12.29.15
Links 29/12/2015: SparkyLinux 4.2, Ian Murdock’s Rants
Contents
GNU/Linux
-
OS.js is a new javascript based operating system that runs on your browser
Shifting between different Operating Systems to manage work and college is a pain in the ass. Did you ever wish that you had an Operating System that runs on your browser, so that you didn’t need to plug in a USB and wait for it load? Then try OS.js- a javascript based minimal operating system. You can use it on any platform that supports a browser.
-
Desktop
-
A year of Linux has already happened. You missed it.
How many times have you heard the famous “20XX is going to be the year of Linux desktop” sentence? What does it mean? When will it happen? Well, it already happened. You missed it.
Okay, let’s break it down into simplest steps possible. First of all, what is a “Linux operating system”?
Linux operating system is a combination of five layers:
Linux kernel
Some mid-level tools
User interface
Some mid-level tools
Some apps -
Top Linux Distributions To look Forward To In 2016
Surprisingly, over 170 distributions are still on the waiting list; and quite a handful of these are even dating back to as far as five years ago, interestingly enough, some of these distros have actually gained a reasonable traction. Which proves that a distro is not necessarily bad or unworthy if it doesn’t get or hasn’t gotten the approval of Distrowatch.
-
Red Star Linux Caught Spying, Modifying, Deleting
The big story today was the confirmation of hidden features in North Korea’s Red Star OS, based on Red Hat/Fedora. It was a top headline on most websites many with plays on the words Open Source and oppressive. In more local circles the release of the first stable Solus OS excited the community and the first reviewer asked where’s vi.
-
System76 Offers $50 and $100 Discounts for All Desktop PCs, Along with Free Shipping
System76, a US company that builds computers, laptops, and servers, has just announced that some of their products now have a $50 discount, or more, and free shipping.
System76 is one of the companies that ship their products only with Linux distributions, in this case, Ubuntu. They have a close relationship with Canonical, and they have made a name for themselves in the community with their really good products.
-
System76 Oryx Pro is the Ubuntu Linux gaming laptop of your dreams [Review]
When you think of a gaming PC, two things probably come to mind — Microsoft Windows and desktop computers. In other words, gamers don’t typically target laptops for playing their favorite games, and even when some do, they will likely aim for Windows 7, 8, or 10. Thanks to Steam, however, Linux-based operating systems are a legitimate option for gaming.
If you want a Linux-based gaming laptop, your choices are slim. Yes, you can buy a Windows laptop and replace the operating system with Ubuntu or another OS, but that isn’t the best experience. Ideally, you want a machine that was designed and sold with Linux in mind. Enter the Ubuntu-powered System76 Oryx Pro. This beast of a gaming laptop can be configured with some jaw-dropping specs. The one I have been testing features an Intel Skylake Core i7 processor, 32GB of DDR4 RAM, NVMe SSD and NVIDIA graphics, including G-SYNC. Are you salivating yet? Read on for more specs and my impressions.
-
Lifting the Fog on Red Star OS
-
North Korea’s Linux-based OS is a snooping machine
-
[Old] RedStar OS Watermarking
During the last few months information about one of North Koreas operating systems was leaked. It is a Linux based OS that tries to simulate the look and feel of a Mac. Some of it’s features have already been discussed on various blog posts and news articles. We thought we would take a short look at the OS. This blog post contains some of the results.
-
-
Kernel Space
-
What PC Linus Torvalds hoped to have in the early days?
-
Kernel 4.4 RC7 Has Been Released, Coming With Updates
-
Linux Foundation Jumping Into Fintech Game
The Linux Foundation wants to extend this project past theory and into the realm practical corporate and developer solutions.
-
Linux Foundation Scholarship Recipient: RJ Murdok
The Linux Foundation’s Training Scholarship Program has awarded 34 scholarships totaling more than $100,000 in free training to students and professionals during the past five years. In this series, we share the stories of recent scholarship recipients with the hope of inspiring others.
For this installment of the series, we talked with RJ Murdok, who is 15 years old and received a Teens in Training scholarship. He is currently in high school in the United States and started studying Linux in 2012. RJ, who is legally blind, says he spends a lot of time contributing bug reports to Bugzilla when he’s not in school. One day, he would like to convert industries and schools over to Linux as well as teach a computer science class at a university.
-
Linux Foundation Will Build a Standard Blockchain, Bitcoin’s Core Technology
Together with twenty other corporations, The Linux Foundation has announced a research effort to unify and further develop blockchain technology, the core of many of today’s cryptocurrencies, including Bitcoin.
At the start of 2014, in a New York Times article, Marc Andreessen, one of Silicon Valley’s top investors, listed Bitcoin and its underlying technology, its blockchain, as one the top three inventions of all time, after personal computers in 1975, and the Internet in 1993.
-
Raspberry Pi 2 Support Being Tried For Linux 4.5 Kernel
Eric sent in his BCM2835/BCM2836 changes for pulling into the ARM -Next code for Linux 4.5, but it’s coming rather late in the cycle, so it’s not immediately clear right now whether this code will be accepted. Eric Anholt has been working for Broadcom on the Raspberry Pi / VC4 driver while recently he took over role as the Raspberry Pi kernel maintainer too.
-
Blockchain could be 2016’s blockbuster [Ed: Linux behind the scenes]
-
The benefits of Blockchain for financial services
-
Private vs. Public Blockchains
-
Blockchain Technology To Revolutionize Banking System
-
The Stories That Shaped the Blockchain Narrative in 2015
-
Graphics Stack
-
Tessellation Support Expands for Intel’s Open Linux Driver
-
Open-Source Tessellation Lands For Pre-Broadwell Intel Hardware
Back on Christmas was news of patches for implementing tessellation shader support for Intel Ivy Bridge and Haswell graphics hardware after support had already landed for Broadwell and newer within the Mesa driver. Support for those older generations is now present in Mesa.
As of this afternoon, Kenneth Graunke’s work for implementing GL_ARB_tessellation_shader support for Ivy Bridge and Haswell is now within Mesa Git master. This makes tessellation support implemented for all hardware capable of doing so — Sandy Bridge and older are not.
-
Gallium3D’s LLVMpipe Now Optimized For POWER8
-
The Biggest Wayland & Mir News Of The Year
In 2015 we saw Canonical continue to invest in Mir and see it mature greatly not only for Ubuntu Phone devices but on the desktop as well in prepping it for the Unity 8 converged experience hopefully for Ubuntu 16.10. Mir this year picked up libinput input support by default, rendering improvements, better performance, and many other features. Outside of Unity 8 though, I haven’t seen any other open-source desktop environments experimenting with Mir.
-
-
Benchmarks
-
See How Your BSD/Linux PC Compares To 36 Other Systems
If you happened to receive some new computer hardware this Christmas or are weighing a possible upgrade with Skylake PCs becoming more common and AMD Zen coming out next year, you might as well benchmark your system against our vast collection of other systems to see how the performance stacks up.
-
-
-
Applications
-
Audacious 3.7.1 Open Source Music Player Released for Linux and Windows
The development team behind the Audacious open source audio player software have announced the availability of the first maintenance release for the Audacious 3.7 series.
-
Triggers
My goal is to put together an event based business process package that is configurable, knows where I and my technicians are, knows where the customers are, can nag us to do the things that really need to be done, can be set up by a smart business operator to gather data at the moment in time when it is easy and likely to be done.
-
CafeOBJ 1.5.5 released
Yesterday we have released CafeOBJ 1.5.5 with a long list of changes, and many more internal changes. Documentation pages have been updated with the latest reference manual (PDF, Html) as well as some new docs on CITP (in Japanese for now) and tutorials.
-
BH 1.68.0-1
A new release of BH is now on CRAN. BH provides a large part of the Boost C++ libraries as a set of template headers for use by R, possibly with Rcpp as well as other packages.
-
Proprietary
-
Vivaldi Snapshot 1.0.357.5 Brings Awesome New Features
As you may know, Vivaldi is a Chromium-based open-source internet browser, built by the Opera founder. It did not reach a stable version yet, but it is already usable.
-
-
Instructionals/Technical
-
Crack passwords in Kali Linux with Hydra
-
A Logstash Tutorial: How to Get Started
-
K Means Clustering in R
-
How to install Sonerezh on Ubuntu 14.041
-
DevStack on openSUSE, or how to quickly setup OpenStack on openSUSE
-
Managing your iPod in Ubuntu
-
How to Install iRedMail (Mail Server) on CentOS 7 & RHEL 7
-
Man in the Middle Attack using Kali Linux – MITM attack
-
How To Install Enlightenment 0.20.2 on Ubuntu 15.10 Wily Werewolf And Ubuntu 14.04 Trusty Tahr
-
Install Glances (system monitor, CLI) on Ubuntu 15.10
-
Working with Functions: Towers of Hanoi
-
Configuring function (Fn) keys in Linux under Openbox
-
Linux on the 3DS by xerpi
-
Converting PDFs to DJVU
-
Trying out Ceph with Oh-My-Vagrant
-
Extlinux on Debian Jessie
-
Linux / Unix: last Command Examples
-
How To Use apt-get Behind Proxy In ubuntu..?
-
User and Group Disk Quota on UNIX / Linux
-
Shellcode Injection
-
How To Install APT 1.1.7 On Ubuntu 15.10 Wily Werewolf
-
The Benefits of Microcaching with NGINX
-
Much faster incremental apt updates
-
Open TCP/UDP sockets using a built-in feature of Bash
-
-
Games
-
Unigine Is Working On Some More Impressive Graphics Tech For 2016
While we sadly haven’t seen many games powered by the Unigine Engine, they seem to be doing great in the professional space with providing immersive, real-time 3D experiences for several different industries — including VR environments. Unigine 2 shipped this year with a ton of improvements to their engine and they continue to lead on the realistic 3D front, but they’re working on even more features for 2016.
-
Battle For Wesnoth 1.12.5 Has Been Released
As you may know, Battle for Wesnoth is an open source turn-based strategy game, running on Linux. The player trains soldiers, to create an undefeatable army, in order to fight agains orcs, undead, bandits and win, in the Kingdom of Wesnoth.
-
Divinity: Original Sin Enhanced Edition Now Available For Mac And Linux
-
Divinity: Original Sin – Enhanced Edition Hits Mac, Linux, SteamOS
-
‘Divinity: Original Sin Enhanced Edition’ Comes to OS X, Steam OS, & Linux
-
Divinity: Original Sin Enhanced Edition Now Available For Mac
-
Divinity: Original Sin – Enhanced Edition Comes to Mac, Linux, and SteamOS
-
Divinity: Original Sin – Enhanced Edition Comes to Mac, Linux, and SteamOS
-
Top 10 Linux Games 2015 – Youtubers Edition
-
OpenRA Christmas 2015 Release (20151224)
-
French Consumer Group Tries To Win Back Resale Rights For Digitally Distributed Games
We talk a lot about first sale rights and resale rights at Techdirt, but of particular frustration to me is the strange capitulation to companies that sell digital copies of software. This isn’t a strictly American problem, though here in the States there has been a near total abandonment of the consumer’s rights when it comes to electronically delivered entertainment, be it eBooks, music, movies or games. The “you’re licensing the game you paid for, not buying it” line is, on its face, ridiculous, amounting to a situation where Game “X” bought on a disc can be resold, but Game “X” bought and delivered on the internet cannot. Why a delivery method would alter the right to resale a bought product because a EULA says so is a concept that simply escapes me.
-
Best-Selling Linux Games for Steam Winter Sale
The latest Steam Winter Sale is still in effect, and it will last until January 4. Let’s take a look at what the Linux users have been buying these past few days.
-
-
-
Desktop Environments/WMs
-
Enlightenment 0.20.2 Linux Desktop Environment Is Out to Fix over 10 Bugs
The developers of the lightweight and modern Enlightenment desktop environment announced on December 28, 2015, the immediate availability for download of the second point release in the Enlightenment 0.20 series.
According to the release notes, which we’ve attached at the end of the article for reference, Enlightenment 0.20.2 is here to fix over 10 issues that were either discovered by the Enlightenment’s developers or reported by users since the previous maintenance release, Enlightenment 0.20.1.
-
K Desktop Environment/KDE SC/Qt
-
Experimental The Unarchiver backend for Ark
Five years ago, the Free Software Foundation announced The Unarchiver as a free tool to extract RARv3 archives. In that blog post, you can notice how the FSF hoped that existing GUI extraction tools like Ark would integrate support for The Unarchiver. That’s because The Unarchiver‘s GUI is only available on Mac OS, while on Linux there are only the CLI frontends (which are lsar to list an archive and unar to unpack an archive).
-
Making Something Unpleasant More Pleasant
I’m just using Dolphin for demonstration purposes, I’m not saying that Dolphin is crashy – Dolphin is awesome!
-
My Experience with KDE and Cantor
Hello. I’m Divit, a 15 year old KDE contributor. I was introduced to KDE through Google Code-in. For those of you who don’t know, Google Code-in is a contest introducing 13-17 year old pre-university students to open source software development. It is somehow similar to Google Summer of Code. This post is related to one of my Google code-in task and in this post, I’ll be telling about the KDE application- cantor and my experience with KDE so far in this competition.
-
Chakra GNU/Linux Devs to Refine the KDE Plasma 5 Implementation in 2016
Today, December 29, 2015, the developers of the Chakra GNU/Linux operating system have published the distribution’s plans for 2016, along with their best wishes to the community.
-
Driving Akonadi Next from the command line
-
-
GNOME Desktop/GTK
-
WebKitGTK+ security status
-
WebKitGTK+ Security Advisory WSA-2015-0002
-
WebKitGTK+ Hit Hard By Over 100 Security Vulnerabilities
WebKitGTK+ WSA-2015-0002 was made public today as a security advisory with more than 100 vulnerabilities being mentioned.
-
Thanks to Apple, WebKitGTK+ Devs Patch More Than 100 Security Vulnerabilities
The developers of the WebKitGTK+ open source WebKit rendering engine used in the popular GNOME desktop environment reported that the software has been hit hard by over 130 security vulnerabilities, urging all users to update as soon as possible.
-
-
-
Distributions
-
Reviews
-
Reviewing Solus 1.0
An interesting new distro, but it’s newness is showing. However Solus might be worth watching as it matures.
-
Manjaro 15.12 (Capella) KDE Review: Slow to Boot, But Stable & Beautiful
I love how Manjaro developers have presented the KDE Plasma 5.5 desktop. It’s a beautiful looking, responsive, power efficient, and a stable desktop. I’m also okay with it using a bit of memory as well. But you know, I can’t wait for 50+ seconds for an operating system to boot (again, part of that has to be blamed upon systemd developers) and 12.6 seconds of shutdown times is also a bit high for my taste, it just ain’t my cup of tea. I like lean & fast operating systems. But hey, that’s just me. And these days, one doesn’t get to see blisteringly fast booting KDE distributions either (in my short experience).
And, in my opinion, I’m still of the belief that GNOME developers are more insightful at seeing solutions from a technological point of view compared to the KDE developers, and I think this is the precise origin of this lag in performance of KDE, when the two desktop environments are compared.
Take MySQL as an example. Some KDE programs use it as their database handler. But the problem is, in its very essence, MySQL is designed to handle large number of data and thus is not optimized to have a small footprint. The now outdated search index service of KDE 4 known as Nepomuk required MySQL as a dependency. Thankfully, the new one in Plasma 5 called Baloo, according to its official page has a database engine of its own which has a small footprint. So it’s apparent that after a while KDE saw the mistake and corrected it.
-
-
New Releases
-
1.0 and Beyond
On the heels of our first release of Solus, I want to take a moment to discuss with the community our plans for beyond 1.0 and up to 2.0.
-
Solus 1.0 Has Been Released
-
Solus 1.0 Released
-
-
Screenshots/Screencasts
-
Arch Family
-
Manjaro 15.12 (Capella) Gets Budgie 10.1 with First Update Pack
The Manjaro developers have just issued the first update for Manjaro 15.12 (Capella), bringing a few important changes and improvements.
The Manjaro developers have been quick to improve upon the recently released version 15.12 of the operating system, and it looks like they have been working right through Christmas. It’s only been a few days since the official launch of the OS, so it’s really nice to see that they want to provide proper support.
-
Manjaro Linux i3 15.12 Officially Released with systemd and OpenRC Flavors
-
-
Red Hat Family
-
Systemd Continued Commanding Linux Systems In 2015
This year Ubuntu switched over to using systemd in place of Upstart, other distributions have also decided to take advantage of systemd, this project hosted its first conference, and the systemd feature-set continued to expand.
Systemd in 2015 gained its own UEFI boot-loader, picked up more networking features, added fsck support, came up with its own su-like command, added more feature integration with Btrfs, and many other features came about while others were refined.
-
Top 5 open organization stories in 2015
-
Top Stocks of the day: Red Hat, Inc. (NYSE:RHT)
-
Apple, Red Hat, Hortonworks, Tableau To Win in ’16, Says Drexel
White’s overarching theme is “muted” tech spending in 2016, but a continuation of “secular trends,” including big data, cloud computing, the Internet of Things, mobile, open source software, and the rise of software in importance generally.
-
Top Stocks of the day: Red Hat, Inc. (NYSE:RHT)
-
Red Hat, Inc. (NYSE:RHT) – Morning Large Cap Report
-
Shift to a net-selling mode on three stocks: Red Hat Inc (NYSE:RHT), Stericycle Inc (NASDAQ:SRCL), Signet Jewelers Ltd. (NYSE:SIG)
-
Shift to a net-selling mode on three stocks: Red Hat Inc (NYSE:RHT), Stericycle Inc (NASDAQ:SRCL), Signet Jewelers Ltd. (NYSE:SIG)
-
Fedora
-
Kevin Fenzi: How do you Fedora?
We recently interviewed Kevin Fenzi on how he uses Fedora. This is part of a series on the Fedora Magazine where we profile Fedora users and how they use Fedora to get things done. If you are interested in being interviewed for a further installment of this series, you can contact us on the feedback form.
-
Sonic Pi packaged for Fedora
Maybe you know about Sonic Pi, the system to learn programming playing with music. Now I want to give it a try in my system (Fedora 23) and my sysadmin-TOC syndrome obligues me first to package it into RPM. Now I have good and bad news. The good news are I have a testing release of Sonic Pi for Fedora 23. It includes a desktop file too. The bad news are… it doesn’t work yet. Sonic Pi uses jackd while a common Fedora Workstation uses pulseaudio and both try to manage the sound device by themselves.
-
Fedora Linux Had A Very Productive, Tremendous Year
With the releases this year of Fedora 22 and Fedora 23, Fedora stakeholders should be proud of themselves with the quality of Fedora releases/support continuing to go up while driving a lot of new innovation and success into Linux. About the only gripe I have with the latest Fedora releases is that they no longer ship with any fun codenames to talk about…
-
-
-
Debian Family
-
Debian’s APT Package Manager to Provide Much Faster Incremental Updates
Debian developer and Ubuntu member Julian Andres Klode wrote an interesting blog post a couple of days ago, where he talks about an upcoming feature of the APT package manager.
-
Debian GNU/Linux 9.0 “Stretch” Gets Its First SPARC64 Netinstall Image, Download Now
On December 28, 2015, Debian developer John Paul Adrian Glaubitz had the great pleasure of announcing the immediate availability for download of the first network install ISO image for the SPARC64 hardware architecture.
-
Debian Founder Threatens Suicide on Twitter, Reports Police Abuse, Allegedly
The Twitter account of Ian Murdock, the founder of Debian, is now full of tweets reporting police abuse and a possible suicide attempt.
Ian Murdock is one of the key figures in the Linux community, but the recent reports that have been posted on this Twitter account got people really worried. At this point, it’s not clear whether these posts are real or if something actually happened with Ian, but the outlook is not good.
-
First sparc64 netinst image available
-
Experimenting with LXQt in Debian
LXQt is a Qt lightweight desktop – the Qt port of LXDE. Packages exist in Debian – albeit without a top level metapackage or task package to make installing it easier. So I wrote up a simple-ish vmdebootstrap call.
-
Debian Founder Ian Murdock’s Tweets Are Raising Eyebrows
He has since declared that he won’t take that drastic step and over the course of many tweets, he has released some of the details which prompted these tweets. Apparently, he was attacked by the police for “knowing” on his neighbor’s door. We’re not sure exactly what he means by that, though it could be an auto-correct for “knocking.”
-
What Struck A Chord With Debian Users In 2015
-
Derivatives
-
Parsix GNU/Linux 8.0 (Mumble) and 8.5 (Atticus) Receive Linux Kernel 4.1.15 LTS
The developers of the Debian-based Parsix GNU/Linux computer operating system have announced the general availability of a new Linux kernel version for all of its supported OSes.
-
SparkyLinux 4.2 GameOver Edition Has Over 80 Games, Desura and Steam for Linux
Just a few minutes ago, December 29, the developers of the Debian-based SparkyLinux operating system were more than proud to announce the release of the GameOver, Multimedia and Rescue editions for SparkyLinux 4.2.
-
SparkyLinux 4.2 Rescue Edition Officially Released, Based on Debian 9 “Stretch”
Just a few minutes ago, December 29, the developers of the Debian-based SparkyLinux operating system were more than proud to announce the release of the GameOver, Multimedia and Rescue editions for SparkyLinux 4.2.
-
Introducing the SparkyLinux Multimedia Edition, a Live CD Full of Tools for Artists On the Go
Along with the announcements for the SparkyLinux 4.2 GameOver and SparkyLinux 4.2 Rescue operating systems, the SparkyLinux devs had the great pleasure of introducing the first SparkyLinux Multimedia Edition.
-
Canonical/Ubuntu
-
Where Ubuntu (and others) Went Wrong
Ubuntu and other popular distributions offer their users a great user experience, great support and frequent updates. Recently there have been reports circulating that Ubuntu has a far greater user base than originally thought. When you combine these things together, it seems like Ubuntu (and distros based on it) are at the top of their game. On the surface I’d agree with this. However, there are some critical areas and missed opportunities that continue to be glossed over. In this article, I’ll share areas where I think Ubuntu and related distros went wrong.
-
1 year of Shuttleworth Foundation Flash Grant
As announced last year, starting January 2015 I’ve benefited from a “Flash Grant” kindly awarded to me by the Shuttleworth Foundation. This post reports publicly about how I’ve used the money to promote Free Software via my own activism, over the period January-December 2015.
-
Flavours and Variants
-
Linux Mint 17.3 “Rosa” Xfce – BETA Release
This is the BETA release for Linux Mint 17.3 “Rosa” Xfce Edition.
-
Linux Mint 17.3 KDE Beta Review 1080p – New Challenge For The Linux Mint Project
-
An Everyday Linux User Review Of Linux Mint 17.3 Cinnamon Edition
I am going to start this review with the new features in Linux Mint 17.3 so that those of you who are already well aware of Linux Mint and what it offers can skip the rest of the review.
The second part of the review will look at it more in depth, highlighting the features and the applications provided with Linux Mint.
-
-
-
-
-
-
Devices/Embedded
-
LG Smart TVs Getting ‘Major Update’ To WebOS 3.0 At CES 2016
LG is preparing to unveil the latest webOS 3.0 Smart TV at the CES 2016 event, promising to bring a host of advanced new features. These will allow consumers to quickly and easily find and switch between the company’s expanded content options.
-
Hands-On: Getting my Raspberry Pi Zero kitted out
This is a vast improvement over having the exposed Raspberry Pi Zero just laying on my desk, but it is still not the ideal configuration I have in mind.
One more thing before I go. I also just picked up my first “genuine” Raspberry Pi Case for my Pi 2, and it really is very nice. Clean, secure and simple to assemble/install. The top pops off to make space for a HAT if necessary. Very nice.
-
New Google Glass model hits the FCC website, images included
Google Glass is not dead. A brand new model of Google’s face computer has popped up on the FCC website (first spotted by 9to5Google), complete with rather high-res images of the device.
The pictures show a Google Glass unit with the FCCID “A4R-GG1″ that looks a lot like the existing Glass design. The biggest change seems to be that the device can now fold up, just like a regular pair of glasses, which will make it much easier to store when you aren’t wearing it. The Glass prism looks longer than the first version of the device, which presumably offers a larger picture.
In general, the case looks smoother and rounder than the previous version of Google Glass. The “Glass” part also seems to be completely independent of the glasses that hold it on your face—the FCC never shows a wearable version with a second side.
-
2015 Embedded Linux Trends in Gaming, TV, Robots, Cars, and Wearables
In part one of this series, I described how community-backed embedded boards, home automation, and Internet of Things devices had supplanted mobile projects as the main focal points for open development. In this post, we look at some other areas where Linux and Android are either thriving (media players, TVs, drones, robots), struggling (games), or are well poised for future success (3D printers, augmented reality, wearables, and automotive).
-
Phones
-
Android
-
Open Source Android Code for PCs was “Stolen” by Console OS, Devs Say
A Kickstarter project called Console OS has exploited open source software licenses in a really nasty — but totally legal — manner by redistributing Android-x86 code in a way that amounts to “stealing,” according to the lead developer of the latter project.
-
Telefonica leaves Firefox OS for Cyanogen OS
Telefonica one of the first Firefox OS partners ditches the operating system for an Android based customized operating system, Cyanogen OS. In an update to its Open Agenda with Firefox OS Telefonica blamed its departure on the inability of Mozilla to provide better user experience which lead to suspension of Firefox OS distribution.
-
Phablets dominate Android Christmas sales
Android users are clearly still in love with large-screened phablet devices. A report by an analytics company indicates that half of the Android phones bought for Christmas were phablets.
-
Google confirms next Android version won’t use Oracle’s proprietary Java APIs
Google is replacing the Java application programming interfaces (APIs) in Android with OpenJDK, the open source version of Oracle’s Java Development Kit (JDK). The news first came by a “mysterious Android codebase commit” from last month submitted to Hacker News. Google confirmed to VentureBeat that Android N will rely solely on OpenJDK, rather Android’s own version of the Java APIs.
-
Frozen Android Phones Give Up All Your Data Secrets
-
Rumors Of LG G3 Receiving Android 6.0 Officially Denied
-
LG G3 Android 6.0 updates rolling out now in Poland
-
Here’s a Better Way To Save Articles on Android
-
Galaxy S5 User Gets Android 6.0 Update, Probably By Mistake
-
How to Set Up Android’s Daydream Screensaver
-
FiLMiC Pro arrives to select Android phones: brings full manual controls for advanced video shooting
-
Xiaomi Mi Pad 2 (64GB) sells out in under a minute
-
Google Uses Homepage to Pitch New Android and iPhone Owners on Its Apps
-
Xiaomi Redmi Note 3 review
While not without its issues, the Xiaomi Redmi Note 3 excels in key areas where its competitors do not, including its premium build quality, exceptional battery life, and the availability of a fast and accurate fingerprint reader, all for an impressive sub-$200 price point.
-
AH Primetime: Android For Tablets Needs A Nudge From Google
Android is a flexible, mostly open source platform that has dominance in the smartphone world. We have competitors, sure; Apple’s iPhone is the next largest competitor, then we have a number of niche offerings and in here we find Microsoft Windows Phone, BlackBerry 10, Symbian and Tizen OS. As it happens, these niche operating systems do still have millions of users, but in terms of scale they remain small players. Now; one of the fundamental reasons as to why Apple’s iOS and Google’s Android operating systems have worked so well is because of the availability of third party applications. There are millions available for both platform, but there are also differences – apparently, you’ll find the quality applications across in the Apple store and the Google Play Store has the inferior quality of applications. Depending on the device(s) you are using, there’s either relatively little difference in application quality but one golden rule is the larger the device, the relatively poorer the Android application experience is.
-
My Favorite Android Apps of 2015
I’m starting to think that this mobile ecosystem that we play in every day has matured. I say that because I haven’t dramatically changed the way I use my phone from 2014 to 2015. I still use many of the same apps as I did last year (most can be found in this list), though some have improved greatly and a few have been replaced. I don’t know that that’s a bad thing, I think it just shows that it’s become harder and harder to standout with new apps or services. Or maybe people aren’t even attempting to make new products or services because the standard options are so good? Whatever the case may be, I do feel as though I’m more efficient than ever and am also able to accomplish more with the apps I continue to use on a regular basis. So that’s a good thing.
-
Android 6.0 Marshmallow rolling out to Sprint LG G Stylo
-
Android 6.0, 6.0.1 Marshmallow Update For Moto X Pure, Moto G, Moto E, Moto X Style, Droid Turbo 2
-
Moto G 2015 Android 6.0 Marshmallow Update Arrives
-
LG Android 6.0 Marshmallow Update Release Breakdown
-
Majority of Android smartphones bought over holidays were phablets, according to analytics firm
According to a new report by analytics firm, Flurry, more Android phablets were activated than any other sized Google-powered smartphones. In fact, if the companies app-tracking tools are accurate, half of all Android activations over the holidays were large-screened mobiles…
-
STM developing mobile payment system for Android phones
Suretap, a consortium formed by Rogers, Bell and Telus, have begun testing mobile payments on Montreal’s public transit network.
“We want to make it simple for customers to get access to our installations and to our network and this is another way,” said STM chairman Philippe Schnobb.
In the new year, a few hundred employees will test the new payment system, which will allow commuters to pay fares with their smartphone.
Schnobb said there’s no timeline right now for mobile payments being available to STM riders.
-
Facebook and Google Want to Create the Android of the AI World
-
Samsung Galaxy S5 gets Android 6.0.1 Marshmallow, by accident
-
Advanced Manual Video Controls Hit Android With FiLMic Pro
-
Sprint’s LG G Stylo gets its Android 6.0 Marshmallow update
-
Oppo R7s review: Not the obvious choice for a mid-range Android, but ColorOS elevates it
Oppo isn’t a particularly well-known name in many Western markets, and that’s hardly surprising considering the Chinese company hasn’t been around for as long as the bigger players. What it is known for is offering ‘bang for your buck’, and its latest R7s model is no different.
Priced at $399, it sits as a midway point in Oppo’s range – between the R7 and the R7 Plus – and goes up against similarly priced devices like the OnePlus 2, HTC One A9, and Nexus 5x, to name just a few.
-
Xiaomi Mi4c: Awesome Android smartphone that doesn’t break the bank [Review]
These days you do not have to spend much to get a good smartphone. Using a Xiaomi Mi4c as my daily driver for the past couple of weeks has made it clear that you can get an impressive handset for just around $200. It is the sort of smartphone that makes you believe that you can have your cake and eat it too — its specs read like those of some flagships while its price is similar to that of more affordable mid-rangers.
-
See why Keeper is a world-class Android password manager
I highly recommend using a password manager on your mobile device. You have to do as much as you can to keep sensitive data from prying eyes. If you must carry passwords with you, an app like Keeper is a must have.
-
-
-
Free Software/Open Source
-
10 projects to fork in 2016
2015 was a year of many new open source projects hitting the scene with a splash. From enterprise solutions to home brewed open source concoctions, many of the projects released as open source software this year have made a huge impact on the world of computing in a very short amount of time. While flash stardom isn’t always the best predictor of longevity, we think these 10 projects just might have come onto the scene with enough momentum to continue their success in the new year.
-
32C3: A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs
The toolchain, or “flow” as the FPGA kids like to call it, consists of three parts: Project IceStorm, a low-level tool that can build the bitstreams that flip individual bits inside the FPGA, Arachne-pnr, a place-and-route tool that turns a symbolic netlist into the physical stuff that IceStorm needs, and Yosys which synthesizes Verilog code into the netlists needed by Arachne. [Clifford] developed both IceStorm and Yosys, so he knows what he’s talking about.
-
Codes of Conduct
What is the role of programmers in software development? The question is never far away in free and open source software (FOSS). Last month, however, the issues surrounding the question were emphasized by Robert C. Martin’s attempt to write a programmer’s oath that states best practices and the resulting discussion.
-
Enterprise startups: Open source may be your only hope
No, not because second-tier developers wrote it. You probably have great developers. Instead, the real problem is that your developers are stuck building new code on top of old code. Over and over and over again.
Ironically, this is a sign of success. But, it also creates problems.
As professor Zeynep Tufekci describes it, “We are building skyscraper favelas in code—in earthquake zones.” While she’s referring to the security vulnerabilities inherent in such code development, the problem is actually broader.
-
Open Source Software’s Role in Breach Prevention and Detection
Security professionals are increasingly acknowledging an uncomfortable truth: No network is secure from a sufficiently skilled and determined attacker. So while every effort should be made to prevent intruders getting on to the corporate network, it’s important that you can quickly spot an intrusion and minimize the damage that can result.
Anton Chuvakin, a security expert at Gartner, points out that if hackers are made to work hard to find what they are after, intrusion prevention and detection systems have a far greater chance of spotting them before they can do too much damage.
-
SaaS/Big Data
-
Mesosphere Releases Datacenter Operating System Version 1.4
Version 1.4 of the Mesosphere Datacenter Operating System (DCOS) is now generally available, featuring user interface updates, support for Marathon 0.13.0 and Chronos, and the Mesos 0.25.0 kernel.
-
A 2016 to do list for the OpenStack board
One look around the airport waiting lounge or family living room will tell you everything you need to know about where the cloud is headed. Christmas carols drift on by thanks to Pandora, gifts come without having to stand in line at the mall, and those holiday snaps of the family will be stored on someone else’s server.
In the next 12 months, software running on clouds will rule our world more than ever—but unfortunately not many of those clouds are powered by OpenStack.
While we rightly raise a glass to celebrate the substantial gains OpenStack has achieved in 2015, it’s time to recognize the vast potential to gain new ground in 2016. So, let’s put those New Year’s resolutions to good use by rallying application developers to the cause. To win them over, we must make OpenStack a more inviting and immediately valuable solution to serve their needs.
-
How Docker and containers improved software development at eZ
Docker sparked the trend in software containers less than two years ago. And since its modest presentation at PyCon in 2013, the startup has vaulted to a value of nearly one billion dollars, drawn 2,500 attendees to DockerCon, and its namesake technology has become a marketable skill to have, entering Hacker News’ top 20 most frequently requested job skills.
-
Apache Turns to Big Data Projects — Big Time
Kylin. Meanwhile, the foundation has also just announced that Apache Kylin, an open source big data project born at eBay, has graduated to Top-Level status. Kylin is an open source Distributed Analytics Engine designed to provide an SQL interface and multi-dimensional analysis (OLAP) on Apache Hadoop, supporting extremely large datasets. It is widely used at eBay and at a few other organizations.
“Apache Kylin’s incubation journey has demonstrated the value of Open Source governance at ASF and the power of building an open-source community and ecosystem around the project,” said Luke Han, Vice President of Apache Kylin. “Our community is engaging the world’s biggest local developer community in alignment with the Apache Way.”
-
10 cool tools from the Docker community
Looking back at 2015, there have been many projects created by the Docker community that have advanced the developer experience. Although choosing among all the great contributions is hard, here are 10 “cool tools” that you should be using if you are looking for ways to expand your knowledge and use of Docker.
-
Linux Containers – Benefits and Market Trends
In April, Docker announced a $95 million series D round of funding. This is one of many events over the past year that has demonstrated how the industry has shifted towards the use of Linux containers (LXC) to deploy online services. Even giant cloud services companies, including Amazon, Google, Microsoft, Redhat, IBM and VMware, are pushing towards containerization. With the market leaning in the direction of containers, let’s take a deeper look at what they are, their history and current developments.
-
-
Oracle/Java/LibreOffice
-
Getting LibreOffice to Do the Write Thing
We install Linux on every one of our Reglue computers. Included in that installation is the entire suite of LibreOffice. Unfortunately, a number of Reglue Kids began complaining about homework assignments being rejected. Most times they were scolded and told to re-submit the assignment in the proper format…you know, that well known proprietary one. Sometimes students were given a lower grade for not following the submission instructions.
-
-
Pseudo-/Semi-Open Source (Openwashing)
-
Most Facebook Open Source Developers Don’t Work for Facebook
More than 3,400 developers have contributed to the long list of open source projects Facebook has launched, and the majority of them are not Facebook employees.
-
Facebook Celebrates Successful Year in Open Source
-
Facebook Claims Open-Source Kudos
-
-
BSD
-
DragonFlyBSD Rebases Its Intel Kernel Graphics Driver Against Linux 4.0
DragonFlyBSD’s Francois Tigeot has done some more great work in allowing their open-source Intel graphics driver to be more featureful and comparable to the Linux i915 kernel DRM driver for which it is based.
While DragonFly’s i915 DRM driver started out as woefully outdated compared to the upstream Linux kernel code, the work done by Tigeot and others is quite close to re-basing against the latest mainline code. With patches published recently, the DragonFlyBSD driver would now be comparable to what’s in the Linux 4.0 kernel.
-
FuguIta-5.8
-
-
Public Services/Government
-
18F site facilitates open-source bargain hunting
To facilitate this, the team launched a new website — Micropurchase.18F.gov — as place to post new projects for registered users to peruse and bid on.
“Our goal is to enable parts of our own agency and the rest of the federal government to use this platform to ask the developer community to create open source code for their project,” 18F said in an email to companies that expressed interest in the original micro-purchase pilot. “We anticipate posting auctions for micro-purchase tasks throughout 2016.”
-
Estonia updates X-Road server
The X-road update is financed in part by the European Regional Development Fund. Estonia’s secure document exchange system is developed as open source.
-
-
Licensing
-
Shining a spotlight on free software: the FSF’s Licensing & Compliance Lab’s interview series
In August of 2012, the Licensing & Compliance Lab kicked off a series of interviews with developers of free software. With 2015 in the rear-view mirror, we take a moment to look back on the series and highlight these great projects once again.
In August of 2012, the Licensing & Compliance Lab kicked off a series of interviews with developers of free software. These interviews were a chance to highlight cool free software projects, especially those using copyleft licenses, and learn more about why they are dedicated to free software. What started as a single interview has grown into a regular feature of the Licensing & Compliance Lab blog. With 2015 in the rear-view mirror, we take a moment to look back on the series and highlight these great projects once again.
-
-
Openness/Sharing
-
Google, HP, Oracle Join RISC-V
RISC-V is on the march as an open source alternative to ARM and Mips. Fifteen sponsors, including a handful of high tech giants, are queuing up to be the first members of its new trade group which will host next week its third workshop for the processor core.
RISC V is the latest evolution of the original RISC core developed more than 25 years ago by Berkeley’s David Patterson and Stanford’s John Hennessey. In August 2014, Patterson and colleagues launched an open source effort around the core as an enabler for a new class of processors and SoCs with small teams and volumes that can’t afford licensed cores or get the attention of their vendors.
-
An Open Source Reference Architecture For Real-Time Stock Prediction
While this post does not cover the details of stock analysis, it does propose a way to solve the hard problem of real-time data analysis at scale, using open source tools in a highly scalable and extensible reference architecture. The architecture below is focused on financial trading, but it also applies to real-time use cases across virtually every industry. More information on the architecture covered in this article is also available online via The Linux Foundation, Slideshare, YouTube, and Pivotal Open Source Hub, where the components in this architecture can be downloaded.
-
Leftovers
-
Science
-
Origins of the Irish down to mass migration, ancient DNA confirms
Scientists from Dublin and Belfast have looked deep into Ireland’s early history to discover a still-familiar pattern of migration: of stone age settlers with origins in the Fertile Crescent, and bronze age economic migrants who began a journey somewhere in eastern Europe.
The evidence has lain for more than 5,000 years in the bones of a woman farmer unearthed from a tomb in Ballynahatty, near Belfast, and in the remains of three men who lived between 3,000 and 4,000 years ago and were buried on Rathlin Island in County Antrim.
Scientists at Trinity College Dublin used a technique called whole-genome analysis to “read” not the unique characteristics of each individual, but a wider a history of ancestral migration and settlement in the DNA from all four bodies.
-
-
Health/Nutrition
-
IDF admits spraying herbicides inside the Gaza Strip
“The aerial spraying of herbicides and germination inhibitors was conducted in the area along the border fence last week in order to enable optimal and continuous security operations,” an IDF Spokesperson told +972 on Sunday.
Palestinian Agricultural Ministry officials told Ma’an news that farmers said Israeli planes had been spraying their agricultural lands adjacent to the border fence for several days straight. Spinach, pea, parsley and bean crops were reportedly destroyed around the al-Qarrara area in eastern Khan Younis and the Wadi al-Salqa area in central Gaza, according to the report.
The military spokesperson did not respond to a follow-up question about the destruction of agricultural crops.
-
USDA Whistleblower Accuses Agency of Censorship of Pesticide Research
Dr. Jonathan Lundgren, an expert on the risk assessment of pesticides and genetically modified crops, worked for the U.S. Department of Agriculture (USDA) Agricultural Research for more than a decade. But when his findings on the ill effects of systemic pesticides and RNAi (a biological process in which RNA molecules inhibit gene expression) on pollinators began to gain traction and visibility, the harassment and punishments did as well.
-
USDA whistleblower launches new bee research effort
Scientist Jonathan Lundgren believes the USDA retaliated against him because of his research on neonicotinoid insecticides and potential effects on bees and butterflies.
Neonicotinoids are among the most widely used pesticides. Some research shows they harm bees and butterflies, but the chemical industry disputes much of the research.
-
-
Security
-
Security advisories for Tuesday
-
Towards (reasonably) trustworthy x86 laptops
Can we build trustworthy client systems on x86 hardware? What are the main challenges? What can we do about them, realistically? Is there anything we can?
-
Recently Bought a Windows Computer? Microsoft Probably Has Your Encryption Key [Ed: yes, flawed by design]
One of the excellent features of new Windows devices is that disk encryption is built-in and turned on by default, protecting your data in case your device is lost or stolen. But what is less well-known is that, if you are like most users and login to Windows 10 using your Microsoft account, your computer automatically uploaded a copy of your recovery key – which can be used to unlock your encrypted disk – to Microsoft’s servers, probably without your knowledge and without an option to opt-out.
During the “crypto wars” of the nineties, the National Security Agency developed an encryption backdoor technology – endorsed and promoted by the Clinton administration – called the Clipper chip, which they hoped telecom companies would use to sell backdoored crypto phones. Essentially, every phone with a Clipper chip would come with an encryption key, but the government would also get a copy of that key – this is known as key escrow – with the promise to only use it in response to a valid warrant. But due to public outcry and the availability of encryption tools like PGP, which the government didn’t control, the Clipper chip program ceased to be relevant by 1996. (Today, most phone calls still aren’t encrypted. You can use the free, open source, backdoorless Signal app to make encrypted calls.)
-
Chaos Computer Club: Europe’s biggest hackers’ congress underway in Hamburg
Some 12,000 hackers are challenging the power of Google, Facebook and Youtube to filter information and shape users’ view of the world. One of them demonstrated how to hack into VW’s cheating software.
-
Password-less database ‘open-sources’ 191m US voter records on the web
Austin-based Chris Vickery – who earlier this month found records on 3.3 million Hello Kitty users splashed online – says the wide-open system contains the full names, dates of birth, home addresses, and phone numbers of voters, as well as their likely political affiliation and which elections they have voted in since 2000.
-
The next wave of cybercrime will come through your smart TV
Smart TVs are opening a new window of attack for cybercriminals, as their security defenses often lag far behind those of smartphones and desktop computers.
Smart TVs are opening a new window of attack for cybercriminals, as the security defenses of the devices often lag far behind those of smartphones and desktop computers.
Running mobile operating systems such as Android, smart TVs present a soft target due to how to manufacturers are emphasizing convenience for users over security, a trade-off that could have severe consequences.
-
Nemesis Bootkit Malware the new stealthy Payment Card.
After I read many articles I got this infos about Nemesis Bootkit Malware:
– suspected to originate from Russia;
– infect PCs by loading before Windows starts
– has ability to modify the legitimate volume boot record;
– seam to be like another Windows rootkit named Alureon;
– intercepts several system interrupts to pass boot process;
– can steal payment data from anyone’s not just targeting financial institutions and retailers;
– this malware hides between partitions and is also almost impossible to remove;
-
-
Defence/Police/Secrecy/Aggression
-
Syria anti-Islamic State documentary maker ‘assassinated’ in Turkey
A Syrian opposition film-maker was gunned down in broad daylight in the Turkish city of Gazientep on Sunday, apparently by Isil supporters.
Friends said that Naji Jerf, 38, was shot twice in the head after being approached by an unknown car outside of a local restaurant.
-
Why Britishers left India in 1947? explains NSA Ajit Doval
ncumbent National Security Advisor, had once said that the spark which Netaji Subhas Chandra Bose created within the Indian Army forced Britishers to quit India in 1947.
In a video posted on Youtube, Doval has given a detailed explanation of the main reason as to why the mighty British Empire which, won the Second World War in 1945, decided to quit India in a hurry.
On August 22, 1945, Tokyo Radio announced the ‘death’ of Netaji in an air crash in Formosa (now Taiwan) on August 18, 1945, en route to Japan.
But the crash theory has been rejected by scores of Netaji’s followers and admirers and several claims of the revolutionary leader resurfacing continue to intrigue and divide Indians over the years.
-
Endless War, Undeclared and Undebated
The Obama administration is waging war all over the world – without congressional authorization
-
-
Transparency Reporting
-
Legislator Looking To Force Government Agencies To Release FOIAed Documents In Their Original Formats
Documents released by the NSA and FBI are often delivered in unsearchable PDFs, made from what look like 7th-generation copies created by a faulty mimeograph and forced through a malfunctioning scanner during an earthquake. This makes it much harder for researchers, journalists and activists to perform keyword searches of released documents, much less accurately track redaction inconsistencies or evolving legal arguments. This is deliberate.
-
Another NSL Challenge Is Made Public; Court Decides Government Can Keep Gag Order In Place Indefinitely
-
D.Md.: Gov’t justified its NSL in this case in classified filings; nondisclosure provision here survives First Amendment scrutiny
-
-
Environment/Energy/Wildlife
-
Saudi Arabia unveils record deficit as it succumbs to oil price rout
A brutal sell-off in oil prices has forced Saudi Arabia’s government to post the largest budget deficit in its history, as the state’s revenues have crumbled.
The country’s deficit rose to 367bn riyals (£66bn), after government spending rose 13pc above officials’ plans in the wake of declining oil prices and a war with Yemen. A Saudi official said that the deficit was “considered an acceptable figure” under the circumstances.
Stock markets reacted positively to the government’s spending plans, as investors had feared far worse news was to come, anticipating an overshoot well in excess of 13pc. The total deficit stood at 16pc of the economy’s size, while analysts had expected a gap of 20pc. The Tadawul All Share Index made a daily gain of 0.7pc.
-
Here Are 58 Million Reasons to Care About California’s Drought
The past four years of punishing drought have badly hurt California’s forests. Rain was scarce, the days were too hot, and this year’s wildfire season was the worst anyone has seen in years, burning up nearly 10 million acres across the West. For the first time, a team of researchers has measured the severity of the blow the drought dealt the trees, uncovering potential future destruction in the process. The resulting paper, published Monday in the Proceedings of the National Academy of Sciences, is a rich visual testament to just how much California needs its trees and how close the state is to losing 58 million of them.
-
Fukushima Today
Throughout the world, the name Fukushima has become synonymous with nuclear disaster and running for the hills. Yet, Fukushima may be one of the least understood disasters in modern times, as nobody knows how to fix neither the problem nor the true dimension of the damage. Thus, Fukushima is in uncharted territory, a total nuclear meltdown that dances to its own rhythm. Similar to an overly concerned parent, TEPCO merely monitors but makes big mistakes along the way.
-
-
Finance
-
2015 saw more than $100 billion in chip-maker M&A action
-
Obama Program That Hurt Homeowners and Helped Big Banks Is Ending
When President Obama announced the Home Affordable Modification Program, or HAMP, on February 18, 2009, in Mesa, Arizona, he promised it would assist 3 to 4 million homeowners to modify their loans to avoid foreclosure. Almost seven years later, less than 1 million have received ongoing assistance; nearly 1 in 3 re-defaulted after receiving inadequate modifications; and 6 million families lost their homes over the same time period.
-
-
PR/AstroTurf/Lobbying
-
Michael Moore just exploded the right’s biggest lie
Michael Moore’s new film, “Where to Invade Next,” is sure to generate Oscar buzz. It is already on the short list of 15 documentaries from which the final five nominations will be announced on Jan. 14. But rather than wonder whether Moore will score a second Oscar (his first was for “Bowling for Columbine” in 2002), the question to ask is whether this film can spark a political revolution just in time for the 2016 election.
“Where to Invade Next” has a wide release set for Feb. 12, which is also Abraham Lincoln’s birthday and the week of the New Hampshire primary. Coincidence? Definitely not.
-
Trump: Muslims Knew About San Bernardino Shooters But Didn’t Report Them
-
-
Censorship
-
How China Tries To Censor The Whole World
-
Time to take a re-look at Censor Board’s role: Arun Jaitley
Having witnessed the Central Board of Film Certification (CBFC) getting embroiled in one controversy after the other through the past few months, the government is now considering taking a re-look at the body so as to make it “controversy free”.
-
Amid Censorship Flap, Steinmetz To Discontinue 81-Year-Old School Newspaper
“School newspapers provide students with a powerful voice and a positive learning experience, and we are committed to providing journalism opportunities to our students,” CPS spokesman Michael Passman said. “Steinmetz High School will continue to offer journalism courses for the foreseeable future, and the Steinmetz Star will remain in operation as an online publication that will continue to serve as a valuable learning opportunity for students.”
-
Kremlin’s Censorship Of Shenderovich Interview Backfiring – OpEd
But the Shenderovich case may provide the Putin regime with an object lesson because it is obvious that the Kremlin took this action because of Shenderovich’s criticism of Putin himself (openrussia.org/post/view/11565/) and because it is obvious that taking down the interview in one place won’t block the spread of the text.
-
China publisher pulls ‘racy’ Tagore poems translation
A Chinese publisher has pulled a translation of Indian poet Rabindranath Tagore’s poems after it sparked controversy for racy content.
The translation of works from one of India’s most famous poets was by Chinese novelist Feng Tang.
His publisher said on Monday that it was removing the work from sale following the “huge debate” in China’s literary and translation circles.
Mr Feng has defended his translation, saying a previous version lacked style.
Tagore, known as the Bard of Bengal and seen as a literary god in India, was the first non-European to win the Nobel prize for literature.
-
Five reasons why we must NOT censor ISIS propaganda
First of all, censoring ISIS in this way is simply not feasible. We can very well demand that mainstream newspapers and TV news stations limit their coverage of these issues, but that would leave the entire field of discussion to the unregulated areas of the internet, the “blogosphere” and social media. ISIS would still dominate in these areas, except now we will have removed from the discourse those outlets that would be most capable to hold the ISIS narrative to scrutiny.
-
Orwellian model won’t keep the internet free
Last week brought a positively Orwellian moment to the debate about Internet freedom.
Chinese President Xi Jinping spoke at a state-organised internet conference in Wuzhen, in Zhejiang province, where he was once party secretary. Xi declared, “As in the real world, freedom and order are both necessary in cyberspace.” He said, “Freedom is what order is meant for, and order is the guarantee of freedom.”
These slogans are more than just propaganda from the leader of a country with the world’s largest internet censorship operation. Behind them lurks a dangerous ambition.
-
China Invokes UN Decree for Its Right to Censor the Internet
China’s President Xi Jinping invoked “cyber sovereignty” to describe his country’s right to create its national cyber policy while giving the opening speech at the second World Internet Conference, held in Wuzhen, Zhejiang, on December 16.
“We should respect the right of individual countries to independently choose their own path of cyber development, model of cyber regulation, and participate in international cyberspace governance on an equal footing,” said President Xi. “No country should pursue cyber hegemony, interfere in other countries’ internal affairs or engage in, connive at or support cyber activities that undermine other countries’ national security.”
-
Not allowing free speech on-campus is dangerous – universities need to defend their right to be offensive
2015 has been an eventful year for freedom of speech. In January, #JeSuisCharlie was a global trend championing freedom of expression, lack of censorship, and the right to offend. Yet, as the year draws to a close, it seems the Facebook generation is becoming more and more suppressed.
Once upon a time, universities were bastions of free speech, where world leaders would debate with fresh-faced 18-year-olds who were determined to save the planet. Once, just about anything could be discussed in the name of free speech. But, this year, there have been countless examples of speakers being banned, societies being stopped, and student media being censored, all in the name of “protecting students.”
-
Syria, France Deadliest Countries for Journalists
The Committee to Protect Journalists says 2015 was one of the deadliest years on record for members of the press worldwide, with 69 journalists killed on-assignment. According to the CPJ, 2015 was the sixth year out of the last ten (and eighth since 1992) in which more than 60 journalists were killed in the line of duty—a figure that includes those targeted for their profession as well as those killed in combat, crossfire or while covering other assignments deemed dangerous.
-
Reading Everything Aaron Swartz Wrote
It was cowardly, disrespectful, and it isolated Aaron again in death. He was The Boy, a tragic waste, not a murdered comrade or a martyr. Saying he was misguided served as an excuse for not being at his side.
-
Does The US Really Want A North Korean Internet?
With all of the news about the holidays, one story you might have missed yesterday is that China passed with little fanfare its new antiterrorism law that bears substantial resemblance to proposals currently under review in the US and UK that would require backdoors or other weakened measures to allow encrypted communications to be secretly monitored by governments.
The Chinese law requires that “telecommunications and Internet service providers should provide technical interfaces and technical support and assistance in terms of decryption and other techniques to the public and national security agencies in the lawful conduct of terrorism prevention and investigation.” It is remarkably similar to the wording of a UK proposal that would require companies to offer the government “permanent interception capabilities … [including] the ability to remove any encryption” and similar to calls by US intelligence officials for the ability to decrypt civilian communication.
On the surface such proposals seem highly desirable: the ability to monitor and disrupt terrorist and criminal communications in order to protect life and ensure national security. The problem, as I pointed out last week, is that there is no universal definition of “terrorism” or “national security threats.” In fact, one of the focal points of the Chinese online censorship apparatus is the removal of material relating to protests and mass organization, which the government views as a threat to the stability and well-being of the nation.
[...]
North Korea is one of the few countries to take this model of a safe and secure internet to its logical conclusion, creating its own walled-off private version of the internet where only a small number of approved websites are accessible. The government even created its own operating system called Red Star OS, designed for total government surveillance. Yesterday two German researchers offered the latest in-depth look at the functioning of this operating system custom built for the world of a surveillance state.
-
Those Demanding Free Speech Limits to Fight ISIS Pose a Greater Threat to U.S. Than ISIS
In 2006 – years before ISIS replaced Al Qaeda as the New and Unprecedentedly Evil Villain – Newt Gingrich gave a speech in New Hampshire in which, as he put it afterward, he “called for a serious debate about the First Amendment and how terrorists are abusing our rights–using them as they once used passenger jets–to threaten and kill Americans.”
-
Chinese president Xi Jinping blogged for the first time—and 48,000 people commented
China’s biggest microblogging site, Weibo, is not unfamiliar to foreign head of states. Indian prime minister Narendra Modi, UK prime minister David Cameron, Venezuelan president Nicolás Maduro—all have opened accounts on the site and have interacted with readers in Chinese. But China’s own leaders are more reluctant to engage with online audiences.
Chinese president Xi Jinping’s limited number of social media contributions include a selfie with Cameron and Manchester City striker Sergio Aguero during Xi’s state visit to the UK in October, while Chinese premier Li Keqiang indulged Modi in a joint selfie, said to be Li’s first, at Beijing’s Temple of Heaven in May. Neither of these were posted by the Chinese leaders on Weibo. Instead, they surfaced on Twitter—a social media platform blocked by China’s elaborate censorship machine.
But finally, on Dec. 25, during his visit to the headquarters of the People’s Liberation Army Daily—a mouthpiece newspaper of the Communist Party and the army—Xi crafted his first post on Weibo. It’s the first Weibo message from any of China’s senior officials, as far as we can tell. Xi wrote the message personally, according to state media.
-
Thai media decide junta chief no laughing matter
Every New Year Thailand’s top political journalists traditionally come up with satirical nicknames for the government and senior ministers. But this year they will forego the pleasure, having decided the junta is no laughing matter.
The occasion is usually a rare moment of light relief for reporters covering the febrile world of Thai politics, in a country which has witnessed a string of military coups, violent street protests and toppled governments – and where defamation is a criminal offence.
-
Was 2015 a Bad Year for Campus Free Speech? Let’s Ask the Experts
Are easily-offended students and their allies within the university bureaucracy ushering in a new era of censorship on American college campuses? Even President Obama is worried that excessive political correctness is stifling legitimate debate at universities.
-
The militarization of the press in Syria
Ahmed Abu al-Hamza, “Software” as he was known by his friends, stood behind the camera on November 6 as a gunman explained how rebel forces took Tel Sukayk, a strategic hilltop north of Hama, from government forces. Suddenly the camera’s sound recorder picked up the faint thud of a mortar shell firing in the distance. A few seconds of confusion then turned to horror as the shell exploded right in front of the camera, killing Abu al-Hamza and the rebel fighter and injuring several others.
-
Dr. Timaree: How to be mindful, ethical when it comes to porn
Censorship, though, is not an effective way of fixing a social problem.
-
Why Latin America Needs PEN
The Mexican way of death is unique, issuing from a symbiosis of indigenous beliefs and practices with Catholic rituals. To celebrate the return of the souls of the dead every November, Mexicans set up altars laden with the departed’s favorite food and drink and sugar skulls emblazoned with that person’s name, while images of Christ, the Virgin Mary and saints flank a photo of the deceased. Marigolds festoon the altars and the graves where relatives gather to share a meal and news of the past year with the visiting spirits.
[...]
Journalists are not only pursued by organized crime in all its forms, but also by local, state and federal governments, police forces, the military, and even by people whose job it is to impart justice. Not only must the federal government guarantee the safety of journalists, it must also resolve pending cases and punish the criminals, even if they work in government. Otherwise, as time passes most of the cases become enveloped in a tangle of conflicting lines of investigation where the real one is lost or the victim is morphed into the guilty party. A journalist friend recently told me about how when dealing with a notorious political crime, officials often present a new line of inquiry every once in a while which leads the investigation further away from reality, until it reaches a point where nobody knows anything for sure, a kind of legal shell game with the truth.
-
Pirate Bay’s Suspended Domain Names Spell Trouble for File-Sharing Sites
Earlier in December, file-sharing site the Pirate Bay went down due to a problem regarding the registration of the thepiratebay.org domain — a seemingly innocuous hitch. But then, a week later, thepiratebay.com and several other of the site’s domain properties, including piratebrowser.com, piratebrowser.net, and piratebrowser.org — which link to the Pirate Bay’s TOR-based anti-censorship tool — also went down, suspended for similar violations of ICANN registration policy. And though thepiratebay.org was quickly restored after a transfer from EuroDNS to a new registrar, the other domains remain suspended.
-
YouTube dumps Holocaust memory
“Why do I see beheadings and bestiality on YouTube, but the story of an aged Holocaust survivor must be removed? Is there an agenda going on? If so, what is it?” she asked. “This ministry is being targeted for some unexplainable reason. Is it because we tap in Michele Bachmann regularly? I do not hear of other ministries undergoing this kind of an exam and retribution.”
-
George Washington University apologizes for censorship of Palestinian flag
Earlier this month, six weeks after receiving a “Warning Letter” for hanging a Palestinian flag out his dormitory window, George Washington University (GWU) student Ramie Abounaja obtained a formal apology from university president Steven Knapp for the attack on his free speech rights. The apology came after an implied threat of legal action against the university.
-
Silencing Students: The 8 Most Loathsome Campus Censors of 2015
Every year brings new examples of ruthless college administrators trampling the free expression rights of students and faculty, and 2015 was no different. Here are eight of the most notable campus censors I wrote about this year.
-
Students of color frustrated with campus climate
Multicultural student groups are calling for more inclusion at AU after a rash of anonymous social media posts and posters targeting minorities have appeared on and around campus.
Yik Yak is a smartphone application that allows smartphone users to make posts anonymously and view posts made by those within close proximity to them. Racist posts on the platform prompted University forums last year and inspired an Undergraduate Senate discussion about race, the Eagle previously reported. In recent months, users have continued to write discriminatory comments in the the app around campus.
-
Chinese filmmaker claims victory in online film censorship lawsuit
Beijing-based filmmaker Fan Popo, whose gay rights documentary was removed from Chinese video streaming websites, has claimed victory in a lawsuit over government censorship despite the courts ruling that regulators were not to blame.
In its verdict released last week, Beijing’s No. 1 Intermediate People’s Court found censors had not ordered his documentary “Mama Rainbow” to be taken down from prominent streaming websites Youku, Tudou and 56.com.
-
Artists oppose Erdogan’s censorship
Turkey welcomes private investors in the field of art and culture, but many artists feel oppressed by their government. Beyond censorship and commercial speculation, an alternative art scene offers some hope.
-
-
Privacy
-
[Old] GCHQ finally admits it ‘persistently’ hacked computers and phones in the UK and abroad
For the first time, UK intelligence agency GCHQ has admitted that it does hack into computers and devices to install malware to spy on people both in the UK and abroad. The admission was made before the UK’s independent Investigatory Powers Tribunal, which is hearing complaints by human rights advocacy group Privacy International and seven internet service providers (ISPs) that GCHQ and the Foreign Office broke privacy laws to illegally hack into phones, computers and networks around the world.
-
China introduces its own ‘snooper’s charter’
A new anti-terror law in China gives the government the explicit power to demand technology firms decrypt electronic messages stored on their servers, sparking concern – and confusion – from foreign companies.
The law as enacted, however, falls short of a draft bill which would have required computer companies to explicitly install “backdoors” on their devices, allowing the Chinese government privileged access to the users’ communications.
-
China passes sweeping anti-terrorism law with tighter grip on data flow
-
China Passes Controversial Anti-Terrorism Law to Access Encrypted User Accounts (Update)
-
China passes its controversial antiterrorism law
-
China passes law requiring tech firms to hand over encryption keys
-
China Passes Antiterrorism Law That Critics Fear May Overreach
-
Foreign tech firms may be forced to hand over data under China’s new anti-terror law
-
Amid Controversy, China Passes Anti-Terrorism Law
-
China passes controversial anti-terrorism law to access encrypted user accounts
-
Chinese Law Requires Tech Firms To Deliver Precious Encryption Keys When Asked
-
China passes controversial anti-terrorism law
-
China’s New Big Brother Law Is A Clone Of The West’s Bad Ideas
-
China passes antiterrorism law that critics fear will overreach
-
China passes first anti-terrorism law
-
China adopts tough anti-terror law
-
China Pours More Scorn On French Journalist Being Forced Out
-
China Passes Counter-Terrorism Law That Sparked US Concern
-
China Passes Anti-Terrorism Law; Tech Companies Might Be Asked to Give Private Information to the Government
-
What Happened With Crypto This Year? 2015 in Review
-
William Binney: NSA Could Prevent 9/11
On today’s special episode of Loud & Clear, Brian Becker interviews National Security Agency whistleblower William Binney. Before the earth shaking revelations by figures such as Chelsey Manning and Edward Snowden, there were NSA agents turned critics such as Binney. We ask Binney what led to his decision to leave the NSA less than two months after 9/11, how he views recent changes to the bulk collection of citizens’ data, if terror attacks could have been thwarted, and why the spying apparatus in the U.S continues to grow.
-
ITU members agree international standard for Big Data
ITU members have approved the first ITU standard on Big Data. The international standard details the requirements, capabilities and use cases of cloud-based Big Data as well a high-level ‘system context’ view and its relationships with other entities. The Big Data paradigm provides an effective, scalable solution to deal with growing volumes of data and uncover patterns or other information capable of making data manageable and profitable.
-
Judge Not Impressed With Government’s Warrantless 921-Page ‘Peek’ Into A Suspect’s Cellphone
All the DHS wanted was a warrantless “peek” at the contents of a seized iPhone. The phone, one of three seized from a person suspected of drug trafficking, was examined by the DHS, with the warrant arriving a month later. Now, all of the evidence obtained from the phone is being tossed out.
In the order granting the suppression of evidence obtained from the phone, Judge Sterling Johnson points out that the government revised its story several times during oral testimony.
-
UK Home Secretary Wants Everyone’s Metadata; But If You Ask For Hers, Gov’t Says You’re Being Vexatious
Theresa May, the UK Home Secretary who seems like a comic book version of a government authoritarian, is leading the charge in the UK for its new Snooper’s Charter, officially called the “Investigatory Powers Bill,” that is filled with all kinds of nasty stuff for making it easier for the government to spy on everyone. Among the many problematic elements is the demand for basically everyone’s metadata. May dismissed the concerns about this by saying it’s nothing more than “an itemised phone bill.” Given that, Member of Parliament Keith Vaz noted to May that people might be interested to see May’s itemized phone bill.
-
Key factor in sharply-improved Putin-Netanyahu strategic ties? The Obama White House
-
U.S. Spy Net on Israel Snares Congress
-
The Phone Call That Upended U.S.-Israel Relations
-
NSA Spying on Israel Ensnared Congress
-
Report: U.S. spying on Israel swept up members of Congress
-
US spying on Netanyahu communications: report
-
Report: The Obama Administration Has Been Spying On Israel, Netanyahu
-
The NSA spied on Israeli prime minister during Iran talks, says WSJ
-
Obama had NSA spy on Israel during Iran nuclear deal negotiations
President Obama vowed in 2013 to cut back on spying on U.S. allies. But in the interests of negotiating his Iran nuclear deal, according to the Wall Street Journal, he made an exception in the case of Israel and thereby also caught communications of U.S. Congress members in that dragnet.
-
-
Civil Rights
-
DOJ’s Equitable Sharing Program Takes $1.2 Billion Hit, Much To Dismay Of Asset Forfeiture-Abusing Law Enforcement Agencies
Good news (of sorts) on the asset forfeiture front: the same budget bill that delivered us into the hands of CISA also helped “rob” the nation’s highwaymen of $1.2 billion in equitable sharing funds.
-
Federal judge: Drinking tea, shopping at a gardening store is probable cause for a SWAT raid on your home
In April 2012, a Kansas SWAT team raided the home of Robert and Addie Harte, their 7-year-old daughter and their 13-year-old son. The couple, both former CIA analysts, awoke to pounding at the door. When Robert Harte answered, SWAT agents flooded the home. He was told to lie on the floor. When Addie Harte came out to see what was going on, she saw her husband on his stomach as SWAT cop stood over him with a gun. The family was then held at gunpoint for more than two hours while the police searched their home. Though they claimed to be looking for evidence of a major marijuana growing operation, they later stated that they knew within about 20 minutes that they wouldn’t find any such operation. So they switched to search for evidence of “personal use.” They found no evidence of any criminal activity.
-
Italian president reduces sentences in CIA kidnapping case
Italy’s president has shaved two years off the sentence of a former CIA base chief convicted in absentia in the 2003 extraordinary rendition abduction of an Egyptian terror suspect.
With the decree, announced Wednesday night by the presidential palace, President Sergio Mattarella reduced to seven from nine years Robert Seldon Lady’s sentence. Mattarella also wiped out the three-year sentence handed down by a Milan court to another US defendant convicted in absentia, Betnie Medero.
-
Former CIA chief’s rendition sentence reduced in Italy
-
Italian president offers pardons in CIA rendition convictions
Italy has partially pardoned the former CIA Milan station chief Robert Seldon Lady who was convicted for his role in the kidnapping of an Egyptian Muslim cleric under the U.S. “extraordinary rendition” programme.
Another U.S. citizen found guilty in the case, Betnie Medero, was also granted a pardon by Italian President Sergio Mattarella, his office said in a statement.
-
From the Shadows of the Cold War: the Rise of the CIA
The longest running director of the CIA (1952-1961), Dulles helped coordinate extremely bloody coups throughout the world. Not surprisingly, he comes off as a nasty piece of work. He and his brother John Foster Dulles both worked with the prestigious Wall Street firm Sullivan and Cromwell, which made a fortune representing cartels that were part of the Nazi war machine (John Foster Dulles went on to become Eisenhower’s Secretary of State). The Dulles brothers were quite cozy with Nazi higher ups in the ’30s and remained staunch apologists for Hitler well into the the ’40s.
-
Sudanese security enjoys “good relations” with the CIA: NISS chief
The director of Sudan’s National Intelligence and Security Services (NISS) Mohamed Atta said his agency maintains “good ties” with the US Central Intelligence Agency (CIA).
-
Trump praises Putin after being told he kills political opponents
“I’m saying when you say a man has killed reporters, I’d like you to prove it”, Trump argued. But, in all fairness to Putin, you’re saying he killed people. In response, Trump said he appreciated “when people call you brilliant” and that “it’s always good, especially when the person heads up Russian Federation”.
McCain’s comments come after Putin complimented Trump last week, and Trump responded it was an “honor” to receive the compliment. “Not a bad thing”, Trump said. The Committee to Protect Journalists reports Russian journalists experience intimidation and censorship.
“I think I’ll win the Hispanic vote”, Trump told reporters after touring the bridge.
-
Russia can only use the United States as an excuse for so long
Sergei Guriev, Russia’s most prominent free market economist, left Moscow in 2013 for Paris, in fear of his liberty. He had publicly supported dissidents, criticized the administration’s policies, was an active and committed liberal, in politics as in economics. He produced, earlier this year, a 21st century equivalent of Niccolo Machiavelli’s “The Prince”: a blueprint of how the modern autocrat rules, and remains.
Unlike the Florentine, though, Guriev isn’t recommending a course of action, he’s describing it; and he doesn’t believe it will be good for the state, but ruinous. If, in this and other writings and interviews, he’s right about the nature of Russia’s governance, his country is in for a bad crash. And when Russia in its present condition crashes, the world will shake.
-
Why Russia Can Only Go Backward
The Public Opinion Foundation conducted a survey this month asking Russians two questions: “What was the main event of the year in Russia?” and “What was the main global event of the year?”
Noteworthy is that fully 40 percent of the respondents had trouble answering either question. And the most brutal political murder in modern Russia — the assassination of my father — did not even figure in the responses. State-controlled television hardly mentions it, with the exception of the first few days after the killing, when commentators spoke of him in contemptuous tones.
-
How Fox News’ Primetime Lineup Demonized Black Lives Matter In 2015
In 2015, Fox News’ three primetime hosts engaged in a smear campaign against the Black Lives Matter movement, fearmongering about the alleged threat they pose to law and order and hyping racist canards aimed at discrediting the movement’s calls for justice.
The Black Lives Matter movement — which emerged after the 2013 shooting death of black teenager Trayvon Martin — became a regular news fixture in 2015 following the high-profile deaths of several unarmed black civilians at the hands of police officers. The movement brought national attention to the issues of police brutality and racial disparities in criminal justice. One group associated with the movement introduced a set of concrete policy solutions, and the movement as a whole became a politically relevant force amid the 2016 presidential race.
-
WaPo Tallies Police Killings–but Holds Back Some of the Numbers That Count
“The kind of incidents that have ignited protests…represent less than 4 percent of fatal police shootings”: That sure sounds like an attempt to play down the number, doesn’t it? Particularly since the write-up never presents the raw number for fatal police shootings of unarmed African-Americans in 2015—which is 37—or the more comprehensive number of all unarmed civilians shot and killed: 90. Those numbers can be found on a graphic that accompanied the story in the paper’s print edition, and in an interactive feature online–but are nowhere to be found in the Post‘s own article on its project. (“Just 9 percent of shootings involved an unarmed victim,” a sidebar accompanying the graphic began—that word “just” indicating that we should read that as “not so many.”)
And the Post‘s “meanwhile,” juxtaposed against “incidents that have ignited protests,” implies that the categories that follow would not inspire protest: those killed “wielding weapons,” who were “suicidal or mentally troubled,” or who “ran when officers told them to halt.”
-
Egypt’s censorship authority raid Merit Publishing house in Cairo
Egypt’s censorship authority raided and searched on Tuesday afternoon Merit Publishing house in downtown Cairo without providing any reason, owner Mohamed Hashem wrote on his Facebook page.
Staff member Mohamed Zein, 23, was arrested during the raid then released a few hours later.
-
Egypt Raids 2 Major Independent Cultural Institutions In 2 Days
Egyptian authorities have raided two pillars of the independent arts and culture scene in Cairo over the past 48 hours.
-
TSA Says It Will Stop Accepting Driver’s Licenses From Nine States
The last time we took notice of the Transportation Security Administration (TSA), it was to inform you that the unpopular, expensive, and ineffectual outfit had decided it could force travelers on domestic airline flights to go through full-body scanners. Previously, TSA had allowed folks to submit instead to a full-body pat-down.
-
Who Needs A No-Fly List When You Can Just Ground 91 Million Citizens?
For the residents of Alaska, California, Illinois, Missouri, New Jersey, New Mexico, South Carolina, Minnesota and Washington (along with American Samoa, Puerto Rico, Guam and the Virgin Islands), this means their ID cards are perfectly legal within those states, but only as long as they stay in those states. (And, apparently, never need to enter a government building — like, say, to acquire a new, compliant ID card).
-
Human Research Loopholes: Alive and Well
In one of the darkest chapters in medical ethics, the United States government ran an experiment from the 1930s to the 1970s in which it withheld treatment and medical information from rural African-American men suffering from syphilis. The public uproar generated by the Tuskegee Syphilis Study eventually resulted in regulations restricting government-supported research testing on humans. These regulations are called the “Common Rule,” and they are right now up for their first full update.
The Common Rule, also known as the “Federal Policy for the Protection of Human Subjects,” is supposed to affirmatively protect us from the abuses of the future. However, the proposed regulation is lousy with loopholes, including ones that could exempt tracking online behavior and experiments related to intelligence activities.
-
Hospital Refuses Pregnancy-Related Care Again Because of Religious Directives
Today we filed a lawsuit challenging Dignity Health’s use of religious directives to deny basic reproductive health care to its patients. Filed on behalf of patient Rebecca Chamorro and Physicians for Reproductive Health, the suit argues that withholding pregnancy-related care for reasons other than medical considerations is illegal in California.
-
Sadistic Cops Make K-9 Maul Unarmed Suicidal Teen – Caught Planning and Celebrating It in Texts
Months after the Herald-Tribune exposed the North Port Police Department for routinely commanding their K-9 dogs to attack people without provocation, the department has done nothing to address the problem. In fact, it defends its officers even in the most egregious cases, including the mutilation of unarmed juveniles.
-
Extended Interview: Remembering Haskell Wexler, 93, Legendary Cinematographer & Activist
In Part 2 of our look at the life and work of Haskell Wexler, we air clips from “Rebel Citizen,” a new documentary about his life, and speak to the film’s director, Pamela Yates. Wexler is perhaps best known for his 1969 film, “Medium Cool,” which captures the upheaval surrounding the 1968 Democratic National Convention in Chicago. He won two Academy Awards for cinematography in “Who’s Afraid of Virginia Woolf?” and “Bound for Glory,” about folk singer Woody Guthrie. His documentaries tackled political issues including the Southern Freedom Riders of the 1960s, the U.S. government’s destabilization of Nicaragua, U.S. atrocities in Vietnam, and torture under the U.S.-backed junta in Brazil.
-
-
Internet/Net Neutrality
-
BT loses its outsourcing legal case against Cornwall Council
Local independent councillor in Cornwall Andrew Wallis reports that the High Court delivered a judgement today in favour of the council’s action to end its outsourcing relationship with BT early.
-
After A Decade Of Waiting For Verizon, Town Builds Itself Gigabit Fiber For $75 Per Month
-
Gigabit Internet Prices in This Small Town May One Day Beat Google Fiber
A few more households may be all a small town fiber network in Massachusetts needs to beat Google Fiber at its own game. The catch is that it’s a really small town, even by Google Fiber standards.
Leverett, Massachusetts, home to some 1,876 residents as of the 2010 census, and on April 7 2015 opened up LeverettNet, the town’s local fiber provider, to much fanfare.
-
Comcast, Which Wanted To Become Even Bigger, Leads The ISP Pack In Consumer Complaints To The FCC
We’ve talked a lot about Comcast here at Techdirt, mostly because between the company’s broadband cash-grab caps, its great big middle finger to the concept of net neutrality, and its (haha) customer service, there’s just a never ending wealth of stories to write up and Mike only lets us out of the dungeon for porridge after we write enough posts. And, as we bring 2015 to a close, it’s kind of fun to remember that Comcast wanted to be an even bigger corporate thing with its intended merger with Time Warner Cable.
-
IPv6 Since 20 Years: Why IPv6 Is Better For Privacy And How To Use It Without ISP Support
Maybe some data is old or controversial, but regularity is clear. Why IPv6 is better than IPv4 and influential to modern Internet? Go to the next chapter.
-
-
Intellectual Monopolies
-
Stupid Patent Of The Month: Microsoft’s Design Patent On A Slider
For the first time ever, this month’s Stupid Patent of the Month is being awarded to a design patent. Microsoft recently sued Corel for, among other things, infringing its patent on a slider, D554,140, claiming that Corel Home Office has infringed Microsoft’s design.
-
Trademarks
-
Canada Too Has An Issue With Abitrary Applications Of Morality In Trademark Applications
In our recent discussion about the delightfully vulgar filing by the Washington Redskins in an effort to point out the arbitrary application of morality by the government to trademark law, the point in the filing was driven home by just how many similarly vulgar and offensive terms the USPTO has been happy to sanctify with a valid trademark. Perhaps some of you out there thought that this was a uniquely American problem, something resulting from our overabundance of political correctness. It’s not. A case in Canada over the trademark application for “Lucky Bastard Vodka” shows this quite well. It also shows the inherent problem in trying to have a government institution apply morality to business in this way.
-
Saskatoon distillery fights feds over ‘scandalous’ trademark
A Saskatoon company’s attempt to trademark its flagship vodka has turned into a four-year battle with the federal government over the definition of “bastard.”
In 2011, LB Distillers applied to the Canadian Intellectual Property Office (CIPO) to register “Lucky Bastard vodka” as a trademark. About eight months later, the agency responsible for trademarks, patents and copyright replied.
“The examiner came back and said it was immoral, scandalous and obscene, and that the general population of Canada would agree that it was an immoral name,” LB Distillers co-owner Cary Bowman said.
-
-
Copyrights
-
The DMCA Has Delivered Us Into The Hands Of The Proprietary Internet Of Disconnected Things
The phrase “Internet of Things” suggests connection. The problem is there’s nothing financially motivating about interconnectedness. Manufacturers of connected devices would prefer homogeneity, which leads to actions like Philips’ which recently pushed a firmware update that locked competitors’ bulbs out of its Hue “smart” lighting fixtures. Sure, it rolled back the update and (mostly) allowed owners to use bulbs they had already purchased, but it was also suggested in the same quasi-apology that the company would rather limit the options available to its purchasers in the future, funneling them through its “friends of Hue” program.
-
Book Publisher Has No Idea How Google Works But Pretty Sure It Could End Piracy If It Tried
Here’s the stupidest thing on piracy you’re going to read today. Or this month. Maybe even this whole holiday season. Rudy Shur, of Square One Publishers, has a problem with piracy, which he thinks is actually a problem with Google.
-
50 Cent Files Stupid, Hypocritical Lawsuit Over Another Rapper’s ‘Theft’ Of His Song In A Mixtape
I can see why 50 Cent and his lawyers might feel this lawsuit is a good idea: 50 Cent is in the middle of bankruptcy proceedings. On top of that, the rapper owes $7 million to the plaintiff in a sex tape lawsuit — one that also involves rival rap star, Rick Ross. (The woman in the sex tape is the mother of one of Ross’ children. 50 Cent can be heard taunting Ross in the recording.) 50 Cent is also engaged in a $75 million lawsuit against his former legal team, so there’s bills to be paid there as well.
50 Cent’s lawsuit takes aim at the rap industry’s standard operating procedure: mixtapes. Rick Ross rapped over 50 Cent’s “In Da Club” in his latest mixtape, much as thousands of rappers have rapped over the beats of others on mixtapes since the early days of the genre. It’s an accepted — if quasi-illegal — practice. Everyone raps over everyone else’s beats on mixtapes, almost all of which are given away as promotional tools.
-
-