06.03.15
Posted in News Roundup at 6:55 am by Dr. Roy Schestowitz
Contents
-
So far in 2015 we haven’t heard much at all about The Machine… Besides that X.Org veteran Keith Packard left Intel to join HP where he’s working on The Machine. Thus now being into June 2015, I’m wondering if this month we’ll see the debut of Linux++, “Software that emulates the hardware design of The Machine and other tools will be released so that programmers can test their code against the new operating system. Linux++ is intended to ultimately be replaced by an operating system designed from scratch for The Machine, which HP calls Carbon,” according to one of the earlier reports.
-
Desktop
-
Amazing. Wonders never cease in 2015, The Year Of The GNU/Linux Desktop.
-
With the popularity of mobile computing, some thought that windows would not be necessary anymore. The guys at Redmond, for example, made an atrocity of an OS and trumpeted as the latest-greatest. It dismissed the idea of windows because all apps ran full screen. Way to go! Especially if one uses a big monitor…what a waste of screen real estate!
-
When I was a young girl, I remember my dad showing me Linux on his computer.
He was showing me what was known then as Red Hat Linux—it was a fresh version of Colgate 4.0 from Best Buy. At that time, I was familiar with Windows 95 and knew how to use a computer, but Linux was new to me. It looked like a bunch of code and too technical. So, it was many years later, in January of 2009, that I finally made the switch.
-
Those on the fence about the Chromebook will find that budget-friendly models make it easy to give them a try. Here are four impressive models that don’t cost an arm and a leg.
-
One of the more surprising things in a relatively unsurprising Citrix Synergy was the round of applause created by the announcement of the Linux VDA Tech Preview. I think it’s great, but it’s not the kind of announcement you’d think would garner much more than a murmur, let alone get a larger reaction from the audience than the iBand’s rendition of “Hey Ya!”
-
Server
-
StackIQ, Inc., makers of the Warehouse-grade automation platform for any large-scale server infrastructure, today announced the release of open source Stacki (short for “Stack Installer”), the world’s fastest and easiest-to-use Linux server provisioning tool. With Stacki, there are zero prerequisites for taking systems from bare metal to ‘a ping and a prompt.’ Alongside this new release, the company made available a one-day, on-site Stacki training and an implementation service for users who want to use the tools immediately for production servers.
-
Kernel Space
-
-
The topic of persistent memory is back to the future for those of us old enough to have used core memory, but today’s persistent memory boasts densities, speeds, latencies, and capacities that are well beyond the scope even of science fiction back in the core-memory era.
-
Since its inception, the Linux Foundation’s Automotive Grade Linux project has promoted itself as a collaborative open source project. With the release of the first AGL Requirements Specification for Linux-based in-vehicle infotainment (IVI), AGL has earned that description more than ever.
-
The AllSeen Alliance, a cross-industry collaboration to advance the Internet of Everything through an open source software project, today announced 20 new members have joined the initiative. This marks the sixth consecutive month with double-digit member growth for the AllSeen Alliance, with more than 70 companies joining the initiative since January. Furthermore, these new members hold expertise across critical horizontal areas of the Internet of Things (IoT) — telecommunications and networking operators, software developers, IoT platforms and solutions, product companies and smart home automation.
-
Graphics Stack
-
The plans for Libinput 1.0 haven’t yielded fruit yet, but libinput 0.16 is out this afternoon as the latest version of this input library used both by Wayland and X11 (and potentially Mir moving forward).
-
libinput uses udev tags to determine what a device is. This is a significant difference to the X.Org stack which determines how to deal with a device based on an elaborate set of rules, rules grown over time, matured, but with a slight layer of mould on top by now. In evdev’s case that is understandable, it stems from a design where you could just point it at a device in your xorg.conf and it’d automagically work, well before we had even input hotplugging in X. What it leads to now though is that the server uses slightly different rules to decide what a device is (to implement MatchIsTouchscreen for example) than evdev does. So you may have, in theory, a device that responds to MatchIsTouchscreen only to set itself up as keyboard.
-
AMD is finally out with a big Catalyst Linux driver update!
-
Samuel Pitoiset today unveiled his long sought after patches for implementing NVIDIA’s PerfKit performance utility as a Gallium3D state tracker for use by the open-source Linux graphics drivers.
-
Benchmarks
-
Today we’re looking at the performance of the latest proprietary graphics drivers on the Linux desktop at the time of testing: NVIDIA 352.09 Beta and the Catalyst 15.4 Beta as packaged for Ubuntu Vivid — fglrx 15.20.2 / OpenGL 4.4.13374. Later in the week should be the open-source Intel/AMD/NVIDIA Linux graphics driver results for celebrating the Phoronix birthday. For this article there were 17 graphics cards tested all supported by these latest proprietary drivers — the graphics cards used were those that were available and in my possession at the time of testing, which sways to the NVIDIA side. There’s basically every major NVIDIA graphics card covered given they’re frequently sending out samples to Phoronix for Linux testing while in the past few years on the AMD side they have barely sent out any GPUs for Linux testing… All of the AMD GCN GPUs tested in this article were retail GPUs I purchased. Anyhow, the graphics cards able to be tested for this article were:
-
All of the Intel x86 systems were running Ubuntu 15.04 with the Linux 4.1 kernel and the rest of the same software make-up. With the Utilite, Ubuntu 12.04 with the Linux 3.0 kernel was used due to newer releases not being supported by CompuLab. With the Jetson TK1 was Ubuntu 14.04 with the Linux 3.10 kernel, likewise due to NVIDIA not providing any newer official images. Due to running OpenGL (non-GLES) tests, only for the x86 systems are the graphics test results while for all of the processor-bound tests are results for all six systems in total.
-
Applications
-
The Inverse Team is pleased to announce the immediate availability of SOGo 2.3.0. This is a major release of SOGo which focuses on improved stability over previous versions.
-
Oracle had the great pleasure of announcing today, June 2, the immediate availability for download and testing of the VirtualBox 5.0 Release Candidate 1 (RC1) virtualization software for Linux, Mac OS X, and Microsoft Windows platforms.
-
The OpenShot Video Editor is preparing to get a major improvement as its developer has just revealed that he managed to improve the performance ten-fold.
-
CherryTree is a text editor, with the features of a modern editor, such as syntax highlighting, spell check, export to html, password protection, and many others.
-
-
-
One of the things I do quite often is go to a terminal, do some short command or two, then close the terminal. I do this away from my coding terminal as I don’t want to contaminate bash history with those commands, mainly because I do a lot of repetitive things [1].
-
Instructionals/Technical
-
Games
-
Rituals is a game that mixes 3D exploration with a subtle story and traditional point-and-click puzzles. It was released on Steam last week, and thanks to a key from developer Tymon Zgainski, we’ve had a look at it.
-
Massive Chalice was funded on Kickstarter two years ago, and after half a year in Steam Early Access, the full release is now available for Linux on GOG, Humble Bundle and Steam.
-
A new high quality RPG title ‘Sword Coast Legends’ is now confirmed to be coming to Linux, and it’s going to be a day-1 release for us.
-
Valve has shipped a DLC to Dota 2 that appears to be the Source 2 Engine version of the game.
-
-
-
Sword Coast Legends, the new game set within Dungeon & Dragons’ Forgotten Realms Sword Coast, has been announced for Linux and Mac.
The party-based RPG is a collaboration between Wizards of the Coast, n-Space, Digital Extremes, and Dragon Age: Origins director and executive producer Dan Tudge.
-
XCOM 2 is going to be awesome, that’s pretty much a given. The annoying thing is we have to play catch up to IGN’s obviously paid for exclusivity here. IGN will be stretching it out as long as possible of course.
-
2K Games has just announced that XCOM 2 will arrive this November and that there will also be a Linux port of the game handled by Feral Interactive.
-
-
-
Blackhole is a beautifully rendered 2D sci-fi hardcore platformer developed and published on Steam by FiolaSoft Studio. The game has been ported to the Linux platform along with the just-released DLC.
-
Desktop Environments/WMs
-
If you haven’t seen the pilot episode of USA’s new series, “MR. ROBOT”… you can see the whole thing on YouTube… until they decide to take it down. Anyway, there was an exchange about GNOME vs. KDE and Linux is even mentioned. Here’s the 1 minute clip.
-
K Desktop Environment/KDE SC/Qt
-
The KDE Community has just revealed that KDE Applications 15.04.2 has been released, making this the second maintenance version in the new branch.
-
Today KDE released the second stability update for KDE Applications 15.04. This release contains only bugfixes and translation updates, providing a safe and pleasant update for everyone.
More than 30 recorded bugfixes include improvements to gwenview, kate, kdenlive, kdepim, konsole, marble, kgpg, kig, ktp-call-ui and umbrello.
-
While Qt 5.5 is hopefully shipping at the end of the month, Qt 5.4.2 is the newest stable version today. Qt 5.4.2 has important security fixes for the Qt WebEngine, DoS vulnerability fix for its BMP image handler, and various other security fixes. There’s also updates in Qt 5.4.2 for third-party libraries bundled within this leading open-source tool-kit.
-
On June 2, the Qt Company, through Tuukka Turunen, announced the immediate availability for download of the second patch release for the stable Qt 5.4 series of the world’s most acclaimed GUI toolkit.
-
Today we have released Qt 5.4.2, the second patch update to Qt 5.4. In addition to improvements and fixes to Qt functionality it also packs new Qt Creator 3.4.1.
-
We are happy to announce the release of Qt Creator 3.4.1. It includes fixes for the following regressions: manually registered documentation on Windows was deregistered again on restart, and disabling plugins could disable most of the About Plugins dialog.
-
First, I would like to announce, I have been chosen as a Google Summer of Code student and my task is to provide a working version of Marble on Android at the end of the summer.
-
So the first fundraiser I’d like to write about is the Make Krita faster than Photoshop Kickstarter campaign. It’s almost over and is already a success but that doesn’t mean you can’t still become a supporter of this awesome painting application. And for the case you shouldn’t have seen it there was a series of interviews with Krita users (and thus users of KDE software) you should have read at least in part.
-
Each of these profiles configures Konqueror in a specific way for a specific task. You can then use these as starting points configure Konqueror to meet your specific needs and save a profile so that you can reconfigure Konqueror at any time to meet those needs. Even when configured for one task, such as file management, Konqueror can be used for other tasks such as web browsing.
-
I started porting of kdepim to KF5 1 year ago (in may 2014). When I started it I thought that it should be easy. But it was not easy because firstly KF5 was not release and it was not stable, there was some bugs. Secondary kdepim is not just KMail, it contains the kdepim libs + akonadi + kdepim runtime + kdepim apps (as korganizer, kmail, etc.).
-
GNOME Desktop/GTK
-
The Linux Mint team has just announced that Cinnamon 2.6 is finally stable and ready for download. They also detailed this latest release of the desktop environment, and it’s got to be biggest update made until now.
-
-
On behalf of the team and all the developers who contributed to this build, I am proud to announce the release of Cinnamon 2.6!
-
-
Reviews
-
Deepin, the Chinese Linux distribution, has previously been covered on MTE. In the two years that passed, Deepin has evolved both visually and in functionality, beyond expectations.
-
New Releases
-
Team Tiny Core is proud to announce the release of Core v6.3…
-
-
-
Peppermint is excited to announce the launch of our latest operating system Peppermint Six. Lightweight and designed for speed, Peppermint Six delivers on that promise whether using software on your desktop, online, or using cloud based apps.
-
Arch Family
-
All AUR (Arch User Repository) package maintainers received an email on June 1, 2015, that notifies them about the fact that the entire software repository will be migrated to a Git-based platform starting June 8, 2015.
-
Ballnux/SUSE
-
AMD finally updated their graphics driver for Linux platforms to version 15.5, a release that introduces support for the SUSE Linux Enterprise Desktop (SLED) 12 operating system.
-
In a recent report for the Tumbleweed rolling-release version of the openSUSE Linux operating system, Dominique Leuenberger informed users and developers alike that the KDE3 packages will soon be removed from the repositories.
-
Slackware Family
-
Yesterday there was a new release for the KDE Applications. I know that I updated my KDE 5 package set barely a week ago, but there were a few updates that I wanted to push anyway, so adding the updated Applications packages seemed like the proper thing to do.
-
Red Hat Family
-
Accanto Systems, an established provider of customer experience management (CEM) and advanced analytics, today announced that it has become a Red Hat ISV Advanced Partner.
-
Red Hat JBoss Middleware Hands-On Labs, join us for a free hands-on lab at one of our Benelux locations
-
Ranga Rangachari, VP & GM of Red Hat, Inc., and Duane Decapite, the Director of OpenStack Product Management at Cisco Systems, Inc., have established a unique partnership between their respective companies under the OpenStack banner, based on the current trajectory of their shared technology.
-
-
Fedora
-
-
-
In the last fedora-infra meeting, Kushal pointed out that it is important that the gems I am using on my project are packaged in Fedora. I was taken aback by this, because I had no idea that such a thing as rpm package of ruby gem existed.
-
-
-
I have been very occupied in recent weeks with piggies of various shapes, sizes, and missions in life [1], so I missed posting the last design team meeting update. This is going to be a quick two-for-one with mostly links and not any summary at all. I’ve been trying hard to run the meetings so the auto-generated summaries are more usable, but I am always happy for tips on doing this even better from meetbot pros (like you? ?)
-
I’ve just open the “remi-safe” repository for Enterprise Linux 7 (RHEL, CentOS).
-
Michal Toman, a Fedora developer known for his work on ABRT (Automatic Bug Reporting Tool), as well as the PowerPC (PPC) and s390 ports of the operating system, has posted a message on the Fedora Linux mailing list, announcing that he wants to revive the MIPS port of Fedora.
-
I manage the community leadership portion of the Open Source and Standards (OSAS) team at Red Hat. Our team works to help ensure the success of the community upstream projects, which are so important to Red Hat. This includes Fedora, CentOS, RDO, oVirt, Project Atomic, and many others. You can read about what we’re working on and find events where our team and other Red Hat employees are presenting at community.redhat.com or follow us on Twitter at @redhatopen.
-
After having proposed the Cinnamon and Netizen Spins for the upcoming Fedora 23 Linux operating system, Jan Kurik comes with yet another interesting proposition: the addition of a default local DNS resolver.
-
Announced today are the Fedora 22 releases for alternative architectures of POWER and IBM Z systems.
-
-
-
On June 2, Fedora Project, through Peter Robinson, had the great pleasure of announcing the immediate availability for download of the Fedora 22 Linux operating system for the PowerPC and IBM System z (s390) 64-bit hardware architectures.
-
Fedora Project have just released the latest version of Linux Distribution, Fedora 22. It now available for download for all the new flavors, Workstation, Server, and Cloud.
-
Debian Family
-
-
-
Derivatives
-
Canonical/Ubuntu
-
As a reminder, the BQ Aquaris E4.5 Ubuntu Edition is the first Ubuntu Phone, but also the Meizu MX4 Ubuntu Edition will be available in Europe soon, now the phone being shipped only in China.
Mark Shuttleworth has announced a while ago that a new BQ Ubuntu Phone will be released soon and now, new information about this has been revealed. The next Ubuntu phone is BQ Aquaris E5 HD, which will become available all over Europe in mid-June, this year.
-
Canonical, the company behind the Ubuntu Linux distribution, today announced the launch of the second Ubuntu phone in partnership with Spanish manufacturer BQ. While it can’t rival any recent (or even older) Android flagship phones in terms of basic specs, the new BQ Aquaris E5 HD is a step up from BQ’s first Ubuntu phone.
With a mediocre 4.5-inch 540×960 display, 1GB of RAM and 1.3 MediaTek A7 processor, the first Ubuntu phone wasn’t exactly a head-turner. The new device still uses the same MediaTek quad-core processor and only 1GB of RAM, but the rest of the specs have improved a bit.
-
Meizu MX4 Ubuntu Edition is coming to Europe soon, but it would be available for everyone straight away. The latest Ubuntu insider event provided some more information about the impending launch.
-
Canonical is still quite eager to have a “convergence” device out into the wild and it looks that BQ will be the company to build it.
-
The Ubuntu Touch platform already received a few major updates in the past few months, but the developers are preparing so much more with the next releases. This information was revealed during the latest Ubuntu insider hangout.
-
Canonical, the Company behind Ubuntu operating system, introduced a new operating system called “Snappy Ubuntu Core” a few months ago for Cloud and devices. Canonical, actually, introduced the Snappy mechanism for it’s mobile version of Ubuntu. Now, it extended this technology to Cloud too. Snappy Ubuntu Core delivers bullet-proof security, reliable updates and the enormous Ubuntu ecosystem at your fingertips, bringing the developer’s favourite cloud platform to a wide range of internet things, connected devices and autonomous machines. Snappy Ubuntu Core is available on a wide range of 32 and 64-bit ARM and X86 platforms.
-
On June 2, Canonical had the great pleasure of announcing that they will join forces with Intel, one of the world’s biggest hardware manufacturer, to collaborate around Intel’s IoT (Internet of Things) gateways and Canonical’s Snappy Ubuntu Core operating system for IoT devices.
-
The world’s most comprehensive IoT event of the year, Internet of Things World or popularly know as IoT World, took place last month at the Moscone Center in San Francisco, United States.
-
Last week we reported on the new features that will arrive in the next major OTA (Over the Air) software update for the Canonical’s Ubuntu Touch mobile operating system for Ubuntu phones.
-
-
Time and again, Ubuntu keeps popping up whenever there’s some Google product launch. Remember Google’s Project Tango or that bit of news about the use of a ‘lightly custmozied Ubuntu’ in Google’s Driverless Car project? Given its widespread use inside Google, it’s no surprise than Google is an Ubuntu Advantage Customer.
-
As a reminder, Marcos Costales has worked at a GPS navigation application for Ubuntu Touch for a while now. The application, called intuitively GSP Navigation, has been finally added to the Ubuntu Store, being available for everybody that owns an Ubuntu phone.
-
In February of this year, BQ, the European technology company, launched the Aquaris E4.5 Ubuntu Edition, the world´s first smartphone featuring the Ubuntu operating system
-
-
If neither Android or iOS tickle your fancy when it comes to smartphones and Windows Phone is still too mainstream for you, there are other options. In fact, Meizu has a smartphone called the MX4 that runs Ubuntu Phone OS, which will make fans of Ubuntu positively giddy. Details on the European launch of the smartphone have now surfaced and the device will land in Europe this month.
-
The Meizu MX4 Ubuntu Edition was launched in China last month and now the handset is headed to Europe this month.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
After reporting earlier the summary of the Ubuntu Desktop Team meeting that took place on June 2, we’re now informing you about the decisions made by the Ubuntu Kernel Team on the same day.
-
-
A developer has built a custom alarm watch powered by the Linux kernel with NTP synchronization, touch keypad, and network connectivity.
-
The PICO-IMX6UL is the first product we know to adopt the i.MX6 UltraLite SoC announced last week by Freescale. Like its siblings, it runs Linux 3.x or Yocto, but it lacks their Android and Ubuntu support. Like the other PICO-IMX6 modules, the PICO-IMX6UL measures 36 x 25mm and plugs into TechNexion’s PICO-DWARF carrier board (shown farther below), thereby converting the COM into a sandwich-style SBC.
-
Congatec’s “Conga-QA4″ Qseven COM is based on Intel’s 14nm “Braswell” Pentium and Celeron SoCs, and offers MIPI-CSI, dual SATA ports, and 4K video.
-
Axiomtek’s “CAPA840″ SBC supports Atom E3800 SoCs, and offers -20 to 70°C support, wide-range power, dual mini-PCIe, and a “ZIO” connector for I/O modules.
-
Phones
-
Tizen
-
Android
-
-
Oppenheimer’s analysts argued that Samsung and other Android OEMs had neglected the “software user experience” and sought to distinguish themselves through hardware, with the S6′s designers opting for: “A cutting-edge CPU, curved display, iPhone-like metal casing, front area fingerprint sensor and camera with OIS.”
But the problem was that the software had barely changed. Look past the hardware and Samsung wasn’t rewarding previous brand owners with anything particularly new or interesting. Neither are other OEMs in the crowded Android market. They have also distinguished themselves through tiny hardware details and similarly don’t have a software story.
-
Google showed off some great new features with Android M last week, but is there any guarantee that any of this year’s big flagship phones will get the new software in a timely manner? BGR alum Dan Graziano writes over at CNET that despite being “addicted” to Android for the past several years, he can’t be bothered to feel the least bit excited about it because he has no idea when his device will get upgraded to the platform, if ever.
-
Last week, we brought you word of an incredibly cool hidden Android M feature: Multi-window support that will let you have two apps open at once side by side. However, Android Police has been playing around with this new feature and has found that Google has kept it hidden for a reason — namely, because it needs a lot more work.
-
Mitsubishi is the latest carmaker to confirm specific plans for both Apple CarPlay and Android Auto, although U.S. consumers are still in the dark.
The company announced that it will launch both products on the 2016 Pajero SUV in Europe this summer, but didn’t discuss any target dates for a U.S. launch.
-
It was the iPad that first introduced us to the magic of augmented reality for astronomy apps, in which your device adds graphics on top of a view of the real world.
-
-
The Samsung Galaxy Android 5.1 release continues to gain steam as we push into June and today we want to take a look at the most important things Galaxy smartphone and tablet users need to know about Samsung’s Galaxy Android 5.1 update and release.
-
Samsung’s top strategy executive said Tuesday that there is room for both his company and Google in the mobile payment space despite some clear overlap.
-
Asus has finally solved the issues that it was experiencing in updating the operating system of the ZenFone 4, ZenFone 5 and ZenFone 6 to Android 5.0 Lollipop, with the company already starting the roll out of the latest version of Google’s mobile operating system to the aforementioned smartphones.
-
If you are an avid Internet user, chances are that you’ve stumbled upon Imgur at least once in your endeavors on the web – it’s not only one of the most user-friendly and appealing visual story-telling community that are completely free to use, it’s also home to one of the friendliest user communities. The Android version of the app was full of bugs and issues; all in all, it was a bit underwhelming. Until now, that is.
-
Mobile gameplay streaming service Kamcord has launched on Android, letting users share clips of their time playing games on their phone with voiceover.
-
-
“AMIDuOS can run nearly all of the Android applications available in Android app markets,” the company says on its website. “To get you started, it comes with preloaded Amazon Appstore. To make AMIDuOS your own, simply add your favorite Android app markets with the AMIDuOS package installer. AMIDuOS is also ARM v7 compatible, so it can run most popular ARM applications as well.”
-
U.K. hardware startup Blocks Wearables, which is in the process of building a modular smartwatch — shown off in concept-form in this teaser video last fall, and originally inspired by Google’s Project Ara modular smartphone — has confirmed the device will run on a modified version of Android Lollipop, rather than the Google Wear platform.
Also today the team has revealed the device’s core module will be powered by a Qualcomm Snapdragon 400 chipset, with peripheral modules using ultra-low-power ARM processors.
-
It’s unlikely that the final version of Android M will be available to consumers until November at the earliest. However, if you have a Nexus 5, Nexus 6, Nexus 9 or Nexus Player and you’re desperate to get your hands on Android M, you can download the Developer Preview today. Here’s how to install Android M now.
-
Japanese developer and publisher Natsume has announced that it’s bringing the Harvest Moon franchise to Android for the first time. And this isn’t a port of one of the many previous entries in the series. Harvest Moon: Seeds of Memories will be a full-blown sequel.
-
It’s been less than a week since Google unveiled its Android M platform but in that time Android fans have gone over the Android M developer build with a fine-toothed comb searching for hidden gems that Google never mentioned. We’ve scoured the web and have cobbled together five of the best unheralded Android M features that we think will really improve the quality of the platform and give Android fans something to cheer, even if they’re not aware that these features exist.
-
In a statement provided to the Wall Street Journal, an unnamed Nintendo spokesperson said “There is no truth to the report saying that we are planning to adopt Android for NX.” That’s a pretty strong denial for a company whose usual stance is simply not to comment on rumors or speculation.
-
-
What are the odds Nintendo’s next platform, possibly a suite of devices codenamed “NX,” would emerge running a flavor of Google’s popular operating system, as claimed by a single anonymous insider in a column by Japanese biz paper Nikkei?
-
Aside from its codename, we know little about Nintendo’s in-development “NX” console. Yesterday, however, Japanese publication Nikkei claimed to have hit upon a particularly juicy detail about the next-gen gaming system, with its sources stating the NX will run some form of Google’s Android OS. The rumor wasn’t exactly far-fetched, given Nintendo’s plans to get into mobile games this year; but alas, it appears to have been a blast of hot air.
-
-
Maybe you have a smart lock or connected light bulbs, but if you really want to move closer to true home automation, you need a smart-home hub. Without one, you can’t do something like set up a nighttime scenario, where your thermostat lowers, front door locks, and lights turn off at bedtime.
-
The Shield is much pricier and powerful than comparable devices such as Google/Asus’ Nexus Player, Razer’s Forge TV, and Amazon.com’s Fire TV, which cost between $79 and $149. Is there actually a market for these high-end Android set-top streaming media and gaming devices? More importantly, why is NVIDIA — a company that makes most of its money from GPU sales — developing a streaming set-top box?
-
At the Google I/O 2015 conference, the search giant introduced the developer preview for the Android M system, whose release is expected in the year’s third quarter. Meanwhile, the Android L OS updates have been rolled out by various OEMs and carriers across the globe.
-
Despite seeming reformed last year, SourceForge has been caught red-handed abusing the reputations of open source projects
-
-
-
If you’ve followed any tech news aggregator in the past week, you’ve probably seen the story about how SourceForge is taking over admin accounts for existing projects and injecting adware in installers for packages like GIMP. For anyone not following the story, SourceForge has a long history of adware laden installers, but they used to be opt-in. It appears that the process is now mandatory for many projects.
People have been wary of SourceForge ever since they added a feature to allow projects to opt-in to adware bundling, but you could at least claim that projects are doing it by choice. But now that SourceForge is clearly being malicious, they’ve wiped out all of the user trust that was built up over sixteen years of operating. No clueful person is going to ever download something from SourceForge again. If search engines start penalizing SourceForge for distributing adware, they won’t even get traffic from people who haven’t seen this story, wiping out basically all of their value.
-
It’s been a crazy few days in Linuxville to be sure. Sourceforge is accused of locking out GIMP developers and inserting malware into the application for users to download. Scott Dowdle spotted a “GNOME versus KDE” in MR. ROBOT and Ubuntu was seen in a Google promotional video. David Both shows users how to use Konqueror and Attila Orosz takes a look at Deepin 2014.3. And finally, is the Bling factor in Linux doomed?
-
-
Buffalo First to Ship Wireless Routers with DD-WRT NXT Open Source Firmware
-
Few if any companies in the world today are as deeply involved in open source work as tech giant Intel. Helping to lead Intel’s open source efforts is Imad Sousou, VP in Intel’s Software and Services Group and GM of the Intel Open Source Technology Center
-
The Linux operating system is the most popular open-source software in the world and has been ported to more computer hardware platforms than any other operating system. Readers will know the story of the underdog who rose to become the world’s leading server operating system. Android especially, a Linux derivative, has caused a stir in recent years with two out of three tablets and 75 percent of all smartphones using the Linux derivative operating system.
-
ONOS’ community today announced the availability of the third release of its open source SDN Open Network Operating System (ONOS), named Cardinal. Providing the best value proposition for scale, performance and high availability, Cardinal adds comprehensive feature sets and performance improvements to enable a new variety of deployments and solution proof of concepts (POCs). Cardinal delivers several significant enhancements, mainly in the areas of Application Intent Framework, southbound interfaces and new distributed core features and capabilities.
-
Open source software fans hate walled gardens. After all, they believe in communities supporting each other for the greater good. Sure, they fight over the details and who gets the most support, but that’s part of what it means to be a creator, an owner, a participant in both the journey and the final result.
-
Events
-
Web Browsers
-
Chrome
-
The latest version of Google’s Chrome/Chromium web-browser is now in beta for its upcoming v44 release.
-
The newest Chrome Beta channel release includes new ES6 features and a number of updates to existing APIs. Unless otherwise noted, changes described below apply to Chrome for Android, Windows, Mac, Linux and Chrome OS.
-
Mozilla
-
Firefox 38.0.5 has been released. This version introduces Pocket, which helps you keep track of articles and videos. Clean formatting for articles and blog posts with Reader View is also a new feature.
-
As you may know, Mozilla Firefox is among the most popular internet browsers available, being very appreciated by FOSS users.
-
We created Firefox to give people choice and control of their Web experience and we’re always adding more ways to personalize your Firefox. Firefox is made by a non-profit organization and a global community dedicated to Mozilla’s mission of promoting openness, innovation and opportunity online.
-
SaaS/Big Data
-
-
The HP Discover conference is going on in Las Vegas this week, and HP is deepening its commitment to OpenStack. It announced that it is expanding the HP Helion cloud portfolio by introducing Amazon Web Services compatibility and embedded OpenStack capabilities. It was all part of the introduction of the HP Helion CloudSystem 9.0 solution.
-
Databases
-
MongoDB World 2015 introduces interesting new features in MongoDB 3.2 and more interesting questions about the future of the company and its community
-
Business
-
Even today, the general consensus still stubbornly persists that Open Source software is developed by ponytailed computer geeks as a hobby in the middle of the night. It’s admittedly a very romantic notion, but one which only reflects the reality to a certain extent.
[...]
Even though there will still be good reasons for many on-premises application scenarios for a long time yet, cloud architecture’s ultimate victory is unavoidable: The cost benefits are simply too enticing.
-
-
FSF/FSFE/GNU/SFLC
-
David Malcom, the developer at Red Hat who has been spearheading the work on libgccjit, is making some progress on speeding up this embeddedable JIT compiler for the GNU Compiler Collection.
-
Licensing
-
Corporate use of open source software is now the norm with more than 60 percent of companies saying that they build their products with open source software, according to the 2015 Future of Open Source survey. But that same survey also revealed that most companies that use FOSS in their products don’t have formal procedures in place for ensuring that their software complies with open source licenses and regulations.
-
Openness/Sharing
-
The Digital Public Library of America and Europeana are collaborating on a project to standardize usage rights statements. Despite operating under different copyright laws (United States and European Union), the DPLA and Europeana are keen to have a clear and compatible way to share copyright information with collaborators and users. To that end, work has begun on developing a technical framework for interoperable rights statements. Currently, they are seeking comments on their Rights Statement White Paper and their Technical Infrastructure White Paper. The deadline for comments on both papers is June 26, 2015.
-
Programming
-
Version 2.6 of the PyPy JIT-compiler-based interpreter for Python has been released. With PyPy 2.6 there’s some Python compatibility improvements along with Numpy improvements and preliminary support for a new lightweight stats profiler.
-
Hardware
-
With summer fast approaching in Boston, I appreciate the FSF office’s air conditioning system. It keeps us comfortable in the heat, but during the record-breaking snowfall this winter, the system broke down, and as a result I found myself on an unexpected adventure.
-
Onboard the Vault itself is an ARM processor running RTOS, a secure operating system focused on privacy and data security. It also has an NFC chip and an antenna (for proving that you are in control and that it’s correctly authorized). Finally, there’s a suite of cryptographic services, including hashing, signing, batch encryption and a hardware random number generator.
-
As Computex 2015 gets under way, server makers like Asus and Gigabyte announce they are using Cavium’s ThunderX SoCs in new systems.
-
Security
-
-
I’ve recently made many improvements and additions. The series is now available as a standalone document titled OpenSSL Certificate Authority. Make sure you check it out!
-
In a recent analysis of more than 30,000 websites, most had at least one serious vulnerability for 150 or more days last year.
-
Defence/Police/Secrecy/Aggression
-
Charlie told me the story of how, as party leader, he was invited by Blair to Downing Street to be shown the original key evidence on Iraqi WMD. Charlie was really worried as he walked there, that there really would be compelling evidence as Blair said, and he would then be unable to maintain the party line against the war. When he saw the actual intelligence on which the dodgy dossier was based, he was astounded. It was incredibly weak and “totally unconvincing”. Blair was not present while Charlie saw the reports, but he saw him afterwards and told Blair he was quite astonished by the paucity of the evidence. Blair went white and looked really rattled, and resorted to a plea for patriotic solidarity. He then reminded Charlie he was not allowed to reveal what he had seen. Charlie felt bound by good faith – he had been shown the intelligence in confidence – not to publish this. Not I think his best moral judgement.
-
Environment/Energy/Wildlife
-
Finance
-
DAVID CAMERON effectively handed penny-pinching MPs a backdated 10 per cent pay rise yesterday after the PM dropped his opposition to the extra cash.
-
PR/AstroTurf/Lobbying
-
It sounds like it’s the New York Times that’s hoping to persuade Democrats that Sanders is unelectable.
-
Censorship
-
Government agencies should have the right to block access to any websites they wish, says Parliamentary Committee, provided there is an adequate oversight mechanism in place.
House of Representatives Standing Committee on Infrastructure and Communications has handed down its report into whether Government agencies should ‘disrupt the operation of illegal online services.’
-
Even in China, people find ways to circumvent the country’s famous Great Firewall that tries to block access to some external sites with material deemed politically dangerous. Interestingly, an editorial in the Chinese-government tabloid, the Global Times, written in response to the students’ publication, recognizes that fact…
-
Privacy
-
A controversial program allowing the U.S. National Security Agency to collect millions of domestic telephone records expired Sunday night after the Senate failed to vote on a bill to extend the authority for the surveillance.
-
Civil Rights
-
This is bad. I have often made the point that airport security doesn’t have to be 100% effective in detecting guns and bombs.
-
An internal investigation of the Transportation Security Administration revealed security failures at dozens of the nation’s busiest airports, where undercover investigators were able to smuggle mock explosives or banned weapons through checkpoints in 95 percent of trials, ABC News has learned.
-
With her four teenagers inside, Ginnifer Hency’s house was raided by officers who suspected she was using and selling marijuana.
In fact, she was. Hency, a multiple sclerosis patient with a medical marijuana card, was charged with intent to deliver, “even though I’m allowed to possess and deliver,” Hency said, in testimony before the Michigan House Committee.
Medical marijuana use had been suggested by her neurologist, Hency said, adding that she can’t take run-of-the-mill pain medication because of a heart condition.
-
In an alley in Denver, police gunned down a 17-year-old girl joyriding in a stolen car. In the backwoods of North Carolina, police opened fire on a gun-wielding moonshiner. And in a high-rise apartment in Birmingham, Ala., police shot an elderly man after his son asked them to make sure he was okay. Douglas Harris, 77, answered the door with a gun.
-
The German federal government has admitted that an EU country’s arts policies could lead to it being sued by foreign corporations before investor tribunals under trade agreements being negotiated with Canada and the US. Both the Comprehensive Economic and Trade Agreement (CETA) and the Transatlantic Trade and Investment Partnership (TTIP) currently include the investor-state dispute settlement (ISDS) mechanism, which allows foreign investors to claim millions of pounds from governments for “indirect expropriation” such as an alleged loss of future profits.
-
Intellectual Monopolies
-
Copyrights
-
The MPAA is advising the U.S. Government’s Internet Policy Task Force to help combat piracy, which they say poses a great cybersecurity threat. According to Hollywood, cyber criminals use pirated content as bait, to exploit citizens through malware and other scams.
TSA Not Detecting Weapons at Security Checkpoints
Permalink
Send this to a friend
06.02.15
Posted in News Roundup at 8:17 am by Dr. Roy Schestowitz
Contents
-
Dell is making a push to enter the Internet of Things ecosystem, and it’s doing so with a new device aptly named Dell IoT Gateway, which is powered by Ubuntu Core, among other things.
-
Not that many years ago, buying a new PC meant spending hundreds of dollars just for an entry level machine. Fortunately these days the barrier to entry has been greatly reduced.
Thanks to innovations in lower end computing options, one can get a brand new computer for the price of a steak dinner. The most commonly known of these lower-end computing options is known as the Raspberry Pi.
-
I’ve spent the last decade introducing people to Linux. These weren’t “here-this-is-a-live-Linux-CD-figure-it-out-yourself-and-good-luck” encounters. We’re talking face-to-face interactions, and often those interactions took place for more than an hour. Sometimes in two or three sessions. I’ve had a chance to see and hear people’s wide range of first reactions to Linux on the desktop, and there is no way to misinterpret those reactions:
Linux on the desktop will often float or sink just from the way it appears to the beholder in the first minute.
-
-
Desktop
-
Anyone who needs proof only needs to look at what Dell is doing these days. It’s cutting the chain that has bound them exclusively to Redmond and placing heavy bets on Ubuntu.
-
Server
-
There’s a heavy level of vendor involvement in Docker and containers, covering more than 60 different companies engaged in development and deployment, management, orchestration, security, and shipping of application containers, based on a new 451 Research report. Many vendors and projects cross over into more than one of these areas, and it’s likely even more players will become involved.
-
A short while ago I was reviewing one of my Twitter lists and I happened upon a tweet that led me to NethServer, an open source project that featured a product the likes of which I had been looking for in recent months.
-
Kernel Space
-
A leap second is an adjustment that is once in a while applied to the Coordinated Universal Time (UTC) to keep it close to the mean solar time. The concept is similar to that of leap day, but instead of adding a 29th day to February to keep the calendar synchronized with Earth’s orbit around the Sun, an extra second 23:59:60 is added to the last day of June or December to keep the time of the day synchronized with the Earth’s rotation relative to the Sun. The mean solar day is about 2 milliseconds longer than 24 hours and in long term it’s getting longer as the Moon is constantly slowing down the Earth’s rotation.
-
Kernel 4.1 RC6 has been released, being a big release, full of updated drivers for SCSI, GPU, RAID, DM, and networking, architecture enhancements, XFS, OverlayFS and CIFS improvements, networking patches and updated documentation.
-
Graphics Stack
-
The Linux 4.2 kernel will bring continued enablement on Intel’s next-gen Skylake architecture, low-power display states, basic enablement of Broxton hardware, DisplayPort improvements, the Gen7 command parser was finally added, dynamic page-table allocation for Gen8+ graphics hardware, and many other internal driver changes.
-
Applications
-
kornelix has just released a new version of its Fotoxx open source and free photo and image editing and collection management software for GNU/Linux operating systems.
-
-
Due to a reported problem with the configure script, I updated the source tarball of FisicaLab, included the Mac package. Now the current package is numbered 0.3.5-1. Sorry for the inconveniences.
-
The new version 1.5.0 for test purposes is now based on Qt 5.2.Some features comes with this version…
-
-
-
As you may know, GNU Octave is an open-source, Matlab alternative. The software provide capabilities for numerical solution of linear and nonlinear problems and has graphics capabilities for data visualization and manipulation.
-
Proprietary
-
As you may know, Google did not create an official Google Drive client for Linux yet. There was a tool called Grive, but it does not work anymore, since Google has changed its API recently.
-
Instructionals/Technical
-
Wine or Emulation
-
Following in the foot steps of Wine 1.7.44, the newest development version of Wine-Staging is now also available.
-
Games
-
Serpent in the Staglands is a pretty interesting looking CRPG that has recently released for Linux. It actually looks a bit like the old Baldur’s Gate games, but plays out quite differently.
-
Siralim is a crisp looking 2D RPG with Roguelike elements that has just been updated to include Linux support!
-
I’ve taken some time to take a look at Warlocks Vs Shadows which is a really great looking 2D side-scrolling action RPG.
It’s worth noting that the game is currently in Early Access, so things are subject to change, and it will probably have bugs.
-
-
2K Games has just announced that XCOM 2 will arrive this November and that there will also be a Linux port of the game handled by Feral Interactive.
-
-
-
-
It seems that XCOM 2 has been announced after a teaser campaign by 2K. The AdventFuture.org website 2K brought online last week was now confirmed to be about XCOM and the reveal trailer was published. And best of all, there’s a tiny little penguin and a certain feline as a mark of Linux support.
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Packages for the release of KDE Applications 15.04.1 are available for Kubuntu 15.04. You can get it from the Kubuntu Backports PPA.
-
-
My work this summer will revolve around offering OpenStreetMap( OSM ) support to Marble: this will involve offering the user a complete experience: from opening OSM files, to viewing and editing them, to finally exporting them in “.osm” files.
-
As I mentioned before my GSoC proposal titled Better Tooling for Baloo has been accepted.
-
One of the reasons why I choose KDE as my mentoring organization is that I already used their Plasma desktop for quite a while now, thus I’m a little familiar with KDE Applications, but the main reason is that my programming skills and knowledge was best matched with KDE’s Marble project.
-
So I got a slot for GSOC2015 to implement a “Checker framework” for KDevelop, therefore I have been and I will be working on it during the summer.
-
The current score is €2675 donated through paypal and €28,463 pledged on Kickstarter! That’s a total if €31,138. That’s seven-and-half stretch goals! Two, however, are already claimed by the choose-your-stretch-goal award.
-
-
New Releases
-
Black Lab Software had the great pleasure of informing us earlier today, June 1, about the immediate availability for download of the fourth service release (SR) of the Black Lab Enterprise, Education and Forensics Desktop 6 distributions.
-
After having informed us about the immediate availability of Black Lab Linux Enterprise Desktop 6 SR4, Black Lab Software has had the great pleasure of sending us details about the fourth service release of their Black Lab Linux Education Desktop 6 distribution.
-
-
Portable Linux operating system based on the Linux Live Scripts, Porteus Kiosk Edition, has been upgraded to version 3.4.0 and is now available for download.
-
The final version of the antiX 15 Linux operating system will be released very soon, but until then we can test the Beta 3 pre-release version that has been announced today, June 1, 2015.
-
Arch Family
-
It’s June 1st, so it is time to get your hands on a new ISO build of the world’s most customizable, lightweight and acclaimed GNU/Linux operating system, Arch Linux.
-
Red Hat Family
-
An outspoken champion of that message is Jim Whitehurst, president and CEO of Raleigh-based Red Hat Software, the high-profile, $10 billion provider of open source software to the enterprise community. In his new book, “The Open Organization: Igniting Passion and Performance,” Whitehurst argues that “Red Hat is the only company that can say that it emerged out of a pure bottom-up culture—namely, the open source ethos—and learned how to execute it at scale.”
-
This marks the third year in a row that Rachel Cassidy, vice president of Global Partner Enablement, and Margaret-Ann Bolton, senior director of Global Partner Marketing, have been recognized by CRN for their leadership, vision, and dedication to channel programs. In addition, this marks the second year in a row that Cassidy has been recognized as one of CRN’s Power 100. The Power 100 spotlights an elite subset of Women of the Channel honorees whose insight and influence in their respective companies help drive channel success.
-
Fedora
-
Fedora 23 might be featuring some new ISO spins of the Linux distribution, including one with the Cinnamon Desktop and a “Netizen” spin focused on “Internet citizenship and citizen engagement.”
The proposed Fedora 23 Cinnamon spin is quite self explanatory and is outlined further via this Fedora Wiki page. The Cinnamon Desktop is already packaged within Fedora repositories but this is about shipping an easy-to-deply Fedora Cinnamon experience rather than first having to install Fedora GNOME or other alternatives.
-
Life Fedy, PostInstallerF is yet another tool that permits the users to easily install multimedia codecs, enable third party repos, install Adobe Flash, Java, proprietary GPU drivers, with a few clicks only.
-
Being Fedora what we could define “a bleeding edge distro”, whenever we perform Exploratory Testing, we certainly have the opportunity to raise the quality of the shipped packages. I’d also say that this process must not substitute automated/scripted testing, which is a fundamental aspect of software development. Modern approaches like Test Driven Development and Behavior Driven Development can assure that the key parts of the application works as intended. Moreover, the Test Cases designed by Fedora QA are handy procedures that check whether the release criterion are met or not and assure that the main features aren’t affected by severe bugs. Indeed, Exploratory Testing is always helpful in order to highlight surprises which aren’t currently covered by common situations and recommended steps.
-
This is the updated color palette that I’m using for creating mockups for Askbot. This color palette comply with the Fedora color palette given here.
-
According to the feedback received from the mentors, I updated the mockups that I have created for Askbot using colors used in the Fedora color palette and also giving more focus on the grid system. I have included some little user experience improvements also in these mockups and we are planning to discuss further on user experience of Askbot as well.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
The Meizu MX4 Ubuntu phone has disappeared from the official store, and there is no information as of yet why that has happened.
-
Developer Marcos Costales had the great pleasure of unveiling what it appears to be the first ever turn-by-turn GPS navigation app for the Ubuntu Touch mobile operating system from Canonical, which powers the so-called Ubuntu phones.
-
The Ubuntu Software Center is a great piece of technology that has lived its life and needs to either go away or go through a major transformation. The new Snappy packages that will be soon used in the Ubuntu desktop would be a great opportunity.
-
Martin Pitt, a renown Ubuntu developer, who apparently is in charge of the systemd maintenance/development for the Ubuntu Linux operating system, posted a message on the Ubuntu mailing list asking for assistance in maintaining systemd in Ubuntu.
-
So I sent emails to the Ubuntu Community Council, Jonathan Riddell, and the Kubuntu Council, asking all of them the same four questions. I’m going to include them below – in their entirety – with as little comment from me as possible.
-
Zoltán Balogh posted recently some information regarding the latest changes implemented in the Ubuntu SDK (Software Developer Kit), which is used for developing applications for the Ubuntu Touch mobile operating system.
-
As you may already know, Canonical has worked a lot at Ubuntu Touch lately and the fourth update (OTA 4) is scheduled for release next week, the update being available only on the Bq Aquaris E4.5 Ubuntu Edition.
-
The indicators icons have been all made monochromatic, the Address Book has received support for importing SIM contacts, a new settings panel and improved the first improved first time user experience for contact sync/import, the Messaging app has received support for group chat, the News scope has received an improved layout, the Today, Nearby and News scopes got support for keywords and scope tagging has been implemented.
-
Flavours and Variants
-
-
The Ubuntu MATE developers are looking for community feedback regarding the creation of a new alternative image that would pack a minimum amount of packages and that would fit on a single CD.
-
-
Read our detailed post describing this year’s survey, and then fill out our short 2-minute survey. Pick your favorite three SBCs from this list or write-in your own alternatives, answer a few questions about what you’re looking for in a hacker board, and then enter the drawing for the chance to win one of 20 free SBCs.
-
Phones
-
Android
-
The Kodi media center finally has a new official Android remote name Kore that has been developed by a member of the community.
-
-
We all expected Android M to be announced at I/O today. The new OS won’t launch officially until Q3 but it has got some nice features we know of which we can look forward too.
-
Google on Thursday unveiled Android M, a new version of Android that focuses on improving overall user experience. It also packs quite a few interesting new features, including hidden functionality that Google didn’t thoroughly explain.
-
Google’s Android 5.1.1 update has been official since April but it only recently started picking up steam with releases for the Nexus 6, Nexus 5, and Nexus 4. With those updates in mind, we take a look at a few things we learned about Google’s Android 5.1.1 release over the course of the last month.
-
-
-
The folders in Google’s stock Google Now Launcher are currently restricted to just 16 entries (four rows of four). That’s going to change very soon. The version of GNL that ships with the Android M preview has folders that automatically paginate when you add more than 16 apps. How many pages can you have? I’m not sure as I have yet to hit the limit.
-
Even though Google started the whole mobile payment thing years ago with Google Wallet, it never really took off with the masses. Google’s newly announced Android Pay, however, might. Just like Google Wallet, Android Pay lets you simply tap your phone on an NFC terminal to make a purchase, but with a little less hassle — there’s no need to enter in a PIN to enable payments. In addition, Google is also allowing Android Pay to be integrated in apps like Lyft, Grubhub and Wish, so users can easily use that to pay for things. I just used Android Pay here at Google I/O, and I can say this: If it’s as easy to use in real life, then I suspect mobile payments are about to be a lot more ubiquitous.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Google Hides Android Fragmentation With Cute Candy [Ed: How is having multiple versions of the same OS "fragmentation"? They redefine it. Like calling Windows "fragmented".]
-
-
-
-
This was the most Android-centric I/O in recent memory.
-
Chances are that if you’re in the recovery interface of your phone, it’s because you broke something, need to force an update, and you’re just fiddling with things. The stock recovery doesn’t have a ton of options, which is why alternatives like ClockworkMod and TWRP exist. Still, the stock recovery in Android M is a little more capable than before.
-
-
-
An Android foundation could help return Nintendo to relevance
-
The only way for Computex, Asia’s foremost tech exhibition, to get going is with a deluge of announcements from local powerhouse Asus, and this year’s show is no different. One of the big attention grabbers from Asus today is the ZenWatch 2, its second Android Wear smartwatch.
-
-
When you stop and think about it, the word “smartphone” is starting to sound a little stale.
Sure, these pocket-size gadgets we tote around are capable of making calls — but for most of us, that’s become a secondary feature compared to the range of data-centric functions the devices enable. In reality, we’re carrying tiny, capable computers that also happen to work as phones.
-
ASUS brought in a big bag of gadgets to present at Computex 2015 in Taipei, and the latest composites of circuitry, metal, glass, and black magic to emerge from it are named the ZenPad 8 & ZenPad S 8. As made apparent by their names, this is a duo of tablets that we’re talking about, and the slates are made special by the fact that they are the first to carry the Zen brand. Oh, and they also have some interesting Intel hardware inside!
-
What is the value of an open source platform? Would someone ever pay for it outright? Indeed, how does someone use an open source platform? Let’s start with the oldest and most significant of open source platforms, Linux. For the longest time, Linux was dismissed as a non-viable data center technology for “enterprise-grade” or “business critical” operations because it had no support model, no applications that ran on it and no obvious way to make money from it. How, then, did Linux become the engine that fueled the growth of the world’s open source ecosystem, an ecosystem that could be valued in the trillions of dollars, when calculating the percentage of the world’s economy that relies on open source systems? Was it just a bunch of hippies sharing the software and singing about it, or were there clear business reasons paving the way to its eventual victory?
-
The state of affairs of enterprise IT is changing quickly. Open source will become a much higher percentage of every IT organization’s environment, given its advantages in terms of cost, control, and innovation. Likewise, open source skills will soon become a critical requirement, both for using open source wisely, but also in attracting the kind of talent necessary to compete in a Third Platform world.
-
The takeover of the SourceForge account for the Windows version of the open-source GIMP image editing tool reported by Ars last week is hardly the first case of the once-pioneering software repository attempting to cash in on open-source projects that have gone inactive or have actually attempted to shut down their SourceForge accounts. Over the past few years, SourceForge (launched by VA Linux Systems in 1999 and now owned by the tech job site company previously known as Dice) has made it a business practice to turn abandoned or inactive projects into platforms for distribution of “bundle-ware” installers.
Despite promises to avoid deceptive advertisements that trick site visitors into downloading unwanted software and malware onto their computers, these malicious ads are legion on projects that have been taken over by SourceForge’s anonymous editorial staff. SourceForge’s search engine ranking for these projects often makes the site the first link provided to people seeking downloads for code on Google and Bing search results.
And because of SourceForge’s policies, it’s nearly impossible for open-source projects to get their code removed from the site. SourceForge is, in essence, the Hotel California of code repositories: you can check your project out any time you want, but you can never leave.
-
-
-
In an open organization, measuring performance for particular roles like community managers may not be straightforward, especially when comparing those roles to others with more defined success metrics, goals, and outcomes. In my experience over the past six years, I’ve worked closely with my manager to make sure that we are in sync with my objectives and what I need to do in order to maximize my impact in my role as a community manager.
-
Web Browsers
-
Mozilla
-
After three Beta releases, the final version of the Mozilla Firefox 38.0.5 web browser has arrived today for all supported operating systems, including GNU/Linux, Microsoft Windows, and Mac OS X.
-
SaaS/Big Data
-
Interested in keeping track of what’s happening in the open source cloud? Opensource.com is your source for news in OpenStack, the open source cloud infrastructure project.
-
As a few people have noticed, I’m a bit of an internet control freak: In an age of central “cloud based” services, I run pretty much my own everything (blog, mail server, DNS, OpenID, web page etc.). That doesn’t make me anti-cloud; I just believe in federation instead of centralisation. In particular, I believe in owning my own content and obeying my own rules rather than those of $BIGCLOUDPROVIDER.
-
Databases
-
Funding/GSoC
-
-
It seems a bit late for introduction so I’ll mainly talk about what my project is about for google summer of code, 2015 and what I’ve done so far. Lasse Schuirmann is my mentor for this project who has been very supportive.
-
-
-
-
-
Public Services/Government
-
As a technology user and enthusiast, I believe in the critical role of open-source software to create the applications and infrastructure necessary to support government-funded technology projects. There is an accelerating interest in and use of open-source software worldwide. Local governments are changing. Forward-thinking municipalities are embracing technology to make countries and cities better for everyone. Innovative government staff are sharing resources, best practices, and collaborating on common problems. Jamaica needs to provide a broad range of resources, programmes and services to support and advance civic innovation.
As open-source software becomes the leading information technology day by day, and there are open-source alternatives to most of the commercial software, Jamaica must join this technological revolution, as the national pledge does state, “…so that Jamaica may play her part in the advancement of the whole human race”.
Open-source software is computer software with its source code made available with a licence in which the copyright holder supplies the rights to study, change, and distribute the software to anyone and for any reason or function. Open-source software is oftentimes developed in a public, collaborative manner. It is the most striking example of open-source development and often compared to (technically defined) user-generated content or (legally defined) open-content movements.
-
Licensing
-
Historically, Conservancy has published extensive materials about enforcement of the GPL, including blog posts, announcements regarding compliance actions, many sections appearing in the definitive Copyleft Guide (a joint initiative with the Free Software Foundation). After Conservancy’s recent announcement of its funding of Christoph Hellwig’s lawsuit against VMware, Conservancy has sought to answer as many questions as possible about GPL enforcement.
-
In this edition, we conducted an email-based interview with François Marier, a free software developer from New Zealand. He is the creator and lead developer of Libravatar. In addition to his passion for decentralization, he contributes to the Debian project and volunteers on the FSF licensing team.
Libravatar is a free network service providing profile photos for a number of Web sites, including bugs.debian.org and git.kernel.org. Its flexible architecture allows end users to host their own images and allows Web sites to use Gravatar as a fallback when necessary. It is licensed under the GNU Affero General Public License version 3, or end user can opt for any later version (GNU AGPLv3+).
-
Openness/Sharing
-
You may not have noticed, but people often become attached to their favorite technology. This could be a mobile phone, a programming language, or a text editor. When you work on someone else’s project, you generally have to go with whatever the prevailing tools and languages are, but when it’s your own project, you get to choose the toys. Documentation requires technology, too, but most people have less of a pre-set opinion about documentation tooling than they do about web frameworks and version control systems. So how is a project to choose?
-
Open Data
-
Half a world away, University of Washington civil and environmental engineering students trace the outlines of roads, paths and buildings in Nepal from their laptops.
Using open data software OpenStreetMap, the students in assistant professor Jessica Kaminsky’s Civil Engineering in Developing Communities class joined an online community effort to turn satellite imagery of Nepal into maps and aid the earthquake relief effort. These digitized maps provide emergency responders and relief coordinators responding to the 7.8 magnitude earthquake and powerful aftershocks in Nepal with critical data to guide teams deployed on the ground.
-
Bulgaria has just published the first datasets on its open data portal. Currently, about 36 datasets from 26 public agencies have been made available online. The organisations involved were summoned to do so by the Council of Ministers. The Council even has a dedicated team to overcome resistance at the agencies and help them to extract and cleanse the data from the databases. The ambition is to publish another 100 datasets before the end of this year.
-
Standards/Consortia
-
The United Kingdom has revised its Digital Service Standard, which describes the components for building eGovernment services. The update came into effect on 1 June, and is to be used for new and redesigned external-facing services.
-
But Mr Hunt has faced a backlash this morning from doctors and nurses who say that government cuts are responsible for creating a heightened demand for agency workers.
-
Security
-
Environment/Energy/Wildlife
-
Jeb Bush is the highest profile speaker at a secretive three-day retreat in Bristol, Virginia, hosted by the CEOs of six coal companies, according to materials for the invitation-only event obtained by the Center for Media and Democracy (CMD) and shared with the Guardian.
-
The $7,500-a-person exclusive golf and fly-fishing retreat will give top coal CEOs – and reliable Republican donors – access to the 2016 presidential hopeful
-
Privacy
-
Adding encryption to the channel between you and Facebook also does very little to protect you from government surveillance. While state actors, and other people tapping your line, might not be able to read the contents of the messages, they have full access to the subject line and the metadata (who sent the message, who received it, when, and so forth). If the US government is in any way interested in what you’re doing on the site, they only need to ask. The same goes for any other government with which, in order to be allowed to operate, Facebook has cut a deal to rat out its users, such as China.
-
Civil Rights
Permalink
Send this to a friend
Posted in IRC Logs at 3:37 am by Dr. Roy Schestowitz
IRC Proceedings: May 17th – May 23rd, 2015
IRC Proceedings: May 24th – May 30th, 2015
Enter the IRC channels now
Permalink
Send this to a friend
06.01.15
Posted in GNU/Linux, Microsoft, Patents at 7:09 am by Dr. Roy Schestowitz
A failed or losing strategy after all? Investors sure think so.
The Old Senate Chamber during the US Supreme Court’s residency
Summary: Using patent blackmail (antithetical to the original goal of patents) and other forms of blackmail, Microsoft is desperately trying to crush GNU/Linux and Android, all while Windows ‘sales’ fall and investors lose confidence
“Issued US Patents Down 11% for Microsoft in 2015 Compared to 2014,” wrote Patent Buddy. “705 Patents Down 49% for Microsoft in 2015 Compared to 2014″ (depending on how it’s measured). It is often said that empires collapse and ultimately end sorely defeated when they over-militarise (like with patents) and then implode. Microsoft is apparently imploding right now.
This is not surprising to us. Microsoft still attacks Android with patents, but right now it uses them for leverage, by means of extortion or SLAPP (an effort not to actually take the blackmailed party to court, as it makes Microsoft look bad and can invalidate the patents). Will it work out at the end? Well, we doubt it, but Cyanogen, the latest embrace extend and extinguish manoeuvre by Microsoft, does pose a threat. Using Cyanogen as a proxy is not competing, it is disrupting nefariously.
“Using Cyanogen as a proxy is not competing, it is disrupting nefariously.”Investors’ press is not very impressed. One site asked a couple of days ago: “Can Microsoft Corporation (MSFT) Truly Take Away “Open Source” Android From The Market?”
Here is a portion of this analysis:
The other question which arises is, will Microsoft be able to drive the open source operating system away from Google’s perceived dominance? The answer is quite simply no, since without Google services, Android will not prove to be an efficient operating system. There will be a whole suite of Microsoft applications which will considerably fill the gap, but will users be content with Microsoft’s app store? The Google Play Store forms the crux of the argument, as it is the main reason why Android is currently thriving. Microsoft will not be able to uphold Android, thereby removing any prevailing beliefs that it will take away the openness of Android.
Currently, Android is by far the most popular operating system. However, there are some who do not like Google and its services. However, this does not take away the fact that the majority trust and support Google’s presence on the Android front.
Moreover, making Android an even more dominant platform is basically digging Windows’ grave (Microsoft does the digging).
Investors’ press insists “Office for Android Won’t Save MSFT” (Microsoft’s biggest cash cow), neglecting to mention that patent pressure is how Microsoft hopes to convince companies to bundle it (possibly free of charge, i.e. no short-term profit, just lock-in). Here is how the press puts it: “In an effort to remain relevant in the mobile space, MSFT announced earlier this week that it has reached an agreement with 31 Android original equipment manufacturer (OEM) partners to preinstall Microsoft Office on a host of current and future tablets. The idea is to expose a larger number of mobile users to the apps than what would be possible with sales of MSFT devices alone.”
This number, 31, is actually nonsense for reasons we named here before. Only 4 of these actually count for something and the reason they cooperated with Microsoft is bribes or extortion (if not both). There is evidence to show this in the leading technology press from Taiwan. Microsoft is now using patents or threat of lawsuits, patent tax etc. as an instrument of coercion, just like the Mafia does. As Mark Shuttleworth once put it: “That’s extortion and we should call it what it is. To say, as Ballmer did, that there is undisclosed balance sheet liability, that’s just extortion and we should refuse to get drawn into that game.” On another occasion Shuttleworth made a Mafia comparison: “It’s an unsafe neighbourhood, why don’t you pay me 20 bucks and I’ll make sure you’re okay” (i.e. not sue by Microsoft).
“that’s illegal,” Shuttleworth insisted. “It’s racketeering.” Ironically, Shuttleworth is now helping Microsoft in several areas.
The investors’ press curiously took note of Microsoft’s blackmail tactics (curiously because the investment community is typically apathetic towards such behaviour, except when the public finds out). This is a matter which we covered here a week or more ago. This does not impress investors (or potential investors), who write that “Open source software is a different type of software. The developers of these platforms, for example Linux etc do not charge users when they use the software. The community of developers will update the software with advanced features bi-annually or quarterly. The issue is that these platforms also do the same kind of work that, say, Windows software is able to do. Hence, more and more users are switching to open source platforms. Therefore, the demand for paid software such as Microsoft Corporation (NASDAQ:MSFT) is increasingly on the decline.”
Microsoft cannot compete with Free software. It constantly attacks it, as we saw recently in India (Microsoft lobbying even by proxy). Microsoft cannot and will not become/embrace Free/Open Source software either, unless it is connected to proprietary software from Microsoft. Watch this new example where a Microsoft-connected site is openwashing proprietary software from Microsoft (the bloated and expensive Microsoft Dynamics), essentially googlebombing to achieve the intended effect (googlebombing by Microsoft is now a regular strategy).
A reader alerted us about this Microsoft advertisement in IT Wire (looks like an article), associating Microsoft’s proprietary software with volunteering efforts. Marine Rescue staff are wasting money (giving it to Microsoft) while people who volunteer give their time away and become ‘addicted’ to (or dependent on) Microsoft lock-in. They are broadcasting their own technical incompetence (the ‘cloud’ hype and proprietary software), but hey, it helps make the Australian government more locked in (to Microsoft). Less dependence on blackmailing of politicians, rights? █
Permalink
Send this to a friend
Posted in Europe, Patents, Site News at 6:08 am by Dr. Roy Schestowitz
Confirmed: European public money wasted attacking the public’s right to know the truth
Summary: The EPO President — or anyone who is referred to as ‘appointing authority’ — finds himself even deeper in a scandal as he silently attacks the very same people whom he pretends to negotiate with by contracting spies from London (to maliciously target British journalists)
THERE is a very large number of cracking attempts against Techrights at the moment (far more than usual). There is definitely also a DDOS attack against Techrights and the pattern can be demonstrated (it comes in waves), starting days ago. Readers have been writing about the site being down, the database being down, etc. because these attacks took the site down many times over the weekend. As a fairly experienced professional in this area (I do this for a living, focusing on sites and servers), even I am struggling. Babysitting the server and aggressive filtering became imperative, making the composition of new articles a secondary priority at best. As we have pointed out before, many of these issues started when we began criticising the EPO and showing corruption in it. Other sites that criticise the EPO report similar issues and the EPO has undoubtedly blocked Web sites critical of the EPO.
We finally have the EPO’s admission that it hired a military-connected company to spy on critics (including Techrights, based on our sources). This ought to do the EPO’s already-poor reputation no favours. This may also be illegal. If the EPO has the guts to hire a military-connected company to spy on critics, it wouldn’t be much of a stretch to also attempt cracking (forcibly gaining access to data).
The EPO is now paying (European taxpayers’ money) to military-connected company called ‘Control Risks’. We’ve been told they spy on us specifically, but we imagine they might also spy on IP Kat (Google-hosted).
“According to a comment received on her earlier post,” wrote IP Kat, “Merpel understands that the European Patent Office has responded by means of the following internal Communiqué to the concern about reports that Control Risks (who describe themselves as “an independent, global risk consultancy specialising in helping organisations manage political, integrity and security risks in complex and hostile environments”) has been commissioned by the EPO to investigate staff members…”
Here is the full text:
Investigative Unit and external firms
26.05.2015
Regarding questions raised in recent publications and blogs
Dear colleagues,
Some recent publication and blogs have questioned the participation of an external firm in EPO activities related to the Investigative Unit. I want to clarify that because the EPO Investigative Unit is rather small in terms of staffing, we need to be able to contract external companies to support our fact finding enquiries. This is one reason why an external firm can be chosen in regard to an investigation, operating within the regulatory framework of the EPO, under the full supervision of the Investigative Unit.
The European Patent Office cannot comment on specific internal investigation cases. This lack of comment is to protect the integrity of any such case and protect the interest of all parties concerned. However I would like to remind the Office has a duty of care to its employees including to investigate allegations of harassment against them by other employees. Investigations can only take place following specific allegations, made by EPO staff or external parties, and these investigations are independently and objectively carried out by the Investigative Unit, under its sole responsibility.
The investigation process of the EPO follows the best international standards and allows persons to be heard, to respond and to defend themselves against any allegations, before any conclusion of misconduct would be reported to the employee’s appointing authority. Only in any case where a serious misconduct is confirmed by the Investigative Unit, a disciplinary case could be instigated where the subject has a further right to be heard before a disciplinary committee and before any subsequent decision on a sanction would be taken.
In 2014, the Investigative Unit received 68 allegations of misconduct (-23% compared to 2013), 50% being already rejected as insufficiently specified.
So the EPO has in fact just confirmed, internally, that it hired spies (the London-based ‘Control Risks’) and it’s known who the targets are. Merpel’s response to it (remember they’re based near London) is this: “Merpel welcomes this response, but regrets that it was made only internally, when the concern raised was much more widespread, and wonders what the EPO Communications department is up to. She notes that, although it is only stated that an “external firm” has been engaged, the Communiqué appears in essence to confirm the original reports concerning Control Risks.”
Well, another important point from Merpel is that “the Investigative Unit (and by extension, Control Risks) has the power to invade the privacy of the subject to an extent that would cause uproar if it happened in a national patent office or in any private enterprise operating within the EU.”
This is not over. We will revisit this subject again and we will do our best to get to the bottom of this. Given the EPO’s appointment of thugs, bullies and alleged criminals to top positions, readers shouldn’t be reluctant to assume the worst. █
Permalink
Send this to a friend
Posted in News Roundup at 5:19 am by Dr. Roy Schestowitz
Contents
-
The Planetary Society reports that the Carl Sagan-inspired spacecraft rebooted as predicted, and the ground team is once again in touch. There’s already a software fix waiting in the wings, and there will be a decision on when to deploy it “very soon” — if all goes according to plan, the Society will deploy the vehicle’s namesake sails soon afterward.
-
If Linux is so great, why has it not replaced Windows, OS X and other closed-source operating systems completely? More generally, why do people still write and develop proprietary software, if open source is a more efficient, user-oriented and secure way to code? Those are important questions about the big-picture significance and future of free and open source software, and they’re worth thinking more about.
I do not mean those questions to sound pejorative, or dismissive of the idea that Linux and other open source software is actually good. Open source has distinct benefits for both users programmers and users, which make it superior in many ways to closed-source software.
-
Desktop
-
Like no other country on Earth, India is using GNU/Linux in school and at work far more than weekend warriors.
-
Immediately after unveiling the Dell Inspiron 15 3000 Series Ubuntu Edition laptop, the renown hardware manufacturer also published details about their smaller, 14″ Dell Inspiron 14 3000 Series laptop powered by Ubuntu Linux.
-
Server
-
The integration of OpenStack and OpenDaylight (ODL) is a hot topic, with abundant, detailed information available; however, the majority of these articles focus on explaining usage aspects, rather than how the integration is implemented.
-
The Docker Bench for Security script is packaged as a Docker container to make it easier to run and test. One of the CIS Benchmark’s recommendations is to limit container privileges to only what is needed to run. Somewhat ironically, the Docker Bench for Security script is a very high-privilege container that has broad access to host resources—usually something a container should not be able to do. That said, as a security testing tool, the container does need the broad access to validate host configuration for container deployment properly.
-
Kernel Space
-
The Linux 4.2 kernel cycle that will soon officially commence will be adding support for the EFI System Resource Table (ESRT) in order to allow the updating of UEFI/BIOS on modern systems from the Linux desktop.
-
-
It’s been a fairly normal week, although I can’t say that the rc’s
have exactly started shrinking yet. No, the rc’s haven’t been all that
big to begin with this release cycle, and things have been fairly
calm, but I’d be happier if we didn’t have noise in raid5 and
device-mapper at this stage.
That said, it’s not like rc6 is a big rc, and things look normal. This
is about half drivers (mainly scsi target, networking, and graphics,
plus the aforementioned raid and dm changes, with other random fixes).
The rest is fairly evenly split between architecture updates (alpha
stands out), filesystem updates (xfs, cifs and overlayfs) and “misc”
(networking, turbostat tool update, documentation).
Most of the fixes are really quite small. Shortlog appended, skimming
it gives a flavor of the kinds of things we have here.
Linus
-
-
It’s Sunday, so guess what?! Linus Torvalds has just announced yet another Release Candidate (RC) version for the forthcoming Linux kernel 4.1, available for download and testing right now.
-
Graphics Stack
-
While Mesa 10.7 just recently entered development, the Git code is often benchmarked on Phoronix, and with not having delivered any Intel Broadwell Linux graphics tests in some time, here’s the latest numbers as of this weekend.
-
Following FFmpeg in supporting NVENC for NVIDIA’s GPU-based video encoding on Linux systems, the forked Libav project has now written up their own NVENC support for H.264 and H.265/HEVC.
-
Benchmarks
-
The Compute Stick plastic case does get warm when benchmarking, but not scorching hot.
-
In the past we’ve written about Eltechs’ ExaGear Desktop software that claims to be 4.5x faster than QEMU and allows x86 Windows/Linux programs to run on ARM. The company has sent over their latest benchmark results of their latest performance claims.
-
Applications
-
The Xen Orchestra team announced this week their next big release: Xen Orchestra 4.0. Xen Orchestra 4.0 has been in development for over nine months now and is codenamed Double Bass.
-
Using two machines concurrently can cause a few problems. I find it’s too cumbersome to use two keyboards and two mice to control the computers. KVM cables are frankly overkill for my needs, taking up too much room in what already is tight a space. But there is a software solution that meets my simple requirements. The software is called Synergy, a simple keyboard and mouse sharing utility. It’s multi-platform software (running on Linux, Windows and OS X) and released under an open source license (GNU General Public License v2).
-
Instructionals/Technical
-
Games
-
I’ve taken some time to take a look at Warlocks Vs Shadows which is a really great looking 2D side-scrolling action RPG.
-
Desktop Environments/WMs
-
-
K Desktop Environment/KDE SC/Qt
-
On Monday morning, June 1, Lydia will be extracting the Evolving KDE survey results for us to review. Which means that you still have all day today (Sunday) to take this very short survey. As we’ve stated before, the survey will remain open afterward, but this deadline is for analysis and presentation at Akademy.
-
GNOME Desktop/GTK
-
The Nautilus (Files) open-source file manager used in numerous GNU/Linux distributions has been updated recently as part of the GNOME 3.17.2 desktop environment, the second milestone towards GNOME 3.18.
-
On May 29, the GNOME Project, through Javier Jardón, had the pleasure of inform all users and developers of the GNOME desktop environment, which is used in numerous distributions of GNU/Linux, that the second milestone towards GNOME 3.18 is now available for testing.
-
-
New Releases
-
We are pleased to announce the beta release of Tanglu 3, which includes Tanglu-KDE, Tanglu-GNOME and Tanglu Core!
This beta release contains many exciting changes, including a new wallpaper.
-
The developers of Tiny Core Linux, one of the smallest GNU/Linux distribution in the world, were proud to announce the release of Tiny Core 6.3.
-
Matthias Klumpp from the Tanglu development team had the great pleasure of announcing this past weekend the immediate availability for download and testing of the Beta release of the upcoming Tanglu 3 Linux operating system.
-
PCLinuxOS/Mageia/Mandriva Family
-
Mandriva is certainly a rather unique company; it has also been the company for which I was privileged enough to work two times, one in 2003 as an intern for several months. Back then I used to handle the national resellers’network. The second time was ten years afterwards in 2012 and 2013, this time as a consultant helping them with their Open Source strategy and their marketing activities. One can see how this company is rather special for me. During my last “tenure” there I got to know what we now know to be the “last” team of Mandriva, its last incarnation as a company. Last week, we learned that the company has been liquidated, which essentially means not just that the company filed for bankruptcy, but that the company as such exists no more. Mandriva went several times (three times?) into bankruptcy, but was never obviously liquidated. At this stage I have no idea what became of the assets, nor its subsidiaries.mandriva-logo-opt
-
Arch Family
-
On May 30, the Manjaro Development Team, through Philip Müller, informed all Manjaro Linux users about the immediate availability for download of the tenth update for the stable Manjaro Linux 0.8.12 distribution.
-
-
It would be an understatement to say that systemd’s introduction as the dominant init system for modern Linux distros has stirred controversy. Both opponents and supporters of this new way of doing things have tended to get rather excited – to put it mildly – whenever the topic of systemd comes up on various tech blogs and forums. Defending one’s choice of init systems from critics has become a sort of moral obligation, if not a way of life. Take the “wrong” side of the argument on your favourite tech forum, and you can expect a deluge of heated comments, frequently containing accusations of “troll” and even nastier descriptive words not suitable for publication.
I suppose it’s natural for geeks to get emotional about their operating system. In fact, if you’ve seen the 2013 movie Her, it’s predicted that in the near future not only will we be able to love our own personal operating system, but also have sex with it. Indeed, I think we’re already there, to judge by the way people have become attached to their mobile handsets.
-
Red Hat Family
-
Fedora
-
We reported earlier this week that the developers of the Chapeau Linux distro based on the well-known Fedora operating system are hard at work preparing to unleash the next major version of the distribution, Chapeau 22, based on Fedora 22.
-
Debian Family
-
Debian 8 (Jessie) was announced only a month ago, and now its developers are preparing the first point update for it and they even have a precise date in mind.
-
Derivatives
-
Canonical/Ubuntu
-
Flavours and Variants
-
The Peppermint development team, through Mark Greaves, had the great pleasure of announcing the immediate availability for download of the final release of their Peppermint OS 6 Linux operating system based on Ubuntu.
-
The wattOS team is pleased to announce the release of the newest version of wattOS – Release 9 – (also known as R9). We have made the switch back to Ubuntu as the upstream distro and built the latest version from 14.04 LTS for long term support and stability.
-
Biff Baxter from the wattOS team had the pleasure of announcing this past weekend that the ninth release of their Ubuntu-based operating system is available for download.
-
-
The movie industry has started to take note that there are very small PCs out there, like the Raspberry Pi 2, and producers have started to add them to film. Point Break is just one example.
-
This alarm clock has everything: seven-segment displays housed in clear epoxy, a touch interface, battery backup, the ability to retrieve the time from an NTP server, and a web interface to change the clock’s settings over the network. That was a large part of [Benoit]’s decision to have the clock run Linux; the network capabilities add a lot of functionality to the clock like the ability to send commands to other devices at particular times. The clock runs on an Aria G25 SOM and has a custom case that looks very professional.
-
A hackable “Zymbit Orange” IoT box offers internal RPi SBC, Arduino shield, Atmel Wingboard, wireless, and touch display options, plus cloud-based access.
-
Phones
-
Android
-
The Android M developer preview launched at Google I/O this year, and while it’s clearly in a rough state and aimed at developers, we figured we should catalog whatever differences we could find between it and Android 5.0. The overall UI isn’t much different from Lollipop, but Google has used M to tackle a lot of user requests.
We’ve covered most of the big additions recently, and checked out the in-the-works multi-window functionality in a separate post, but there’s a few new things that didn’t show up in the official announcements.
-
-
-
Google started rolling out Android 5.1.1 for Android Wear devices. The update provides significant upgrades and enhancements, including support for WiFi and a new app launcher.
-
-
-
-
Google I/O Apple may be winning the PR war with its Watch, but Google thinks an open platform, and some nifty Android Wear software, can give it the edge in the smartwatch world.
At its annual Google I/O developers shindig in San Francisco, the Chocolate Factory said in the first year of Android Wear the operating system has been updated four times and there are now over 4,000 Wear apps in its software store, including more than 1,000 watch face designs.
-
Google has finally presented the much-anticipated Android M at the Google I/O 2015 conference. While Android 5.0 Lollipop was introduced before as a new interface and design, Android 6.0 codenamed ‘Android M,’ is now the company’s most powerful OS release with several platform improvements. Here is the breakdown of the sweet new changes and features of Android M compared to Android 5.0 Lollipop.
-
The Nexus 5 Android 5.1.1 update is finally starting to make progress and Nexus 5 users around the world are now receiving prompts to download and install Google’s new firmware. With that in mind, we want to take a look at how the Nexus 5 Android 5.1.1 update has been performing on Google’s aging former flagship. This is our Nexus 5 Android 5.1.1 review.
-
Believe it or not, Google’s Android Pay makes it simpler and more rewarding to pay for things with a phone than the already easy-to-use Apple Pay.
With more than one billion active Android users, that’s going to give mobile payments a big boost in 2015, at least in the US. This is no half-hearted Google Wallet.
-
ourceForge, once a trustworthy source code hosting site, started to place misleading ads (like fake download buttons) a few years ago. They are also bundling third-party adware/malware directly with their Windows installer.
-
Now that the weekend is here, the after effects of this year’s android extravaganza that is Google I/O is still being fully digested. The announcements that came through will have repercussions going forward for the rest of this year, not to mention well into next year and beyond as well. Although, this year did not as many mega announcements as there was last year, there was still quite a few notable ones on offer. A few of the big headline points included the unveiling and releasing of the developer preview of Android M, as well as the announcing and brief explanation of Google’s next mobile payment platform, Android Pay. Of course, one of the surprise hits of this year’s event was the announcement (and subsequent release) of Google’s new photo service, which is now known as Google Photos.
-
If you’ve downloaded a copy of GIMP for Windows from SourceForge in recent days, you may want to double check to make sure you didn’t get other programs installed as well. Some copies of the “open source Photoshop” were apparently being offered with for-profit adware bundled with the installer.
-
Project Releases
-
GNU Octave, a high-level programming language for numerical computations and an open-source alternative to MATLAB, is out this weekend with a huge release. Meet GNU Octave 4.0.
The GNU Octave 4.0 release now uses a GUI by default when running interactively, defaults to using OpenGL graphics with Qt while having fallback support for Gnuplot and Fltk, adds new audio functions/classes, makes other language additions, and has a whole lot of other changes.
-
Brasero is an application from the GNOME stack that is used to burn CDs and DVDs or to creates copies from other disks. It’s been around for many years, and it’s trusted implicitly, but it doesn’t hurt if we analyze it a little bit more thoroughly.
-
Openness/Sharing
-
Washington: Now, a new project, named emojidex, is offering emojis as a service that allows developers to share new emojis with each other and add them to their apps and websites.
-
The Odia language is spoken by more than 40 million people in the Indian state of Odisha (the 9th largest Indian state by area) and its neighboring states, as well as, the Odia diaspora living outside India. With over 5000 years of literary heritage, the Odia language has been recognized as one of the oldest South Asian languages and has been given the status of a “classical language” by the Indian government.
-
Open Data
-
When a 7.8 magnitude earthquake hit Nepal, the world wanted to help the people, but few were as well-placed as 1998 NU graduate Neil Horning, who lives in Kathmandu.
Already well-known to the open source mapping community for a human rights mapping website called NepalMonitor.org, Horning had only to grab his laptop and make his way through the rubble to be tapped for a new assignment.
He would be the new coordinator of Quakemap.org, born the day after the quake in a high-tech workshop called Kathmandu Living Labs.
-
Over the last decade there has been a gradual adoption of Code-Of-Conduct statements at events and within organisations, including at FOSS4G events and within OSGeo projects. Adopting a good Code-Of-Conduct consolidates expectations about respectful behaviour at events and forums, ensuring they are safe, welcoming and productive and helps communities discretely address indiscretions should they occur.
-
Open Hardware
-
FPGAs are great, but open source they are not. All the players in FPGA land have their own proprietary tools for creating bitstream files, and synthesizing the HDL of your choice for any FPGA usually means agreeing to terms and conditions that nobody reads.
-
-
Russia’s new search engine hasn’t found many users.
Created a year ago as part of a Kremlin effort to exert more control over the Internet, the search engine was given the high-flying name of the Soviet satellite that beat the United States into space in 1957: Sputnik.
-
Hardware
-
IC Insights will release its Update to the 2015 IC Market Drivers report in June. The Update includes revisions to IC market conditions and forecasts for the 2015 2018 automotive, smartphone, personal computer and tablet markets, as well as an update to the market for the Internet of Things. This bulletin reviews IC Insights’ 2015 unit shipment forecast for total personal computing unit shipments.
-
As part of a study commissioned by IGEL Technology, the Fraunhofer Institute for Environmental, Safety and Energy Technology (UMSICHT) carried out research into various different approaches for IT work stations in terms of their impact on the climate and cost effectiveness. The researchers compared new PCs and notebooks with older devices, which continue to be operated as software-based thin clients. The researchers found that over the entire life cycle of a three-year operating phase, software thin clients reduced global warming potential by up to 60%, and cut overall costs by up to 47%.
-
Health/Nutrition
-
The tobacco industry has been accused of “appalling hypocrisy”, amid claims that it is fuelling the illicit trade in cigarette smuggling to bolster its arguments against tax increases and other anti-smoking measures.
In a report published to coincide with World No Tobacco Day, the pressure group ASH (Action on Smoking and Health) claimed that some tobacco companies are flooding foreign markets with more products than there is demand.
-
Defence/Police/Secrecy/Aggression
-
Michael Morell’s stint with the CIA included deputy and acting director, but during the time preceding the US invasion of Iraq, he helped prepare daily intelligence briefings for Bush. One of those briefings, from October 2002, is an infamous example in intelligence history as how not to compile a report. This National Intelligence Estimate, titled “Iraq’s Continuing Programs for Weapons of Mass Destruction”, was the ostensibly flawed intelligence cited continuously by Bush supporters as justification to pursue a war of aggression against Iraq. However, this claim is dubious at best, and serves more as a smokescreen to lend credence to a president who was otherwise hellbent on revenge against Saddam Hussein, as evidenced in his statement a month before the report, “After all, this is the guy who tried to kill my dad.”
-
The New York Times published a major front-page critique Tuesday of the Obama administration’s military tactics in the air war against the Islamic State in Iraq and Syria. The article quotes several US and Iraqi military and intelligence officials, most of them unnamed, denouncing the supposed restraint on bombing due to excessive fears of killing civilians.
-
Meanwhile, Smith reports, “The administration’s training program has been severely delayed. Only 90 rebels have taken part so far. And the Pentagon now says the first 5,000 rebels won’t be vetted and ready until the end of this year at the earliest.”
-
President Barack Obama’s disclosure last month of the death of two hostages in a January drone strike offered the public a brief glimpse of the tragic consequences of the government’s clandestine drone killing program. We cannot know how commonplace these kinds of civilian casualties are because of the government’s selective secrecy on the program. But now, Congress has an opportunity to weigh in.
-
A newly declassified Pentagon report provides startling high-level confirmation that the US-led strategy in Syria contributed directly to the rise of the Islamic State (IS).
-
The general in charge of Iran’s paramilitary activities in the Middle East said the United States and other powers were failing to confront Islamic State, and only Iran was committed to the task, a news agency on Monday reported.
-
A declassified secret US government document obtained by the conservative public interest law firm, Judicial Watch, shows that Western governments deliberately allied with al-Qaeda and other Islamist extremist groups to topple Syrian dictator Bashir al-Assad.
-
U.S. intelligence documents released to a government watchdog confirms the suspicions that the United States and some of its so-called coalition partners had actually facilitated the rise of the Islamic State of Iraq and Syria (ISIS) as an effective adversary against the government of the Syrian dictator President Bashar al-Assad. In addition, ISIS members were initially trained by members and contractors of the Central Intelligence Agency (CIA) at facilities in Jordan in 2012. The original goal was to weaken the Syrian government which had engaged in war crimes against their own people, according to a number of reports on Sunday.
-
Newly revealed documents show how the CIA stood by as arms shipments from Libya enabled the rise of ISIS
-
In 2003, Valerie Plame was exposed as a CIA operative by officials of the George W. Bush administration in an effort to discredit her husband, Joe Wilson, a former ambassador who had criticized the decision to invade Iraq.
-
A Senior Al Shabaab commander wanted by CIA has died in Southern Somalia. Somalia based group, Al Shabaab said.
-
An interview televised by CSPAN in 1989, when he was mayor of Burlington, Vermont, Sen. Bernie Sanders gave a stinging criticism of American covert actions to undermining socialist governments in Latin American countries.
“If you trace the history of the United States vis a vis Latin America and Central America, there has never been a time where a country made a revolution for the poor people where it was not overthrown by the CIA or the United States government, or the marines,” Sanders said.
-
Much of Wood’s research has uncovered how the ‘war on terror’ has been a ‘tit-for-tat’ affair. Extraordinary rendition, began under Clinton, and resulted in alleged militants from Bosnia and Albania being taken to Egypt where they were tortured. One of these militants was the brother of the Al Qaeda Number Two El-Zawahiri, who subsequently ordered an attack on the US in Tanzania in revenge. In response, Clinton’s government put Osama bin Laden on the kill list. 9/11 soon followed, with the first US targetted drone strike happening a month later.
-
With Chris Woods, investigative journalist and author of the book Sudden Justice: America’s Secret Drone Wars.
-
A couple of weeks ago, the Republican presidential hopeful Jeb Bush was asked in an interview with Fox News whether, knowing what he knows now, he would have invaded Iraq. It’s the kind of predictable question for which most people assumed he would have a coherent answer. They were wrong. Jeb blew it. “I would have [authorised the invasion],” he said. “And so would have Hillary Clinton, just to remind everybody. And so would almost everybody that was confronted with the intelligence they got.”
-
Iraq seems to be losing the war with Islamic State (IS). Its army is retreating as the jihadists speed up their advance, with reinforcements coming from all across the globe, volunteers bolstering the extremists’ ranks. Airstrikes don’t seem to halt the offensive – either in Iraq and Syria. Isn’t this the time for the world to act? Shouldn’t the US do something decisive on the matter – given some claims that it’s America’s fault IS even came into existence in the first place. What should be done, what could’ve been done, and what should never have been done in the War on Terror?
-
How can we foresee unexpected situations before the fact? Mr. Mudd suggests what he calls “right-to-left thinking,” or asking completely different questions related to what we don’t know about a problem, instead of what we do know— Donald Rumsfeld’s famous “known unknowns.” For example, current analysts at the CIA might ask: Where is ISIS going to strike next? We know that the Islamist group will attack somewhere, but the where and when are unknown.
But what about the “unknown unknowns,” things that we don’t even know that we don’t know? For this problem, Mr. Mudd believes a good leader needs to call in a “fresh team” of renegade thinkers who will purposefully challenge prevailing ideas, popular leaders and establishment traditionalists locked into the known unknowns. The renegades aren’t just playing devil’s advocate, or joining the contemporary equivalent of President Lincoln’s “team of rivals,” because that means staying within the boundaries of what is known about the unknown. To get to the unknown unknowns (assuming that they’re knowable in principle, if not in practice), you need to think outside parameters of convention, and this usually means bringing in outsiders and giving them a chance to be heard.
-
In her Wednesday letter “ Army should avoid politics, do right thing,” Sylvia Bower began and ended her comments that the government “should acknowledge that Bush was right and there were WMD.” The writer’s premise and conclusion don’t agree with history and miss the point of the article.
-
Former President George W. Bush did not lie about weapons of mass destruction to justify a war with Iraq, journalist Bob Woodward said in a segment on “Fox News Sunday.”
-
This week many liberals gasped when Bob Woodward showed up on Fox News to defend George Bush and Dick Cheney’s prosecution of the Iraq War. Woodward told Chris Wallace that neither Bush nor Cheney lied about Iraq’s WMDs, that the intelligence on Iraq’s nuclear, biological and chemical weapons wasn’t seriously flawed and that the disastrous war against Saddam Hussein was probably justified.
-
Probably the most infamous cases of mass mind control involves religious cults, with the People’s Temple Jonestown Massacre in Guyana, South America being the most tragic. In 1978, Jim Jones, most likely suffering from megalomania, forced 912 followers into committing mass suicide. Attempts to rescue the followers, ultimately by a member of the US House of Representatives, ended in the representative’s murder and the deaths of all sect members.
The totality of Jim Jones’ control was blamed on a religious extremism administered through a charismatic leader with a regimen of 24/7 control of mind and body. In today’s world, religious cultism is not dead, but is still a problem.
There is a more extensive form of mind control involving millions of Americans, not in the religious sense but in the political sense. There is no immediate threat of death for humans but, in effect, a deadly threat to a democracy founded well over 200 years ago, the American experiment in democracy.
We are speaking of Rupert Murdoch’s News Corporation, which has potential access to a global audience of 4.7 billion people, three-fourths of the world’s population. Its Fox News Channel acts as the ultimate political cult in the United States.
-
Miller was renowned as a Times national-security reporter prior to 9/11, achieved stardom as the face of the pro-war propaganda effort prior to the Iraq invasion, and then became a household name all over the world once it was discovered she’d made the most impactful mistake the media business had ever seen.
-
There was a segment on America’s crumbling infrastructure on 60 Minutes last night. Congress, even Congress, recognizes the problem, if not its full gravity. They say, not without reason, that funding infrastructure overhaul is expensive and we can’t pay for it. With the Bush tax laws this is a problem. With the staggering cost of the American invasion of Iraq addressing America’s urgent domestic issues is a huge problem. Our inner cities fester and our bridges and highways are crumbling, to mention but two infrastructure problems.
-
Official Washington loves the story – the Iraq War was failing until President George W. Bush bravely ordered a “surge” in 2007 that won the war, but President Obama squandered the victory, requiring a new “surge” now. Except the narrative is dangerous make-believe, says ex-CIA analyst Ray McGovern.
-
Poor Jeb! Being even less informed than his ambusher, he could only “respectfully disagree” and reiterate the neocon party line: if only we’d kept more troops in longer ISIS wouldn’t have coalesced. “You can rewrite history all you want,” he said, with a sigh, “but the simple fact is we’re in a much more unstable place because America pulled back.”
-
This week, Saudi Arabia just sanctioned two senior Hezbollah members, Khalil Harb and Muhammad Qabalan, for “terrorist actions.” Both operatives have long Hezbollah resumes, but they stand out for playing leadership roles overseeing Hezbollah’s operations in one particular region: the Middle East. Tellingly, the decision to blacklist these two Hezbollah operatives comes in the wake of Hezbollah threats that Saudi Arabia would “incur very serious losses” and “pay a heavy price” as a result of its Yemen campaign. Given Hezbollah’s recent investment in expanding its regional presence and operations, the Saudis are taking these threats seriously.
-
On the morning of May 14, 1975, in a valley of limestone, sinkholes and caves, the end was drawing near. The discarded possessions of those who had fled were everywhere: suitcases, shoes, wrinkled blouses. This was Long Tieng, a secret military air base established by the Central Intelligence Agency from where it led clandestine operations in Laos during the Vietnam War.
-
As Henry Kissinger turns 92, the former uber-diplomat still enjoys international prestige for his many career accomplishments. Still, there are wide areas of the globe he steers clear of — the better to avoid questioning in connection with war crimes.
As National Security Advisor and Secretary of State under President Richard Nixon and then Secretary of State under President Gerald Ford, Kissinger was known for his realpolitik approach to foreign policy. In the context of the Cold War, that often meant employing ruthless means to undermine perceived U.S. enemies and bolster allies. It is perhaps no coincidence that Kissinger has gone to great lengths to argue that countries cannot prosecute a world leader for crimes against humanity committed in a third country.
Below are some of the most glaring examples of foreign policy decisions Kissinger made — from Vietnam to Chile — that violated human rights.
-
As China rapidly builds new artificial islands in the South China Sea to expand its territory claim there, Washington is adamantly refusing to recognize those claims.
On Saturday, U.S. Defense Secretary Ash Carter called for “an immediate and lasting halt” to the practice.
-
In the May 21st 2015 issue of the London Review of Books, legendary investigative reporter Seymour Hersh who, in 1969, first exposed the ghastly My Lai massacre by US forces during the Vietnam War, published an new account of the killing of Osama Bin Laden which exposed the story told by the Obama Administration to be, as he put it, “a blatant lie.”
Using sources inside the CIA and Pakistani intelligence, Hersh dismantled, plank-by-plank, the official narrative first paraded by President Obama in his public address a few hours after the raid in Abbottabad and later embellished by John Brennan.
Hersh’s revelations establish that at the time of the raid Bin Laden was essentially an invalid. He was living under a sort of ‘house-arrest’ by the Pakistanis, who were monitoring him 24/7. US intelligence was alerted to Bin Laden’s presence in Abbottabad by a ‘walk-in’ informant who wanted to collect (and, in fact, did) a portion of the $25 million ‘reward’ that was on offer.
-
A federal judge has thwarted an attempt to force the release of the Senate report on the Central Intelligence Agency (CIA) torture program.
The American Civil Liberties Union (ACLU) filed a Freedom of Information Act (FOIA) request for the release of the Senate Intelligence Committee’s full report on the CIA interrogation program. The executive summary of the report was previously made public, albeit with numerous redactions.
But U.S. District Court Judge James Boasberg rejected the ACLU’s request, ruling the report remains a congressional record and thus isn’t subject to the FOIA. When Congress created FOIA in 1966, it made sure to exempt the legislative branch from its provisions.
-
Much as the U.S. did that night by projecting Osama’s killing as an act of victory. By killing a terrorist who had long lost his relevance even in the eyes of his most serious backers, the only point U.S. President Barack Obama was trying to make was that killing an individual could compensate for not being able to address the circumstances that made his terror network flourish.
[...]
The same narrative later played out in Libya, where the intervening nations were more intent on finishing off Qaddafi than stabilising the country. The same story is gaining traction in the case of Syria, where the West’s recalcitrance on dealing with Assad has led to Islamic State gaining greater foothold, to a point now where it controls almost half its territory. The farce that played out in Libya is being repeated now in Syria and Yemen. We wonder if Osama’s ghost has been wilfully kept alive.
-
The investigative journalist Seymour Hersh takes apart several important pieces of the U.S. narrative on the death of Osama bin Laden in Abbottabad in Pakistan in 2011.
[...]
Hersh alleges that Saudi Arabia paid for bin Laden’s accommodation. This is unverified but not improbable. More than anything, the Saudis wanted bin Laden silent, either under house arrest in Pakistan with no connection to the outside world, or dead. Their money got the former; the U.S. did the latter. The world did not get to hear of bin Laden’s account of who funded him and groomed him during the 1990s and early 2000s.
-
Meanwhile, we pander to our greatest enemies in the Middle East: Qatar, Kuwait and Saudi Arabia, which support terrorism and allow no human rights within their borders. This policy is both absurd and repugnant. Our policy should be to take sides with Assad before it is too late and help him destroy the terrorists. Then we must take Saudi Arabia to task for its contemptible acts against civilization.
-
The struggle for African liberation, often spearheaded by socialist, left-leaning national liberation movements, is an important part of African history. Many figures loom large as part of this history, including Patrice Lumumba, the first democratically elected prime minister of the Congo.
Young and charismatic, Lumumba endeared himself to the emerging national liberation movement, while trying to balance conflicting needs and agendas in a country largely controlled by Belgium financial interests – even after independence.
-
Bangladeshi authorities arrested two men suspected of being recruiters for the Islamic State, police said, one of whom works for a local unit of the Coca-Cola Co.
-
Turkish Foreign Minister Mevlut Cavusoglu said Monday that the US had agreed to provide air support for so-called “moderate rebels” being trained in Turkey, once they cross the border into Syria.
Cavusoglu told the Daily Sabah that there was “a principle agreement” between the two governments for Washington to provide air cover for the proxy forces being trained in a US-funded program aimed at toppling the government of Syrian President Bashar al-Assad.
-
Foreign Minister Mevlut Çavuşoğlu, speaking to Daily Sabah in an exclusive interview while attending the fifth MIKTA Foreign Ministers Meeting in Seoul, said the moderate Syrian opposition forces that will be part of the train and equip program in Kırşehir won’t be abandoned once they are back in Syria. He said ignoring their plight once in Syria was against what the program wanted to achieve, adding that the U.S. and Turkey had agreed in principle to provide the trained and equipped moderate forces with air protection in Syria. He said that the air cover for trained Syrian forces was not part of the comprehensive plan put forward by Turkey that included setting up no-fly zones and safe zones in Syria. On the issue of Rohingya refugees, he said Turkey was in close contact with Indonesia and Malaysia, which are also MIKTA members, adding that the government had donated $1 million to help the refugees. The foreign minister also remarked on the start of the latest round of Cyprus unification talks, noting that Turkey was more determined than ever to resolve the issue. The current positive climate created by the resumption of talks needed to last, he said.
-
The US bombing of the Chinese embassy in Belgrade during the NATO’s 1999 Kosovo campaign was no accident.
-
When I was in Beijing during the protests in 1989, a middle-aged man came up to me and asked, “Couldn’t America send some B-52s here and…” and he made a swooping motion with his hand.
Ten years later, on May 7, 1999, the American bombers did show up.
Instead of showering freedom ordnance on China’s dictators, however, they dropped five bombs on the Chinese embassy in Belgrade.
As to why this happened, the United States has always declared it was an accident.
-
Teaming up with conservatives, libertarians and liberals, at the end of last week U.S. Rep. Ted Yoho, R-Fla., continued his fight to ensure authority over armed drones remains solely with the Department of Defense (DOD), as he brought back the “Drone Reform Act (DRA)” on Friday.
-
Germany should make sure that Ramstein is not used for illegal attacks
-
-
A German court on Wednesday rejected a lawsuit against the government brought by three Yemeni men who lost two relatives in a U.S. drone strike.
The men, who were unable to leave Yemen to attend the hearing, alleged in their suit that the German government let the United States use an air base in southern Germany to relay flight control data for lethal drone strikes, including the 2012 attack in which their relatives were killed.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
A German court in Cologne has rejected the lawsuit of a Yemeni family whose two relatives died in a U.S. drone strike.
-
The United States military’s desire to kill without putting its soldiers at risk began earlier than many realize. In Kill Chain: The Rise of the High-Tech Assassins, veteran Washington reporter Andrew Cockburn begins the story of America’s modern assassination program in the 1960s, on the Ho Chi Minh trail in North Vietnam.
-
-
-
-
-
-
-
-
From Artificial Intelligence, drones and the Internet of Things – the US army also has something clever up their sleeves and it’s no messing around with this new weapon of defense.
-
The U.S military will come one step closer to its dream of arming fighter jets with ray guns this summer, as DARPA shifts one of its hottest laser projects onto White Sands Missile range for field tests.
-
Victims of drones are living witnesses of the US’ barbaric policies, brutalities and indiscriminate killing of civilians.
-
Ryan, who I don’t believe opposes drone technology per se, nevertheless criticizes the many surveys that consistently show solid U.S. support for drones because they “fail to seek information about public attitudes in the face of drone operations that, in reality, often cause civilian deaths.” He is right to conclude that, logically, public support declines when civilian casualties are involved, and he is also right to critique the polls. I do disagree, however, with the popular assumption (and not just Ryan’s) that “in reality” drone strikes “often” cause civilian casualties.
-
WikiLeaks has begun hosting a new database called ICWatch, built by Transparency Toolkit. The site includes a searchable database of 27,000 LinkedIn profiles of people in the intelligence community. Organizers say the aim of the site is to “watch the watchers.” WikiLeaks founder Julian Assange talks about how the database could be used to help identify individuals connected to the U.S. kill list, formally known as the Joint Prioritized Effects List, or JPEL.
-
-
This formula is repeated throughout the rest of the book. That is 1) There is a military problem 2) Someone always tries to find a technological solution, and then 3) Spends a lot of money only to find out the U.S. has made the problem worse.
-
Speaking in my hometown, Oxford, on Tuesday, Qatar’s Shaikha Moza told an audience at the university that Muslims are being “dehumanised” by Western media coverage of violent Islamic extremism and identified as “something fearful and unknowable”.
I have to agree and do not consider this phenomenon to be particularly new. The British tabloids have worked hard to present Muslims at home and abroad as backward and hostile. I imagine this makes it easier to kill them when we send bombs and armed drones into Iraq, Libya, Syria and Yemen.
-
Fears are growing over the fate of an American citizen trapped in a Yemeni military prison after a Saudi air strike bombed the compound where his lawyers believe he is held.
-
Sharif Mobley is a US citizen, who was kidnapped in Yemen and has been in detention for five years. The FBI is known to have interrogated him. His life has been increasingly endangered as war rages in Yemen, and this past week the military compound, where he has been held, was bombed.
-
We commend Professor Charles Dunlap for his excellent recent post on international law and public support for drone strikes. As he notes, there are many points of agreement between him, Professor Goodman, and ourselves, primarily that when it comes to drone strikes, the American public is interested not just in being safe, but in being compliant with international law. Of course, he points to a number of differences and we appreciate the opportunity to respond to what we take to be the main criticisms he raises.
-
The Justice Department is acknowledging that the FBI, DEA and other federal law enforcement agencies are likely to make increasing use of unmanned aerial drones in the United States.
-
The article claims that “the campaign has killed an estimated 12,500 fighters” and “has achieved several successes in conducting about 4,200 strikes that have dropped about 14,000 bombs and other weapons.” But an anonymous American pilot nonetheless complains that “we have not taken the fight to these guys,” and says he “cannot get authority” to drone-bomb targets without excessive proof that no civilians will be endangered. Despite the criticisms, Schmitt writes, “administration officials stand by their overriding objective to prevent civilian casualties.”
-
Though war is one of the greatest scourges of humanity, the Church has always sought to humanize war, as much as this is possible. This effort faces a new challenge with the rise of drone warfare, now in nascent stage. The USCCB’s Committee on International Justice and Peace has just released its second letter in two years on the topic. What does it mean to humanize war? How has this challenge become more difficult? I will briefly examine these questions before introducing the important contribution of these two letters from the bishops.
-
The Pentagon behaves as if aircraft carriers will rule forever … they won’t
-
The glaring exception to all this hawkishness, of course, is Rand Paul, the libertarian senator who made his mark in 2013 with a filibuster protesting the American policy of using drones to kill Americans engaging in terrorism overseas. Paul was absent from Oklahoma City last month, busy with another filibuster to stop the National Security Agency’s metadata collection program. Days later, in an interview on MSNBC, the Kentucky senator lambasted the “hawks in our party” for policies that he said have allowed the terrorist group ISIS to “exist and grow.”
-
Just to round out this discussion of dying in vain and to give the concept a domestic feel, here is something to think about: Black men aged 20-34 died at a higher rate in Philadelphia in 2002 than in the military in Iraq from 2003-06 at the height of the US war there. Now that is real dying in vain, and a dying in vain that seems to grind on every day in America’s urban areas.
-
Jared Ball and Bashi Rose continue their coverage of the May 13th Commemoration of the 1985 Bombing of MOVE
-
A century ago, the world witnessed the first use of weapons of mass destruction. On April 22, 1915, the German High Command launched their first chlorine attack with a bombardment of the trenches on the Western Front, sending a thick yellow cloud floating towards the French and Canadian lines. Its effects were horrific even by the standards of the trenches. Chlorine burnt the throat and destroyed the lining of the lungs. Many drowned in their own bodily fluids.
-
Swiss activists started a campaign on Tuesday against an official deal between their country and Israel through which Switzerland is to buy drones, Quds Press has reported. The first protest took place outside Switzerland’s largest military base.
-
In the land of American exceptionalism, bipartisan political leaders make “mistakes” in foreign policy; they do not commit war crimes. The invasion of Iraq offers a much needed case study; and the brother of the president who launched the invasion sets the stage.
-
When President Barack Obama apologized on April 23 to the families of Warren Weinstein and Giovanni Lo Porto, an American and an Italian, both hostages killed in a drone attack in Pakistan in January, he blamed their tragic deaths on the “fog of war.”
-
A coalition of peace groups began airing TV ads in Syracuse this week urging pilots from the 174th Attack Wing at Hancock Field in Mattydale to stop flying their remotely-piloted drones over Afghanistan.
The 15-second TV ads are critical of the attacks carried out by the New York Air National Guard’s MQ-9 Reaper drones operated by the attack wing.
“Drone pilots: Please refuse to fly,” the ads say. “No one has to obey an immoral law.”
-
Mr. Obama, she said, also conceded that his administration had failed her. “That was the least he could do,” Mrs. Foley said in an interview this week. “That was hopeful. I recognize that the administration feels badly it was not handled well and it was not given the priority it should have had.”
-
While these announcements represent an uncommon acknowledgement of casualties from drones, notably absent from these remarks was the acknowledgement that Weinstein and Lo Porto were indeed killed by a drone strike, the specific location of the strike, and which government agency was responsible for conducting the strike. Even in a moment of apparent transparency, the U.S. government was opaque.
-
The trial of four protesters who allegedly cut the perimeter fence at RAF Waddington and walked onto the base has been postponed until October.
The defendants, members of the End The Drone Wars group, were arrested on January 5 following their protest against the use of unmanned Reaper ‘drones’ in the Middle East, remotely piloted from Waddington.
Christopher Cole, 51, from Oxford, Gary Eagling, 52, from Nottingham, Dr Katharina Karcher, 31, from Coventry, and Penelope Walker, 64, from Leicester, all deny criminal damage.
-
Given yesterday’s announcement by the Prime Minister that his Government would legislate within weeks to revoke Australian citizenship from dual-nationality terrorists, it is worth revisiting three Interpreter pieces on whether this is a useful weapon in the fight against terrorism.
-
Recalling historical dates in chronological order might not be everyone’s party trick, but a new online map has just made gathering World War II knowledge a little easier. Powered by Google, the digital tool highlights the areas of Aberdeen which fell victim to the air raids of the 1940s – and the dates of when they were hit.
-
It is Memorial Day again. Some will celebrate. Some will drink too much. Some will march in parades. Some will rally around the flag. Some will go shopping. Some will mourn. I am among the mourners. I mourn mostly for those we have killed — and I mourn for those we haven’t killed yet, but will in the days ahead. I mourn for all of the mothers and fathers who put their children to bed at night and wonder if this will be the night that they are killed by a drone attack.
I mourn for the 500,000 Iraqi children – dead because of U.S. foreign policy. The official policy as described by Madeleine Albright on 60 Minutes was ‘that we think the price was worth it.’ Worth it to whom? Not to the mothers and fathers, sisters and brothers, grandmothers and grandfathers of those children.
-
The deaths of Hakema Abu Adwan, 66, and Nadjah Abu Adwan, 47, was first documented by soldiers in the report in early May, when it was claimed the sisters were shot dead on 22 July by Israeli forces who then listed them as terrorists despite knowing that they were civilians.
-
In an aggressive move, one of the demonstrators repeatedly forced a list of children killed by U.S. drone strikes into the embassy “janitorial” staff’s view.
-
The researchers found that many people who have lived where wars are fought have taken part in those wars in one way or another, and that they have no clear understanding (not that anyone else does) of when they have been civilians and when combatants. Said one interviewee, highlighted as typical: “What I think is that there is no line at all. . . . Civilians can turn into fighters at any time. Anybody can change from a fighter to a civilian, all in one day, in one moment.”
The interviewees made clear that many are forced into participation in war, others have very little choice, and others join in for reasons not too different from those expressed by the Pentagon: primarily self-defense, but also patriotism, prestige, survival, civic duty, social standing, outrage at the targeting of peaceful protesters, and financial gain. Bizarrely, not a single interviewee said they joined in a war in order to prevent Americans from going shopping after church or otherwise continuing with their lifestyle or freedoms.
-
At the heart of the mutual friction was Kosovo, the former Serbian province with an ethnic Albanian majority which unilaterally declared independence in 2008.
-
So it happened also that when our modern heroes rode through the deserts of the Middle East, they saw a robust fellow (Iraq) mistreating a little fellow (Kuwait). When our heroes accosted him, the big fellow said that the little fellow was stealing his oil and not helping him protect his flock (the Arab nations) from the advancing Iranians. So Iraq, who had no money “with him” as Cervantes says of the lout Don Quixote encountered, said he could not pay Kuwait what it owed it.
-
From the witness stand, Christina Blache could finally do what she had most wanted and most feared: She looked for the first time at the man who shot her, who killed her friend, who ravaged so many lives.
Her muscles tensed. Her nerves tingled. She fought back tears.
-
Nujaan, who is 27 and has been a soldier for four years, says that Isis’s “target is women”. She says: “Look at Shingal [in Iraq] where they raped the women and massacred the men. It is a matter of honour to defend ourselves first, and then our families and lands.” Sitting beside her is Zenya, 22, who adds that she also “is fighting for myself and my family”.
-
While the U.S. waged a war in Vietnam 50 years ago with 2.7 million men conscripted from every segment of society, less than one-half of 1 percent of the U.S. population is in the armed services today — the lowest rate since World War II. America’s recent wars are authorized by a U.S. Congress whose members have the lowest rate of military service in history, led by three successive commanders in chief who never served on active duty.
-
The Chinese embassy in Pakistan is attempting to verify reports of a video purporting to show a Chinese kidnapped by Taliban-allied fighters in Pakistan a year ago asking Beijing to help secure his release.
Chinese in Pakistan have been told to be on the alert, despite the security situation improving this year.
-
A militant video released Sunday purported to show a Chinese tourist kidnapped by Taliban-allied fighters in Pakistan a year ago asking for his government to help him be released.
A militant known to belong to a Taliban splinter group called Jaish Al-Hadeed, or the “Contingent of Steel,” gave the video to The Associated Press. While it could not be independently verified by the AP, the man in the video resembled other known photographs of Hong Xudong, kidnapped in May 2014.
-
An armed militia group in Pakistan with links to the Taliban released a video of a Chinese tourist they announced that they kidnapped last year, according to Hong Kong’s Oriental Daily.
In the video, the hostage asked the Chinese government to pay the ransom or his captors would execute him, but did not specify the sum of money. The hostage also criticized the Pakistani government, stating that they only care about money and had made no attempt to rescue him, the paper said.
-
Virtually every government in the world creates an illusion for its people. Take economic policy. Government policies might hurt us in the short term, but we are all on a one way route to the ‘promised land’ of happiness, or so we are told by the politicians, the corporate media and spokespersons for the ones who make us suffer to ensure they never have to – the privileged elite, the ruling class.
-
Time and again, conflict has been bad news for historical artifacts and sculptures. There was the infamous burning of the Library of Alexandria, the destruction of the Buddhas of Bamiyan in Afghanistan by the Taliban, and the Nazi’s battle to burn as much “degenerate art” as they could find. Swept up in a violent fervor, mobs and soldiers have been quick to destroy what took societies centuries to create; what museums and collectors spent decades collecting, preserving, and documenting for the public.
-
Environment/Energy/Wildlife
-
In other words, MEDEA was a program that scientists relied on to get accurate and classified climate data — and now it is gone. But why?
-
-
In a recent speech, President Obama proclaimed that climate change “constitutes a serious threat to global security (and), an immediate risk to our national security,” and warned that it actually could exacerbate other menaces, such as terrorism and political instability.
“Severe drought helped to create the instability in Nigeria that was exploited by the terrorist group Boko Haram,” Obama said. “It’s now believed that drought and crop failures and high food prices helped fuel the early unrest in Syria, which descended into civil war in the heart of the Middle East.”
But even as the White House is affirming its focus, the CIA reportedly is ending a key program that shared the agency’s climate change data — some of it gathered by surveillance satellites and other clandestine sources.
-
The CIA will no longer allow climate change scientists to access data from spy satellites and submarines in order to study global warming. Prior to the announcement, scientists could study global warming data in extreme detail thanks to a program, called MEDEA — Measurement of Earth Data for Environmental Analysis. Now the CIA is shutting down the program, saying that there is no longer a need to study the implications of climate change.
-
The CIA began the program in 1992 under President George H. W. Bush, whose son George W. Bush, as president, shut down MEDEA. In 2010, President Barack Obama revived the program along with establishing a new CIA office, Center for Climate Change and National Security. That office was shut down without explanation in 2012.
-
Gelderland provincial council has given a €22,000 contract to a small pest control company to kill 1,600 geese using a controversial method of breaking the birds’ necks.
Despite the cost of €13.75 per bird, no-one has seen if or how the method works and the province does not plan to check up on the work or animal welfare issues, the AD reports.
The contract has been awarded to a company named V&T, based in Leerdam but details about how the neck breaker will work are sketchy.
The method, known as cervical dislocation, involves snapping the birds’ necks one by one. According to the local broadcaster Omroep Gelderland, the bird’s neck is placed between two blocks and then broken, resulting in a ‘stress-free and painless death’.
-
Since last Tuesday’s oil spill, more than 20,000 gallons of death-dealing crude has sickened or killed pelicans, cormorants, grebes, dolphins, sea lions, elephant seals, bass, guitarfish, spiny lobsters, rock crabs, urchins, octopi, shrimp, mussels, sea hares, sponges, anemones, coral, and whole swaths of smaller sea life along the long-protected and once-pristine Gaviota Coast.
-
Authorities said Friday they reclaimed four more bodies from Texas waters, adding to the growing death toll inflicted by record-setting storms that continue to submerge highways and flood homes.
-
Floodwaters deepened across much of Texas on Tuesday as storms dumped almost another foot of rain on the Houston area, stranding hundreds of motorists and inundating the famously congested highways that serve the nation’s fourth-largest city.
-
Finance
-
Was the German working class suddenly turning super-militant? Some may have been fearful, some hopeful that on the rail lines and elsewhere the old IWW-Wobbly song from 1915-USA, “Solidarity Forever” was literally coming true: “… without our brain and muscle not a single wheel can turn.”
The strike of locomotive engineers stopped freight cars May 19 and passenger traffic the next day. Unlike eight previous strikes by the same union, the strike was not for 30 hours, 42 hours or six days – but with no end date. Although the state-owned but largely independently-run railroad company tried to maintain a skeleton schedule, two-thirds of the wheels stopped turning; also city rail service was cut by 40 to 85 percent. In Berlin the crucial “S-Bahn” elevated system tried hard to achieve at least 20-minute intervals on main routes. Subway, bus and tram lines were unaffected – but overfilled.
-
Former CIA director’s name recognition has become way for company KKR to help attract big name clients from country’s richest families
-
Matthew McCarthy was asked by KKR to fly to New York from Ohio, where he manages money for the founders of a consumer-products company. First he had dinner with KKR’s billionaire co-founder Henry Kravis. The next morning, he met David Petraeus, the former director of the Central Intelligence Agency and current chairman of the KKR Global Institute at the company’s headquarters.
-
Front and centre of these will be the settlement with US regulators for as much as $10bn (£6.5bn) for the mis-selling of sub-prime mortgages and mortgage securities, the scale of which could provide a serious headache for chief executive Ross McEwan.
-
The more he researched, the more he was drawn into the population that most middle-class people would prefer to ignore. After raising some modest funds, he opened an office to begin recruiting Skid Row’s residents for a theater that would tackle their problems and those of society as a whole. As you can imagine, given the psychological wreckage and drug problems of those who he would be directing, this was not an easy task. McEnteer writes about Jim Beame, a talented but mentally ill member of Malpede’s company who riffed about baseball and other things that struck his fancy in a performance piece and as such was described as the company’s “star” by People magazine:
But there was no Hollywood happy ending for Jim Beame. True, his association with LAPD appeared to calm him down somewhat. He had become more subdued and less overtly angry. But still, in his anger he hallucinated whoever he was with into his parents or his ex-wife, who was trying to control him. He had been kicked out of virtually all the shelters on Skid Row for his loud, abusive behavior. He interrupted long recitations of baseball or basketball statistics only to make lewd comments to any women who happened to be present. Conversation with him was impossible. By the time he joined LAPD he had been on the streets for six years, living in a vacant lot near Chinatown, eating out of the trash.
-
Cuba was doing business with the U.S. even before the embargo was lifted.
-
While Ben Bernanke will never agree that global economic growth has ground to a halt as a result of his monetary policies, a phenomenon which in the past year has been dubbed “secular stagnation” by the very serious weathermen (and will certainly never admit the reason for such stagnation), with every passing month one thing becomes clear: there can be no growth and certainly no prosperity for the broader population with a $200 trillion (and rising at over $10 trillion per year) overhang in global debt. And now, even Goldman gets it.
-
Congressional proposals to temporarily extend federal health insurance subsidies if they’re lost in an upcoming Supreme Court decision would only delay, not avoid premium hikes, insurance market disruptions and potential coverage losses for millions of Americans.
-
Protests are mounting against decisions by the NATO-backed regime in Kiev to drastically increase prices for energy, water, and other basic necessities. Protesters reportedly set up a mock gallows near government buildings in downtown Kiev this weekend. The protests follow a march on May 16 of an estimated 5,000 people in Kiev to protest the price hikes.
The right-wing government in Kiev is slashing spending on subsidies to basic goods to funnel the money to the Ukrainian regime’s Wall Street creditors and boosting military spending on the war against Russian-backed forces in east Ukraine. As a result, consumer prices for basic necessities are skyrocketing.
-
Los Angeles entrepreneur Elon Musk has built a multibillion-dollar fortune running companies that make electric cars, sell solar panels and launch rockets into space.
[...]
Tesla and SolarCity continue to report net losses after a decade in business, but the stocks of both companies have soared on their potential; Musk’s stake in the firms alone is worth about $10 billion. (SpaceX, a private company, does not publicly report financial performance.)
Musk and his companies’ investors enjoy most of the financial upside of the government support, while taxpayers shoulder the cost.
-
Lobbying/Politics
-
Ben Bradlee was a legendary editor, a man whose Washington Post brought down a president and whose swashbuckling style made him a celebrity and a hero to many an aspiring journalist.
But according to J. Edgar Hoover, the FBI’s towering, autocratic leader for much of the postwar era, Bradlee was “a colossal liar” who was out to smear him.
-
-
They have deranged smiles, hefty laughs, sometimes, like John McCain, seven homes, a cool twenty million in the bank, and that syphilitic grin.
I was in Vietnam, 1994, talking with people in Hanoi. Saw the photos of children all lined up in the courtyard of an orphanage. Oh, maybe 20 in one shot, 10 in another, and the story was repeated through narratives, both visual and oral.
-
In the oversold Republican primary situation, a candidate is likeliest to get attention when there’s a screw-up, such as Jeb Bush’s five attempts last week to answer a simple question about Iraq, or the borderline racist questions posed to Cruz by Mark Halperin of Bloomberg News.
-
Censorship
-
The site, RUBlacklist, is an information resource aimed at users who wish to learn about tools that can be used to circumvent censorship. It doesn’t host any tools itself but offers advice on VPNs, proxies, TOR and The Pirate Bay’s Pirate Browser.
-
Privacy
-
New laws are about to take effect in the UK, where the Conservatives want to force Google, Apple and Facebook to hand over encrypted messages from suspects (criminals or terrorists) to unravel their plans and annihilate them. These encrypted messages might be analyzed by MI5, MI6 and GCHQ.
-
Even so, his company is likely to be clued in. That’s because Recorded Future doesn’t just mine open forums for information: it tries to scan every part of the open web. Hackers frequently talk to each other on chat platforms known as IRCs — and Recorded Future is able to pick up those conversations too.
-
The indiscriminate and ingrained use of PowerPoint presentations threatens the military’s institutional integrity. Former defense secretary Robert Gates said he was terrified by the thought of promising young officers sitting in cubicles and reformatting slides in their prime working years. At the CIA, he was able to ban slides from briefings, but at the Pentagon, he couldn’t even cut down the number used. Earlier this year, Defense Secretary Ashton Carter banned PowerPoint presentations during a summit in Kuwait to encourage analysis and discussions, instead of the usual fixed briefings.
-
-
Controversial provisions of the Patriot Act are set to expire tonight if the Senate doesn’t reach a compromise on government surveillance in a rare Sunday session. We are inside Congress with all the latest updates on the fate of the first major reform package since the Edward Snowden revelations – and what another marathon legislative session could mean for the future of intelligence.
The USA Freedom Act, a bipartisan compromise that would ban the bulk collection exposed by Snowden and is overwhelmingly backed in the House of Representatives, fell three votes short of advancing in another marathon nine days ago. A two-month extension of government surveillance proposed by supporters of the status quo also fell short of the 60-vote supermajority needed to start debate on a bill in the Senate.
-
What Orange County students — and staff — post on social media sites such as Twitter, Facebook and YouTube is now being monitored by their school district to “ensure safe school operations,” the district announced this morning.
-
Ministers are facing calls to curb the scale of police access to private phone and email records, after a report by privacy campaigners found officers were making a request every two minutes and getting access in 93% of cases.
The figures, released to Big Brother Watch under freedom of information laws, found there were more than 730,000 requests for communications data between 2012 and 2014 from forces across the UK. There were annual increases in applications in each of those years, peaking at just under 250,000 last year, according to the report.
-
Civil Rights
-
Elected in the brand name of peace, the Barack Obama has joked to his White House staff that he is “good at killing people.”
-
-
-
The U.S. government’s successful prosecution of ex-CIA officer Jeffrey Sterling for leaking secrets about a failed covert operation to the press followed a long campaign against him for protesting racial discrimination inside the spy agency, writes Norman Solomon.
-
-
-
Jeffrey Sterling recently stood before a judge as his sentence was read. The former CIA officer, the judge declared, would spend 42 months — that’s three and half years — behind bars.
The feds had convicted Sterling on nine felony charges, including seven counts of espionage.
He didn’t sell secrets to the Russians. He didn’t trade intelligence for personal gain. He made no attempt to disrupt the American way of life.
What did he do, then?
-
He spent 30 months in federal prison for blowing the whistle on the CIA’s government-sanctioned torture practices. Now John Kiriakou joins activists from the anti-war group Code Pink to write letters to other activists, dissenters and perceived political prisoners.
-
-
As Kiriakou told Scheer, the DOJ stacks the cards in its favor by filing as many charges as it can against a defendant, burying the victim in legal fees and, even more important, in fear. And win it does. According to a ProPublica piece that Kiriakou references in the Truthdig interview, the Department of Justice is victorious in 98.2 percent of its cases.
-
Shortly after the 1963 assassination of President John F. Kennedy, Chief Justice Earl Warren, who oversaw the first official inquiry, was asked by a reporter if the full record would be made public.
-
The 1992 JFK Records Act established that 40,000 documents relating to the assassination of John F. Kennedy would be made public in October 2017. Now that the date is little more than two years away, seven archivists and technicians with top-secret security clearances have begun poring over the pages for processing at the National Archives, Politico reports. “Within our power, the National Archives is going to do everything we can to make these records open and available to the public,” Martha Murphy, head of the archives’ Special Access branch, says. “That is my only goal.” However, the president-to-be will have the power to keep the records—including 3,600 documents that have never been made public—under lock and key, a move many fear will fuel lingering doubts about whether Lee Harvey Oswald acted alone, whether US officials knew about the plot in advance, and if officials purposefully blocked a full investigation.
-
Was the assassination of John F. Kennedy engineered by a government agency? Did Lee Harvey Oswald work for the mob, or for communists? And just why was he in New Orleans in the summer before the assassination?
-
The remaining records concerning the 1963 assassination of President John F. Kennedy are to be made public by October 2017, by law, but the release of those records is not guaranteed and may not happen if agencies such as the CIA and FBI appeal to the then-sitting president.
“We have sent letters to agencies letting them know we have records here that were withheld,” Martha Murphy, head of the National Archives’ Special Access Branch, told Politico. While no agencies have requested a waiver quite yet, some have “gotten back to ask for clarification” while seeking more information.
-
The JFK Records Act of 1992 ordered that all of the files related to the federal inquiry into John F. Kenney’s assassination be made public in 25 years. As the October 2017 deadline nears, POLITICO takes a look at what the files might tell us – if we actually get to see them.
-
No sooner had he become committee chairman this year when he staged an unheard of stunt in trying to reclaim from the executive branch copies of a classified report — revealing new evidence of torture via “enhanced interrogation techniques” by the Central Intelligence Agency — in order to bury it. It had been issued by Sen. Dianne Feinstein (D-CA) and the committee only weeks earlier.
-
In September 1975, CIA Director William E. Colby told Sen. Frank Church’s committee that 37 lethal poisons were discovered in an agency lab. Church, left, with Co-Chairman John G. Tower, R-Texas, displayed a poison dart gun for all to see.
[...]
Schwarz, Fenn, Weiner and Wyden all agree that in the years following the Sept. 11, 2001, terrorist attacks on the World Trade Center and Pentagon, many of the institutions spawned by the Church Committee’s investigations were seriously weakened.
One blow to the power of the FISA court, Weiner said, came when President George W. Bush authorized warrantless NSA surveillance of American citizens without going to the court. It was an effective end-run, he said.
“The system broke down after 9/11 on the direct orders of the president of the United States, who tried to bypass and countermand the court,” Weiner said.
Fenn recalled a CIA official’s telling remark during a hearing.
-
Washington Post’s Tehran reporter Jason Rezaian is accused of espionage and gathering classified information, among other charges.
-
Jason Rezaian, the Washington Post reporter imprisoned in Iran for nearly 10 months, is standing trial behind closed doors in Tehran on charges of espionage and at least three other major crimes.
-
Dick Cheney and George W Bush were widely condemned by Democrats for their baseless fear-mongering to pressure members of Congress into passing expansive surveillance laws that infringed on American’s civil liberties. Unfortunately, with parts of their Patriot Act set to expire on Monday, the Obama administration is playing the very same game that its own party once decried hyperbolic and dishonest – even after a Justice Department report released last week concluded that the expiring section used to collect Americans’ phone records in bulk has never been vital to national security.
See if you can tell the difference between the Obama administration’s statements about the renewal of the Patriot Act and those from the Bush administration when they wanted Congress to renew some of the controversial mass surveillance authorities they passed after 9/11.
-
The jailed leader of the Venezuelan opposition, Leopoldo Lopez, has declared he is on a hunger strike and called for a protest march next weekend against the socialist government.
Lopez, the best-known opposition activist in custody, was jailed more than a year ago for his role in instigating street protests against the president, Nicolás Maduro, that led to violence in which 43 people died and hundreds more were injured.
-
The CIA has been linked to each and every one of the conspiratorial and coup-making processes against the Bolivarian Revolution, call them coups, economic war, assassination attempts against the president, or barricades (guarimbas). (The CIA is) another sewer pipe that logically excretes pestilent water against the Revolution that it has been unable to overthrow. The CIA being used as a “journalistic sewer pipe” demonstrates what their intentions are.
-
Operation Condor was a covert, multinational “black operations” program organized by six Latin American states (Argentina, Bolivia, Brazil, Chile, Paraguay, and Uruguay, later joined by Ecuador and Peru), with logistical, financial, and intelligence support from Washington.
-
Escaping surveillance is what Matthews used to do for a living. Officially he was a diplomat, in Europe, Asia and the Caribbean, but his real job was recruiting and then managing foreign agents, often in places where such activity was forbidden.
-
An extensive Princeton University study shows that the American people have no impact on which laws get passed.
-
Can a beauty pageant combat racial bias in one of the most homogeneous societies on Earth?
Ariana Miyamoto, who is part African-American, thinks it can. And she has been enduring a lot of abuse to make that point.
-
It’s been some time since I wrote about Abu Zubaydah (Zayn al-Abidin Muhammad Husayn), one of 14 “high-value detainees” transferred from secret CIA prisons to Guantánamo in September 2006, beyond discussions of his important case against the Polish government, where he was held in a secret CIA torture prison in 2002 and 2003. This led to a ruling in his favor in the European Court of Human Rights last July, and a decision in February this year to award him — and another Guantánamo prisoner and torture victim, Abd al-Rahim al-Nashiri — $262,000 in damages, for which, just last week, a deadline for payment was set for May 16, even though, as the Guardian noted, “neither Polish officials nor the US embassy in Warsaw would say where the money is going or how it was being used.”
-
Since being seized in a raid in Pakistan in 2002, Abu Zubaydah has had his life controlled by American officials, first at secret sites, where he was tortured, and since 2006 in a small cell in Guantanamo Bay, Cuba. And, thanks to one of the strangest, and perhaps most troubling, legal cases to grow out of the War on Terror, it appears he’s not going to be leaving anytime soon—which was exactly the plan the CIA always wanted. Not even his lawyers understand what’s transpired behind closed doors in a Washington, D.C., courtroom.
-
Fear of foreign infiltration behind a draft law that turns civic groups into security risks
-
An American Civil Liberties Union report alleges that border patrol agents have engaged in racial profiling and intimidation tactics along southern New Mexico’s border with Mexico.
-
The EU has imposed sanctions and some travel bans on Russia for its actions in Ukraine.
-
Early last year, Pakistani anti-drone activist Kareem Khan received an unannounced visit at his Rawalpindi home from over a dozen unidentified men, some in police uniforms. He was subsequently abducted without being offered any explanation and, over the course of the next nine days, interrogated about his anti-drone work and tortured. After a local court ordered Pakistan’s intelligence agencies to produce Khan he was released and told not to speak to the media.
Khan was due to travel to Europe to testify before parliamentarians about a December 2009 U.S. drone strike on his North Waziristan home that killed his brother and son along with a local stonemason staying with his family. He had also filed a case against the Pakistani government for its failure to investigate the deaths of his family members.
-
Lt. Col. Jason Amerine, a Special Forces war hero who played an instrumental role in the overthrow of the Taliban in the months after 9/11, is under investigation over a purported unauthorized disclosure relating to a U.S. hostage held overseas that was made to U.S. Rep. Duncan Hunter’s office.
-
Intellectual Monopolies
-
Copyrights
-
Popular CDN service CloudFlare has denied allegations from the RIAA that accuse the company of aiding and abetting piracy. Warning against a SOPA-like precedent, the company has asked the court not to include CloudFlare in the restraining order which aims to stop a reincarnation of music service Grooveshark.
-
Steve Albini is a renowned musician, record engineer, producer and songwriter. He’s also not shy of expressing a controversial opinion or two.
-
A couple of years ago in the Svensson case, the European Court of Justice (CJEU) made it clear (finally) that merely linking to content is not infringement. That was a case involving a news aggregator linking to official sources. However, in a new case that has been referred to the CJEU, the court will examine if links to unauthorized versions of content is infringing as well. The excellent IPKat has the details of the case which involves a blog that linked to some pre-publication Playboy photos in the Netherlands. A lower court had said that it wasn’t copyright infringement, but still broke the law, by facilitating access.
Permalink
Send this to a friend
05.31.15
Posted in Law, Patents at 4:06 pm by Dr. Roy Schestowitz
US Supreme Court darkens the future
Summary: The patent system goes wild in terms of scope, the nature of the plaintiff (merely purchasing patents), and the extension of patents to monopolies on named APIs (by virtue of deranged interpretation of copyright law)
WE are deeply disturbed to see Federal-level interventions and rulings in favour of the patent industry, including the most parasitic elements of it. People must learn the reality of these injustices and rise up in opposition before it’s too late. The gap between the rich and the poor rapidly widens because of these outrageous moves, which involve passage of ownership, not just physical ownership but also monopoly on simple ideas.
Florian Müller, a booster of Oracle against Android, covered the White House's attack on Android and on software developers, urging the SCOTUS to allow/endorse patentability of APIs (by denying an appeal).
“The gap between the rich and the poor rapidly widens because of these outrageous moves, which involve passage of ownership, not just physical ownership but also monopoly on simple ideas.”The SCOTUS also helps trolls (against Cisco) right now, as demonstrated by a decision that even British patent lawyers are denouncing. “Commentators have picked up on the identity of the patentee,” wrote IP Kat, “a troll/patent assertion entity/non-practicing entity/etc – as being the headline grabber in this case, if only to paint a picture of General Counsel throughout Silicon Valley being on the edge of their seats awaiting this decision. However, the Court’s comments in this respect were limited. The Court said that they were well aware of the industry that had developed in which patents were being used primarily for obtaining licensing fees. Such conduct can create a “harmful tax on innovation”. However, because no issue of frivolity had been raised by the parties in this case the Supreme Court did not comment further, except to reinforce the power that the district courts have in dissuading frivolous cases.”
I personally find the US patent system very intimidating. The rulings are almost always made in favour of Big Business interests; if not soon, then some time later. Based on these two new reports, Samsung now goes further with Android by patenting software. This is a software patent pertaining to computer vision, which is my area of research. It’s all reducible to math and the US allows this math to be patented and monopolised. Yesterday I saw the article “Auction Co. Can’t Shake Suit Over $2M Software Patents”. How can software patents be sold for so much? How can they be sold at all? This beats the purpose (original purpose of the patent system) because patents just become passable weapons. To quote the article: “A California judge on Friday tentatively refused to toss an inventor’s suit alleging an auction company botched its handling of video technology patents she held with her software programmer ex-husband by selling them for vastly less than their $2 million minimum value, ruling the auctioneer had a fiduciary duty to the inventor.”
“The rulings are almost always made in favour of Big Business interests; if not soon, then some time later.”These “handling of video technology patents” are software patents, which again cover math. This is clearly a problem, but groups like the EFF continue losing focus. They should tackle scope of patents, not ‘quality’ of pertinent patents or patent trolls.
Consider this latest post from Adi Kamdar (EFF). “What a waste of resources,” iophk wrote to us. “It is the ability to patent the wrong things that is the core of the problem not ‘bad’ patents or ‘trolls’, though they are also a problem.”
Kamdar wrote:
Amidst the clamor of surveillance reform and TPP Fast Track negotiations, Congress is still finding time to work out the kinks of patent reform. One of the big topics of the day: inter partes review (IPR). This procedure lets third parties (like EFF) challenge bad patents (like the one used to go after podcasters).
We joined Engine, Public Knowledge, and R Street in sending a letter [PDF] to the Senate Judiciary Committee urging them to strengthen the IPR procedure, making it more accessible to and a more powerful tool for those of us acting in the public interest.
The EFF is once again wasting its time fighting “bad patents” rather than software patents.
In other news, there’s this new article which talks about copyrights, trademarks and patents collectively, referring to them all as “Intellectual Property”. The part about patents says: “A common question that is often asked by founders is whether they can get their software patented.”
Software as a whole cannot be patented, but parts of it, in few parts of the world, can probably be patented.
The article says: “The short answer to this is “no- software cannot be patented per se,” i.e. a computer program is not independently patentable.” If the Justice Department gets its way, not only part of a program will be a monopoly but also APIs (covered by copyrights). It often seems like everything just gets worse, not better. Maybe this whole patent system (or by extension the so-called ‘IP’ system) needs a revolution and a reset. █
Permalink
Send this to a friend
Posted in Free/Libre Software, FUD, Security at 3:23 pm by Dr. Roy Schestowitz
Summary: Insecurity firm McAfee, whose record on Free software is appalling (it is Windows-centric for its business), continues years of tradition by slinging mud at Tor
TECHRIGHTS regards and has for many years considered McAfee to be a leading source of FUD against Free software. To give a very recent example, McAfee is connected to the "VENOM" hype (former management), just like Microsoft.
The latest McAfee FUD targets Tor [1-4]. It’s FUD which associates Tor with crime. Framing Tor as a crime tool is like framing kitchen knives as weapons for murder, but this kind of characterisation sure fits the current war against Tor (anonymity). The attack on encryption is also on the rise and much of the British media is now spreading propaganda that associates encryption with terrorism. A recent movie that I watched, The Imitation Game, shrewdly associates encryption with the Nazis. █
Related/contextual items from the news:
-
The ransomware is free to use but site retains 20 percent of any ransom that is collected, McAfee researcher says.
-
We might be entering a whole new era of malware, one where even those who lack any semblance of deep technical expertise will be able to acquire and disseminate viruses and the like on the fly.
-
-
A free collection of files has been discovered that aids in the creation of ransomware; the process of encrypting the contents of someone’s computer until they pay to have it unlocked. Set your price and away you go.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »