Police Officer Is Said to Be Indicted in Shooting Death of Akai Gurley

      A New York City police officer was indicted Tuesday in the fatal shooting of an unarmed black man in a Brooklyn public housing complex stairwell in November, several people familiar with the grand jury’s decision said.

    • Obama to Seek War Power Bill From Congress, to Fight ISIS

      The Obama administration has informed lawmakers that the president will seek a formal authorization to fight the Islamic State that would prohibit the use of “enduring offensive ground forces” and limit engagement to three years. The approach offers what the White House hopes is a middle way on Capitol Hill for those on the right and left who remain deeply skeptical of its plans to thwart extremist groups.

  • Transparency Reporting

  • Environment/Energy/Wildlife

  • Privacy

    • Samsung Ad Injections Perfectly Illustrate Why I Want My ‘Smart’ TV To Be As Dumb As Possible

      Samsung has been doing a great job this week illustrating why consumers should want their televisions to be as dumb as technologically possible. The company took heat for much of the week after its privacy policy revealed Samsung smart TVs have been collecting and analyzing user living room conversations in order to improve voice recognition technology. While that’s fairly common for voice recognition tech, the idea of living room gear that spies on you has been something cable operators have been patenting for years. And while Samsung has changed its privacy policy language to more clearly illustrate what it’s doing, the fact that smart TV security is relatively awful has many people quite justly concerned about smart TVs becoming another poorly-guarded repository for consumer data.

    • Movie review: Citizenfour

      About 20 minutes into this electrifying, often terrifying documentary, the film-maker shows for the first time the man we have come to know as Edward Snowden. The ex-NSA employee who blew the whistle on the US Government’s spying on its citizens is a familiar face only because of 24 hours of interviews this film’s maker compiled over eight days in a Hong Kong hotel room. But when he first appears, he’s talking to Guardian journalist Glenn Greenwald about how they will deal with what Greenwald calls “the ‘you’ story”.

    • Jewel v. NSA: Making Sense of a Disappointing Decision Over Mass Surveillance

      A federal court in San Francisco sided with the U.S. Department of Justice, ruling that the plaintiffs could not win a significant portion of the case—a Fourth Amendment challenge to the NSA’s tapping of the Internet backbone—without disclosure of classified information that would harm national security. In other words, Judge Jeffrey White found that “state secrets” can trump the judicial process and held that EFF’s clients could not prove they have standing.

    • Judge Rules You Can’t Sue the NSA for Secretly Spying on You Unless You Prove You’re Being Secretly Spied On

      Advocates for less government snooping suffered a blow Tuesday when a federal judge in California ruled that a group of citizens can not sue the National Security Agency to stop the “upstream” collection of their data.

  • Civil Rights

    • More Power For Bad Cops: NYPD Head Supports Raising ‘Resisting Arrest’ To A Felony

      The most half-baked “weapon” in any policeman’s arsenal should never be raised to the level of a felony. “Resisting arrest” is the charge brought when bad cops run out of better ideas. This truism runs through nearly every law enforcement agency in the country. When you take a look at videographers and photographers who have been arrested for exercising their First Amendment rights (and backed by a DOJ statement), you’ll see plenty of “resisting arrest” charges.

    • Northern Va. woman dies after being stunned by deputies

      A 37-year-old woman has died after deputies in northern Virginia used a Taser stun gun on her while she was in custody.

      Natasha McKenna of Alexandria was taken off life support Sunday, five days after she was stunned at the Fairfax County jail, the Fairfax County Sheriff’s Office said in a news release.

      McKenna was in the process of being transported from the Fairfax County jail to the Alexandria city jail Tuesday when deputies say she failed to comply with their commands and resisted them. A deputy then used a Taser to restrain her, sheriff’s Lt. Steve Elbert said Monday.

    • Hundreds of South Carolina Inmates Sent to Solitary Confinement Over Facebook

      In the South Carolina prison system, accessing Facebook is an offense on par with murder, rape, rioting, escape and hostage-taking.

      Back in 2012, the South Carolina Department of Corrections (SCDC) made “Creating and/or Assisting With A Social Networking Site” a Level 1 offense [PDF], a category reserved for the most violent violations of prison conduct policies. It’s one of the most common Level 1 offense charges brought against inmates, many of whom, like most social network users, want to remain in contact with friends and family in the outside world and keep up on current events. Some inmates ask their families to access their online accounts for them, while many access the Internet themselves through a contraband cell phone (possession of which is yet another Level 1 offense).

    • Pasco, Washington, police have killed more people than police in Germany and the UK combined

      With just 59,000 residents, the Pasco police department in Washington state have shot and killed four people in the past six months—more than police in the entire United Kingdom, which has over 80,000,000 citizens, in the past three years combined. In fact, Pasco police are on pace to have more police shootings than Germany, also with 80,000,000 citizens, over the current 12 month period.

    • U.S. Drops to 49th in World Press Freedom Rankings, Worst Since Obama Became President

      Each year, Reporters Without Borders issues a worldwide ranking of nations based on the extent to which they protect or abridge press freedom. The group’s 2015 ranking was released this morning, and the United States is ranked 49th.

      That is the lowest ranking ever during the Obama presidency, and the second-lowest ranking for the U.S. since the rankings began in 2002 (in 2006, under Bush, the U.S. was ranked 53rd). The countries immediately ahead of the U.S. are Malta, Niger, Burkino Faso, El Salvador, Tonga, Chile and Botswana.

    • ‘Drastic decline’ in world media freedom

      Media freedom has suffered a ‘drastic decline’ worldwide last year in part because of extremist groups such as Islamic State and Boko Haram, the watchdog group Reporters Without Borders says. – See more at: http://www.skynews.com.au/news/world/europe/2015/02/12/-drastic-decline–in-world-media-freedom.html#sthash.dLBZAYMJ.dpuf

    • How the Chapel Hill Victims Deserve to Be Mourned

      I didn’t know Yusor Mohammad, Deah Shaddy Barakat or Razan Mohammad Abu-Salha — the victims of Craig Stephen Hicks’ shooting spree in Chapel Hill, North Carolina – but I recognize them. Anyone who has spent time in American Muslim communities would, and that’s partly why this horrible crime is so painful. I realize I’m making assumptions and maybe getting sentimental in the process, but I can’t help it. The personalities that come through from the testimonies of friends and family, the record of the efforts and achievements of these young people, and the photographs that radiate such joy and life are all too familiar to miss.

    • Conservatives Dance On Grave Of ISIL Hostage: ‘Jew-Hating, Anti-Israel B**ch’

      Not all conservatives used the death of American hostage Kayla Mueller to highlight the brutality of the Islamic State — some decided to focus their disgust on the 26-year-old’s humanitarian work for Palestinians.

      “No tears for the newly-departed Kayla Mueller, the ISIS hostage whose parents confirmed today that she is dead,” conservative blogger Debbie Schlussel wrote on Tuesday, under the headline, “Kayla Mueller: Dead ISIS Hostage Was Jew-Hating, Anti-Israel Bitch.”

      “Mueller was a Jew-hating, anti-Israel piece of crap who worked with HAMAS and helped Palestinians harass Israeli soldiers and block them from doing their job of keeping Islamic terrorists out of Israel,” she wrote.

      Schlussel condemned Mueller’s humanitarian work in the “so-called ‘West Bank’” to prevent the demolition of “terrorists’ ‘houses.’”

    • Trapped in Baku

      A press freedom advocate — and husband of an American servicewoman — went to the U.S. embassy in Azerbaijan, fearing for his life. But he was turned away.

    • Azerbaijani journalist sheltering in Swiss embassy
    • Azerbaijani Foreign Ministry: Emin Huseynov went into hiding at Swiss embassy to avoid investigation

      Foreign Ministry spokesperson Hikmet Hajiyev said in this regard that the investigation carried out under the court verdict discovered that chairman of the Institute for Reporters’ Freedom and Safety Emin Huseynov has engaged in illegal business over unregistered grant contracts, making a great deal of money – AZN 1,575,956 – but evading from taxes AZN 247,551 tax to be paid to the state budget.

    • German Embassy Releases “Alarming” Declaration to Residents in Venezuela

      Caracas, February 11th, 2015. (Venezuelanalysis)- The German Embassy in Caracas has alarmed political observers in Venezuela by publishing what the press has described as an “alarming” official declaration to its citizens in the South American country.

      Published on February 5th, the declaration is written and signed by the Chargé d’Affaires at the German Embassy, Dr. Jörg Polster. It began to make the rounds on social media networks over the last two days.

      In the statement, German diplomat Polster informs readers that the embassy is extremely “worried” about the current situation in the country and advises German residents to take a number of “precautions in the face of the crisis”.

    • Google’s new robo-dog stalks premises, withstands hard kicks (VIDEO)
    • US bill seeks to tie massive trade pact to EU rejection of BDS

      Bipartisan lawmakers aim to make renunciation of Israel boycott efforts in Europe a key negotiating point in largest free trade deal in history

    • A Worthless Piece of Paper

      President George W. Bush was fond of saying that “9/11 changed everything.” He used that one-liner often as a purported moral basis to justify the radical restructuring of federal law and the federal assault on personal liberties over which he presided. He cast aside his oath to preserve, protect and defend the Constitution; he rejected his oath to enforce all federal laws faithfully; and he moved the government decidedly in the direction of secret laws, secret procedures and secret courts.

      During his presidency, Congress enacted the Patriot Act. This legislation permits federal agents to write their own search warrants when those warrants are served on custodians of records — like doctors, lawyers, telecoms, computer servers, banks and even the Post Office.

      Such purported statutory authority directly violates the Fourth Amendment to the U.S. Constitution, which guarantees the right to privacy in our “persons, houses, papers and effects.” That includes just about everything held by the custodians of our records. Privacy is not only a constitutional right protected by the document; it is also a natural right. We possess the right to privacy by virtue of our humanity. Our rights come from within us — whether you believe we are the highest progression of biological forces or the intended creations of an Almighty God — they do not come from the government.

    • Protesters call for Aquino resignation

      Nationalists and anti-imperialists marched to commemorate the 116th year of the Philippine-American War on Feb. 4, with a call to make President Aquino, suspended Police chief Alan Purisima, and the US government accountable for the recent Mamasapano deaths.

    • Egyptian Court Orders Release of 2 Al Jazeera Journalists

      An Egyptian court on Thursday ordered the release of two journalists jailed for more than a year on charges of broadcasting false news in a conspiracy with the Muslim Brotherhood.

      The release followed the publication this week of a previously undisclosed opinion by Egypt’s highest appeals court condemning the journalists’ conviction as baseless when it ordered a retrial at the beginning of this year. The release also comes at a time when the Egyptian government appears to be trying to allay some of the international criticism it has received after a series of harsh and hasty criminal convictions issued during a crackdown on dissent after the military takeover in July 2013.

    • Denial of Refugee Protection For Matt DeHart

      On Monday, February 9th, Matt DeHart’s parents, Paul and Leann, received notice by mail from the Refugee Protection Division of Canada’s Immigration and Refugee Board that the family’s claim for Refugee Protection had been denied. The family fled the United States after Matt was interrogated and tortured during an FBI espionage investigation in which child pornography charges were hastily filed after Matt was detained at the Canadian border, an action which was triggered by an espionage alert.

    • Matt DeHart Denied Asylum in Canada

      Matt DeHart claims that all his troubles stem from a file uploaded, twice, to a Tor server he ran out of a closet in his parent’s home. An FBI investigation into something the CIA might have done.

    • Matt DeHart, former American soldier claiming he was tortured by U.S., loses bid for asylum in Canada

      Mr. DeHart testified the pornography charges are a ruse to investigate an espionage and national security probe tied to his involvement in Anonymous and his operation of a “hidden” Internet server used to leak a classified U.S. government document, likely destined to WikiLeaks, the whistle-blowing organization.

    • Jails Have Become Warehouses for the Poor, Ill and Addicted, a Report Says

      Jails across the country have become vast warehouses made up primarily of people too poor to post bail or too ill with mental health or drug problems to adequately care for themselves, according to a report issued Wednesday.

      The study, “Incarceration’s Front Door: The Misuse of Jails in America,” found that the majority of those incarcerated in local and county jails are there for minor violations, including driving with suspended licenses, shoplifting or evading subway fares, and have been jailed for longer periods of time over the past 30 years because they are unable to pay court-imposed costs.

  • Internet/Net Neutrality

  • Intellectual Monopolies

    • Copyrights

      • “Canada Remains A Safe Haven For Online Piracy”

        The MPAA, RIAA and other entertainment industry groups keep hammering on Canada for its lacking anti-piracy enforcement. The groups label Canada a “safe haven” for both file-sharers and online pirate sites, and ask the U.S. Government to intervene.

      • Copyright Monopolist Claims Legal, Non-Infringing “Fair Use” Is Like AGGRAVATED RAPE

        In a fuming blog article, David Newhoff claims that non-infringing, legal uses of copyrighted works – that is, of people’s own property – are like “aggravated rape” when made without unneeded consent of the monopoly holder. Newhoff tries to scold the crucial concept of “fair use” in copyright monopoly doctrine, the concept which explicitly says that some usages are not covered by the monopoly and therefore not up to the monopoly holder, and ends saying that if you don’t grant permission and can’t set limits, it’s “aggravated rape”. Just when you think copyright monopoly zealots can’t sink any lower, they surprise you with one of the few creativities they’ve ever shown.

      • YouTube Flags Cat Purring as Copyright Infringing Music

        YouTube’s automated takedown tool is known for its flaws, but this week it crossed a line by attacking a purring cat. According to YouTube’s Content-ID system both EMI Publishing and PRS own the rights to a 12 second purring loop. The cat in question, Phantom, has filed a dispute and hopes to reclaim his rights.

      • US’s ‘Naughty List’ Of Countries Whose Intellectual Property Rules We Don’t Like Is A Joke That’s No Longer Funny

        Mocking the ridiculous “Special 301 report” from the US Trade Representative has become something of an annual sport around these parts. As we’ve explained, the whole concept of the report is something of a joke: copyright, patent and trademark maximalists send in reports to the USTR, claiming which countries don’t do enough to respect US intellectual property, and the USTR — via no systematic or objective process — rewrites those complaints into a report that declares certain countries “naughty” for their practices. The whole thing is such a joke that even those in the government will openly mock it. As I’ve said in the past, I once saw the head of the US Copyright Office openly joke about the purely arbitrary nature of the 301 report at a conference. Countries like Canada — which are regularly named to the report, despite having copyright laws that are, in many areas, more stringent than the US’s — have openly declared that they do not find the Special 301 process to be legitimate, and thus do not pay any attention to it. A couple of years ago, Chile also made it clear that it felt the 301 process was illegitimate.

      • Torrent Site: Copyright Troll Had Staff Access to Member Data

        Empornium, one of the leading private torrent trackers for adult content, says it believes a copyright troll gained access to a staff moderation account and is now using obtained data to threaten its users. The revelations may shine light on why some Empornium users have received settlement threats with no lawsuit filed and no notice from their ISPs.

      • BitTorrent’s Original Content Deal Makes Bid for Reputability

        The move might be an effort to appear more legitimate to advertisers and others within entertainment content distribution circles. The BitTorrent file-sharing protocol is often linked with users of the downloading software exchanging content in violation of intellectual property laws. The first project under this original video distribution agreement is the movie Children of the Machine.

Links 12/2/2015: Black Lab Linux KDE Edition, Android SmartWatches

Posted in News Roundup at 6:29 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Is GNU/Linux becoming too complex for its own good?

    A Debian developer, who faced issues with some minor tasks on his own machines, has now raised the question whether the distribution being built is too complex to understand and debug.

  • Server

    • Docker Popularity A Game-Changer For Cloud, Linux?

      What’s the next step for Docker, one of Silicon’s Valley’s hottest startups?

      It’s not an initial public offering — at least not this year, apparently. The well-funded, lean company says that it’s in no rush to go public.

  • Kernel Space

    • Top 10 Features of Linux Kernel 3.19

      Linux kernel 3.19 has been officially announced by none other than its father, Linus Torvalds, on February 8, 2015. It is a great release that brings some very interesting features. Because we didn’t have access to a complete list of its features at the moment of writing the news article about its availability, we have decided to drop another one that highlights Linux 3.19 kernel’s prominent features.

  • Applications

  • Desktop Environments/WMs

  • Distributions

    • A eulogy to CrunchBang, the Linux distro that time passed by

      DistroWatch.com is currently tracking 287 active Linux distributions. That’s a lot, but not every Linux distribution is a massive project. For every Ubuntu or Fedora, there are many more hobbyist distributions created and run by one or two people. Sometimes they grow into their own large projects, like Linux Mint did. And sometimes a developer decides to pull the plug, as CrunchBang’s developer recently did.

      [...]

      In the end, hobbyist Linux distributions are created to scratch an itch. Developers may eventually find that itch has been solved elsewhere, or may not want to put the long hours into scratching it anymore. CrunchBang no doubt has users who use and love it, even today—but the end of CrunchBang doesn’t have to be sad. CrunchBang’s developer now believes the larger Linux ecosystem has improved so much that CrunchBang is no longer necessary.

      That’s good news for everyone, including Newborough, who now gets to spend his valuable time on something else. Thanks for a killer run, Philip.

    • Security Onion: A Linux Distro For IDS, NSM, And Log Management

      Security Onion is a Linux distribution for intrusion detection, network security monitoring, and log management. It’s based on Ubuntu and contains Snort, Suricata, Bro, Sguil, Squert, Snorby, ELSA, Xplico, Network Miner, and many other security tools. Security Onion is a platform that allows you to monitor your network for security alerts. It’s simple enough to run in small environments without many issues and allows advanced users to deploy distributed systems that can be used in network enterprise type environments.

    • Getting Started with Linux: Another Look at UberStudent

      Time flies. It’s hard to believe it, but it’s been four years since I first took a look at a Linux distribution called UberStudent. Back then it was in its 1.0 release, called “Cicero.” The latest release, “Epicurus,” came out in mid-January, with a version number of 4.1.

      There are a lot of Linux distributions out there. What makes this one worth checking out?

      As with previous releases, what makes UberStudent unique is its target audience, and the software and little added touches it has as a result.

    • New Releases

      • Black Lab Linux Releases 32-bit Edition of Their KDE-Based Distro

        In a world where everyone tries to drop 32-bit support for their OSes, Black Lab Linux developers have announced on Twitter that they’ve released a 32-bit version of their KDE-based distribution in order to support installations of the Black Lab Linux KDE Edition 6.0 SR1 operating system on low-end computers or machines with old/semi-old hardware components.

    • Arch Family

      • Satire: Linus Torvalds awarded Arch Linux as the most consumer friendly distribution

        Richard M Stallman congratulated Arch for their achievement but also pointed out the areas where he thinks Arch needs improvement, “Arch’s lack of support of DRM and binary blobs are the only areas where I see hurdles in the wide-spread adoption of Linux. We have elevated the DRM implementation project at FSF to boost work on it. Today Arch is the second most popular operating system and this gap is only due to Arch’s bad philosophy of pure Open Source software. I think they should start offering proprietary and patented applications in their repositories.”

    • Red Hat Family

      • UAE Exchange consolidates data centres with Red Hat Linux

        Red Hat, Inc. (RHT), the world’s leading provider of open source solutions, today announced that UAE Exchange, a leading foreign exchange and money transfer brand, has successfully created a scalable, secure, robust and high-performance datacenter environment by consolidating its IT infrastructure on Red Hat Enterprise Linux.

      • Red Hat Upgrades Virtualization Platform

        The prolific developers at Red Hat have been relatively quiet in the New Year. Now, the open source leader is picking up the pace with the introduction of the latest version of its enterprise virtualization tool.

        The company announced general availability this week of Red Hat Enterprise Virtualization 3.5 aiming to offer tighter integration with OpenStack while promising to ease deployment of IT infrastructures for traditional virtualization workloads along with enterprise-level cloud infrastructure.

    • Debian Family

      • Derivatives

        • CrunchBang, Elementary, and other Linux Complications

          The top stories today are more thoughts on CrunchBang and Elementary OS’ move to raise capital. My Linux Rig spoke to Matthew Miller from Fedora about his desktop and Adam Williamson announced Fedora 22 Anacoda/DNF testing day. Canonical pats itself on the back for a job well done in media production and John Goerzen hits the complexity nail on the head.

        • Canonical/Ubuntu

  • Devices/Embedded

    • Raspberry Pi robot’s explained

      Is the Pi robot a specific product or just a concept? An easy answer for some, but not everyone knows the score

    • Hackable Pi-like SBC opts for 1.6GHz quad-core STB SoC

      Shenzhen Xunlong has launched a $59 open-spec “Orange Pi Plus” SBC with a 1.6GHz quad-core Allwinner H3 SoC, 40-pin Pi-compatible expansion, WiFi, and SATA.

      In December when Shenzhen Xunlong Software announced its open-spec, Linux- and Android-ready Orange Pi and Orange Pi Mini SBCs, both of which use the dual-core, Cortex-A7 Allwinner A20 system-on-chip, the company also briefly noted an upcoming, quad-core Orange Pi Plus. The Plus was said to offer a quad-core, Cortex-A7 Allwinner A31 SoC with a PowerVR SGX544MP2 GPU. Instead, the shipping version, now available at AliExpress for $59, arrives with Allwinner’s new quad-core Cortex–A7 based H3 SoC and a Mali-400 MP2 GPU.

    • Linux-based mobile manipulation robots due soon

      Former Unbounded Robotics execs have launched “Fetch Robotics” with $3 million in funding, and will ship a ROS-on-Linux mobile manipulator bot in Q2 2015.

      A startup called Fetch Robotics has announced $3 million in Series A financing from O’Reilly AlphaTech Ventures (OATV) and Shasta Ventures, along with a development team that jumped from the apparently now defunct Unbounded Robotics. Fetch Robotics plans to announce and ship two mobile manipulation robots in the second quarter that are aimed principally at the logistics and light industrial markets, “as well as for other human-robot collaboration opportunities,” says the company.

    • Phones

      • Tizen

        • Russian Federation to help Tizen and Sailfish battle Android and iOS

          The Tizen Operating System has got unexpected interest from the Russian Federation, as the Minister of Communications and Mass Communications Nikolai Nikiforov showed his enthusiasm for the Tizen based Samsung Z1 and the “de-monopolization of the global IT-ecosystems”. When prompted about the lack of software, Nikiforov said that conditions will be created to promote the independent mobile OS.

        • Tizen Operating System in Samsung 2015 Smart TVs

          Samsung’s 2015 TV Line up will be Tizen, and they have confirmed that they will be dropping Android as a suitable TV platform for them. Using Tizen and EFL for its User Interface, Tizen TVs will have great multitasking between applications and movie streaming services, and great gaming potential with Sony’s PlayStation Now service, and much more!

        • Sony SmartWatch 3 Review: The Best-Performing Android Smartwatch Yet

          Sony’s been trying the smartwatch thing for years, but the original SmartWatch and the SmartWatch 2 both… what’s the word I’m looking for here? Sucked? Yeah. But the SmartWatch 3 has solid performance and two nifty features you won’t find on any other Android Wear. It’s the first with built-in GPS and a screen you can read without backlighting.

          Android Wear watches are off to a pretty decent start. The Moto 360, the LG G Watch R, and the Asus ZenWatch are all lovely and useful in their own ways. So why might you buy a Sony smartwatch instead?

      • Android

        • How Secure is Your Android? Mobile Antivirus Apps Tested

          Most of us will never see our Android antivirus apps spit out a warning because most of us will never encounter malware on our phones. So how can you tell if your Android antivirus is actually protecting your phone against the malware that sometimes sneaks onto Google Play or is installed by an overbearing spouse? Independent testing lab AV-Test is here with the answers.

        • Nokia’s HERE maps updated on Android and Windows Phone

          Nokia has announced that an update for its Windows Phone and Android Here mapping apps will be rolling out from today.

        • How to automatically unlock your Chromebook when your Android phone’s nearby

          Google is working hard to kill the password. If you want to live in that future now, you can turn on a feature that automatically unlocks your Chromebook whenever you wander near it with your Android phone in your pocket.

        • How to Download Android 5.0.2 Lollipop for Nexus 5?

          The Android Lollipop 5.0.2 update has been made available to some Nexus devices, including the Nexus 7 2012 and 2013 models and the Nexus 10. However, there is still no sign of the update for the Nexus 5 or the Nexus 4. While both the Nexus 6 and the Nexus 9 come with Android 5.0, apparently, the Nexus 5 Android 5.0 Lollipop update has been suspended because it was reported that the update causes the device’s battery to drain at a faster than normal rate.

        • Unofficial app opens up PS4 remote play on Android devices

          To this point, the PlayStation 4′s novel Remote Play function was only accessible on the PlayStation Vita, PlayStation TV, and certain Xperia mobile phones. That’s no longer the case, thanks to an unofficial port that lets the official PS4 Remote Play app work on practically any modern Android device.

        • HTC One M8 and LG G3 pick up Android 5.0 Lollipop

          AT&T began deploying Android 5.0.1 for its LG G3 variant on Tuesday. The carrier will automatically push the roughly 700MB update over the air, but eager users can also manually search for the file by navigating to Settings>General>About phone>Software Update.

        • Here are all of the phones that can get Google’s massive new Android update today

          Google started pushing out its latest version of Android in November, but most Android phone owners are still waiting for the update.

        • What’s Up With Android Wear?

          Research firm Canalys says just 720,000 smartwatches powered by Android Wear, Google’s operating system for wearable devices, shipped in the last six months of 2014.

        • HTC Could Be The Next Android Partner To Ditch Google In Smartwatches
        • JW Player Brings Its Video Player To Android Apps

          JW Player, the streaming video company that (in the words of its president Chris Mahl) helps online publishers find “life after YouTube, or life beyond YouTube,” has made a big move onto mobile with the general release of its Android SDK.

          The player already worked in mobile web browsers, so it wasn’t entirely absent from Android. But this will allow publishers to include the players directly in their apps, to customize its appearance, and to include video advertising.

        • Android Lollipop Review: Google’s Material Design Delivers The Goods

          Regardless of the tinkering Google’s engineers have done under the bonnet, the most noticeable improvement has to be the overall look. Google is calling Android’s fetching new aesthetic “Material Design” and it’s all about giving the OS a more welcoming look. It’s mostly flat colours, clever use of shadow and UI elements which look like layers of paper stacked on top of one another. Google has left behind the world of skeuomorphic design ­–– just like Apple did with iOS 7 –– and the end result is something that looks less cluttered and more eye-catching.

    • Sub-notebooks/Tablets

      • Finally: The best phablet in the world is getting Android Lollipop

        After releasing Android 5.0 Lollipop updates for a variety of top flagship handsets in the past weeks, including the Galaxy S5 and Galaxy Note 3, Samsung has started rolling out the one official Lollipop ROM certain smartphone buyers were waiting for, the one made for the Galaxy Note 4.

Free Software/Open Source

  • Puppet Labs community manager on setting expectations

    The other side of community involvement in an open source project is the end users. It’s hard to be a successful open source project if no one is using it! But aside from providing documentation and forums, how else can projects and users connect?

    Kara Sowles, community manager for Puppet LabsOne way is a users group, a type of club where the members all share an interest in a particular arena. SHARE is one of the oldest computer users group around. The basic idea behind a users group is to provide more resources and share information among a local cell, provide support, encouragement, new ideas, mailing lists, and more. There are some challenges with belonging to a users group, managing a users group, and representing your open source project in a users group.

  • Cisco Takes Open Source Route to Policy Revamp

    Cisco is developing open source tools designed to allow network operators to describe policy in more meaningful terms.

    The Noiro Networks team inside Cisco Systems Inc. (Nasdaq: CSCO) is trying to solve the problem of network policy that doesn’t make sense in an application-centric world. Typical networking policy uses networking language — describing traffic flows or or whether specific ports are allowed to connect with each other. Instead, the Noiro Networks team is looking to describe policies in terms of how applications are allowed to interoperate, says Thomas Graf, a principal software engineer at Cisco working on Noiro Networks.

  • Without open source, there would be no DevOps

    If we’re going to do DevOps, we have to give up open source. Right? Wait, we’re an Agile shop, so we have to give that up, too. Right?

    Over the last five years or so, I’ve talked with a lot of people confused about what it means to “do DevOps,” and clearly concerned about having to give up other things that have already proven their value in order to adopt DevOps. The bad news is, we’ve not done a good job in the DevOps community of nailing down what DevOps is and what it isn’t at an earlier stage in our development.

  • Google Launches Open-Source, Cross-Cloud Benchmarking Tool

    Google today launched PerfKit, an open-source cloud-benchmarking tool that, in Google’s words, is an “effort to define a canonical set of benchmarks to measure and compare cloud offerings.” The PerfKit tools currently support Google’s own Compute Engine, Amazon’s AWS and Microsoft’s Azure clouds. Google says it has worked on this project with over 30 researchers, companies and customers, including ARM, Canonical, Cisco, Intel, Microsoft, Rackspace and Red Hat.

  • Events

    • Oregon State University Open Source Lab hosts 160 projects

      The South California Linux Expo (SCALE) is an annual event aiming to provide educational opportunities on the topic of open source software. This is SCALE13X, and prior to the event I caught up with one of the speakers, Emily Durham, who will give a talk called Human Hacking.

      Emily Dunham of Open Source Lab at OSUEmily is currently finishing her final year in computer science at Oregon State University (OSU), where she is the student systems engineer at the OSU Open Source Lab. Previous to that gig at OSU, she helped run the Robotics Club, Linux Users Group, and Security Club. Emily has 7 years of experience in open source communities, and I talked with her regarding her career and life, open hardware, community psychology, and of course, her upcoming talk at SCALE13X.

  • SaaS/Big Data

    • Myriad Project Marries YARN and Apache Mesos Resource Management

      There are a lot of interesting announcements arriving as the O’Reilly Strata event rolls out. In one notable example, MapR and Mesosphere have announced a new open source Big Data framework (called Myriad) that allows Apache YARN jobs to run alongside other applications and services in enterprise and cloud datacenters. The initiative was kicked off by a developer at Ebay and turned into a collaborative effort between multiple companies. The project is now approaching Apache incubation.

  • Funding

    • Hitachi’s Acquisition of Pentaho Makes it a Big Data Analytics Player

      We’ve been watching the Big Data space pick up momentum as 2015 begins, and now Hitachi Data Systems Corporation has announced its intent to acquire Pentaho in what is being billed as “the largest private Big Data acquisition transaction to date.” Hitachi claims that the acquisition will accelerate enterprise adoption of Big Data technologies and solutions through “easier, faster deployment, leading to faster ROI.”

  • BSD

  • Licensing

    • Open Source Debate: Copyleft vs. Permissive Licenses

      Most discussions of free software licenses bore listeners. In fact, licenses are usually of such little interest that 85%of the projects on Github fail to have one.

      However, one aspect of licensing never fails to stir partisan responses: the debate over the relative advantages of copyleft licenses such as the GNU General Public License (GPL), and permissive licenses such as the MIT or the Apache 2 licenses.

      You only have to follow the links to Occupy GPL! that are making the rounds to see the emotions that this unending debate can still stir. Calling for an end to “GPL purism,” and dismissing the GPL as “not a free license,” the site calls on readers to use permissive licenses instead, describing them as “truly OSS [Open Source Software] licenses and urging readers to “Join the Fight!”

      Occupy GPL! itself is unlikely to have a future. Anonymous calls to actions rarely succeed; people prefer to know who is giving the call to arms before they muster at the barricades. Nor is the site’s outdated name and inconsistent diction, nor the high number of exclamation and question marks likely to inspire many readers. Still, the fact that the site exists at all, and the counter-responses in comments on Google+ show that the old debate is still very much alive.

    • Confessions of a Recovering Proprietary Programmer, Part XIII

      As a recovering proprietary programmer, I can assure you that things work a bit differently in the open-source world, so some adjustment is required. But participation in an open-source project can be very rewarding and worthwhile!

Leftovers

  • Security

  • Defence/Police/Secrecy/Aggression

    • Wikileaks shows US funded Mamasapano operation – solon

      Secret embassy cables leaked by WikiLeaks in 2010 reveal the United States’ heavy involvement in the Philippines’ counter-terrorism efforts including the botched police operation in Mamasapano, Maguindanao, a party-list congressman claimed on Wednesday.

      Kabataan Party-list Rep. Terry Ridon said the cables, which were from 2005 to early 2010, show how the US government planned to operate covertly within the ranks of Philippine forces.

    • Killing of 3 Muslims in US elicits criticism over media blackout

      A shooting in the US, which has reportedly left three Muslims dead in a North Carolina university town, has set social media buzzing over accusations of double standards, with major media outlets failing to report the story.

    • U.S. Dumps Massive Load, of Weapons and Ammunition, in Lebanon

      The U.S. ambassador to Lebanon announced a new shipment of weapons and ammunition have arrived in Beirut, the latest American assistance to Lebanon’s army as it fights ISIS along its border with Syria. The Ambassador said the equipment includes more than 70 M198 howitzers and over 26 million rounds of ammunition and artillery “of all shapes and sizes, including heavy artillery.”

      “We are very proud of this top-of-the-line equipment. This is the best that there is in the marketplace. It’s what our soldiers use,” the Ambassador continued. “I know that in a matter of days it’s going to be what your brave soldiers are using in the battle to defeat terrorism and extremism.”

  • Transparency Reporting

    • Ecuador to Take Assange Case to UN Human Rights Council

      The Republic of Ecuador will take the case of its most famous asylum seeker, Julian Assange, to the U.N. Human Rights Council, according to reports this week.

    • Britain: Julian Assange Duty Is Draining Police Coffers, London Chief Says

      London’s police chief said Tuesday that the cost of keeping watch on Julian Assange, who is holed up in the Ecuadorean Embassy there, was draining resources and must be reviewed. Mr. Assange, the WikiLeaks founder, sought refuge in the embassy in June 2012 to avoid extradition to Sweden for questioning on sexual assault allegations, which he denies. London’s Metropolitan Police have been standing guard around the clock to prevent him from fleeing, at a cost of about $15 million since the operation began. Police Commissioner Bernard Hogan-Howe told LBC Radio that officials were considering “how we can do that differently in the future, because it’s sucking our resources in.” Mr. Assange says the allegations were trumped up to facilitate his extradition ultimately to the United States, where he could be put on trial over huge leaks of information to WikiLeaks.

    • Cameras could cut £10m bill for watching Assange

      A review of the round-the-clock operation to guard Julian Assange, the WikiLeaks founder who is holed up in the Ecuadorian embassy, was announced by Sir Bernard Hogan-Howe yesterday.

    • Met Chief considering pulling the plug on £10m Assange operation

      The UK’s most senior police chief says he is reviewing the operation to guard WikiLeaks founder Julian Assange because it is “sucking” their resources. Deputy Prime Minister Nick Clegg last week revealed the cost of the surveillance operation outside the Ecuadorian Embassy in London had reached around £10m. Metropolitan Police Commissioner Sir Bernard Hogan-Howe told LBC radio: “We are reviewing the way forward there.” Mr Assange, who has been granted political asylum by Ecuador, has been living at the embassy since June 2012.

    • Julian Assange security ‘sucking Met Police resources’

      Security costs for Wikileaks founder Julian Assange are to be reviewed, Metropolitan Police Commissioner Sir Bernard Hogan-Howe has said.

      Maintaining a guard for Assange at the Ecuadorean Embassy in central London has cost £10m, according to figures disclosed to LBC radio.

  • Finance

    • Hidden cards in HSBC game of leaks

      The newspaper argued that similar policies would be followed by journalists in other parts of the globe, saying that it wouldn’t be responsible to just dump information on all account holders, as this could unnecesarily expose them to criminals after the extent of their wealth became public. Although no relevant accounts were tied to government officials by La Nación yet, investigations were said to be ongoing.

    • HSBC files show Tories raised over £5m from HSBC Swiss account holders

      Conservative donors, peers and a high profile MP are listed among the wealthy who legally held accounts in Switzerland with HSBC’s private bank, for a wide variety of reasons.

      Their ranks include Zac Goldsmith, MP for Richmond Park, plus his brother the financier Ben Goldsmith, and a Swiss resident, German-born automotive heir Georg von Opel, who has donated six-figure sums in the past two years.

      Peers named in the HSBC files include Lord Sterling of Plaistow, the P&O shipping and ports entrepreneur who was ennobled by Margaret Thatcher, and Lord Fink, who was a party treasurer under David Cameron and has given £3m to the Conservatives.

  • PR/AstroTurf/Lobbying

    • How Reality TV Is Teaching Us to Accept the American Police State

      February 04, 2015 “ICH” – Americans love their reality TV shows—the drama, the insults, the bullying, the callousness, the damaged relationships delivered through the lens of a surveillance camera—and there’s no shortage of such dehumanizing spectacles to be found on or off screen, whether it’s Cops, Real Housewives or the heavy-handed tactics of police officers who break down doors first and ask questions later.

  • Privacy

    • Google is ‘privatized NSA’, unexamined deaths, & C of E censorship (E173)

      Afshin Rattansi goes underground on Google’s shady privacy record. Kristinn Hrafnsson, lawyer for WikiLeaks, warns that it appears Google is “not a benign company, it has sinister aims,” and reveals that it wants to be a dominant part of the military intelligence complex, handing information to the US government. Dr. Suzy Lishman, president of the Royal College of Pathologists, warns up to 10,000 deaths every year should be referred for further investigation, but are not due to massive numbers of death certificates being filled out minimally or wrong. We look into why the Church of England is removing the right to free speech for one of its vicars. Boris Johnson meets Hillary Clinton to discuss ISIS in New York. And if you’re a war-wounded veteran, you’d better hope you were injured after April 2005 – or you may lose most of your compensation to pay for basic care.

    • Philip K. Dick Warned Us About the Internet of Things in 1969

      Be careful about what you say in your living room if your new TV is on. News broke earlier this week that Samsung’s Web-connected SmartTV can listen to, record, and send what the television hears to a third-party company. The television doesn’t watch you watch it back, but it is listening.

    • Mayor Muriel Bowser Orders D.C. Fire to Lift Radio Encryption

      D.C. Mayor Muriel Bowser has ordered the D.C. Fire Department to lift the encryption of the department’s radios.

      News4′s Mark Segraves broke the news on Twitter Tuesday night.

      She has instructed the fire chief to stop encrypting the department’s radio transmissions beginning Friday morning. Encryption of the radios prohibits anyone except fire personnel from listening to the radio transmissions.

    • Obama asks Germany “to give us the benefit of the doubt” on NSA spying

      President Barack Obama asked Germans to give the United States the “benefit of the doubt” when it comes to snooping by the National Security Agency.

      In a Monday joint press conference with Chancellor Angela Merkel held at the White House on Monday, Obama said he recognizes “the sensitivities around this issue.”

      In October 2013, German media reported that Merkel had “strong suspicions” that her personal cellphone was being monitored by American authorities.

      White House spokesman Jay Carney unequivocally told reporters at the time that such surveillance was not continuing, but he did not directly deny the allegations of past conduct. The next year, Germany decided not to renew its government contract with Verizon, citing concerns over spying by the National Security Agency.

    • Laura Poitras on Citizenfour, Edward Snowden and whistleblowers

      The first glimpse the world had of Edward Snowden was in a short video in a dark Hong Kong hotel room. But film-maker Laura Poitras’ journey with the NSA whistleblower began much earlier.

    • Oscar-Nominated Edward Snowden Documentary CITIZENFOUR to Debut on HBO 2/23
    • Court Says NSA Spying too Secret to Stop

      In a ruling handed down Tuesday, a federal district judge in California refused to rule that NSA collection of Internet and phone content without a warrant violates the Fourth Amendment, and dismissed part of a lawsuit challenging the spy agency program.

    • Judge White Makes Crucial Error While Capitulating to State Secrets, Again

      Ah well, all that discussion probably counts as a state secret. A concept which is getting more and more farcical every year.

    • Surveillance and the Vanishing Right to Know

      Despite the continuing torrent of disclosures concerning previously secret and wide-ranging government surveillance efforts, many criminal defendants are not getting notice of the secret surveillance authorities used in their cases. This is a serious problem—one felt acutely by defendants, but one that also has immense consequences for the public at large in an age of mass surveillance. To those whose liberty is not on the line, the right of criminal defendants to notice might seem like a narrow, procedural issue. It is not. In a world of multiplying surveillance techniques used in secret, the criminal defendant’s right to notice of surveillance used against him is vanishing—and this shift presents a fundamental obstacle for defendants, and a basic, structural problem for courts and the public.

    • EFF Vows to Continue the Fight Against Mass Surveillance After Disappointing Ruling

      EFF will keep fighting the unlawful, unconstitutional surveillance of ordinary Americans by the U.S. government. Today’s ruling in Jewel v. NSA was not a declaration that NSA spying is legal. The judge decided instead that “state secrets” prevented him from ruling whether the program is constitutional.

    • Judge rules for NSA in warrantless search case

      A U.S. judge on Tuesday ruled in favor of the National Security Agency in a lawsuit challenging the interception of Internet communications without a warrant, according to a court filing.

      U.S. District Judge Jeffrey White in Oakland, California wrote the plaintiffs failed to establish legal standing to pursue a claim that the government violated the Fourth Amendment.

    • Surveillance and Freedom of the Media

      These findings are the result of the exposure of mass surveillance that seriously undermines the safety of journalistic sources, the safety of whistleblowers and freedom of the media, in stark contrast with a meaningful democracy where access to information, privacy and freedom of expression is protected.

    • Twitter Reports a Surge in Government Data Requests

      Twitter on Monday released its twice-yearly transparency report, showing a surge in government requests for users’ Twitter information.

      The report, which discloses the frequency with which government agencies from around the world ask Twitter to hand over data on specific users, said total requests rose by 40 percent, to about 2,871, compared with the company’s last report, in July. The latest requests came from more than 50 countries.

    • If the NSA has been hacking everything, how has nobody seen them coming?

      The Snowden docs show us that high value targets have been getting compromised forever, and while the game does heavily favour offence, how is it possible that defence hasn’t racked up a single catch? The immediate conclusions for defensive vendors is that they are either ineffective or, worse, wilfully ignorant. However, for buyers of defensive software and gear, questions still remain.

    • The state most excited for “Fifty Shades of Grey” will surprise you

      TheWrap in conjunction with Facebook took a look at some of the chatter about the film — and its stars Dakota Johnson and Jamie Dornan — online. The data came from likes, comments and shares about the movie on Facebook. “For the past seven days, 3.7 million people had over 6 million interactions related to the Jamie Dornan and Dakota Johnson romp on Facebook,” TheWrap reported.

    • Breaking smart TV surveillance capabilities may be a felony

      Customers who are concerned about the surveillance capabilities of Samsung’s smart TVs have another headache to worry about: Tampering with the machine to disable such components may be a felony.

      Samsung’s privacy policy raised concerns with privacy activists who spotlighted the warning: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.” Now there are concerns that tinkering with the software by tech-savvy customers may run afoul of the Digital Millennium Copyright Act.

      “Most smart TVs on the market have taken technological measures to prevent users from accessing or modifying firmware in order to prevent illegal copying and distribution of copyrighted material. But users could technically face felony charges for circumventing lockdown restrictions — even if the modifications they’re trying to make are legal under copyright law,” Slate reported Tuesday.

    • Who Else Listens To Your TV?

      That’s not exactly what the Terms say; they note that “if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted”. So we’re not just talking about the sort of data Google Now or Siri sends to their service provider (the phrase after you have started the voice recognition). Samsung also sends the commands themselves, plus any conversation around them. From that description, it seems the whole stream of conversation is likely to be sent.

  • Civil Rights

    • Jeffrey Sterling’s trial by metadata: Free speech stories

      When a Washington, DC, area jury convicted Jeffrey Sterling of multiple counts of espionage, the smoking gun wasn’t a key bit of classified information found in the former CIA officer’s possession; it was a trail of phone calls and emails of unknown content.

      The information about where those calls and emails went, however – to a New York Times reporter – was enough to convince a jury to send Sterling to prison for up to 80 years.

      According to the US Justice Department, Sterling was providing Risen with details of a failed CIA attempt to undermine Iran’s nuclear programme by having a Russian scientist code-named Merlin pass along intentionally flawed blueprints. Risen then exposed the operation in his 2005 book, State of War.

    • Map of 73 Years of Lynchings

      The most recent data on lynching, compiled by the Equal Justice Initiative, shows premeditated murders carried out by at least three people from 1877 to 1950 in 12 Southern states. The killers claimed to be enforcing some form of social justice. The alleged offenses that prompted the lynchings included political activism and testifying in court. FEB. 9, 2015 Related Article

    • Lynching as Racial Terrorism

      It is important to remember that the hangings, burnings and dismemberments of black American men, women and children that were relatively common in this country between the Civil War and World War II were often public events. They were sometimes advertised in newspapers and drew hundreds and even thousands of white spectators, including elected officials and leading citizens who were so swept up in the carnivals of death that they posed with their children for keepsake photographs within arm’s length of mutilated black corpses.

      These episodes of horrific, communitywide violence have been erased from civic memory in lynching-belt states like Louisiana, Georgia, Alabama, Florida and Mississippi. But that will change if Bryan Stevenson, a civil rights attorney, succeeds in his mission to build markers and memorials at lynching sites throughout the South as a way of forcing communities and the country to confront an era of racial terror directly and recognize the role that it played in shaping the current racial landscape.

      Mr. Stevenson’s organization, the Equal Justice Initiative, took a step in that direction on Tuesday when it released a report that chronicles nearly 4,000 lynchings of black people in 12 Southern states from 1877 to 1950. The report focuses on what it describes as “racial terror lynchings,” which were used to enforce Jim Crow laws and racial segregation. Victims in these cases were often murdered without being accused of actual crimes but for minor social transgressions that included talking back to whites or insisting on fairness and basic rights.

      The report is the result of five years of hard work. Researchers reviewed local newspapers, historical archives and court records; interviewed local historians, survivors and victims’ descendants; and scrutinized contemporaneously published articles in African-American newspapers, which took a closer interest in these matters than the white press. In the end, researchers found at least 700 more lynchings in the 12 states than were previously reported, suggesting that “racial terror lynching” was far more common than was generally believed.

    • Watch one of Jon Stewart’s most famous moments: his epic Crossfire appearance

      Crossfire’s whole premise was a debate between left and right, one that at times degenerated into a shouting match. Stewart often criticized the show as dumbing down American public discourse. And, when Crossfire’s hosts invited him on to debate, he embarrassed them.

      “You’re partisan — what do you call it — hacks,” Stewart said, to a stunned Carlson and Begala. “Stop hurting America.” Here’s the clip…

    • Privacy experts question Obama’s plan for new agency to counter cyber threats

      White House to unveil on Tuesday the Cyber Threat Intelligence Integration Center but critics fear an expansion of government monitoring of online data

    • Judge Nap on New Cybersecurity Agency: ‘Lost Liberties Don’t Come Back’

      “I believe that the people who build these things have the ability to make them absolutely attack-proof, but in order to do that, they have to make them impervious to government intrusion,” Judge Nap said, adding that any government agency big enough to protect us is big enough to surveil us.

      “The Internet cannot be protected by the government, because the government will never permit a system that it can’t zero into,” Judge Nap said, concluding that he would “absolutely not” establish this agency.

      Watch Judge Nap and Stuart

    • Torture and the CIA’s Unaccountability Boards

      Last Saturday, January 31, CIA Inspector General David Buckley resigned after a little more than four years in office. His departure came at the end of the same month his office published a scathing report that found the agency committed serious wrongdoings in connection to its rendition, detention, and torture program. It was also the same month that his report was swept aside by a parallel investigation conducted by a CIA “Accountability Board” that was hand-picked by agency leadership. Unsurprisingly, the Accountability Board recommended holding no one accountable for any failings.

    • Guantánamo Bay: wheels of justice turn slowly – at $7,600 a minute

      The Guantánamo Bay war court is now costing US taxpayers over $7,600 per minute, according to new Pentagon figures.

  • Internet/Net Neutrality

    • Google is seriously taking on US telecom

      First it conquered search. Then it was online video and advertising. Now Google is turning its attention toward telecom — and it’s no experiment.

      In recent months, Google has said it’s bringing ultra-fast Internet to at least 18 US cities, including Atlanta and Nashville. It announced pilot tests of a low-cost, modular smartphone. The company’s joined an influential lobbying group for upstart telecom firms. And now Google is considering an entry into wireless service, as first reported by The Information, a technology news site founded by former Wall Street Journal reporter Jessica Lessin.

    • Hello HTTP/2, Goodbye SPDY

      HTTP is the fundamental networking protocol that powers the web. The majority of sites use version 1.1 of HTTP, which was defined in 1999 with RFC2616. A lot has changed on the web since then, and a new version of the protocol named HTTP/2 is well on the road to standardization. We plan to gradually roll out support for HTTP/2 in Chrome 40 in the upcoming weeks.

    • Wall Street Knows Darn Well That FCC’s Net Neutrality Rules Won’t Harm Broadband: Stocks Went Up

      And, indeed, it appears the stock market acted accordingly. Following Tom Wheeler’s official announcement that the FCC would move to reclassify under Title II, all the key broadband players saw their stocks jump up, not down. If it was really that bad, you would have seen the opposite.

02.11.15

EPO Staff to March to British Consulate to Protest Against the Administrative Council (AC)

Posted in Europe, Patents at 9:09 pm by Dr. Roy Schestowitz

Sean Dennehey
Sean Dennehey
Image credit: UK Patent Office “Technical Contribution” Workshop – London 2005

Summary: Sean Dennehey and John Alty from the Board of the Administrative Council will see their consulate in Germany occupied by EPO staff

FOLLOWING some very large protests against EPO management, including a recent staff protest around the Danish Consulate (about 1,000 people in attendance, yielding mainstream press coverage), there is another protest being organised.

“Actions continue at the European Patent Office,” said a statement today. “On Wednesday 25 February 2015 a demonstration will take place in Munich (Germany) starting from the EPO Isar building (Bob-van-Benthem-Platz 1) at 12.10h and ending at the British consulate (Möhlstrasse 5).

“The United Kingdom is represented in the Administrative Council by Mr John ALTY (Chief Executive and Controller General of the UK IPO) and Mr Sean DENNEHEY (Deputy Chief Executive UK IPO). Mr Dennehey is also member of the Board of the Administrative Council (“Board 28″) which is currently discussing the future of the EPO Boards of Appeal. Mr Dennehey was recently re-elected Chairman of the Patent Law Committee. Mr Dennehey apparently supported the Office in trying to suppress public discussion about the suspension of a Member of the Boards of Appeal while at the same time leaving space for Mr Battistelli to express his view of the events.”

This ought to yield press coverage in English — not Danish — hence it would be readable by a broad audience and raise awareness of the EPO scandals.

We previously published Dennehey's contact details (after the EPO’s management had removed these), so those who wish to be diplomatic about it can eloquently express their concerns about the Administrative Council to him (or to John Alty, who is also in the list). As we have shown over the past half a year, the Administrative Council has become more of an extension of Battistelli’s regime; it’s not independent. The Administrative Council lost credibility not only in the eyes of EPO workers but also outsider who depend on EPO services and pay taxes that EPO receives.

The EPO’s Digital War (Censorship) Against Staff Web Site

Posted in Europe, Patents at 8:50 pm by Dr. Roy Schestowitz

Benoit Battistelli

Summary: The EPO’s management has been blacklisting dissent and increasingly relying on censorship as means of eliminating opposing voices

A LOT has been happening in the EPO regime in recent weeks, culminating in resignations or firings from one side and protests from the other (up to a third of all staff), resulting in an assault on the press (paid 'articles') from one side and DDOS attacks on the other. There is a war between staff and the crooked managers who attack the staff’s rights, break the rules, and operate a tyranny that betrays principles of scope and even, based on numerous criteria, violates EU law.

Based on an E-mail from the webhost of SUEPO, the attacks on their site is quite serious. Here are some enumerable details:

Subject: Server blocked due to DoS attack

thank you for your request.

The attack appears to be over. We were able to unblock your IP-Addresses.

Your server should be reachable again.
Detailed information about the attack:
Type UDP Packetflood
Traffic: 3,5G with 8MPacket/s
Random external IP Sources
Destination 87.106.183.86 Port 80,5190
Start-Date 2015-02-05 05:18:41+0100

In simple terms, there is no denying that this was a DDOS attack. We would love to know the outcome of the investigation as we too came under heavy DDOS attacks, lasting months (keeping my wife and I awake at night and causing serious financial damage), ever since we started criticising EPO management. We can’t tell if there is a correlation between these attacks (SUEPO and us), but if there is a correlation between those two, then we can deduce something about the motivation (or source).

A source told us that an investigation is underway, citing SUEPO as stating: “By flooding our server with external requests in this manner the attackers rendered it unavailable. As soon as our server was reachable again, the attackers attempted an SSH brute-force attack to take control of the server.

“Such attacks constitute a violation of law and SUEPO has filed criminal charges against unknown and will cooperate with the German and Dutch authorities, who are now investigating the matter.”

Our source further indicated that there had been other oppressive measures against SUEPO, so the above would not be exactly unprecedented. To quote further:

What happened to SUEPO until now?

Communication with our members has become extremely difficult. In particular, we cannot reach our members on their EPO email address because of the measures applied by the Office since 2013, such as:

- The domain name suepo.org is blacklisted in the email server of the EPO since 2013. A sender from @suepo.org cannot reach a recipient @epo.org

- Many colleagues have reported that external emails containing the word “SUEPO” in the subject line or body do not reach a recipient @epo.org. Despite several requests for clarification, the administration has remained silent on the matter.

What next?

Your committee will strive to maintain its communication means with staff and to continue to inform them promptly of what is really happening in the Office. We would like to encourage you to provide your local SUEPO Committee with your private email address if you haven’t done it yet. Given the current context, we think it makes sense.

This in its own right serves to show that the EPO already engages in digital war against SUEPO. It’s a war of censorship. Would the EPO go as far we paying crackers? That’s an important question. Some people deem DDOS attacks “just a sit-in/protest”. Such people rarely (if ever) had to respond to an actual DDOS attack; these can persist for weeks or months.

“Some people deem DDOS attacks “just a sit-in/protest”.”“In the meantime,” said our source, “SUEPO has issued the statement” (above).

“Some people,” our source added, “are currently trying to investigate whether there is any similarity between the recent cyberattacks on the server of the Croatian web portal dnevno.hr.

“An open question here is whether or not EPO funds are being used to finance these attacks.”

As we noted earlier today, Željko Topić is alleged to have covered up for his predecessor/s. Is the EPO now covering up its own misconduct, by covert, subversive or aggressive means also? If so, Topić may have plenty of “work experience” to offer the EPO after all.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts