EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.24.13

Links 24/6/2013: Cumulus Networks, More GNU/Linux Migrations in Germany, PHP 5.5.0 Released

Posted in News Roundup at 12:21 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Small Brick Open Source PLC

    The OSPLC SMALL BRICK is an open-source PLC (programmable logic controller) that can be programmed using open source C language programming tools.

    The PLC is a general-purpose controller with a wide variety of applications. It is useful to the engineer, technician, student and hobbyist.

  • Open source summer reading list

    Earlier this month, Facebook officially announced its implementation of hashtags, prompting both celebration and outcry from users. But the event also sparked a spate of critical analyses addressing the nature of conversations today, as well as the ways technologies facilitate and organize even the most banal ones. Love them or hate them, hashtags have become an overwhelmingly popular convention for pursuing those recurring questions: What’s going on right now? And how should we make sense of it?

  • Opensource.com summer book Twitter drawing rules

    Enter for your chance to win a book from our summer reading list. Here’s what you need to do:

  • JDownloader Court Ruling Worries Open Source Software Developers

    This week news broke that the popular JDownloader download tool had been declared illegal by a German court. The headline was open for debate since the court only took exception to one particular and long-since removed feature which allowed the downloading of encrypted video streams. However, the ruling has concerned the creators of JDownloader who say that it represents a threat to the development of Open Source Software.

  • Web Browsers

    • Mozilla

      • Firefox 24 for Linux gets native MP3, AAC and H.264 support

        Firefox users who use the Windows 7 or Windows 8 operating system benefit from support for H.264, Mp3 and AAC formats that Mozilla implemented in version 21 of the web browser. Support means that users of the browser on those systems can play audio and video files requiring these formats in the browser without plugins.

      • Launching Maker Party 2013
      • Mozilla checks in with Cookie Clearinghouse for better cookie handling

        The Center for Internet and Society at Stanford Law School has announced a list-based exception platform for managing cookies, called the Cookie Clearinghouse (CCH). Mozilla has committed to work with the CCH Advisory Board to develop the platform.

        Mozilla’s recent attempts to bring in better handling of cookies – in the form of Safari’s third-party cookie block – and reduce the tracking of users ended up in “development hell” a month ago. This was not, though, a result of criticism from advertising groups, but because it was generating too many false positives and false negatives when deciding whether to block cookies from third-party sites.

  • SaaS/Big Data

    • Rackspace, Fidelity: OpenStack Hybrid Cloud Partnership

      The public cloud’s heyday has passed, and enterprises should focus on hybrid cloud investment. So say executives at Rackspace (RAX), the OpenStack-powered cloud hosting vendor. And if deals like the one Rackspace just announced with Fidelity Investments to build an OpenStack cloud is any indication, Rackspace’s vision is on the mark. Here’s the scoop.

  • Databases

    • Oracle Databases: From MySQL to NoSQL Switch?

      Is the NoSQL database trend a threat to Oracle (ORCL)? This is a big week for the company, which announced somewhat disappointing Q4 new software licenses yesterday. While cloud computing and hardware sales are Oracle’s big challenges, you can’t overlook the open source database wars as well. Indeed, Oracle and MySQL faces challenges from smaller NoSQL vendors.

    • MongoDB GUIs that Shine

      MongoDB is a high performance, open source, non-relational NoSQL database written in C++. MongoDB stores structured data as JSON-like documents with dynamic schemas (MongoDB calls the format BSON). This property helps make the integration of data in certain types of applications easier and faster. MongoDB is network accessible, has full index support, query profiling, replication and fail-over support, indexing, auto-sharding for cloud-level scalability, load balancing and more.

    • Oracle Advances Open Source MySQL Clustering
    • TokuMX brings “Fractal Tree indexing” to MongoDB

      Tokutek has announced version 1.0 of TokuMX, a version of MongoDB that has its storage layer replaced with Tokutek’s storage engine. The storage engine, which is available for MySQL and MariaDB, uses the company’s patented Fractal Tree indexing. In developing TokuMX, the developers have also replaced the locking and replication code of MongoDB to get better workload performance as the client count increases. The focus for TokuMX is on large databases of over 50GB, where its indexing technology can bring the most benefit to performance.

  • Oracle/Java/LibreOffice

    • LibreOffice is getting better, even better

      The group responsible for overseeing the development of the LibreOffice free and open source “Office”-style productivity suite of applications has confirmed its latest release.

      The Document Foundation says that 98 bug reports and improvements have been included in LibreOffice 4.0.4, with the 4.1.x (and onward) set of releases due to follow as soon as this July.

  • CMS

    • WordPress 3.5.2 Released – Maintenance and Security Fixes

      WordPress 3.5.2 is now available. This is the second maintenance release of 3.5, fixing 12 bugs. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.

      The WordPress security team resolved seven security issues, and this release also contains some additional security hardening.

    • CMSs mostly vulnerable through addons says German security agency

      Unpatched vulnerabilities not closed by the developers in time or the lack of a crisis communication plan or brute force protection did have the biggest negative impact on the BSI’s overall rating, while a clunky integration into existing management software only brought down the score a little. However, the security experts did not conduct a penetration test for the study.

  • Education

    • How libraries can be a haven for makers

      I work at a public library in the Washington DC-area and often think about what needs to be designed into the space of future public libraries. I was recently visiting the MAKE magazine website when I saw a fascinating how-to video about building your own portable Raspberry Pi game system.

  • Funding

  • FSF/FSFE/GNU/SFLC

  • Project Releases

    • Suricata 1.4.3 released!

      Photo by Eric LeblondThe OISF development team is pleased to announce Suricata 1.4.3. This is a small but important update over the 1.4.2 release, fixing some important bugs.

    • Touch-aware Magnolia 5.0 released

      Version 5.0 of the open source Magnolia CMS has been released after a year and a half spent redeveloping the front end tools that deliver content to the CMS’s users. Talking with The H, Pascal Mangold, CEO of Magnolia, explained that Magnolia 4.5 had seen the redevelopment of the backend of Magnolia to create a foundation for the work that has been delivered in Magnolia 5.0. Magnolia is a Java CMS that is built around the concept of being an enterprise integration platform, connecting users with enterprise systems in an accessible way.

    • Google’s Dart hits beta

      Google has released the first beta version of its scripting language Dart, which it originally unveiled as its alternative to JavaScript in October 2011. Google’s new programming language essentially aims to replace JavaScript – unlike Microsoft’s TypeScript and CoffeeScript, two supersets that add important features to the older scripting language.

    • Build Tool Version 0.6.8 Released
  • Openness/Sharing

    • The most inspiring introduction to Open Science. Ever.

      The video never went viral, probably because it has an unexplained ‘interlude’ after 42 minutes 57 seconds which makes it seem to end at a random point. This bizarre showstopping moment didn’t deter your intrepid iij innovation hunters (it actually resumes after about a minute of serious onscreen weirdness) from recognizing a gem and it certainly shouldn’t stop you watching it

    • Open Access/Content

      • Funders have all the power in OA negotiations. So why aren’t they using it?

        A few days ago I explained why I don’t think “hybrid OA” is a legitimate path to the full-open-access world we all want. The TL;DR is first that it’s offered at stupidly high prices, and secondly that it’s completely impossible to detect or prevent double-dipping because journal subscriptions are the most opaquely priced good in the known universe.

        Then I found that Stuart Shieber had written much the same article but much better four years ago, from the perspective of explaining why the Harvard open-access fund does not cover hybrid fees.

  • Programming

    • 13 Linux Debuggers for C++ Reviewed

      Most time in debuggers is spent doing the same few things: setting breakpoints, stepping through code, looking at variables. Which products make those features supremely accessible and useful? We compare 13 debuggers and find out.

      Have you compared debuggers lately? Until recently, I’d been programming using only one debugger — the one supplied by my compiler vendor. Suddenly, with a new job programming on Linux, I find the range of choices in debuggers is dizzying. Wikipedia lists 18 GUI front ends for GDB alone. This article is the result of my effort to choose a debugger with a good GUI front end for my first UNIX/Linux job in several years.

    • Zend Framework 2.2.1 Released

      The Zend Framework community announced the immediate availability of Zend Framework 2.2.1!

      Packages and installation instructions are available at: http://framework.zend.com/downloads/latest

    • Google’s JavaScript challenger gains better tools, performance

      Like TypeScript, Dart is a language aimed at making it easier to develop large, complex web applications that are efficient, secure, and maintainable. It compiles into JavaScript, so it can run in any modern web browser, but its syntax is designed to ameliorate some of JavaScript’s more glaring flaws.

    • PHP 5.5.0 Released
    • PHP 5.5.0 adds optimizer and drops Windows XP support
  • Standards/Consortia

    • Google’s VP9 web video codec enters home straight

      As planned in May, Google has now finalised the bit stream for VP9, its open video compression format. Chromium has included a beta VP9 decoder for some time and this has now been activated by default according to an entry in the issue tracker reading “Remove VP9 flag, and enable VP9 by default”. VP9 can also be enabled in the developer version of Chromium and Chrome (“Enable VP9 playback in video elements”). Google is planning to incorporate the final version of VP9 into Chrome 29 and enable it by default by 20 August. It is nonetheless likely to be some time before VP9 achieves a critical mass on YouTube – to date VP9 is limited to a few demo videos.

Leftovers

  • Second Life turns 10: what it did wrong, and why it may have its own second life
  • Silvio Berlusconi sentenced to seven years in jail in bunga bunga sex trial
  • Science

    • Black hole mysteries

      Scientists are just getting to know the black holes that help anchor our cosmos

  • Health/Nutrition

    • EU Approves the Use of Laser “Tattoos” on Fruit as Replacement for Sticky Labels

      Sticky fruit labels may soon be things of the past thanks to a new EU ruling that allows grocers and retailers to make laser marks on the skin of citrus fruit, melons and pomegranates. Laser branding, previously banned because of the use of iron oxides and hydroxides, was approved after three years of liaising between the EU and Laser Food – the company behind the technology. The new law will come into effect on June 23rd.

      Read more: EU Approves the Use of Laser “Tattoos” on Fruit as Replacement for Sticky Labels | Inhabitat – Sustainable Design Innovation, Eco Architecture, Green Building

    • When Jeremy Hunt can become health secretary, it’s a sign Britain is sick

      How can one have faith in the democratic process and the ruling elite when such a man is passing judgment as health secretary?

  • Security

    • Kaspersky Secure OS vs China, Iran, North Korea Hackers?

      Kaspersky Lab is developing a cyber secure operating system to combat state-sponsored hackers in China, Iran, North Korea and more. But when will CEO Eugene Kaspersky offer updates?

    • DNS provider’s error caused LinkedIn “hack” and affected 5,000 more

      LinkedIn, the professional networking site which had been reported as hacked or hijacked yesterday, was in fact the victim of human error at the company’s DNS provider, Network Solutions, an error which appears to have affected up to 5,000 domains in all. Network Solutions has said in a blog posting that while trying to resolve a DDoS (Distributed Denial of Service) attack, it accidentally changed the DNS records of a “small number” of customers.

  • Defence/Police/Secrecy/Aggression

    • Report: Stronger Border Led to More Migrant Deaths

      Tucson, Arizona – As immigration reform debates run hot on Capitol Hill, many members of Congress say a more secure border has to be part of any bill they approve. One of those is Arizona Sen. John McCain, one of the “Gang of Eight” of bipartisan lawmakers pushing reform.

    • First State Department Benghazi photos released
    • Latest Brazil protests bring 250,000 on to streets

      More than 250,000 anti-government protesters have again taken to the streets in several Brazilian cities and engaged police in isolated intense conflicts. Demonstrators vowed to stay in the streets until concrete steps are taken to reform the political system.

      Across Brazil protesters gathered to denounce legislation known as PEC 37 that would limit the power of federal prosecutors to investigate crimes. Many fear the laws would hinder attempts to jail corrupt politicians.

    • Turkish police use water cannon to disperse remembrance gathering

      Turkish police used water cannon to disperse thousands who had gathered in Istanbul’s Taksim Square on Saturday to observe a memorial for four people killed during recent anti-government protests. The officers later fired teargas and rubber bullets to scatter demonstrators who regrouped in side streets.

      The police move came as Turkish Prime Minister Recep Tayyip Erdoğan declared that foreign-led conspirators he alleges are behind the anti-government movement in his country also are fomenting the recent unrest in Brazil.

    • Guevara’s ‘betrayer’ tells his story: ‘When I heard Che had died it was like a bullet had hit me’

      He was one of Guevara’s most trusted collaborators, yet he has been framed by some as the man who betrayed him. Now Ciro Bustos tells his story

    • Boy’s death highlights anger some Yemenis feel over U.S. drone strikes

      If an apparent U.S. drone strike this month in the village of Mahashama had killed only its intended targets – an al Qaida chief and some of his men – locals might’ve grumbled about a violation of Yemen’s national sovereignty and gone on with their lives.

      But the strike also killed a 10-year-old named Abdulaziz, the younger brother of the targeted militant, Saleh Hassan Huraydan, according to local tribal leaders and Yemenis with close ties to the al Qaida branch here. And that set off a firestorm of complaints that underscores how American airstrikes can so outrage a community that even though al Qaida loses some foot soldiers, it gains dozens of sympathizers.

    • Ex-CIA chief to Obama: Strike North Korea

      The Obama administration should “seriously consider” a surgical strike to prevent North Korea from developing long-range missiles capable of carrying a nuclear warhead, argued former CIA director James Woolsey.

      In a radio interview Sunday night, Woolsey warned the U.S. is currently wide open and virtually defenseless against a missile coming from a southerly direction, and that both Iran and North Korea made advances toward firing missiles in that direction.

    • Obama’s Secret CIA Hit Squad Detailed in “The Way of the Knife”

      The story behind the development and deployment of this presidential killing corps is told inThe Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth, the latest book by Pulitzer Prize-winning journalist Mark Mazzetti.

    • Jihawg Ammo: Pork-laced Bullets Designed To Send Muslims Straight ‘To Hell’
    • How Barrett Brown shone light on the murky world of security contractors

      Unlike Edward Snowden or Bradley Manning, Brown is not a celebrity. But after helping expose a dirty tricks plot, he faces jail

  • Environment/Energy/Wildlife

  • Finance

    • California sends a cease and desist order to the Bitcoin Foundation

      California’s Department of Financial Institutions has issued a cease and desist letter to the Bitcoin Foundation for “allegedly engaging in the business of money transmission without a license or proper authorization,” according to Forbes. The news comes after Bitcoin held its “Future of Payments” conference in San Jose last month. (The license information is available on CA.gov and Forbes placed the cease and desist letter on Scribd.)

      If found in violation, penalties range from $1,000 to $2,500 per violation per day plus criminal prosecution (which could lead to more fines and possibly imprisonment). Under federal law, it’s also a felony “to engage in the business of money transmission without the appropriate state license or failure to register with the US Treasury Department,” according to Forbes. Penalties under that law could be up to five years in prison and a $250,000 fine.

    • Starbucks pays corporation tax in UK for first time in five years

      Starbucks, one of the companies exhorted by the prime minister to “wake up and smell the coffee” over tax, has handed over £5m to HM Revenue and Customs – its first payment in five years.

      But the cash has only gone some way towards assuaging critics, one of whom complained that companies should not be able to “pick and choose” how much tax they wanted to pay.

      The coffee shop chain said on Sunday it had made the contribution to please its customers and would be paying a second £5m instalment in the last half of the year despite claiming the business overall continued to make a financial loss in Britain.

    • Why Spain And Italy Are Like Cyprus, Slovenia, And Greece

      The “XXXXX is not YYYYY” jokes aside, Europe’s union of nations is beginning to separate increasingly between the haves and the have-nots. The sad truth, as Bloomberg’s Niraj Shah notes, is that recession/depression has pushed Spanish and Italian GDP-per-capita below the EU average in purchasing power terms – just like Cyprus, Slovenia, and Greece. Irish GDP per capita was 29% above the average, while Greek and Portuguese per capita output were 25% below. Output per head for the EU ranged between 47% (Bulgaria) and 271% (Luxembourg) of the average. With today’s news that retroactive ESM recaps are unlikely, the banking-sovereign symbiosis of Spain and Italy will increasingly come under pressure and with productivity so dismal, there is little hope for now.

    • Southeast Asia: The Next Crisis?

      Southeast Asia, so long a byway of the world economy, has become a well-worn path for foreign investors seeking refuge from the continuing after-effects of the global financial crisis. They have come because the region has been surging ahead over the last few years, even as the West slumped, China readjusted and India stuttered.

      As confidence grew in Southeast Asia’s newfound ability to realize its potential, success followed success: Indonesia is on the cusp of becoming the region’s first trillion-dollar economy, and achieved an investment-grade credit rating for the first time in 14 years in late 2011, something the Philippines also attained for the first time ever earlier this year; manufacturing has been booming in Malaysia and Thailand; and the Philippines began to challenge India as the top destination for offshore services, while posting first-quarter GDP growth of 7.8%, Asia’s best performance.

    • Bitcoin Foundation Receives Cease And Desist Order From California

      Directly following last month’s Bitcoin 2013 conference event in San Jose, CA that brought decent revenue into the state, California’s Department of Financial Institutions decided to issue a cease and desist warning to conference organizer Bitcoin Foundation for allegedly engaging in the business of money transmission without a license or proper authorization.

      If found to be in violation of California Financial Code, penalties can be severe ranging from $1,000 to $2,500 per violation per day plus criminal prosecution which could result in fines and/or imprisonment. Additionally, it is a felony violation of federal law to engage in the business of money transmission without the appropriate state license or failure to register with the U.S. Treasury Department. Convictions under the federal statute are punishable by up to 5 years in prison and a $250,000 fine.

    • Bernanke’s stand-off with markets: who will blink first?

      US Federal Reserve Chairman Ben Bernanke is playing a potentially dangerous game of chicken with global financial markets sent reeling by his threat to scale back the central bank’s huge stimulus program.

    • China stocks tumble on credit tightening fears

      Chinese stock markets have fallen sharply as the country’s central bank indicated its credit tightening policy would continue.

      The Shanghai Composite SSE index fell 5.3% to 1,963.24 points, over 1,540 points below its 52-week high.

    • How Austerity Has Failed

      Austerity has failed. It turned a nascent recovery into stagnation. That imposes huge and unnecessary costs, not just in the short run, but also in the long term: the costs of investments unmade, of businesses not started, of skills atrophied, and of hopes destroyed.

    • U.S. Seemingly Unaware of Irony in Accusing Snowden of Spying

      At a press conference to discuss the accusations, an N.S.A. spokesman surprised observers by announcing the spying charges against Mr. Snowden with a totally straight face.

      “These charges send a clear message,” the spokesman said. “In the United States, you can’t spy on people.”

    • 6 Facts About Hunger That Demonstrate the Shameful Excesses of American Capitalism

      Of all the miseries placed on human beings in their everyday lives, the lack of food may be the most inexcusable. Even in a world controlled by unbending attitudes of self-reliance and individual responsibility, the reality of children and seniors and disabled citizens going hungry is a stain on humanity, a shameful testament to the capitalist goal of profit without conscience.

    • Teachers to close schools with strike against cuts

      The strike, which will be followed by regional strikes elsewhere in the UK next term leading to a one-day national stoppage before Christmas if the dispute is not solved, is over government curbs on teachers’ pay, cuts to their pension and changes to their working conditions.

  • PR/AstroTurf/Lobbying

    • Brazil Protests Peaceful, And Not About Bus Fares

      In preparation for FISL (where I hope to be speaking next week), I have been continuing to try to understand the protests in Brazil, which are now regularly bringing crowds the size of a European town onto the streets. They aren’t really about “bus fares” — and as far as I have been told are free of violence by the protesters apart from a statistically insignificant number of them. With so many people on the streets, there are bound to be a few disorderly encounters; to focus on them is try to distract from the real issues.

      The real issues every Brazilian friend I have spoken to cares about relate to a sequence of governments failing to address structural issues and widespread corruption, and even perhaps joining in. The protesters are people just like you and me, who just won’t take it any more and are peacefully but loudly saying so.

  • Privacy

    • Edward Snowden seeks asylum in Ecuador amid diplomatic storm

      The intelligence whistleblower Edward Snowden will on Monday attempt to complete an audacious escape to the relative safety of South America after his departure from Hong Kong escalated already fraught diplomatic relations between the United States and China.

    • NSA leaker Snowden arrives in Moscow en route to ‘third country’ with WikiLeaks help

      The plane carrying whistleblower Edward Snowden has landed at Moscow’s Sheremetyevo airport. The former CIA contractor, who left Hong Kong in a bid to elude US extradition on espionage charges, is on his way to a ‘third country’ via Russia.

    • RT interview re Snowden flying to Russia

      As the news broke that NSA whis­tleblower, Edward Snowden, had fled Hong Kong for Rus­sia today, I was invited on RT to do an inter­view. At that point few people had any idea of his plans. How­ever, it appears that the USA had charged Snowden under the Espi­on­age Act 1917 (no sur­prises) and then asked Hong Kong to arrest and hold him, pending extra­di­tion. Equally unsur­pris­ingly, Hong Kong found mis­takes in the paper­work and used the oppor­tun­ity to com­plain about US spy­ing activ­ity in its territory.

    • WikiLeaks Statement On Edward Snowden’s Exit From Hong Kong

      Mr Edward Snowden, the American whistleblower who exposed evidence of a global surveillance regime conducted by US and UK intelligence agencies, has left Hong Kong legally. He is bound for the Republic of Ecuador via a safe route for the purposes of asylum, and is being escorted by diplomats and legal advisors from WikiLeaks.

      [...]

      “The WikiLeaks legal team and I are interested in preserving Mr Snowden’s rights and protecting him as a person. What is being done to Mr Snowden and to Mr Julian Assange – for making or facilitating disclosures in the public interest – is an assault against the people”.

    • Edward Snowden asks for asylum in Ecuador: live updates

      The NSA whistleblower left Hong Kong on an Aeroflot flight to Moscow, two days after the US charged him with espionage, before applying for asylum in Ecuador

    • Now the Government Knows You’re a Dog

      “On the Internet, nobody knows you’re a dog.” That phrase is ingrained in web culture, stemming from a Peter Steiner comic that was published in a 1993 issue of The New Yorker.

    • Anger mounts after Facebook’s ‘shadow profiles’ leak in bug

      Facebook said Friday it fixed a bug that exposed contact info for over six million accounts. The admission revealed its ‘shadow profile’ data collection activities, and users are furious.

      [...]

      …users behind closed doors, without their consent.

      [...]

      One man commented this afternoon, “I just downloaded the “extended backup” and I’m still viewing emails and phone numbers that are NOT PUBLIC!!!!”

      [...]

      The yearlong gap of exposure as described by Reuters creates a scenario of horrifying possibilities for any woman who has begin to experience harassment, abuse or stalking by an ex within the past year. Or, anyone being maliciously stalked and harassed by a tech-savvy aggressor (or a stalker’s Facebook sock puppet) they may have accidentally friended over the past year.

    • Obama’s ‘Insider Threat’ Program a ‘Sweeping’ Crackdown on Leakers

      A program being implemented by the Obama administration titled “Insider Threat” requires millions of federal employees to keep a close watch on each other—a “sweeping” effort to crackdown on whistleblowers and leakers across the U.S. government, McClatchy reports Friday after obtaining a series of government documents.

    • We can use European law to challenge this spying

      If the law says you can do whatever you like, saying that everything you do is “in accordance with the law” doesn’t mean anything. If “supervision” over state spying is done in secret, by “trusted” cronies appointed by the executive itself, it offers no safeguards either. We need strict legal rules, transparency at least about the law and the basics of practice, and spies who are accountable to parliament and to the general public.

    • Bush’s Foiled NSA Blackmail Scheme

      In early 2003, as the U.S. and British governments were seeking international acquiescence to their aggressive war on Iraq, an unexpected cog throw into the propaganda machine was the disclosure that the National Security Agency was spying on UN Security Council members in search of blackmail material.

      The revelation received little attention in the mainstream U.S. news media, which was almost fully onboard the pro-war bandwagon, but the disclosure received wide international attention and stopped the blackmail scheme. U.S. President George W. Bush and British Prime Minister Tony Blair were forced to abandon a UN resolution and invade Iraq with a ragtag “coalition of the willing.”

    • EXCLUSIVE: Snowden reveals more US cyberspying details
    • Greenwald Tears Into Gregory: With Newsmen Like You, ‘Who Needs Government To Criminalize Reporting?’

      Guardian journalist Glenn Greenwald took Meet The Press host David Gregory head on in an interview Sunday morning, after Gregory asked if Greenwald would be criminally culpable for “aiding and abetting” NSA leaker Edward Snowden.

      “I think it’s pretty extraordinary that anybody who would call themselves a journalist would publicly muse about whether or not other journalists should be charged with felonies,” Greenwald said. “The assumptions in your question, David, is completely without evidence, the idea I’ve aided and abetted him in any way. The scandal that arose in Washington before our stories began was about the fact that the Obama administration is trying to criminalize investigative journalism by going through the e-mails and records of AP reporters, accusing a Fox News journalist of the theory you just embraced, being co-conspirator in felonies for working with sources.”

      “If you want to embrace that theory,” Greenwald continued, “it means that every investigative journalist in the United States who works with their sources, who receives classified information, is a criminal. It’s precisely those theories and precisely that climate that has become so menacing in the United States. It’s why the New Yorker’s Jane Mayer said investigative reporting has come to a standstill, as a result of the questions you just mentioned.”

    • Obama says FBI nominee Comey will balance privacy, security

      In nominating Jim Comey to be the next FBI director on Friday, President Barack Obama said the former Justice Department official will help strike a balance between the need for information on terrorist plots and respecting Americans’ privacy.

    • An Apology to my European IT Team

      As more information comes out on Prism, two criteria consistently show up that we would have consistently triggered oversight…

    • NSA director: Edward Snowden has caused irreversible damage to US

      Keith Alexander defends agency’s broad surveillance as being in line with Americans’ expectations for preventing another 9/11

    • Edward Snowden and the NSA files – timeline
    • Former Facebook security chief is now working for the NSA
    • Support NSA whistleblower Edward Snowden, says Julian Assange

      The WikiLeaks founder, Julian Assange, has called on the world to “step forward and stand with” Edward Snowden, after the NSA whistleblower was charged with espionage by US federal prosecutors.

      According to a statement on the WikiLeaks website, Assange said: “A few weeks ago, Edward Snowden blew the whistle on an ongoing program – involving the Obama administration, the intelligence community and the internet services giants – to spy on everyone in the world. As if by clockwork, he has been charged with espionage by the Obama administration.”

    • Venezuela or Ecuador: where next for NSA whistleblower Edward Snowden?
    • NSA leaks: US and Britain team up on mass surveillance

      Latest revelations from Edward Snowden show that the state risks crossing ever more ethical and legal boundaries

    • NSA Targeted Communications in China and Hong Kong – Snowden

      Earlier, he had said that the British agency, GCHQ, is worse than the NSA when it comes to cyber-snooping on worldwide communications.

    • NSA Now Revealing A Lot More About What It Does Than Snowden Leaks Did; So Is That Harming America?

      One of the key refrains that has come out from those who are unhappy about the revelation of details around the NSA’s surveillance efforts is that Edward Snowden’s leaks are somehow harmful to America. During hearings about all of this, NSA boss Keith Alexander claimed that “Americans will die” because of these sorts of leaks. But… between those same hearings and other revelations from the administration and Congress, we’re actually learning much more about the various programs directly from the government, as information is now being “declassified.” And, apparently, President Obama is asking the NSA and the Justice Department to look into declassifying even more. So while the initial shove to declassify information may have come via Snowden, the stuff that we’re really learning about is coming through revelations following Snowden’s leaks — revelations that never would have happened without his leaks.

    • Snowden’s plane leaves Moscow, NSA leaker not seen aboard

      Ex-CIA contractor, Edward Snowden, has not been seen aboard the plane to Havana on which he would reportedly be traveling, reports RT’s correspondent on the flight. The plane has already departed from Moscow’s Sheremetyevo airport.

    • Edward Snowden due to fly to Cuba in Ecuador asylum bid
    • LinkedIn DNS hijacked, traffic rerouted for an hour, and users’ cookies read in plain text

      According to Berg, that site does not require SSL (secure sockets layer), which means that anyone who visited in the last hour or so sent it their long-lived session cookies in plain text … a potential security risk.

    • To the Guardian – why PRISM? ECHELON has been around since 1948 supported by US, UK, Canada, Australia

      It is not at all clear to me why everyone is so excited about PRISM and the apparently new ability to monitor private communications that the Guardian got all excited about last week. It took me a day or two to remember the name, but I have this piece (below) from 2003 which documents ECHELON which has been around since 1948. PRISM reads like an extension/ subset/ addition to ECHELON.

    • NSA PRISM puts “public” cloud in a new light

      It’s all those other three-letter acronym (TLAs) organizations, such as the FBI, IRS, and SEC, which might have access to my data that I worry about.

    • Snowden receives refugee document of passage from Ecuador
    • Google must delete last of UK Street View data

      The payload data was collected by Google’s Street View cars when driving around the countryside; the software that was mapping out the location of Wi-Fi access points was also recording any data packets it could see which could include fragments of Wi-Fi users’ email, passwords or other personal data. The decision to enforce and prosecute over the payload data came as a result of investigations started when ICO reopened the case in April 2012 after concerns about the engineer’s actions working with the data. This then immediately raised questions about how the search company has handled the data.

    • Why A Special Congressional Committee Must Be Created To Investigate NSA’s Unconstitutional Domestic Spying

      In the past couple of weeks, the NSA has, unsurprisingly, responded with a series of secret briefings to Congress that have left the public in the dark and vulnerable to misstatements and word games. Congress has many options at its disposal, but for true accountability any response must start with a special investigative committee. A coalition of over 100 civil liberties groups agrees. Such a committee is the right way the American people can make informed decisions about the level of transparency and the reform needed.

    • EXCLUSIVE: Snowden sought Booz Allen job to gather evidence on NSA surveillance
    • Rep. Rogers: Snowden’s Secrets ‘Belong To The People Of The US’ & He’s A Traitor For Giving Them What They Own

      Over the past few years, we’ve found that Rep. Mike Rogers, the head of the House Intelligence Committee, has an incredible knack for spewing pure bullshit in defense of whatever he’s supporting, rarely even bothering to make sure his statements are internally consistent. Still, his statements on Meet the Press this weekend take that nonsense to a new high.

    • GCHQ Revelations Destroy Case for Snooper’s Charter

      So the revelations from Edward Snowden keep on coming, exposing ever-more profound attacks on privacy and democracy in the UK and elsewhere. News that GCHQ is essentially downloading, storing and searching through the entire flow of Internet traffic that comes into and goes out of the UK without any specific warrant to do so is one side of that. That seems to be taking place through an extremely generous interpretation of the out-of-date RIPA law that is supposed to bring some level of accountability to just this sort of thing. The fact that it doesn’t shows that we must reform RIPA and make it fit for the Internet age.

  • Civil Rights

    • Civil liberties: Guarding the guards
    • to understand terrorism and threat assessment, look to Aum

      Just as important was what the Japanese government and people did not do. They didn’t panic. They didn’t make sweeping changes to their way of life. They didn’t implement a vast system of domestic surveillance. They didn’t suspend basic civil rights. They didn’t begin to capture, torture, and kill without due process. They didn’t, in other words, allow themselves to be terrorized. Instead, they addressed the threat. They investigated and arrested the cult’s leadership. They tried them in civilian courts and earned convictions through due process. They buried their dead. They mourned. And they moved on. In every sense, it was a rational, adult, mature response to a terrible terrorist act, one that remained largely in keeping with liberal democratic ideals.

    • Stephen Lawrence family and friends targeted by police ‘smear’ campaign

      Exclusive: former undercover officer Peter Francis says superiors wanted him to find ‘dirt’ shortly after 1993 murder

    • Journalist Hastings Sent Out Mysterious Email Hours Before Death
    • Meet The Man In Charge Of America’s Secret Cyber Army (In Which “Bonesaw” Makes A Mockery Of PRISM)

      With his revelations exposing the extent of potential, and actual, pervasive NSA surveillance over the American population, Edward Snowden has done a great service for the public by finally forcing it to answer the question: is having Big Brother peek at every private communication and electronic information, a fair exchange for the alleged benefit of the state’s security. Alas, without further action form a population that appears largely numb and apathetic to disclosures that until recently would have sparked mass protests and toppled presidents, the best we can hope for within a political regime that has hijacked the democratic process, is some intense introspection as to what the concept of “America” truly means.

      However, and more importantly, what Snowden’s revelations have confirmed, is that behind the scenes, America is now actively engaged in a new kind of war: an unprecedented cyber war, where collecting, deciphering, intercepting, and abusing information is the only thing that matters and leads to unprecedented power, and where enemies both foreign and domestic may be targeted without due process based on a lowly analyst’s “whim.”

      It has also put spotlight on the man, who until recently deep in the shadows, has been responsible for building America’s secret, absolutely massive cyber army, and which according to a just released Wired profile is “capable of launching devastating cyberattacks. Now it’s ready to unleash hell.”

    • Obama’s crackdown views leaks as aiding enemies of U.S.

      Even before a former U.S. intelligence contractor exposed the secret collection of Americans’ phone records, the Obama administration was pressing a government-wide crackdown on security threats that requires federal employees to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report their suspicions.

      President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping in its reach. It has received scant public attention even though it extends beyond the U.S. national security bureaucracies to most federal departments and agencies nationwide, including the Peace Corps, the Social Security Administration and the Education and Agriculture departments. It emphasizes leaks of classified material, but catchall definitions of “insider threat” give agencies latitude to pursue and penalize a range of other conduct.

    • Time to repeal the Patriot Act, NDAA and abolish DHS

      Many Americans have known for a long time that the IRS is a rogue agency that will readily break the law to accomplish its “mission.”

      A friend of ours tells the story: He got a call from the local police department in the pre-dawn hours of a dark night. The dispatcher told him he needed to go immediately to his business, a heating and air conditioning business. When he arrived he learned that his business had been burglarized. The investigating police wanted him to determine what had been taken. After a couple of hours of searching he could find nothing noticeable missing. Even some cash had been left behind. “Well, you need to get ready for an IRS audit,” the policeman said. Sure enough, a few days later when he arrived at work he found a chain and padlock on his door and a notice from the IRS to contact them.

      In case you’re interested, the audit revealed that he was due a refund. Nobody paid any attention, even the Congressman whom the business man contacted.The result of what happens when government operates in secret—whether it be the Beaufort County Sheriff’s Department and the Washington Police Department or the FBI/CIA, can be seen in the FISA Court. That’s the apparatus set up by the Patriot Act to review government eavesdropping. We now learn that the “Foreign Intelligence Surveillance Act” Court approved 99.97% of the government’s request to snoop, and that many of them were aimed at Americans, within America, not foreigners outside the USA.

    • Who’d try to smear Stephen Lawrence’s family? A Met that’s out of control

      The Met is out of control. The revelation that it sought to smear the Lawrence family in the hunt for Stephen Lawrence’s killers – perhaps to stifle racist aspersions on its detectives – beggars belief. Less surprising is that the operation was unknown to the then police chief, Sir Paul Condon, to the home secretary and to the Macpherson inquiry. It is merely further evidence of the Met’s gift for malpractice and skulduggery.

    • Global protest grows as citizens lose faith in politics and the state

      The myriad protests from Istanbul to São Paulo have one thing in common – growing dissent among the young, educated and better-off protesting against the very system that once enriched them. And therein lies the danger for governments

  • Intellectual Monopolies

06.23.13

Links 23/6/2013: Russian-Based OpenMandriva Goes Alpha, Snowden in Russia

Posted in News Roundup at 11:25 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • New and amazing features of Linux

    The Linux operating system has been around since the beginning of the first computers and the first operating systems. Since its first formation in the form of a small operating system running on the command line interface it has been constantly evolving into a much more powerful and robust operating system capable of sustaining heavy workload and performing multiple tasks at once.

  • Uruguay Fights For GNU/Linux

    Uruguay is a small country, only 3 million people. That explains the fluctuations on the graph but the trend and substance is clear. According to Statcounter Uruguayans are using GNU/Linux regularly and in great numbers. That almost certainly means government, business and consumers have ready access.

  • Linux on Film: Dredd (2012)

    One of the elements that made the original RoboCop (1987) so good was seeing Alex Murphy deal out some major butt-kicking in spite of the losing battle he was facing against the city, politicians and his makers. And Dredd (2012) serves this very experience ala carte. I don’t think the reboot of Robocop can come close to the sheer audacity of Dredd. Dredd is a straightforward no-nonsense cop-thriller set in the future. Judge Dredd is presented as he should be – a dedicated, incorruptible cop with a powerful firearm.

  • When it comes to a new networking OS, Linux is the Linux of networking

    How is networking like farming? JR Rivers, the co-founder and CEO of Cumulus Networks, which launched earlier today, tried to use our evolution from a hunter-gatherer society to today’s food acquisition environment to explain how technological advances that speed up distribution and make distribution or product manufacturing cheaper change societies.

  • Why Every GNU/Linux User Should Support Tesla Motors
  • Desktop

    • Could Google Deliver a Chrome OS-based Tiny Stick PC?

      While the Raspberry Pi has grabbed many headlines as a tiny, ultra-inexpensive, pocketable computer that runs various open source operating systems, it’s actually only one of many tiny LInux computers being touted as part of a new “Linux punk ethic.” As we’ve noted, there are various pocket-size Android devices selling online for under $100 (see the photo).

  • Audiocasts/Shows

  • Kernel Space

    • Hardware, Past, Present, and Future.

      Here’s some thoughts about some hardware I was going to use, hardware I use daily, and hardware I’ll probably use someday in the future.

    • The People Who Support Linux: 19-Year-Old Aims to be a Kernel Developer
    • Linux Foundation sees broadening role for developers

      Linux developers were once just that, developers. But their role is changing says the Linux Foundation, which is expanding its training options to help them.

      The foundation, an industry supported non-profit, has added two courses to its program, OpenStack Cloud Architecture and Deployment and Linux Enterprise Automation.

    • Linux-3.9.7

      I don’t need to have the latest and greatest from the bleeding edge of FLOSS but I do like the polish being put on the Linux kernel…

    • Graphics Stack

      • NVIDIA Driver Soon Likely To Support EGL, Mir

        With NVIDIA entering the GPU IP licensing business, the need to support EGL by their binary display driver — and with that the Ubuntu Mir display server and Wayland — has become more pressing.

        While there hasn’t been any official communication out of NVIDIA yet, it’s likely that their binary display driver will soon be bearing EGL support to complement their GLX windowing system support. The EGL interface is for sitting between OpenGL and the windowing system. EGL is used by Google’s Android operating system for mobile devices. Beyond that, both the Mir Display Server and Wayland/Weston are using EGL rather than the GLX windowing system API.

      • Oracle To Work On Mesa Driver For VirtualBox
    • Benchmarks

      • Ubuntu 13.10 Performance On Intel Core i7 “Haswell”

        The many Intel Haswell Linux benchmarks delivered on Phoronix this month have been from updated Ubuntu 13.04 configurations. However, if you’re curious about what the performance is like when upgrading to an Ubuntu 13.10 “Saucy Salamander” daily development snapshot, here are some benchmarks.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Getting started on KDEPIM

        Or so they say. We developers are used to high-resolution screens but many users use netbooks with 1024×600 screens (the horror!). Unfortunately, KMail configuration dialog did not fit in such a small rectangle, so I massaged the various configuration pages to reduce the minimum necessary size for the dialog. The minimum size for the dialog is now 780×567 pixels on my machine (you may get different results depending on widget style and fonts).

    • GNOME Desktop/GTK

      • Gnome Shell 3.9.3 Release

        We are less than 100 days away from the official GS 3.10 release and another little step towards another amazing major release has been made yesterday with the release of 3.9.3. This new version brings some tweaks and fixes, while also porting to new technologies like the bluez 5.

      • Every Detail Matters is Open for Business

        Everyone’s favourite UX polish extravaganza is back for another round. For the next months we will be targeting a host of bugs that will add polish and finesse to the GNOME 3 user experience.

        This is the third time that I’ve run Every Detail Matters. Over the last two rounds, the initiative has gone from strength to strength. A total of 82 bugs have been fixed so far, and the GNOME 3 user experience has been massively improved as a result of everyone’s contributions.

  • Distributions

    • Fedora vs OpenSuse vs Gentoo vs Ubuntu vs OSX vs Windows

      Lets start with the honest truth right out of the blocks, there isn’t a best OS, there isn’t a worst OS, there is only preference and the right tool for the job you want it to do.

      [...]

      We are bound by our choices, find it hard to change them unless we have a reason to, but can do if the pain level is righ. There is no such thing as the perfect OS, only the right tool for us and the job we want them to perform. We find excuses, reasons to justify out choices however most to the time they are just that, sometimes they are based on experience, most of the time on FUD. Forcing an OS on someone is never going to work, and suggesting one might seem like a great idea, but usually ends in disaster.

    • Pisi Linux Beta: A Real-life Test

      I waited eagerly for the beta release of Pisi Linux. As soon as it was out, I downloaded it and installed it into a partition my ZaReason’s Alto 4330 had.

      The installation took about 25 minutes. Once it was over, I noticed a few bugs. For example, Pisi’s Grub 2 installed into the MBR, not into the partition I chose. Well, that’s not a show stopper to me. Besides, Pisi’s Grub is very well designed. Anyway, I booted my brand new Linux kitten to see what it looked like and what it was capable of.

      Those who used old-school Pardus will feel familiar with Pisi. Kaptan greets you and lets you choose your first-time settings. Yes, it was great to see Kaptan again!

    • AntiX 13.1 Will Resurrect Your Old Computer

      AntiX, a fast, lightweight and easy-to-install Linux Live CD distribution based on Debian Testing and MEPIS, for Intel-AMD x86 compatible systems, is now at version 13.1.

    • New Releases

    • Screenshots

    • PCLinuxOS/Mageia/Mandrake/Mandriva Family

    • Gentoo Family

    • Red Hat Family

      • Red Hat CEO: Expect Better Economy in 2013

        Red Hat (RHT), the largest provider of open-source software, noted that the IT spending environment isn’t as strong as everyone would like it to be. However, it’s not getting worse, either.

        In an interview with TheStreet, CEO Jim Whitehurst noted that it’s a “tough IT environment” right now, but nothing has fundamentally changed for Red Hat. “It’s a little bit of a slower IT environment right now, and projects are a little slower. Nothing has fundamentally changed about the business, though.”

      • Red Hat OpenStack: No Revenues This Year, But…

        Red Hat OpenStack will generate zero revenues, billings and bookings this year. Does that make the open source cloud platform a failure? Absolutely not. Here’s why Red Hat (RHT) partners need to pay attention.

      • Fedora

        • A Week With Fedora: End Of The Line

          So I’ve been working with Fedora for over a week now, and I have to say that it’s been fun. I haven’t hit any major issues that are deal breakers for me. I’ve fully personalised Fedora’s Gnome Shell desktop environment, and I’m really happy. However, I think it’s time to go back to Ubuntu,and here’s why…

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu community donation plans detailed

            Ubuntu Community Council member Elizabeth Krumbach and Community Manager Jono Bacon have detailed Canonical’s plans to distribute community-oriented donations from the donations page on the Ubuntu web site. After Canonical implemented a page asking for donations from users who download the Linux distribution, the company faced criticism for not making it sufficiently clear exactly how the money collected under the “community participation”, “better coordination with Debian and upstreams” and “better support for flavours” sliders would be used. Bacon promised to deliver a plan to make the process more transparent and accountability more clear and this plan has now been delivered and has been approved by the Community Council.

          • Ubuntu 13.04 Raring Ringtail review – best Linux OS shows why Unity interface was made

            With the Unity design aesthetic allied to a speedy and robust engine, Ubuntu 13.04 Raring Ringtail may just be the one Linux OS to rule them all. Read our Ubuntu 13.04 Raring Ringtail review to find out why.

          • Canonical denies move towards open core

            Canonical, the company behind the Ubuntu GNU/Linux distribution, has reiterated its decision not to create a firm based on open core products.

          • First steps with a brand new Ubuntu virtual machine
          • Mir’s GPLv3 License Is Now Raising Concerns

            Taking a break from blogging about UEFI and Secure Boot, Linux kernel developer Matthew Garrett is now writing about how Canonical’s choice of license for their Mir Display Server is a bit scary. It’s not the GPLv3 license alone that’s raising eyebrows, but the GPLv3 combined with the Ubuntu Contributor’s License Agreement that is unfortunate in the mobile space.

            Basically, Matthew explains how Canonical is trying to push Ubuntu (in the form of Ubuntu Phone/Touch) into markets generally hostile towards the GPLv3 licensem since the license requires users be able to replace the GPLv3 code. Android and other open-source mobile platforms tend to be under a more liberal license that keeps open-source enthusiasts happy along with mobile phone vendors.

  • Devices/Embedded

    • Tiny ARM CPU module targets embedded Linux apps

      DAVE announced an SODIMM-style computer-on-module based on a Texas Instruments Sitara AM335x ARM Cortex-A8 system-on-chip, complete with dual CAN interfaces, Linux support, and two evaluation baseboard options. The Diva computer module is also available from U.S.-based Smart Embedded Systems, with turnkey support including Linux drivers and firmware for the processor’s programmable real-time unit (PRU).

    • Phones

      • Android

        • Android smartwatch is loaded with wireless

          A Chinese startup called “Geak” (seriousy!) has developed an Android 4.1 smartwatch with built in WiFi, Bluetooth 4.0, NFC, and GPS wireless communications. The China-targeted Geak Watch runs on a 1GHz MIPS architecture SoC equipped with 512MB RAM and 4GB flash, and features a 1.55-inch 240 x 240-pixel touchscreen and IPX3 water resistance.

        • Boxfish Hatches a Hot Idea for Searchable TV

Free Software/Open Source

  • Download Hosts Withdrawing

    With news this week that GitHub is banning storage of any file over 100Mb and discouraging files larger than 50Mb, their retreat from offering download services is complete. It’s not a surprising trend; dealing with downloads is unrewarding and costly. Not only is there a big risk of bad actors using download services to conceal malware downloads for their badware activities, but additionally anyone offering downloads is duty-bound to police them at the behest of the music and movie industries or be treated as a target of their paranoid attacks. Policing for both of these — for malware and for DMCA violations — is a costly exercise.

  • What it Takes to be an Open Source Expert

    OSFY speaks to industry leaders to bring you their thoughts on this hot topic…

  • Is that really the source code for this software?

    I’ve been looking into how easy it is to confirm that a binary package corresponds to a source package. It turns out that it is not easy at all. So I’ve written down my findings in this blog entry.
    I think that the topic of reproducible builds is one that is of fundamental importance to the free software and larger community; the trustworthiness of binaries based on source code is a topic quite neglected. We know about tivoization and the reality that code can be open yet unchangeable. What is not appreciated in sufficient measure is that parties can, quite unchecked, distribute binaries that do not correspond to the alleged source code.

  • State of OpenIndiana

    When Oracle announced it was discontinuing the development of OpenSolaris, there was shock among the free Unix community. OpenSolaris was popular and had a very loyal user-base and good support from developers, internal and community. A fork of OpenSolaris was quickly announced. A fork of the kernel would become what is known as Illumos. And the operating system would become OpenIndiana, which would use the Illumos kernel.

  • GlobalSign Pushes SSL for Open Source
  • Open-Source Off-Road Simulator Called Rigs of Rods Shows the Power of Free Software

    Scroll down and watch the selection of videos…

  • Cyber experts suggest using open source software to protect privacy

    One enterprising netizen has compiled a list of services, from social networks to email clients, and even web browsers, that offer better protection from surveillance. They are listed on a web page called prism-break.org.

    When asked about steps that a digital native can take to protect his privacy and online data, Sunil Abraham, executive director of Bangalore-based non-profit Center for Internet and Society said, “Stop using proprietary software, shift to free/open source software for your operating system and applications on your computer and phone. Android is not sufficiently free; shift to CyanogenMod. Encrypt all sensitive Internet traffic and email using software like TOR and GNU Privacy Guard. Use community based infrastructure such as Open Street Maps and Wikipedia. Opt for alternatives to mainstream services. For example, replace Google Search with DuckDuckGo.”

  • This week in open source news: 3D-printed hands, smart light bulbs, and more
  • 13 Things People Hate about Your Open Source Docs

    Most open source developers like to think about the quality of the software they build, but the quality of the documentation is often forgotten. Nobody talks about how great a project’s docs are, and yet documentation has a direct impact on your project’s success. Without good documentation, people either do not use your project, or they do not enjoy using it. Happy users are the ones who spread the news about your project – which they do only after they understand how it works, which they learn from the software’s documentation.

  • Small Brick Open Source PLC

    The OSPLC SMALL BRICK is an open-source PLC (programmable logic controller) that can be programmed using open source C language programming tools.

    The PLC is a general-purpose controller with a wide variety of applications. It is useful to the engineer, technician, student and hobbyist.

    All the source files for the small brick OSPLC are provided, including schematic diagrams so that you can build this project yourself or modify it.

  • Web Browsers

    • Mozilla

      • Firefox Web browser to move ahead plan to block tracking

        The maker of the popular Firefox browser is moving ahead with plans to block the most common forms of Internet tracking, allowing hundreds of millions of users to eventually limit who watches their movements across the Web, company officials said Wednesday.

        Firefox’s developers made the decision despite intense resistance from advertising groups, which have argued that tracking is essential to delivering well-targeted, lucrative ads that pay for many popular Internet services.

      • Mozilla again postpones Firefox third-party cookie-blocking, this time for months

        Decision to use blocking blacklists and whitelists means another delay in adding auto-blocking to browser

      • Mozilla Joins Forces with Stanford Group on Privacy Scheme

        If you’re like nearly everybody else, you get annoyed by how advertising cookies in your browser seem to know what your interests are and serve up creepy ads that hit a little too close to home. With that problem in mind, Mozilla has been steadily working toward standardizing Do Not Track features in the Firefix browser. The idea is not welcome to everyone, though. The Internet Advertising Bureau (IAB) has accused Mozilla of “undermining American small business” with the move.

  • SaaS/Big Data

    • Netflix open sources its Hadoop manager for AWS

      Netflix runs a lot of Hadoop jobs on the Amazon Web Services cloud computing platform, and on Friday the video-streaming leader open sourced its software to make running those jobs as easy as possible. Called Genie, it’s a RESTful API that makes it easy for developers to launch new MapReduce, Hive and Pig jobs and to monitor longer-running jobs on transient cloud resources.

    • What is OpenStack and what is its role in open source cloud computing?

      In an effort to commoditize the world of open source cloud computing, Red Hat is throwing their weight behind OpenStack in the same way they threw their weight behind Linux over a dozen years ago.

    • City of Chicago Joins Open Cloud Consortium

      Who says you have to be a vendor or a channel partner to get involved in industry associations driving the adoption of cloud computing? If there’s an unwritten rule somewhere, nobody bothered to tell the City of Chicago, which announced this week it had joined the Open Cloud Consortium (OCC).

      The OCC is a not-for-profit organization that manages and operates cloud computing infrastructure to support Big Data for scientific, medical, healthcare and environmental research. That’s quite the huge mandate, and the organization’s membership is made up of a variety of corporations (most in the technology sector in some way), universities, U.S. national laboratories and federal agencies, as well as international partners.

    • Fidelity Likes OpenStack, Despite High-Profile Departures

      In a major missive from Dell Computer recently, the company announced that its public cloud ecosystem and strategy will be centered on partners Joyent, ScaleMatrix and ZeroLag, and will emphasize recent acquisition Enstratius. That represented a very major reversal of its plans to deliver public cloud services based on the open source OpenStack cloud platform. Right on the heels of that news, IBM–which has been firmly in the OpenStack camp–announced that it is spending billions to buy SoftLayer for its cloud computing infrastructure tools and services.These were high level departures from the OpenStack camp, although IBM is still pursuing OpenStack cloud plans by pass-through, since SoftLayer delivers OpenStack services.

  • Databases

    • Comic Relief uses open cloud big data on MongoDB

      Comic Relief has confirmed its use of 10gen’s open source non-relational NoSQL database, MongoDB, to create a computing for this year’s event which raised £75 million.

      The charity enlisted cloud services firm Armakuni to build the platform so that it could handle 10,000 concurrent call centre operators and a peak of 500 donations per second.

  • Oracle/Java/LibreOffice

  • CMS

  • Business

  • BSD

  • FSF/FSFE/GNU/SFLC

    • Free Software alternatives to help you outwit PRISM

      Just because your activities are being monitored by the powers that be does not mean that you should throw up your arms in the air and give up. Yes, complete privacy is almost impossible to achieve in the age of bits and bytes, but there are things you can do to minimize how much of your privacy you give up.

      Mostly, it comes down to the tools you employ to navigate this interconnected universe of ours. The most popular tools are owned by major technology companies, the same outfits that give government agencies free, warrantless access to your data.

    • GNU Parallel 20130622 (‘Snowden’) released

      GNU Parallel 20130622 (‘Snowden’) has been released. It is available for download at: http://ftp.gnu.org/gnu/parallel/

  • Openness/Sharing

    • Open-Source Solution for Temperature Monitoring

      Here’s a nice example of the DIY spirit at work. A former Portland, OR, restaurant owner was looking for a way to better monitor food storage temperatures (which had to be regularly checked and written in a notebook). There didn’t seem to be a good automated system available, so he built his own, using open-source hardware to develop a unit that can monitor temperature, humidity and barometric pressure of a given location, then transmit the data via the Internet and a Wi-Fi network.

    • Open Hardware

      • Open Source Robots Are on the Move This Month

        Open source robots are back in the news. In late May, we reported on the Arduino Robot (shown) — which puts much of the intelligence in the open hardware Arduino kit on wheels and includes an interface for creating custom robots. The Arduino Robot’s Motor Board controls motors, and the Control Board reads sensors and helps to operate. Each of the boards is a full Arduino board using the Arduino IDE. Now, there are robots arriving based on the open platform that you can control with swipes from your smartphone.

  • Programming

    • System Manageability

      The greatest need for improving the manageability of Linux systems is to provide a standard programming interface – an API – for system management functions.

      The API should be a low-level interface that provides the needed control over managed systems. It should also support a higher level abstraction, making it easy for system administrators to use it for routine tasks.

    • Open Source PHP 5.5 Released with Opscode Caching

      One of the biggest open source PHP releases in years is now out and you can count me among those that are excited and eager to deploy and use it.

    • Open Source Foundations in a Post-GitHub World
  • Standards/Consortia

    • Xiph unveils “next-next-generation” video codec

      The Xiph.Org Foundation has taken the wraps off Daala, a “next-next-generation” video codec that has been under development for some time; this was until recently overshadowed by development work on the Opus audio codec at Xiph. However, the developers at the foundation think that the right time has come to open up development of the codec to a wider audience, even though they still classify the software as “pre-pre-alpha”. According to Xiph, a prototype of the codec successfully encoded and decoded a video stream over the internet at the end of May.

Leftovers

  • English is no longer the language of the web
  • Colombia to Seal Agreement with NATO in Brussels

    Defense Minister Juan Carlos Pinzón will travel Sunday to Belgium where he is scheduled to sign Tuesday its first cooperation agreement with the North Atlantic Treaty Organization.

    According to El Tiempo newspaper, the two-page document will be signed by Pinzon and NATO Secretary General Anders Fogh Rasmussen, and will be broadened with a second chapter in the next two months.

  • No Traction For Windows On Arm
  • Windows RT facing pressure from being isolated

    Microsoft’s Windows RT operating system may fall to the same fate as Hewlett-Packard’s (HP) webOS as most brand vendors have already stopped developing related products, leaving Microsoft’s second-generation Surface RT, the only Windows RT-based device in the next-generation tablet competition, according to sources from the upstream supply chain.

  • Science

    • 3-D printed trachea splint saves baby’s life

      A Michigan baby’s life was saved by the insertion of a 3-D printed trachea at two months old.

    • How 3D printing will rebuild reality

      When Star Trek debuted in the mid-60s, everybody geeked out about the food synthesizers. Even my mom, a reluctant but compulsory Trek viewer, recognized the utility of this amazing gadget, particularly with two ravenous boys around the house. My brother and I knew, of course, that the real magic food box was the refrigerator.

    • Bacterial DNA in Human Genomes

      A team of scientists from the University of Maryland School of Medicine has found the strongest evidence yet that bacteria occasionally transfer their genes into human genomes, finding bacterial DNA sequences in about a third of healthy human genomes and in a far greater percentage of cancer cells. The results, published today (20 June) in PLOS Computational Biology, suggest that gene transfer from bacteria to humans is not only possible, but also somehow linked to over-proliferation: either cancer cells are prone to these intrusions or the incoming bacterial genes help to kick-start the transformation from healthy cells into cancerous ones.

  • Health/Nutrition

    • The Frankenfood Conspiracy: Secret summit where slick lobbyists for bio-tech giants seduced Tory Ministers into changing their tune on GM food

      Even by the standards of an industry that claims to be able to end hunger, prevent environmental catastrophe and bring prosperity to the developing world, it must have felt like a breathtakingly audacious move.

      Last summer, the world’s biggest biotech corporations decided the time was right to convince the Government to allow so-called Frankenstein food to be grown in its fields.

    • Breastfeeding figures fall as NHS budget is cut

      The number of new mothers attempting to breastfeed has fallen in England for the first time in almost a decade.

      New figures suggest that 5,700 fewer women initiated breastfeeding with their child in 2012-13 than the year before. It is the first recorded fall since the Department of Health began collecting and releasing the statistics in 2004.

    • U.S. Approves a Label for Meat From Animals Fed a Diet Free of Gene-Modified Products

      The Agriculture Department has approved a label for meat and liquid egg products that includes a claim about the absence of genetically engineered products.

      It is the first time that the department, which regulates meat and poultry processing, has approved a non-G.M.O. label claim, which attests that meat certified by the Non-GMO Project came from animals that never ate feed containing genetically engineered ingredients like corn, soy and alfalfa.

    • The upcoming EU-US and EU-Canada trade deals have serious implications for the NHS

      After the government pushed through its widely opposed privatisation regulations it is time now to focus on the big trade deals and look to the G8 meeting in June. There is a reason the public are being told nothing about them – because they won’t like what they hear.

  • Defence/Police/Secrecy/Aggression

    • LA Times Reports Hastings Was Going Into Hiding Before His Death
    • Authorities, Media Dismiss Michael Hastings Assassination Claims

      Authorities and media outlets have predictably moved to dismiss claims that Rolling Stone journalist Michael Hastings – who complained of being under investigation by the FBI before his death in a fiery car crash on Tuesday – was murdered as a result of foul play, despite the vehicle’s engine being found 100 feet away from the scene of the blaze.

      [...]

      Following his role in bringing down Gen. Stanley A. McChrystal, Hastings was told by a McChrystal staffer, “We’ll hunt you down and kill you if we don’t like what you write.” The Rolling Stone journalist also “had the Central Intelligence Agency in his sights” and was set to release an article exposing the agency, according to L.A. Weekly.

      Despite the fact that investigating whether or not a journalist who had made a number of enemies at the very top of the power structure could have been the target of an assassination is a perfectly legitimate question, news outlets have characterized such inquiry as being insensitive and crass.

    • The U.S. Policy Coup Explained by 4-Star General Wesley Clark

      General Wesley Clark, on the talk circuit in 2007, explained how the U.S. military planned to destroy the governments of seven countries in five years and enumerates them in this YouTube video.

    • Native Americans prepare to defend homelands, walk across America

      Native Americans focused on defending their homelands and upholding the Rights of Nature during June, as they prepared for non-violent resistance to the threats of the tarsands pipeline, uranium mining and coal-fired power plants.

    • Ruins of Maya City Discovered in Remote Jungle
    • From Afghanistan, Thank You Bradley Manning!

      Recognition that 95 million human beings were killed in World War I and II has helped the people of the world understand that the method of war is not cost-effective. An awakened world hoped the United Nations could, as determined in the UN Charter, eventually ‘save succeeding generations from the scourge of war’.

      The scourge of war in Afghanistan continues, with the United Nations reporting that more than 3,000 Afghan civilians have been killed and wounded in the first five months of this year, a fifth of whom were Afghan children. So, ordinary people should seize opportunities to tell the truth about war.

  • Cablegate

  • Environment/Energy/Wildlife

    • Worst Hanford tank may be leaking into soil

      The first ever double-shell tank to have leaked at Hanford may be in far worse condition than anyone imagined. Hanford workers conducting routine maintenance on the tank, known as AY-102, Thursday were shocked to find readings of radioactivity from material outside the tank. Until now leaked nuclear sludge had only been detected in what’s known as the tank’s annulus — the hollow safety space between the tank’s two walls.

    • Goodbye, Miami

      By century’s end, rising sea levels will turn the nation’s urban fantasyland into an American Atlantis. But long before the city is completely underwater, chaos will begin

  • Finance

    • The Last Mystery of the Financial Crisis

      It’s long been suspected that ratings agencies like Moody’s and Standard & Poor’s helped trigger the meltdown. A new trove of embarrassing documents shows how they did it

    • Bank of Spain calls for elimination of the minimum wage

      The Bank of Spain has called for the elimination of the minimum wage, more flexibility in the labour market and other attacks on the working class.

      Its annual report states, “The seriousness of the labour market advises maintaining and intensifying reform momentum through the adoption of additional measures to promote job creation in the short term and facilitate wage flexibility.”

  • PR/AstroTurf/Lobbying

    • The BBC Business Unit and the public interest

      The BBC’s reporting of issues from NHS reform, welfare reform and the looming EU US trade deal can be better understood by looking at the BBC’s Business Unit. A narrow and questionable ‘business perspective’ drives more coverage than viewers may think.

  • Privacy

    • When in doubt, NSA searches information on Americans

      According to newly revealed secret documents, the NSA retains wide discretion over targeting individuals for surveillance – including, potentially, Americans. Civil libertarians say ‘it confirms our worst fears.’

    • Arrest of N.S.A. Leaker Seen as Easier Than Transfer to U.S.

      The request from the United States that Hong Kong detain Edward J. Snowden, who has been accused of stealing government secrets, before it seeks his return to America is likely to set off a tangled and protracted fight, with Mr. Snowden and his legal advisers having multiple tools to delay or thwart his being surrendered to American officials.

    • The other hacking scandal: Suppressed report reveals that law firms, telecoms giants and insurance companies routinely hire criminals to steal rivals’ information

      Some of Britain’s most respected industries routinely employ criminals to hack, blag and steal personal information on business rivals and members of the public, according to a secret report leaked to The Independent.

      The Serious Organised Crime Agency (Soca) knew six years ago that law firms, telecoms giants and insurance were hiring private investigators to break the law and further their commercial interests, the report reveals, yet the agency did next to nothing to disrupt the unlawful trade.

      [...]

      Victims of computer hacking identified by Soca – who suffered eBlaster Trojan attacks which allowed private investigators to monitor their computer usage remotely – include the former British Army intelligence officer Ian Hurst. He was hacked by private investigators working for News of the World journalists who wanted to locate Freddie Scappaticci, a member of the IRA who worked as a double-agent codenamed “Stakeknife”.

    • Sheeple Waking Up To NSA Spying: Privacy Search Engines Booming

      StartPage and Ixquick, two strongly privacy oriented search engines owned by the same company, announced recently that they surpassed three million daily searches for the first time.

      According to information Startpage provided to Infowars, traffic to the Search Engine has grown from 2.8 million daily searches to now approaching 4 million.

    • Does NSA Surveillance Remind You of Anything?
    • GCHQ monitoring described as a ‘catastrophe’ by German politicians

      Britain’s European partners have described reports of Britain’s surveillance of international electronic communications as a catastrophe and will seek urgent clarification from London.

      Sabine Leutheusser-Schnarrenberger, the German justice minister said the report in the Guardian read like the plot of a film.

      “If these accusations are correct, this would be a catastrophe,” Leutheusser-Schnarrenberger said in a statement to Reuters. “The accusations against Great Britain sound like a Hollywood nightmare. The European institutions should seek straight away to clarify the situation.”

      Britain’s Tempora project enables it to intercept and store immense volumes of British and international communications for 30 days.

    • If you think GCHQ spying revelations don’t matter, it’s time to think again

      So is it a Milly Dowler moment? Will the revelation that GCHQ taps every internet communication that enters or leaves the UK mark the moment when ordinary citizens stop and say: “Oh, now I get it.” A moment when people realise that the stuff that nerds and activists had been droning on about might actually affect them?

      My hunch is that it isn’t such a moment. Most people will just shrug their shoulders and get on with life. They will accept the assurances of those in authority and move on. If they do, then they will have missed something important. It is that our democracies have indeed reached a pivotal point. Ever since it first became clear that the internet was going to become the nervous system of the planet, the 64 billion dollar question was whether it would be “captured” by giant corporations or by governments. Now we know the answer: it’s “both”.

    • MI5 feared GCHQ went ‘too far’ over phone and internet monitoring

      Senior figures inside British intelligence have been alarmed by GCHQ’s secret decision to tap into transatlantic cables in order to engage in the bulk interception of phone calls and internet traffic.

      According to one source who has been directly involved in GCHQ operations, concerns were expressed when the project was being discussed internally in 2008: “We felt we were starting to overstep the mark with some of it. People from MI5 were complaining that they were going too far from a civil liberties perspective … We all had reservations about it, because we all thought: ‘If this was used against us, we wouldn’t stand a chance’.”

    • Nancy Pelosi Booed, Heckled Over Edward Snowden, NSA Comments At Netroots Nation 2013
    • Pelosi Faces Questions, Criticism about NSA Surveillance at Netroots Nation

      At the Netroots Nation conference this weekend, Representative Nancy Pelosi (D-CA) was questioned publicly about her stance on NSA spying. While she was quick to defend the program as markedly different from the warrantless wiretapping program established under President Bush, she also noted that more needed to be done to improve transparency around the program.

      Pelosi’s comments were met with skepticism and disapproval from at least some members of the audience. Marc Perkel, a small business owner and technology activist, interrupted Pelosi when she was talking about finding a balance between security and civil liberties. According to Politico, Marc Perkel yelled, “It’s not a balance. It’s not constitutional!…No secret laws!”

    • EXCLUSIVE: US spies on Chinese mobile phone companies, steals SMS data: Edward Snowden
    • GCHQ intercepted foreign politicians’ communications at G20 summits
    • Skynet rising: Google acquires 512-qubit quantum computer; NSA surveillance to be turned over to AI machines
    • EXCLUSIVE: US hacked Pacnet, Asia Pacific fibre-optic network operator, in 2009
    • Facebook Bug Exposed 6 Million Users
    • Facebook Says Technical Flaw Exposed 6 Million Users

      Facebook has inadvertently exposed six million users’ phone numbers and e-mail addresses to unauthorized viewers over the last year, the company said late Friday.

    • Snowden spy row grows as US is accused of hacking China

      Edward Snowden, the former CIA technician who blew the whistle on global surveillance operations, has opened a new front against the US authorities, claiming they hacked into Chinese mobile phone companies to access millions of private text messages.

      His latest claims came as US officials, who have filed criminal charges against him, warned Hong Kong to comply with an extradition request or risk complicating diplomatic relations after some of the territory’s politicians called for Snowden to be protected.

      The latest developments will raise fears that the US’s action may have pushed Snowden into the hands of the Chinese, triggering what could be a tense and prolonged diplomatic and legal wrangle between the world’s two leading superpowers.

    • U.S. seeks Snowden’s extradition, urges Hong Kong to act quickly

      The United States said on Saturday it wants Hong Kong to extradite Edward Snowden and urged it to act quickly, paving the way for what could be a lengthy legal battle to prosecute the former National Security Agency contractor on espionage charges.

    • For Spiegel, Tempora is front page news. Apart from The Guardian the British press stays silent.

      Clearly a crashing ferry that injured no-one, and some high society wedding are more important than a programme which, if proven, would be equivalent to PRISM and conducted by the UK.

      A D-Notice has been issued to the press (see Guido Fawkes here) to not report on the leaks in this case, but when one newspaper is still leaking, surely a point has to come that others should report and debate it too?

    • GCHQ and security services ‘need parliamentary oversight’

      Labour’s Douglas Alexander says widespread surveillance allegations need to be addressed by intelligence agencies

    • House Committee Conducts Lovefest With NSA Chief

      The Kansas City man is Khalid Ouazzani, who, as part of a plea bargain in 2010, admitted that he sent money to Al Qaeda. He was never charged with planning any attacks inside the United States, and the NYSE bombing was described as “nascent plotting,” so it’s hard to know just how serious this was. Still, at least Ouazzani actually did something. The San Diego man merely planned to send money.

    • Web’s Reach Binds N.S.A. and Silicon Valley Leaders

      When Max Kelly, the chief security officer for Facebook, left the social media company in 2010, he did not go to Google, Twitter or a similar Silicon Valley concern. Instead the man who was responsible for protecting the personal information of Facebook’s more than one billion users from outside attacks went to work for another giant institution that manages and analyzes large pools of data: the National Security Agency.

      [...]

      The disclosure of the spy agency’s program called Prism, which is said to collect the e-mails and other Web activity of foreigners using major Internet companies like Google, Yahoo and Facebook, has prompted the companies to deny that the agency has direct access to their computers, even as they acknowledge complying with secret N.S.A. court orders for specific data.

    • Petition To Preemptively Pardon Ed Snowden Reaches Goal Of 100k Signatures

      The Whitehouse petition to pre-emptively pardon NSA whistleblower Edward Snowden for “crimes he may have committed while blowing the whistle” has reached its goal of 100,000 signatures. This means that the U.S. Administration, by its own rules, need to take it seriously enough to craft a response to it. While that response is unlikely to be anything else than “we politely disagree and intend to impolitely hunt this man down”, it is still an important signal of dissent.

    • Communications Surveillance, Protest and Control…

      What is the real reason that certain of the authorities are so keen on universal surveillance of communications data? Is it the fight against terrorism? It doesn’t seem very likely. It’s a supremely ineffective method of dealing with terrorism at best – even the examples quoted by the security services as ‘proof’ that it works have pretty much all been swiftly debunked (see for example here). In practice, it seems, targeted, intelligence-driven, almost ‘traditional’ methods seem to do the job far better. So why do the authorities all around the globe seem to be so enthusiastic about communications surveillance? One word: control

    • Whistleblower Edward Snowden Lands In Moscow
    • Edward Snowden leaves Hong Kong for Moscow
    • Spy-leaker Snowden leaves Hong Kong
    • Edward Snowden leaves Hong Kong on Moscow flight

      US intelligence fugitive Edward Snowden has flown out of Hong Kong, from where the US was seeking his extradition on charges of espionage.

    • Bill Clinton on NSA: Americans need to be on guard for abuses of power by US
    • Liberal activists show irritation with Obama over surveillance
    • Pelosi booed for saying NSA leaker Snowden violated the law

      House Minority Leader Nancy Pelosi (D-Calif.) was booed onstage Saturday when she said former government contractor Edward Snowden broke the law by leaking classified documents on National Security Agency (NSA) surveillance programs.

      Speaking at the NetRoots Nation conference in San Jose, Calif., Pelosi told the audience to reject comparisons between President Barack Obama and his predecessor, President George W. Bush, on their oversight of surveillance programs. The top House Democrat said Obama is poised to reveal “in another few days, a few more proceedings” of the secret Foreign Intelligence Surveillance Court.

    • 5 Fun Facts From the Latest NSA Leak

      After a brief respite, the Guardian newspaper has resumed its publication of leaked NSA documents. The latest round provides a look at the secret rules the government follows for collecting data on U.S. persons.

  • Civil Rights

    • US steps up efforts to break Guantánamo hunger strike

      Shaker Aamer, last British resident held in camp, tells of harsh regime to break strikers’ resistance

    • Autonomy: an idea whose time has come
    • Million Protesters Demonstrate In 100 Brazilian Cities

      More than a million protesters have taken to the streets in Brazil as demonstrations over a range of social issues grow. Demonstrating people flooded into Rio de Janeiro and more than 100 cities. Violence and clashes erupted in many places and an 18-year-youth died when a car drove through a barricade in Sao Paulo state. This is the largest protests in the country in more than two decades.

      Government announcement to lower transport fares and promises of better public services failed to stem the tide of discontent in the country.

    • Candidate Obama Debating President Obama On Civil Liberties vs. Government Surveillance

      We recently had a video showing then Senator Joe Biden, from seven years ago, “debating” the current President Obama on government surveillance. I hadn’t seen this until now, but someone else has put together a much better video showing Presidential candidate Obama in 2008 vs. President Obama in 2013.

06.22.13

Links 22/6/2013: Linux Caixa Mágica 20, Syria Proxy War Brewing

Posted in News Roundup at 8:24 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • 23 Pictures That Prove Society Is Doomed
  • Health/Nutrition

    • Follow the money: Monsanto and the World Food Prize

      Although genetic engineering has been widely adopted in a few major crops—mainly soybeans, corn, cotton and canola—only two general types of engineered genes, for resistance to herbicides and for killing certain insects, have been widely commercially successful after 30 years of trying.

      These have provided some benefits, such as a reduction of chemical insecticide use on some of these crops, and some relatively small yield increases. Most of the yield increases for small farmers are from cotton, a low value crop, which is unlikely to pull these farmers out of poverty.

      At the same time, in the countries that have used these technologies the longest, big problems are emerging. Weeds resistant to the herbicide used on Monsanto’s crops have reached epidemic proportions in the U.S., reportedly infesting about 60 million acres and increasing rapidly. This has increased herbicide use by hundreds of millions of pounds above where it probably would have been had these crops not existed.

      And now insects resistant to Bt are emerging around the world. I was at the University of Illinois recently, where I heard a respected corn entomologist bemoaning the intention of corn farmers toreturn to the use of chemical insecticides to control rootworms that have developed resistance to Monsanto’s Bt gene for controlling that important pest.

    • Genetically engineered sugar beets destroyed in southern Oregon
    • Chipotle Is The First U.S. Fast Food Chain To Identify Products With GMO Ingredients

      Sure, you probably know the basic ingredients in your fast food lunch — chicken or beef, lettuce and tomato, whathaveyou — after all, you’re the one who ordered it. But if you, like many consumers, care whether or not those ingredients include genetically modified organisms (GMOs), the ingredient list usually is no help. Chipotle announced that it will now mark those ingredients on its website for discerning consumers.

  • Defence/Police/Secrecy/Aggression

    • What Cop T-Shirts Tell Us About Police Culture

      Earlier this week, an anonymous public defender sent Gothamist this photo of an NYPD warrant squad officer wearing a t-shirt with a pretty disturbing quote from Ernest Hemingway

    • Noam Chomsky: Obama Is ‘Running Biggest Terrorist Operation That Exists’

      June 21, 2013 “Information Clearing House – Continuing his streak of fiercely criticizing President Obama’s foreign policy and civil liberties record, pre-eminent left-wing scholar Noam Chomsky told GRITtv that this administration is “dedicated to increasing terrorism” throughout the world via its own “terrorist” drone strikes in foreign lands.

    • CIA secretly providing training for Syrian rebels
    • CIA Training Syria Rebels: Report
    • REPORT: The CIA Has Been Secretly Training Syrian Rebels For Months
    • CIA and the US military operatives train rebels in Turkey and Jordan – report

      The CIA and US special operational troops and have been secretly training Syrian rebels at bases in Jordan and Turkey since November 2012. Up to 100 from all over Syria have gone through courses in the last month alone, according to US media reports.

    • CIA secretly providing training for Syrian rebels: Report

      The CIA and US special operations forces have been training Syrian rebels for months, since long before President Barack Obama announced plans to arm the opposition, the Los Angeles Times has reported.

    • US Leaves 700 troops in Jordan as CIA Trained Militants Fighting in Syria

      US President Barack Obama said the United States left around 700 combat-ready troops in Jordan after a training exercise in the country.

    • US special forces and CIA training Syrian rebels – Report

      The CIA and US special forces have been secretly training Syrian rebels since last year at bases in Jordan and Turkey, the Los Angeles Times reported Friday.

    • Unwinding “Unwitting”

      For around fifteen years, this arrangement “worked.” Those who knew about it accepted it—sometimes queasily, more often eagerly. It made them feel important, adventurous, grown up. It meant that they weren’t just playing in a student-government sandbox. Anyway, promoting liberal-democratic ideas among Third World students, opposing Communist and Soviet influence, and helping anti-apartheid student groups in South Africa did not present problems of conscience. Moreover, while the C.I.A. money was earmarked for overseas activities, it freed up funds derived from other sources to be used for the N.S.A.’s domestic purposes, which included campaigning for academic freedom, demanding the abolition of the House Un-American Activities Committee, and supporting the civil-rights movement. (For example, the N.S.A. helped found the Student Nonviolent Coordinating Committee and provided it with crucial political and financial assistance.) For these reasons, it’s too simple, and not truly correct, to dismiss the N.S.A. as nothing but a C.I.A. front. It was better than that. But it was deeply compromised. The secrecy and deception inherent in the arrangement amounted to a kind of moral corruption.

    • Iran: Sixty Years After The 1953 CIA Coup That Toppled Democracy

      The election of a moderate new president in Iran, Hassan Rouhani, who has promised to enact reforms, including the release of political prisoners, comes almost exactly 60 years after a cataclysmic episode that continues to define geopolitical relations in the Middle East and profoundly influence the image of the United States in the region.

    • CIA head paid a visit to Moscow secretly – sources

      CIA Director John Brennan paid an unannounced visit to Moscow on Wednesday and Thursday, sources told Interfax on Friday.

      Russian Foreign Intelligence Service declined to confirm or deny that Brennan had been to Moscow, but senior Kremlin aide Yury Ushakov told reporters in mid-May that “a contact with the director of CIA is being planned.”

    • Libertarians Claim James Gandolfini Killed By CIA

      In the wake of The Sopranos star James Gandolfini’s sudden death,libertarians everywhere are saying the actor was assassinated by the Central Intelligence Agency.

    • CIA deputy director, Cuyahoga Falls native retires
  • Cablegate

    • Edward Snowden Asylum: Olafur Vignir Sigurvinsson Readies Private Plane To Iceland

      An Icelandic businessman linked to WikiLeaks said he has readied a private plane to take Edward Snowden, the former National Security Agency contractor who exposed secret U.S. surveillance programmes, to Iceland if the government grants him asylum.

      “We have made everything ready at our end now we only have to wait for confirmation from the (Icelandic) Interior Ministry,” Olafur Vignir Sigurvinsson told Reuters. He is a director of DataCell, a company which processed payments for WikiLeaks.

    • Julian Assange Emerges As Central Figure In Bradley Manning Trial

      Bradley Manning is at the defense table. Casting a long shadow over his trial, however, is the figure of someone else the government would apparently like to put on trial: Julian Assange.

      On Tuesday, government prosecutors sparred with defense lawyers for Manning, the Army private first class who has admitted to leaking a massive cache of documents to the transparency organization that Assange founded. At issue was whether the judge should accept as evidence two WikiLeaks tweets and a crowdsourced document called “The Most Wanted Leaks of 2009.”

    • In WikiLeaks Probe, Feds Used a Secret Search Warrant to Get Volunteer’s Gmail

      The Justice Department used a secret search warrant to obtain the entire contents of a Gmail account used by a former WikiLeaks volunteer in Iceland, according to court records released to the volunteer this week.

      The search warrant was issued under seal on October 14, 2011 by the Alexandria, Virginia federal judge overseeing the WikiLeaks grand jury investigation there. The warrant ordered Google to turn over “the contents of all e-mails associated with the account, including stored or preserved copies of e-mails sent to and from the account, draft e-mails, deleted e-mails [...] the source and destination addresses associated with each e-mail, the date and time at which each e-mail was sent, and the size and length of each e-mail.” The warrant also ordered Google not to disclose the search to anyone.

  • Environment/Energy/Wildlife

    • Houston to buy half its power from renewable sources

      The city of Houston has agreed to purchase half its electricity from renewable sources.

      That will make Houston the largest municipal purchaser of renewable energy in the nation, according to the city, which cited estimates from the Environmental Protection Agency.

      “Houston is already known as the energy capital of the world, but we are committed to becoming the alternative energy capital of the world as well,” Mayor Annise Parker said in a written statement Thursday.

    • Billionaire U.S. activist kicks off campaign to turn Obama against Keystone

      Billionaire anti-Keystone XL activist Tom Steyer wants to rally legions of digital-savvy Obama supporters to persuade the President that Canadian oil sands crude poses a threat to the United States.

      The wealthy Californian upped the ante Thursday in the high-stakes political showdown over Keystone XL by launching a social media campaign aimed at re-awakening the fervent hordes of mostly, young Obama supporters.

    • During Record Drought, Frackers Outcompete Farmers for Water Supplies

      The impacts of 2013′s severe drought are apparent across the nation in forests, on farms and on once snowy peaks. Meanwhile, the oil and gas industry is demanding unprecedented amounts of water for hydraulic fracturing, better known as fracking.

  • Finance

    • No admission of guilt. No denial. No justice.

      Financial adviser Chauncey Mayfield allegedly stole $3.1 million from the pension funds of Detroit police officers and firefighters so he could buy shopping centers in California, according to the Securities and Exchange Commission.

      Did he do it? Who knows? Mayfield and several of his associates settled the case last week without admitting or denying guilt. All they had to do to make the SEC go away was agree to give the money back.

    • Ex-Enron CEO Jeff Skilling to leave prison early

      U.S. District Judge Sim Lake of the Southern District of Texas announced at a hearing in Houston today that Skilling will serve 14 years. His original conviction called for him to serve 24 years in connection with the collapse of the once high-flying energy trading firm. Under the agreement with federal prosecutors, Skilling could be released as early as 2017.

    • Bless the Borrowers

      Robert Kuttner’s title refers, first, to the “medieval institution” that was the fate of improvident souls in England who could not repay their debts, including Daniel Defoe. In 1692, Defoe was committed to King’s Bench Prison in London, where he began to agitate for a change in the legal system. Forcing debtors to rot, Defoe not disinterestedly pointed out, was injurious to both parties, since “after a debtor was confined in prison both he and the creditor lost through his prolonged distress.” Society responded, eventually, with bankruptcy laws, but it is very much Kuttner’s point in “Debtors’ Prison” that we — America and Europe in the age of the financial crisis — have yet to absorb the principal lesson of Defoe’s “bitter experience.”

  • Privacy

    • The Dragnet at the Edge of Forever

      Amidst the havoc surrounding the earth-shattering revelations being made about the massive catch-all surveillance being conducted by the US government against virtually everybody with an Internet connection, a set of relatively unremarkable letters arrived in our GMail inboxes on Tuesday evening, containing a series of attachments.

      These attachments were scanned court orders, sealed and later unsealed, issued to Google by the United States District Court for the eastern district of Virginia. These orders demanded that Google hand over to the United States (yes, they were that specific), various information relating to accounts we hold with Google, including whom we communicated with, when, from where, and for how long.

      The court orders were almost certainly related to the Grand Jury investigation of the unauthorized public disclosure of information showing considerable misconduct, including a number of probable cases of war crimes, by US military forces in Iraq and Afghanistan during their wars in these countries, a list of people being held without trial or legal recourse in Guantanamo Bay, and a trove of diplomatic cables detailing the ways the US government have conducted themselves – both good and bad – over many years.

    • Mastering the internet: how GCHQ set out to spy on the world wide web

      Project Tempora – the evolution of a secret programme to capture vast amounts of web and phone data

    • GCHQ taps fibre-optic cables for secret access to world’s communications

      Exclusive: British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal

    • NSA: If Your Data Is Encrypted, You Might Be Evil, So We’ll Keep It Until We’re Sure

      There’s been plenty of commentary concerning the latest NSA leak concerning its FISA court-approved “rules” for when it can keep data, and when it needs to delete it. As many of you pointed out in the comments to that piece — and many others are now exploring — the rules seem to clearly say that if your data is encrypted, the NSA can keep it. Specifically, the minimization procedures say that the NSA has to destroy the communication it receives once it’s determined as domestic unless they can demonstrate a few facts about it.

    • U.S. charges Snowden with espionage
    • Ex-Contractor Is Charged in Leaks on N.S.A. Surveillance

      Edward J. Snowden, the former National Security Agency contractor whose leak of agency documents has set off a national debate over the proper limits of government surveillance, has been charged with violating the Espionage Act and stealing government property for disclosing classified information to The Guardian and The Washington Post, the Justice Department said on Friday.

    • Latest NSA Leak Shows How Obama Misled Public on Surveillance of Americans

      Last week, President Obama claimed in an interview that the National Security Agency could not listen to Americans’ phone calls or read their emails. But newly revealed secret government documents—the latest in the series of high-profile leaks about classified surveillance—outline how the NSA can sweep up and store Americans’ communications.

      The documents, published by the Guardian late Thursday, are signed by Attorney General Eric Holder and stamped with the date July 29, 2009. They were submitted to the secret Foreign Intelligence Surveillance Court and outline the so-called “minimization procedures” the NSA is supposed to follow to limit any “incidental” spying it does on the communications of Americans or permanent U.S. residents. The disclosure sheds light on highly significant surveillance procedures the government has until now managed to keep beyond public scrutiny.

    • Wired/John Hodgman animated series about NSA spooks

      Wired’s kicked off a new animated webcomedy starring John Hodgman as a crusty old NSA agent and Nicole Winters as his young protege. It’s pretty promising stuff!

    • Reassured by NSA’s Internal Procedures? Don’t Be. They Still Don’t Tell the Whole Story.

      Yesterday, the Guardian released two previously-classified documents describing the internal “minimization” and “targeting” procedures used by the NSA to conduct surveillance under Section 702. These procedures are approved by the Foreign Intelligence Surveillance Court (FISC) on an annual basis and are supposed to serve as the bulwark between the NSA’s vast surveillance capabilities and the private communications of Americans. As we noted earlier today, the procedures, themselves, aren’t reassuring: far too much discretion is retained by NSA analysts, the procedures frequently resolve doubt in favor of collection, and information is obtained that could otherwise never be obtained without a warrant.

    • The NSA Can Hold Onto Americans’ Communications for Years, Leaked Docs Say
    • Evil in a Haystack
    • WikiLeaks plane ‘ready’ to bring Snowden to Iceland
    • U.K. Spy Agency Secretly Taps Over 200 Fiber-Optic Cables, Shares Data With the NSA

      The British spy agency GCHQ has secretly tapped more than 200 fiber-optic cables carrying phone and internet traffic and has been sharing data with the U.S. National Security Agency, according to a news report.

    • Facebook Accidentally Exposed Contact Info for Six Million Users

      According to a post on Facebook’s security blog, a bug in the company’s friend recommendation system exposed the contact information of some six million users to others. The bug has been present for about a year, but the company only found out about it in the last 24 hours. The affected users will be notified by email. The company says there’s no evidence the bug was exploited maliciously.

    • Ellsberg Says: Put A Stop To Indiscriminate Spying On Americans

      To Daniel Ellsberg, the well-known whistleblower and lifelong advocate for freedom who leaked the “Pentagon Papers” 40 years ago, “there has not been in American history a more important leak than Edward Snowden’s release of NSA material.”

    • Timeline of NSA Domestic Spying
    • Russ Tice, Bush-Era Whistleblower, Claims NSA Ordered Wiretap Of Barack Obama In 2004

      Russ Tice, a former intelligence analyst who in 2005 blew the whistle on what he alleged was massive unconstitutional domestic spying across multiple agencies, claimed Wednesday that the NSA had ordered wiretaps on phones connected to then-Senate candidate Barack Obama in 2004.

      Speaking on “The Boiling Frogs Show,” Tice claimed the intelligence community had ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats.

    • Mastering the Internet and GCHQ

      Nick Pickles, director of Big Brother Watch, said: “This appears to be dangerously close to, if not exactly, the centralised database of all our internet communications, including some content, that successive Governments have ruled out and Parliament has never legislated for.

      “Britain has a clear legal process in place to govern the interception of the content of communications and blanket interception is not a part of that system. If GCHQ have been intercepting huge numbers of innocent people’s communications as part of a massive sweeping exercise then I struggle to see how that squares with a process that requires a warrant for each individual intercept. This question must be urgently be addressed in Parliament.

      “The fact GCHQ staff have been discussing how light the UK’s oversight regime is compared to the US highlights why we need a wholesale review of surveillance law, including the fact that there is absolutely no judicial process within the current system and the people making these decisions are able to hide in the shadows rather than face public scrutiny.”

    • EE Dragging its Feet on Mobile Data Transparency

      Mobile company EE has been quite open in explaining the sale of data analytics based on their customers data in partnership with Ipsos MORI. But we are concerned that they think the storm is over and can return to business as usual. We may need your support to make them listen.

      EE has already met with ORG to explain how their data services work, how they aggregate data and what general legal framework they operate. For this, we commend EE on their openness and hope that it continues.

    • Police State Canada: Communications Security Establishment Canada (CSEC) Runs Massive Domestic Spying Program

      Communications Security Establishment Canada (CSEC), the NSA’s Canadian counterpart and longstanding partner, has been scrutinizing the metadata of Canadians’ electronic communications since at least 2005.

      Moreover, the NSA routinely provides Canada’s security agencies with intelligence on Canadians and CSEC reciprocates by providing U.S. intelligence officials with information about people living in the U.S. This arrangement allows both agencies to circumvent legal bans on warrantless surveillance of their own citizenry’s communications.

      It was “common” for NSA “to pass on information about Canadians,” Wayne Easter, Canada’s Solicitor-General in 2002-3, told the Toronto Star this week. As Solicitor-General, Easter was responsible for overseeing the operations of the Canadian Security Intelligence Service (CSIS) and the Royal Canadian Mounted Police (RCMP).

    • Google told to delete Street View payload data or face UK prosecution

      Information commissioner’s office says it will launch contempt of court proceedings if data is not deleted within 35 days

    • In Depth Review: New NSA Documents Expose How Americans Can Be Spied on Without A Warrant

      The Guardian published a new batch of secret leaked FISA court and NSA documents yesterday, which detail the particulars of how government has been accessing Americans’ emails without a warrant, in violation of the Constitution. The documents lay bare fundamental problems with the ineffectual attempts to place meaningful limitations on the NSA’s massive surveillance program.

      Essentially, the new documents, dated July 2009 and approved in August 2010, detail how the NSA deals with the huge streams of information it receives during the collection program that gathers the content of email and telephone calls, allowing it to keep vast quantities of content it could never get with a warrant. They may not be the current procedures – more on that in another blog post shortly.

    • Spying on the World From Domestic Soil

      The world is still reeling from the series of revelations about NSA and FBI surveillance. Over the past two weeks the emerging details paint a picture of pervasive, crossborder spying programs of unprecedented reach and scope: the U.S. has now admitted using domestic networks to spy on Internet users both domestically and worldwide. The people now know that foreign intelligence can spy on their communications if they travel through U.S. networks or are stored in U.S. servers.

    • Edward Snowden is a true patriot

      A million people marched in London to stop Blair going to war.

    • US Surveillance: Doubts Over FBI And NSA Claims

      Terrorism analysts and specialist journalists say claims of thwarted terror plots from phone and data mining do not stand up.

    • Government-tech ties: Ex-Facebook exec moved to NSA, Amazon’s CIA deal, more

      • Where did Facebook chief security officer Max Kelly go after he left the social network in 2010? To the NSA, according to the New York Times, which says it’s the first to report that tidbit. Also previously unreported, says the NYT, is that Internet-call provider Skype developed a program to make it easier to cooperate with law enforcement and the government.

  • Civil Rights

  • Intellectual Monopolies

    • Copyrights

      • Opening Pandora’s Box

        I first placed music online in 1996, a WAV file recorded through a microphone to promote the sale of an album I had under license on my indie BeanBag label featuring Georgie Fame and Van Morrison. I cheered for other music industry executives like Larry Rosen of GRP Records when he launched Music Boulevard online around 1997. I licensed songs by Jesse Colin Young (founder of The Youngbloods) to music publishing expert Bob Kohn’s eMusic.com for a cash advance against future royalties that had us partying like it was 1999.

        But by the year 2000, any hope of that engagement between legal music and the Internet leading to a new future was pretty much dashed by an online startup corporation named Napster that provided free music downloads. Though a Federal court would find Napster guilty in 2001 of providing illegal copying similar to a counterfeiting operation, the business model known as “DMCA ‘Safe Harbor’ corporations” was launched.

06.21.13

Links 21/6/2013: antiX 13.1, More NSA/FBI Revelations

Posted in News Roundup at 11:24 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Michael Hastings, Bridge-Burning Journalist (1980-2013)

    Hastings, a reporter for Rolling Stone and BuzzFeed who died in a car crash in L.A. yesterday at the age of 33, didn’t see it as his job to maintain “good media/military relations,” or to decide what is “necessary to report.” To the contrary–he told CounterSpin (1/27/12) that one of his golden rules for reporting was, “What does everybody know who’s on the inside, but no one’s willing to say or write.”

    Hastings never forgot that journalists’ loyalties are supposed to be with the public and not to the government officials whose actions they cover–and that approach distinguished him not only from Burns but from most of his colleagues.

  • Google Finally Admits That Its Infamous Brainteasers Were Completely Useless for Hiring

    Google has admitted that the headscratching questions it once used to quiz job applicants (How many piano tuners are there in the entire world? Why are manhole covers round?) were utterly useless as a predictor of who will be a good employee.

  • Science

  • Hardware

  • Health/Nutrition

    • House Rejects Farm Bill as Food Stamp Cuts Prove Divisive

      The surprise defeat of the farm bill in the House on Thursday underscored the ideological divide between the more conservative, antispending Republican lawmakers and their leadership, who failed to garner sufficient votes from their caucus as well as from Democrats.

      [...]

      The failure was a stinging defeat for Speaker John A. Boehner of Ohio, who continues to have trouble marshaling the Republican support he needs to pass major legislation. Without the solid backing of his party, Mr. Boehner has to rely on some Democratic support, which deserted him Thursday.

  • Security

    • NetTraveler using PRISM phishing lures

      Recent email found by blogger Brandon Dixon indicates that the latest spear-phishing campaigns from the group behind NetTraveler are using the PRISM controversy to lure victims into reading the booby-trapped email. The mail, which tells the tale of the disclosure of PRISM and other NSA programmes, offers a 2.5MB file – “Monitored List1.doc” – and implies that this contains a list of those monitored by the NSA. The file, of course, actually contains malware that exploits an older vulnerability CVE-2012-0158 to infect the computer.

  • Defence/Police/Secrecy/Aggression

    • The Lies of Empire: Don’t Believe a Word They Say
    • Syria Is Becoming Obama’s Iraq

      In perfect Bush-like fashion, President Obama has invented a bogus pretense for military intervention in yet another Middle East country. The president’s claim that the Syrian government has used chemical weapons — and thus crossed Obama’s imaginary “red line” — will likely fool very few Americans, who already distrust their president after the massive NSA spying scandal.

    • The FBI’s Nearly Unbelievable Record of “Justified” Shootings

      We’re still waiting for the FBI to finish its internal investigation into exactly what happened in an Orlando apartment last month, when an FBI agent shot and killed Ibragim Todashev, a Chechan man who knew Boston bombing suspect Tamerlan Tsarnaev. Since the shooting, unnamed officials have painted a number of different pictures of the scene in the room in the moments before the agent opened fire. Among them, that Todashev was unarmed, that he was brandishing a knife, and that he was carrying a pipe or maybe a broomstick.

    • Iraq Says Proxy War Over Syria Threatens Its Neutrality

      Iraq is being buffeted by both sides in the civil war raging across its border in Syria and Baghdad’s official policy of neutrality is at risk as the conflict spirals into a region-wide proxy war, its foreign minister said.

    • Michael Hastings researching Jill Kelley case before death

      During the weeks before he was killed in a car crash in Los Angeles, reporter Michael Hastings was researching a story about a privacy lawsuit brought by Florida socialite Jill Kelley against the Department of Defense and the FBI.

      Hastings, 33, was scheduled to meet with a representative of Kelley next week in Los Angeles to discuss the case, according to a person close to Kelley. Hastings wrote for Rolling Stone and the website BuzzFeed.

      Kelley alleges that military officials and the FBI leaked her name to the media to discredit her after she reported receiving a stream of emails that were traced to Paula Broadwell, a biographer of former CIA director David H. Petraeus, according to a lawsuit filed in Federal District Court in Washington, D.C., on June 3.

    • If You Were Bradley Manning, What Would You Do?

      Some Bradley Manning supporters have put together a very compelling campaign, called I Am Bradley Manning, asking the government to drop the “aiding the enemy” charge against Bradley Manning and noting the chilling effects it has on whistleblowers. The key part of the campaign is a five minute video of various well-known people talking about Bradley Manning and asking what would you do if you were in his shoes, and saw that your government was lying to the public, and doing things that you believed went against the very values and principles you were supposed to be fighting for.

    • The US Uses Vulnerability Data for Offensive Purposes

      No word on whether these companies would delay a patch if asked nicely — or if there’s any way the government can require them to. Anyone feel safer because of this?

    • Former TWA 800 investigators claim crash details were covered up

      It was a central fuel tank explosion that sent TWA Flight 800 plummeting into the Atlantic Ocean in a 1996 crash that remains one of the country’s most devastating airline accidents.

    • Clear Evidence That Corporate America Wants the Govt. to Treat Protesters as ‘Terrorists’

      Corporations are trying to use the PATRIOT Act in ways that have nothing to do with Osama Bin Laden because the PATRIOT Act gives transnational corporations the power to snuff out the activism of all those who oppose them.

      Terrorism, as it is commonly considered, is the use of violence against civilians to achieve any number of political ends: the destruction of the federal government, the overturning of Roe V. Wade, the restoration of a Caliphate. If you try to kill people – or succeed in killing people for a political purpose – you’re a terrorist. If you blow up the Alfred P. Murrow Federal Building and kill 168 civilians, like Timothy McVeigh, you’ve committed an act of terrorism.

      Seems pretty self-explanatory – right? Not according to TransCanada Corp., the Canadian owned energy conglomerate that is the backer of the Keystone XL pipeline extension. A new set of documents obtained by the group Bold Nebraska shows that this foreign corporation is encouraging American law enforcement agencies to treat anti-pipeline protestors like terrorists. Yes, terrorists.

      The documents, which Bold Nebraska got a hold of through a FOIA request, were part of a briefing given to Nebraska law enforcement agents about the “emerging threat” of groups like Tar Sands Blockade and Rainforest Action.

    • Government Privatization Paves the Way for Crony Corruption

      It’s dangerous business when private contractors recruit top government employees and then effectively lease them back to the government.

    • Your Government on War

      That was President John F. Kennedy speaking to the 1963 graduating class of American University —announcing that the human race was ready to move beyond war. This was the speech in which he revealed that talks on a Nuclear Test-Ban Treaty with the Soviet Union had begun, and that the U.S. was unilaterally suspending atmospheric nuclear testing.

    • Why Won’t the FBI Tell the Public About its Drone Program?

      Today we’re publishing—for the first time—the FBI’s drone licenses and supporting records for the last several years. Unfortunately, to say that the FBI has been less than forthcoming with these records would be a gross understatement.

      Just yesterday, Wired broke the story that the FBI has been using drones to surveil Americans. Wired noted that, during an FBI oversight hearing before the Senate Judiciary Committee, FBI Director Robert Mueller let slip that the FBI flies surveillance drones on American soil. Mueller tried to reassure the senators that FBI’s drone program “is very narrowly focused on particularized cases and particularized leads.” However, there’s no way to check the Director on these statements, given the Bureau’s extreme lack of transparency about its program.

    • NYT Pays Tribute to Hastings by Attacking Him After Death

      When a journalist dies, how can you tell if they’ve had a career that’s upheld the proudest journalistic traditions of challenging the powerful and fearlessly exposing the truth?

      The New York Times will attempt to piss on that career in the journalist’s obituary.

    • Michael Hastings’ Wife Obliterates New York Times For Dismissive Obituary

      In the 24 hours since the tragic death of journalist and author Michael Hastings was first reported on Tuesday, those who knew him, worked with him, and covered his work have offered numerous remembrances of the man best known for his Polk Award-winning Rolling Stone piece, “The Runaway General.”

      That article, which presented a dim view of the U.S. strategy in the Afghanistan war and exposed a military command structure working to actively undermine its civilian leadership, also contained several accounts of less-than-professional behavior and comments by Gen. Stanley McChrystal, the International Security Assistance Force commander, the disclosure of which led to McChrystal tendering his resignation in June 2010.

      But it’s an obituary in The New York Times that has sounded a discordant note amid the rest of the encomiums. And now Hastings’ widow, Elise Jordan, is firing back at Times brass.

    • Bill O’Reilly Thinks Drones Don’t Kill Civilians (VIDEO)

      Bill O’Reilly probably lost it during his sow O’Reilly Factor on Wednesday when he wondered why far-left loons who opposed drones and Gitmo detention are ‘so crazy.’

      Well, it appears it’s the other way round since O’Reilly did a really pathetic impression of a German reporter who quite rightly questioned Obama’s drone warfare policy in Berlin that day.

  • Cablegate

  • Environment/Energy/Wildlife

  • Finance

    • Do Unpaid Internships Lead to Jobs? Not for College Students

      The common defense of the unpaid internship is that, even if the role doesn’t exactly pay, it will pay off eventually in the form of a job. Turns out, the data suggests that defense is wrong, at least when it comes to college students.

      For three years, the National Association of Colleges and Employers has asked graduating seniors if they’ve received a job offer and if they’ve ever had either a paid or unpaid internship. And for three years, it’s reached the same conclusion: Unpaid internships don’t seem to give college kids much of a leg up when it comes time to look for employment.

    • Decline and fall: how American society unravelled

      Americans were no less greedy, ignorant, selfish and violent then than they are today, and no more generous, fair-minded and idealistic.

    • Global markets fall as end to US stimulus beckons

      Global markets have fallen sharply after the Federal Reserve signalled it may begin to scale back its stimulus of the US economy later this year.

      On Wall Street, the Dow Jones dropped 354 points, or 2.3%, to close at 14,758, while the S&P 500 had its worst day since November 2011, shedding 2.5%.

    • Disunited Kingdom: Crisis Leaves Britain Deeply Fractured

      The economic crisis has caused the United Kingdom to drift apart, creating ever-widening rifts between rich and poor, native and immigrant, English and Scot. With the anti-Europe UKIP party on the rise, Great Britain stands at a crossroads.

    • U.S. wages fall amid overseas pressure

      Competition from China and other low-wage rivals, coupled with fallout from the 2007-09 financial crisis, has put American wages under such unprecedented strain that they have shifted into reverse — not merely stagnating, but falling.

      “Water finds its equilibrium, its own level,” said Jeff Joerres, chief executive of Milwaukee-based global staffing giant ManpowerGroup Inc., who refers to this accelerating leveling of wages as “global labor arbitrage.”

      Read more: http://www.post-gazette.com/stories/business/news/us-wages-fall-amid-overseas-pressure-692123/#ixzz2WpuIFBiI

    • JP Morgan’s man in the White House: Barack Obama’s legacy of ashes

      At one time, it seems decades ago now, the general thinking in the USA was that President Barack Obama would jolt the American political system into actually doing something beneficial for its citizens rather than spying on them, building F-35 aircraft, upgrading nuclear weapons, spending trillions of dollars (US) on national security, cutting unemployment benefits/food stamps, fomenting war with Iran, Syria, China and Russia; and dragging out the war in Afghanistan.

    • Why Cities Should Use Public Banks Instead of Big Banks

      Of all the public entities that have fallen victim to the big bank-induced economic downturn, cities have the most compelling stories of being burned. If “all politics is local,” this is even more true for economics, at least where people’s ordinary lives are concerned. City budgets contain the life blood of communities. School districts, contracts with utility companies, waste services, and street repairs all filter locally. City social services are often the first line of response for people in need. City councils also fund soup kitchens, domestic violence shelters, and animal shelters.

  • Privacy

    • Rand Paul: The Youth and I Agree That the NSA Stinks

      The libertarian senator picked up on the dip in support for the POTUS among younger Americans

      [...]

      Rand Paul is claiming that the youth of America have his back in his battle against Big Brother, reports Politico.

    • NSA snooping program ‘just one element of vast secrecy regime’

      The NSA warrantless spying program is only a part of a “vast” American secrecy regime that has developed and expanded since 9/11, former NSA senior official and a whistleblower Thomas Drake has told RT.

      Thomas Drake, who worked for the American National Security Agency (NSA) from 2001 to 2008, says he was at the place “from the very beginning” of the development of the mass surveillance program, PRISM, that grants the government access to Internet users’ emails, search results, video chats and other data.

    • Secret Sqrrl: NSA “spin-off” company releases data mining tool

      Recent revelations of the National Security Agency’s (NSA) data mining capabilities have come to the forefront recently, making “big data” a new subject of interest and concern for many people.

      So what better time than now to launch a data analytics tool based on the very technology that the NSA uses to perform its real-time analysis of massive amounts of data being pulled in from sources like the PRISM program?

    • What If The NSA Tracked Your Emotions?

      Last week, in Your Computer Is Watching You: AOL Rolls Out Emotion Tracking, I described how YouEye and other firms could use the webcam built into your computer to measure your emotional reactions to videos. There’s nothing nefarious about this program – the participants in the video testing explicitly opt-in to be part of the process. But, with the recent revelations about NSA vacuuming up phone and computer data, one wonders what might be possible with clever engineers and an unlimited budget…

    • Here’s how to ask the NSA for your records (but don’t hold your breath)

      After the PRISM leak, you probably want to know exactly what the NSA has on file about you. And here’s some good news amid all the are-we-living-in-a-surveillance-state hand-wringing: Civil rights advocate Jonathan Corbett put together a website called My NSA Records that wants to help you understand what your records looks like.

    • NSA whistleblower to tech firms, Obama: ‘Grow a pair!’

      Edward Snowden, the 29-year-old fugitive who revealed the NSA’s PRISM system, has told the technology companies involved in surveillance to stand up for users’ rights and demand a change in the current law.

      “If for example Facebook, Google, Microsoft, and Apple refused to provide this cooperation with the Intelligence Community, what do you think the government would do? Shut them down?” he said, during a question and answer session hosted by The Guardian

    • The Terror Con, Booz Allen Hamilton and the NSA

      Booz Allen, whose top personnel served in key positions at the NSA and vice versa after the inconvenient collapse of the Cold War, has been attempting to substitute terrorist for communist as the enemy of choice. A difficult switch indeed for the military-industrial complex about which Dwight Eisenhower, the general-turned-president, had so eloquently warned us.

    • If your name is Ahmed or Fatima, you live in fear of NSA surveillance

      Muslim and Arab Americans have been targets of intrusive monitoring programs even when they ‘have nothing to hide’

    • NSA whistleblower Edward Snowden warns ‘truth would emerge’ even if US govt murders him

      Answering the questions about him being a potential Chinese spy, Snowden said that by calling him a traitor, the US government has destroyed any possibility of a fair trial.

    • President Obama compares NSA to airport security
    • Does the NSA Really Need “Direct Access”?

      So, making the assumption that the NSA can eavesdrop on our Internet traffic already, does it really need access to Apple and Google’s server farms? After all, there’s nothing irreproducible about their systems—the rise of cloud computing technologies in recent years means that these companies’ servers are virtual constructs in any case, running on fungible hardware. With enough storage space and computing power, it is certainly technically possible to imagine shadow servers, emulating the relevant functions of a number of companies’ online services, and synchronized with data from Internet backbone taps at telcos. It might not be a perfect copy of what’s on the real servers, but such a system would still allow extensive historical searches in many cases. With such a system, “direct access” versus “intercepting traffic in transit” becomes a distinction without a difference.

    • Rieder: Why is NSA leaker Snowden demonized?
    • NSA PRISM, Edward Snowden, Who Are The Real Traitors?

      “I’m neither traitor nor hero. I’m an American.” – Edward Snowden

      [...]

      There are weeks that change the course of human history. There are weeks when people must choose sides. There are weeks that expose the real American traitors. There is no middle ground in this debate. You are either on the side of freedom, liberty, truth, transparency and the U.S. Constitution or you are on the side of mindless obedience, oppression, deception, corruption and tyranny. A courageous young Millennial named Edward Snowden has risked his life and his future to expose the illegal, surreptitious surveillance programs being conducted by the United States government in clear violation of the 4th Amendment to the U.S. Constitution. The NSA, with the full knowledge of Barack Obama and Congress, has been covertly collecting phone and internet records on millions of Americans with the full cooperation of Verizon and other mega media/data corporations. Our owners have been using the U.S. Constitution to wipe their asses. The 4th Amendment to the U.S. Constitution is so unambiguous that any intelligent politician, bright journalist or fifth grader in Miss Sabatini’s history class could interpret its meaning and intention. Our founding fathers believed in truth, clarity and simplicity. The traitorous sociopaths in control of our government today believe in obfuscation, ambiguity and complexity.

    • NSA surveillance played little role in foiling terror plots, experts say

      Michael Dowling, a Denver-based attorney who acted as Zazi’s defence counsel, said the full picture remained unclear as Zazi pleaded guilty before all details of the investigation were made public. But the lawyer said he was sceptical that mass data sweeps could explain what led law enforcement to Zazi.

      “The government says that it does not monitor content of these communications in its data collection. So I find it hard to believe that this would have uncovered Zazi’s contacts with a known terrorist in Pakistan,” Dowling said.

      Further scepticism has been expressed by David Davis, a former British foreign office minister who described the citing of the Zazi case as an example of the merits of data-mining as “misleading” and “an illusion”. Davis pointed out that Operation Pathway was prematurely aborted in April 2009 after Bob Quick, then the UK’s most senior counter-terrorism police officer, was pictured walking into Downing Street with top secret documents containing details of the operation in full view of cameras.

    • What Bothers me About NSA Data Collection: A Reply to Thomas Friedman

      One of the most articulate commentators to come to the defense of the NSA is Thomas Friedman. His recent column in the New York Times epitomizes what bothers me most about this whole affair—the readiness of people who claim to be defenders of an open society to make excuses for people and policies that undermine it.

      Friedman argues that although what the NSA is doing is distasteful, we should put up with it because it might stop some future terrorist attack, which in turn, would prompt even more intrusive violations of our freedoms.

    • Russia promises legal action over NSA surveillance scandal

      Russia will not ignore the actions of the US authorities who had admitted leaks of personal data of Russian citizens to which the US security services had access, the Foreign Ministry’s plenipotentiary for human rights, Konstantin Dolgov, said at a special meeting initiated by the Upper House of the Russian parliament.

    • US lawmakers call for review of Patriot Act after NSA surveillance revelations
    • Fisa court oversight: a look inside a secret and empty process

      Obama and other NSA defenders insist there are robust limitations on surveillance but the documents show otherwise

    • Glenn Greenwald: As Obama Makes “False” Surveillance Claims, Snowden Risks Life to Spark NSA Debate

      Glenn Greenwald, the Guardian journalist who broke the NSA surveillance story earlier this month, joins us one day after both President Obama and whistleblower Edward Snowden gave extensive interviews on the surveillance programs Snowden exposed and Obama is now forced to defend. Speaking to PBS, Obama distinguished his surveillance efforts from those of the Bush administration and reaffirmed his insistence that no Americans’ phone calls or emails are being directly monitored without court orders. Greenwald calls Obama’s statements “outright false” for omitting the warrantless spying on phone calls between Americans and callers outside the United States. “It is true that the NSA can’t deliberately target U.S. citizens for [warrantless] surveillance, but it is also the case they are frequently engaged in surveillance of exactly that kind of invasive technique involving U.S. persons,” Greenwald says. After moderating Snowden’s online Q&A with Guardian readers, Greenwald says of the whistleblower: “I think what you see here is a person who was very disturbed by this massive surveillance apparatus built in the U.S. that spies not only on American citizens, but the world, with very little checks, very little oversight. He’s making clear his intention was to inform citizens even at the expense of his own liberty or even life.”

    • Edward Snowden stands by leak allegations

      The former intelligence contractor who leaked documents on US surveillance programmes has defended himself in an online chat, the Guardian reports.

    • NSA spying flap extends to contents of U.S. phone calls

      National Security Agency discloses in secret Capitol Hill briefing that thousands of analysts can listen to domestic phone calls. That authorization appears to extend to e-mail and text messages too.

    • Secret to Prism program: Even bigger data seizure

      “You have to assume everything is being collected,” said Bruce Schneier, who has been studying and writing about cryptography and computer security for two decades.

    • U.S. surveillance architecture includes collection of revealing Internet, phone metadata

      The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.

    • The influence of spies has become too much. It’s time politicians said no

      What are secret courts? Why do we need them? To protect Britain’s special relationship with the United States, we are officially told; to protect the credibility and integrity of our intelligence services. Never mind that for decades we have handled security-sensitive cases by clearing the court whenever necessary, and allowing our secret servants to withhold their names and testify from behind screens, real or virtual: now, all of a sudden, the credibility and integrity of our intelligence services are at stake, and need urgent and draconian protection.

    • Connecting the Dots on PRISM, Phone Surveillance, and the NSA’s Massive Spy Center

      …massive operation to secretly keep track of everyone’s phone calls on a daily basis…

    • James Bamford on NSA Secrets, Keith Alexander’s Influence & Massive Growth of Surveillance, Cyberwar
    • NSA Leaker Edward Snowden Has a Higher Approval Rating Than Congress

      Polls conducted in the days since Glenn Greenwald and The Guardian pulled back the curtain on the NSA’s surveillance program have found that a majority of Americans are fine with said program so long as it targets suspected terrorists, but are less fine with being targeted themselves; and that they’re skeptical of the claim that leaking information about the NSA’s spying program will jeopardize the government’s ability to keep America safe.

    • Sweden’s data protection Authority bans Google cloud services over privacy concerns

      In a landmark ruling, Sweden’s data protection authority (the Swedish Data Inspection Board) this week issued a decision that prohibits the nation’s public sector bodies from using the cloud service Google Apps.

    • Texas Law Now Can’t Snoop in Email Without Warrant

      It’s a step closer to protecting your electronic privacy… in Texas.

    • WikiLeaks Says It Is Working to Negotiate Asylum in Iceland for Snowden

      WikiLeaks activists in Iceland are discussing with government officials there the possibility of asylum for Edward J. Snowden, the former National Security Agency contractor who disclosed hundreds of classified documents on N.S.A. surveillance, Julian Assange, the founder of the antisecrecy group, said Wednesday.

    • ‘Anonymous’ search engine sees rocketing growth after NSA revelations

      An alternative search engine DuckDuckGo has enjoyed a record surge in traffic as NSA scandals spark fears and frighten away Internet users from the more popular Google or Yahoo!.

      Over the previous week DuckDuckGo, a private search engine, which claims not to collect users’ searches or create any personal user profile, has increased its traffic by 26 per cent and passed 3.1 million of direct queries.

    • PRISM – Where do we go from here?

      To make matters worse, DuckDuckGo are not audited by any external body, so we only have their word that they are not an NSA honeypot setup to monitor people that deliberately avoid Google on privacy grounds (exactly the type of people the NSA are interested in) and we only have their word that their privacy policy is upheld – frankly Gabriel, that is not good enough.

      For the above reasons, I once again turn my old friends at Ixquick. If you are looking for a private search engine, you cannot do better than Ixquick and Startpage at this time – they have been audited and certified by Europrise, they are not based in the US and therefore not under the jurisdiction of FISC and I know them personally and know that they stand by their word. They haven’t paid me to say this, so no, this isn’t some profit making scheme by me, but the facts are as they stand – it is literally impossible to trust that your data is private and secure if you use a company that has any legal ties to the United States. That means Cloud, Email, Blogs, ECommerce, Hosting, Image Galleries, Microblogs, Voice over IP, Instant Messaging, Social Networking – yes absolutely -everything- which makes up our digital society. If you still don’t quite understand what that means, GMail, Hotmail, Skype, Facebook, Twitter, Dropbox, Crashplan, Blogger, Google Search, Bing, Yahoo Mail etc. are all inherently insecure as a direct result of the Foreign Intelligence Surveillance Act, the PATRIOT Act, the National Security Agency and PRISM – and that is before we even start to discuss CALEA and whether or not your broadband router has a built in back door…

    • Revealed: the top secret rules that allow NSA to use US data without a warrant

      Fisa court submissions show broad scope of procedures governing NSA’s surveillance of Americans’ communication

    • India sets up nationwide snooping programme to tap your emails, phones
    • Uncle Sam and Corporate Tech: Domestic Partners Raising Digital Big Brother

      “National security” agencies and major tech sectors have teamed up to make Big Brother a reality. “Of the estimated $80 billion the government will spend on intelligence this year, most is spent on private contractors,” the New York Times noted. The synergy is great for war-crazed snoops in Washington and profit-crazed moguls in Silicon Valley, but poisonous for civil liberties and democracy.

    • PRISM: EU citizens’ data must be properly protected against US surveillance

      The US PRISM internet surveillance case highlights the urgent need to pass legislation to protect EU citizens’ personal data, most MEPs agreed in Wednesday’s Civil Liberties Committee debate with Justice Commissioner Viviane Reding. MEPs also called for safeguards for personal data transferred outside the EU.

    • 3 Former NSA Employees Praise Edward Snowden, Corroborate Key Claims

      USA Today has published an extraordinary interview with three former NSA employees who praise Edward Snowden’s leaks, corroborate some of his claims, and warn about unlawful government acts.

    • Use of Tor and e-mail crypto could increase chances that NSA keeps your data

      When it comes to surveillance rules, some US people are more equal than others.

    • How Today’s NSA Is Much, Much Worse Than Stasi Or Orwell’s “1984”

      There are still people warning us of sleepwalking into a Stasi or “1984” society. They missed the boat by a long shot: we are already far, far past the point of Stasi or “1984”. The apparatus that governments have built to trace, track, and record citizens is the stuff of nightmares.

    • Why NSA surveillance is a threat to British doctors and lawyers

      So now the penny drops, and we all know why GCHQ has long refused to allow government departments to store information classified at “Restricted” or above in US cloud computing services. But what about the private sector? Well, Edward Snowden’s revelations are now causing something of a crisis in the IT industry as its international customers start thinking through the implications. In the past week I’ve heard of big firms reconsidering plans to spend hundreds of millions on services that would have been hosted in the US, as they start to realise that US agencies might snoop on their data and use it to tip off their competitors. US service firms now fear this will harm their growth, and it’s not just Microsoft and Google; many other companies such as Amazon, Salesforce and Rackspace could lose out.

    • In Germany, Merkel has blunt words for Obama on right to privacy

      President Obama, the former college lecturer on constitutional law, got a lecture on privacy rights Wednesday from German Chancellor Angela Merkel and faced tough questions from the German press about his perceived failure to be less warlike after winning the Nobel Peace Prize.

      Mrs. Merkel raised the subject of National Security Agency surveillance of the Internet in a private meeting with Mr. Obama in Berlin, where she emphasized the need for “proportionality.”

    • Bush-Era NSA Whistleblower Makes Most Explosive Allegations Yet About True Extent of Gov’t Surveillance

      Russ Tice, a former intelligence analyst and Bush-era NSA whistleblower, claimed Wednesday that the intelligence community has ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats.

      He also made another stunning allegation. He says the NSA had ordered wiretaps on phones connected to then-Senate candidate Barack Obama back in 2004.

      “They went after–and I know this because I had my hands literally on the paperwork for these sort of things–they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the–and judicial,” Tice told Peter B. Collins on Boiling Frog Post News.

    • Leaked NSA Doc Says It Can Collect And Keep Your Encrypted Data As Long As It Takes To Crack It

      If you use privacy tools, according to the apparent logic of the National Security Agency, it doesn’t much matter if you’re a foreigner or an American: Your communications are subject to an extra dose of surveillance.

      Since 29-year-old systems administrator Edward Snowden began leaking secret documentation of the NSA’s broad surveillance programs, the agency has reassured Americans that it doesn’t indiscriminately collect their data without a warrant, and that what it does collect is deleted after five years. But according to a document signed by U.S. Attorney General Eric Holder and published Thursday by the Guardian, it seems the NSA is allowed to make ambiguous exceptions for a laundry list of data it gathers from Internet and phone companies. One of those exceptions applies specifically to encrypted information, allowing it to gather the data regardless of its U.S. or foreign origin and to hold it for as long as it takes to crack the data’s privacy protections.

    • Bush-Cheney began illegal NSA spying before 9/11, says telcom CEO

      Contradicting a statement by ex-vice president Dick Cheney on Sunday that warrantless domestic surveillance might have prevented 9/11, 2007 court records indicate that the Bush-Cheney administration began such surveillance at least 7 months prior to 9/11.

      The Bush administration bypassed the law requiring such actions to be authorized by FISA court warrants, the body set up in the Seventies to oversee Executive Branch spying powers after abuses by Richard Nixon. Former QWest CEO John Nacchios said that at a meeting with the NSA on February 27, 2001, he and other QWest officials declined to participate. AT&T, Verizon and Bellsouth all agreed to shunt customer communications records to an NSA database.

    • The Terror Con: How Keeping Americans Terrified Is Making Corporations Big Bucks

      For defense contractors, the government officials who write them mega checks, and the hawks in the media who cheer them on, the name of the game is threat inflation. And no one has been better at it than the folks at Booz Allen Hamilton, the inventors of the new boondoggle called cyber warfare.

    • US House bill would force Obama to declassify Fisa court decisions

      Two US congressmen introduced a bill on Thursday compelling the Obama administration to declassify the secret legal justifications for the wide-ranging surveillance programs run by the National Security Agency.

      The disclosure bill, a complement to one pushed in the Senate last week, is the latest in a series of legislative attempts to rein in the NSA’s collection and analysis of Americans’ phone records and, potentially, Internet usage.

    • Latest Guardian Scoop: When the NSA Can Use U.S. Data Without a Warrant
    • Revealed: the top secret rules that allow NSA to use US data without a warrant
    • Break free of PRISM with the EFFs PRISM Break site

      Avoid Prism and the NSA with the Electronic Frontier Foundation’s guide to maintaining your privacy – comprised of free and open source software

    • Linux Format 173 On Sale Today – Escape Google!
    • Google-a-go-go
    • France sets Google deadline for privacy changes

      The French data protection authority, CNIL, has today announced that Data Protection Authorities from France, Germany, Italy, the Netherlands, Spain and the United Kingdom have respectively launched enforcement actions against Google.

    • Apple co-founder says he admires Edward Snowden as much as Pentagon Papers leaker Daniel Ellsberg

      The Apple co-founder Steve Wozniak has backed NSA whistleblower Edward Snowden and admitted he feels “a little bit guilty” that new technologies had introduced new ways for governments to monitor people.

      “I felt about Edward Snowden the same way I felt about Daniel Ellsberg, who changed my life, who taught me a lot,” he said.

      Speaking to Piers Morgan on CNN he said he was not the kind of person to “just take sides in the world – ‘I’m always against anything government, any three letter agency,’ or ‘I’m for them’.”

    • How to fight PRISM

      Thursday 6 June, the day the PRISM story broke, was a good day to be a cryptographer. The sudden prospect of mass, unwarranted surveillance delivered an electric shock to thousands who were now looking for ways to protect their privacy online. At Cryptocat, we saw nearly 5,000 new individuals starting to use our free encrypted chat software. Other privacy and encryption services saw a rise of as much as 3,000 per cent in new users. – See more at: http://newint.org/blog/2013/06/21/prism-surveillance-nsa-software/#sthash.bP6q2IQe.dpuf

    • Lou Reed: NSA scandal is ‘very disturbing’

      Music veteran also says MP3s ‘sound like shit’ and journalists are ‘very problematic’ in first appearance since liver transplant

    • Lou Reed’s shock at Edward Snowden’s NSA revelations – video
    • Britain’s response to the NSA story? Back off and shut up
    • NSA revelations prompt questions about Australian intelligence agencies

      The independent senator Nick Xenophon is pressing for answers about whether Australian parliamentarians are being watched by intelligence agencies in the wake of revelations in the Guardian about the US Prism programme.

    • NSA Prism programme a game changer on web privacy, says Sir Martin Sorrell

      The founder of the world’s biggest marketing services company, Sir Martin Sorrell, has said he believes revelations about the National Security Agency’s Prism internet surveillance programme are a “game changer” that will spark a fundamental rethink of web privacy by web users.

    • Sir Martin Sorrell: The NSA’s Prism programme surprised even me – video
    • How NSA Spies on US Citizens Revealed in New Leaks

      Leaked documents have revealed how the United States’ National Security Agency (NSA) is able to gather and use information on US citizens.

    • NSA surveillance: don’t underestimate the extraordinary power of metadata
    • New NSA Warrantless Tactics Reveal Little Room For Presumption Of Innocence

      The Guardian released new details about the National Security Agency’s spying practices, which reveals how analysts can store vast sums of data without a warrant. Specifically, if the NSA “inadvertently” stumbles upon anything related to a potential crime, it can store the data for later investigations.

      Quite reasonably, the Supreme Court has declared that law enforcement can charge citizens with a crime if it’s being conducted in “plain sight“–e.g. if cops see pot sitting in the passenger seat of a car during a traffic stop. That is, the presumption of innocence doesn’t apply to if police inadvertent witness a crime. Unfortunately, the scope of the presumption of innocence gets tinier as the government’s eyes get bigger.

    • Secret rules let NSA keep U.S. data without warrant

      The National Security Agency may keep Americans’ emails and phone calls if they’re “believed to contain significant foreign intelligence,” secret papers show.

      The world’s largest spy agency may also keep U.S. citizens and legal residents’ domestic communications if NSA analysts believe the communications could suggest evidence of a crime, the documents published Friday by British newspaper The Guardian and The Washington Post indicated.

    • Provisions under which NSA can collect, retain data on U.S. residents revealed

      Two secret documents describing the procedures the National Security Agency (NSA) is required to follow when spying on foreign terror suspects reveal the provisions that allow the agency to collect, retain and use information on U.S residents without a warrant, The Guardian newspaper reported today.

    • ‘Indefinite Surveillance’ Under the 2014 NDAA?

      The National Defense Authorization Act recently approved by the House would build on powers currently available to government to allow unrestricted access to all personal data collected “during combat operations from countries, organizations, or individuals, now or once hostile to the United States,” political analyst Stephen Benavides reports at Truthout.

      The data are known officially as “captured records” and include any kind of personal file belonging to parties deemed to be in conflict with the United States. Of course, the war on terror’s expanding battlefield means those records do not have to be collected outside of the United States.

    • Indefinite Surveillance: Say Hello to the National Defense Authorization Act of 2014

      Passed in 1978, the Foreign Intelligence Surveillance Act (FISA) set the groundwork for surveillance, collection, and analysis of intelligence gathered from foreign powers and agents of foreign powers, up to and including any individual residing within the U.S., who were suspected of involvement in potential terrorist activity. On October 26, 2001, a little over a month after 9/11, President George W. Bush signed the USA Patriot Act into law. Two provisions, Sec. 206, permitting government to obtain secret court orders allowing roving wiretaps without requiring identification of the person, organization, or facility to be surveyed, and Sec. 215 authorizing government to access and obtain “any tangible thing” relevant to a terrorist investigation, transformed foreign intelligence into domestic intelligence.

    • 2014 NDAA Passes the House, With Many Amendments
  • Civil Rights

    • FBI Admits It Surveils U.S. With Drones
    • Brazil protests expand to over one million people
    • Brazil erupts in protest: more than a million on the streets

      The streets of central Rio de Janeiro and dozens of other cities echoed with percussion grenades and swirled with teargas last night as ranks of riot police scattered the biggest demonstrations Brazil has seen for more than two decades.

      As a minority of protesters threw rocks, torched cars and pulled down lamp-posts, the police fired volleys of pepper spray and rubber bullets into the crowd and up onto overpasses where car drivers and bus passengers were stuck in traffic jams. At least 40 people were injured in the city and many more elsewhere.

      A vast crowd – estimated by the authorities at 300,000 and more than a million by participants – filled Rio’s streets, one of a wave of huge nationwide marches against corruption, police brutality, poor public services and excess spending on the World Cup.

    • Brazil’s president meets protests with an anti-Erdogan response

      Protests have popped up across the globe in recent years, but government response has varied. Rousseff’s approach contrasted with the adversarial position of Turkey’s Erdogan, for example.

    • Judges order California to immediately release prisoners

      For decades, California’s political leaders have tried every imaginable approach to dealing with its overcrowded prisons – sending inmates out of state, fighting the federal courts all the way to the U.S. Supreme Court, promising more prison beds and insisting that it has done plenty to cut inmate populations and improve health care.

    • Guantánamo force-feeding does not trouble prison doctors

      Calls for the doctors who force-feed hunger-striking prisoners at Guantánamo Bay to refuse to perform the practice on ethical grounds have got nowhere, a spokesman for the prison said on Thursday.

  • Internet/Net Neutrality

    • Verizon accused of intentionally slowing Netflix video streaming

      In a user forum on Verizon’s website, a couple users claim their Netflix instant streaming quality has been on the decline. Some claim to continue to experience problems even after contacting Verizon’s customer service agents and working with them to resolve it.

  • Intellectual Monopolies

    • Canadian Government Maps Plan for Future Intellectual Property Reform

      The House of Commons may have adjourned for the summer, but just hours before breaking, the government filed its response to the Standing Committee on Industry, Science and Technology’s report on the Intellectual Property Regime in Canada. That may sound dry, but the document provides a clear indication of what the government has planned for the coming years on IP reform.

      So what’s in store? Leaving aside an assortment of promised studies on international best practices, improving patent quality, and improving research and development, the government response includes five notable plans (or non-plans).

    • Copyrights

06.19.13

Links 19/6/2013: Chromebooks Spread, Linux Community Distro Poll, Nokia Sale Talks Over, Subversion 1.8

Posted in News Roundup at 6:03 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Linux Potpourri: KDE 4.11 Beta, Debian 7.1, & Pisi Linux Beta

    There’s rarely a dull moment in Open Source World and if you look away for just a second you’ll miss something. Here are several interesting tidbits I found in my feeds I wished to share. KDE released 4.11 beta at the end of last week and it did indeed ship with Wayland support. Debian released an update to 7.0 Saturday and Pisi Linux (1.0) has made its first public appearance.

  • Tata Elxsi wins ‘Best User Experience’ design at Automotive Grade Linux Contest

    Tata Elxsi, a global design company and a part of the $ 100 billion Tata group, was declared winner of the first Automotive Grade Linux (AGL) User Experience Contest in the “Best User Experience” category.

  • Cumulus Networks Unveils a Linux Platform for Data Centers and Cloud Deployments
  • Start-up readies network-optimized Linux for data centers

    Start-up Cumulus Networks this week has emerged with a Linux network operating system designed for programmable data centers like the ones Google and Facebook are building.

    The company’s Cumulus Linux OS operating system includes IPv4 and IPv6 routing, plus data center and network orchestration hooks. Much like OpenFlow for independent, software-defined control of network forwarding, Cumulus Linux is intended to run on commodity network hardware and bring open source extensibility to high capacity data centers.

  • Cumulus Networks Comes Out of Stealth With Linux for Data-Center Networks
  • Planet Linux Caffe to Begin Accepting Bitcoin at HackMiami ‘Day of Bitcoin Secrets,’ Hackers and Cryptocurrency Enthusiasts Rejoice

    South Florida’s first Linux themed coffee shop will host a day of Bitcoin awareness and discussion.

  • Raspberry Pi gets its own media center kit: £46 for easy XBMC and controller (hands-on)
  • Desktop

    • Linux Desktop: Change vs. Conservatism

      The last five years of user revolts have left Linux desktop users wary of innovation. Too often recently, “innovation” has meant unwanted changes imposed without any consultation by developers upon users. As a result, Linux desktop development has become cautious, avoiding major changes that are visible to users.

      One sign of these times is that many users are voicing the opinion that this attitude is a good thing. They talk dismissively of change for change’s sake, and regard GNOME 2 with an awe that it never received during its heyday.

      However, if unrestrained change is undesirable, such conservatism seems simply its extreme opposite. Even granted that most experiments to improve the desktop will fail, some efforts at innovation seem desirable.

      If nothing else, such efforts help to attract and retain developers for a project — and, at best, they may occasionally come up with features that transform computing for their users, such as KDE’s Activities and Folder Views.

      Besides, some change is inevitable. Even post-revolt, some innovation persists on all the Linux desktops. Mostly, its long-term goals are poorly defined and sometimes tentative, but as computing changes, a few small innovations continue to find their way on to the screen despite the general lack of encouragement.

    • What Happened to the Mid-Range Chromebook?

      Chromebooks are about to get a boost in exposure, with Walmart and Staples adding the cheap laptops to their stores. But the expanded availability has left me wondering what happened to the best Chromebook of all, Samsung’s $450 Series 5 550.

    • Google Pumps The Retail Channel For Chromebooks
    • Google adds more retailers for Chromebook

      Google’s Chromebook laptop will be carried by over 6,600 stores around the world, as the company signs on more retailers.

      Starting Monday, Walmart is offering an Acer Chromebook, which has a 16GB Solid State Drive, in about 2,800 stores across the U.S. for US$199, while from this weekend, Staples will offer Chromebooks from Acer, Hewlett-Packard and Samsung Electronics in its over 1,500 stores in the country.

    • Reality Check: Success of GNU/Linux
    • Shipments of GNU/Linux PCs in India

      So, GNU/Linux is growing share in a market that’s growing installed base by 10% per annum currently. In 2012, 11 million PCs were sold in India. In 2006, the number was 5.4 million, a doubling in just 7 years. That’s hundreds of thousands of legacy PCs per annum installed with GNU/Linux and installations are growing 10% per annum or more. Meanwhile tens of millions of small cheap computers running Android/Linux are being bought by an emerging market in India. To the extent that the middle-class continues to grow, India is set for explosive growth of FLOSS for years to come.

  • Server

  • Audiocasts/Shows

  • Kernel Space

    • Linux Foundation Sponsors IT Training Scholarship

      The French revolutionary Georges Danton famously said, “After bread, education is the people’s first need.” And while the French Revolution and the channel may not have much in common, there are few places in which this populist message resonates better than the open source ecosystem, where providing development and other skills to volunteer contributors is vital to long-term success—which is exactly what the Linux Foundation is doing starting this week with its 2013 Linux Training Scholarship Program.

    • Linux creates scholarship for developer do-gooders and women

      The Linux Foundation this morning announced a change to its annual Linux Training Scholarship Program with new categories that reflect the evolving world of computer programming.

    • Share Your Expertise: Calling First-Time Speakers to Contribute at LinuxCon/CloudOpen North America

      The Linux Foundation produces more than 15 events a year. They range from the Linux Kernel Summit to CloudOpen to Automotive and Embedded Linux Conferences. If you have attended our events over the last few years you would likely have run into many luminaries from the world of Linux, open source and open cloud. We are fortunate to work every day with experts from the developer communities and with many of the largest open source projects and companies in the world. It’s a great talent pool to choose from.

    • Win a Linux training course in 300 words or less

      Attention Linux developers: If you’ve ever wanted to take a class with the Linux Foundation but have been held back by enrollment costs, then here’s your chance to win a scholarship.

    • Linux Foundation’s 2013 Training Scholarship Program Opens
    • Canonical names carrier group for Ubuntu Touch devices

      It’s graduation season and every day there are articles about the shortage of computer scientists. This includes a shortage of entry-level engineers, but also experienced SysAdmins, IT Architects and DevOps professionals in the enterprise IT market, especially as the market is undergoing a shift to cloud and highly automated IT environments.

    • New Linux Training Courses Address OpenStack, Enterprise Automation Needs

      It’s graduation season and every day there are articles about the shortage of computer scientists. This includes a shortage of entry-level engineers, but also experienced SysAdmins, IT Architects and DevOps professionals in the enterprise IT market, especially as the market is undergoing a shift to cloud and highly automated IT environments.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • What we did in KWin 4.11

        With the release of the 4.11 Beta 1 behind us it’s a good moment to look back on this last half year on development. KWin 4.11 is a very important release for us. As you might have heard at the last Plasma sprint we decided to make 4.11 the last release of the KDE workspaces based on Qt 4. Fear not: the KDE Software Compilation with all it’s great application will see a 4.12 release – at least I have not heard anything else, just the workspaces need some time to do the Qt 5 transition. In addition we want to provide extended bug fix releases for the 4.11 release of the workspaces. So 4.11 is a very important release – being the bridge towards Qt 5.

      • Summer with Amarok

        In this blog I will share information about my Google Summer of Code project “Audio СD collection refactoring”, which is a part of Amarok (if you still not aware of it Amarok is great music player).

      • Google Summer of Code 2013: Cantor + Python

        This year I have a project accepted to Google Summer of Code. This is my second time in the program and I am very happy and grateful for it

        This year I come back to Cantor, the KDE mathematical environment for several mathematical softwares like Maxima, Sage, Scilab, etc. In 2011 I developed the Scilab backend during Google Summer of Code. My mentor was Sylvestre Ledru, from Scilab team.

      • Akademy 2013, I’m coming!

        It is less than a week now. I’m very excited to attend Akademy 2013, the annual KDE Conference, this year for the second time. I just got my Spain visa few mins back.

      • Rekonq 2 – 2.2 Major Features Highlighted
      • Thank You Akademy Sponsors
    • GNOME Desktop/GTK

      • GNOME Accessibility bid selected

        The GNOME Foundation Board is happy to announce that following the Call for Bids for GNOME Accessibility Work, Igalia, a Spanish company, was selected to perform the work.

      • GNOME Files 3.9.3 Release

        The most significant change Nautilus 3.9.3 brings, is the port of Nautilus Sidebar in GtkPlacesSidebar Widget (Removal of nautilus-places-sidebar.c).

  • Distributions

    • Do-over for Linux Community Distro Poll

      Last week’s FOSS Force poll was only up for a few hours before we had to take it down.

      It dealt with the issue of community distros. If you’re interested, you’re welcome to take a gander at the article that accompanied the poll. Mainly, it sought to determine what you considered to be a community GNU/Linux distro. There had been quite a bit of discussion on the subject here on our site, so we decided to put it to you in a down and dirty poll, just to see if we could come to any kind of consensus.

      The comments to our poll article became quite heated. It seems that hardly anybody wanted to be left off the community distro bandwagon. Everybody wanted their favorite Linux distro to be considered a community distro.

      A lot of people took a notion that if their distro was said not to be a community distro, then that was the same as saying that it was full of bugs or didn’t work properly or something like that. It was like if we said your red car is not a black car, that somehow that meant we were saying there was something defective about your red car because it wasn’t black. It was odd. Made no sense to us. Still doesn’t.

    • Linux Community Distro Poll
    • New Releases

    • Screenshots

    • PCLinuxOS/Mageia/Mandrake/Mandriva Family

      • Anne Nicolas: Mageia project is a viable and mature

        Let’s cut this story short. My today’s guest is Anne Nicolas, the chairperson of Mageia.org association.

      • OpenMandriva Releases Public Alpha

        Back in May the OpenMandriva project treated interested parties to a tech preview, but today we discover an official public alpha release ready for testing. Not much else is ready, but there is an ISO. Downloading is slow going, but that’s not a completely bad thing.

    • Gentoo Family

    • Red Hat Family

    • Debian Family

      • Debian 7: A So-So Distro Not Worth Switching For

        Debian may be a granddaddy in the Linux world, but the latest version of the software isn’t much to look at. Debian 7, dubbed ‘Wheezy,’ is about as exciting as its name is unattractive, and it’s certainly not a showcase for the latest distro developments. To be kind, this latest Debian Linux release has little or no flash-bang impact under its hood.

      • SODIMM-style ARM COM is packed with I/O, runs Debian

        Glomation released an SODIMM-style computer-on-module built around an Atmel SAMA5D3 Cortex-A5 ARM processor, and supported with a Debian Linux stack. The GECM-5100 is equipped with gigabit Ethernet and TFT LCD controllers, and it also offers USB, CAN, SDIO/MMC/SD, image sensor, serial, analog, and digital I/O interfaces.

      • Slandering Debian GNU/Linux

        One thing the growing prominence of GNU/Linux has triggered is more slander from the powers that be.

      • Derivatives

        • Debian Edu interview: Victor Nițu

          The Debian Edu and Skolelinux distribution have users and contributors all around the globe. And a while back, an enterprising young man showed up on our IRC channel #debian-edu and started asking questions about how Debian Edu worked. We answered as good as we could, and even convinced him to help us with translations. And today I managed to get an interview with him, to learn more about him.

        • Canonical/Ubuntu

          • Ubuntu phone OS forms international Carrier Advisory Group

            [Eight carriers have joined the Ubuntu phone Carrier Advisory Group (CAG). CAG members will influence the Ubuntu Phone roadmap and participate as launch partners. The carrier group includes: Deutsche Telekom, Everything Everywhere, Korea Telecom, Telecom Italia, LG UPlus, Portugal Telecom, SK Telecom and the leading Spanish international carrier.]

          • Canonical Announces Formation of Carrier Advisory Group for Ubuntu Mobile Development
          • The future of Ubuntu on mobile: Canonical forms carrier group to shape OS
          • Google should acquire Canonical and merge Ubuntu with Android

            Ubuntu could easily emerge as a force to reckon with in the mobile industry. Perhaps a stand-alone Ubuntu platform won’t succeed (cause it lacks major backers), but Ubuntu for Android definitely has a chance. Just imagine using your regular Android smartphone as a full-blown Linux computer when you connect it to a bigger screen. Powerful stuff…

          • Testing: On To Saucy Salamader!

            With the upgrade of my main laptop to 13.04 (Raring Ringtail) I have now migrated my testing laptop to Saucy Salamander. I want to stress to everyone — this is my testing laptop and not one that I rely to store important content. I do use it daily for things like browsing the web, listening to music and playing Minetest with my children.

          • 10 Things We Want in Ubuntu 13.10 (Saucy Salamander)

            Ubuntu 13.04 wasn’t a big release. Apart from stability improvements, application updates, and performance tweaks, Raring Ringtail didn’t get the same amount of attention as Ubuntu’s previous releases did. That said, the distribution did lay the foundation for a bigger release, which is expected to come out this year and that is Ubuntu 13.10.

          • Ubuntu Weekly Newsletter Issue 321
          • Mac OS X vs Windows 8 vs Ubuntu Linux
          • Tweak Ubuntu Unity: Get a dock-style launcher and Unity Dash

            One of the biggest criticisms of Ubuntu Unity is the inability to move the Launcher. After having an epiphany, Jack Wallen illustrates one way you can have the best of both worlds.

          • Ubuntu Support: How to Get Help

            For those of us Linux users who are more adventurous, switching to a new operating system can be pretty exciting. Unfortunately, problems tend to crop up when a new user seeking help isn’t familiar with the best practices for finding support.

          • In-Fighting Continues Over Mir On Non-Unity Ubuntu

            For those looking for the latest drama in the Ubuntu Linux land, the fighting over whether KDE and GNOME should support the Mir Display Server to complement the in-development Wayland support continues to be hotly discussed.

          • Ubuntu for phones gets a telco carrier club

            Canonical has gathered together seven carriers including Deutsche Telekom, Everything Everywhere and Korea Telecom to create the Ubuntu Carrier Advisory Group (CAG) for Ubuntu for phones. The group will be confidentially briefed on Canonical’s plans for the upcoming phone operating system and will, in return, give the company feedback on those plans and get the chance to be a launch partner with the right to ship Ubuntu devices in their markets. Canonical expects further carriers, including “leaders in all major markets”, to join the group before its doors close in July. The current timetable will see Ubuntu for phones launched early in 2014.

          • EE gets behind new Ubuntu OS

            4G operator joins coalition of firms discussing development of new software.

            EE has pledged its support for a new operating system branded Ubuntu by joining a coalition of international operators, which will look to develop the new software, Mobile Today has reported.

          • Ubuntu Touch smartphone one step closer to shipping

            Having a great, Linux-based, mobile platform is one thing. Bringing it to the masses, in the form of actual smartphones (and tablets, phablets and whatever other words we’re using to describe “devices we can hold in our hand” nowadays), is quite another.

          • First Ubuntu smartphones get one step closer with backing of Carrier Advisory Group

            The arrival of the first Ubuntu OS-based smartphone took one step closer today with the formation of the Ubuntu Carrier Advisory Group – a collection of operators around the world that want a say in the ongoing development of the Ubuntu smartphone OS.

          • Canonical announces Ubuntu Carrier Advisory Group, first 8 telecom partners
          • Canonical names carrier group for Ubuntu Touch devices
          • Flavours and Variants

            • Peppermint OS Four Review: Linux Mint of Lubuntu with added Ice and Web apps!

              Peppermint OS Four is one distro, possibly, I haven’t paid sufficient attention till date. This week first time I made an honest effort to understand and use it for a few days continuously. I must say I am very impressed with the new Peppermint OS release – Peppermint OS Four. Earlier my impression was it is just repackaged Lubuntu. But, with continuous usage for a few days, my impression changed – it brings a lot more to the user than the parent distro Lubuntu. I guess you’ll understand more what I am saying in the remaining part of the review.

            • Review: Zorin OS 7 Core

              It has been almost exactly a year since I reviewed Zorin OS 6 Core, which was based on Ubuntu 12.04 LTS “Precise Pangolin”. The new version is based on Ubuntu 13.04 “Raring Ringtail”, so I’m reviewing that now.

  • Devices/Embedded

Free Software/Open Source

  • Kitware to Develop an Open-Source HPC Design-Analysis Environment for Nuclear Energy Research

    This research will provide advanced modeling and simulation of nuclear power reactors for the design of future systems and operation of existing plants.

  • OSI Seeks a General Manager

    On behalf of the board of directors, I am pleased to share the news that we have opened our first management position at the Open Source Initiative. Our search begins now and we expect to bring on board a new General Manager this summer.

  • Open Source Initiative seeks first manager

    The Open Source Initiative, the US non-profit organisation that defines open source and advocates its use, has announced that it is seeking its first full-time manager. The OSI has traditionally been run by the members of the board of directors, which has limited the organisation’s outreach and fundraising capabilities. Over the past few years though, it has been transitioning to a more active role in fostering the use and understanding of open source, reaching out and opening its doors to become a wider membership-driven organisation.

  • The Pistoia Alliance Releases HELM Biomolecular Representation Standard Open Source Tools

    The Pistoia Alliance is pleased to announce the release of the HELM biomolecular representation standard software toolkit and editor under the permissive open source MIT licence.

  • PrismTech Announces the Release of Open Source OpenSplice Community Edition v6.3

    PrismTech(TM), a global leader in standards-based, performance-critical middleware, today announced a major update to the Open Source OpenSplice(TM) Community Edition. This v6.3 update will provide access to the latest version of OpenSplice DDS along with several innovations that improve usability, productivity and performance.

  • NREL offers an open-source solution for large-scale energy data collection and analysis

    (Nanowerk News) The Energy Department’s National Renewable Energy Laboratory (NREL) is launching an open-source system for storing, integrating, and aligning energy-related time-series data. NREL’s Energy DataBus is used for tracking and analyzing energy use on its own campus. The system is applicable to other facilities—including anything from a single building to a large military base or college campus—or for other energy data management needs.

  • Free and Commercial Game Engines

    The appearance of new game engines with Linux support gives rise to hope that more games will start to appear in Linux versions. The free game engines are also getting better.

    Commercially successful games usually score high with their perfect blend of breathtaking graphics, well-animated characters, realistic lighting, spectacular sound, and convincing effects. These features all can be developed from the bottom up; nowadays, game engines come into play in this process. Game engines can cater to 2D or 3D graphics, and some come complete with the necessary development modules.

  • GlobalSign Offers Free SSL Certificates for Open-Source Projects, Helping Make the Internet More Secure
  • GlobalSign Offers SSL Certificates for Open-Source Projects, Helping Make the Internet More Secure
  • Virtualization: No Traction from Open Source Alternatives

    VMWare continues to lead the virtualization market. Open Source alternatives just aren’t getting any traction.

  • Events

  • Web Browsers

    • Chrome

      • Google’s VP9 Open Video Format Rolls Out in Chromium Build

        For years now, Google has been looking to take a leadership stance in web-based video formats. We’ve reported on its efforts to facilitate 3D online video, and we covered Google’s acquisition of On2, giving Google control of the VP8 video codec. Meanwhile, Google, of course, has YouTube under its belt, attracting countless eyeballs per day to the videos housed there.

      • Google’s VP9 web video codec enters home straight

        As planned in May, Google has now finalised the bit stream for VP9, its open video compression format. Chromium has included a beta VP9 decoder for some time and this has now been activated by default according to an entry in the issue tracker reading “Remove VP9 flag, and enable VP9 by default”. VP9 can also be enabled in the developer version of Chromium and Chrome (“Enable VP9 playback in video elements”). Google is planning to incorporate the final version of VP9 into Chrome 29 and enable it by default by 20 August. It is nonetheless likely to be some time before VP9 achieves a critical mass on YouTube – to date VP9 is limited to a few demo videos.

      • Spycam vulnerability reappears in Google Chrome’s Flash

        An issue, previously fixed by Adobe in October 2011, has reappeared in Google Chrome and allows attackers to take control of webcams and microphones from Flash content. At its heart the problem is an old one: click-jacking.

    • Mozilla

      • Mozilla’s Science Lab aims to revitalise the scientific process

        Mozilla has created a new initiative aimed at increasing internet adoption, digital research and the use of open source technologies among scientists and researchers. Kaitlin Thaney announced on her blog that she will be heading the newly created Mozilla Science Lab as Director. The initiative is funded by Mozilla and the Alfred P. Sloan Foundation and is connected to Software Carpentry, a volunteer organisation that already helps researchers “be more productive” by educating them in general computing skills and programming.

      • Mozilla’s Open Badges Program Picks Up Some Big Backers

        Mozilla is moving rapidly ahead with its Open Badges online credential verification initiative. Back in March, the company announced Open Badges 1.0, which it billed as “an exciting new online standard to recognize and verify learning.” Since then, the program has picked up some enthusiastic backing from former U.S. President Bill Clinton, and now, the folks behind Blackboard’s free,hosted CourseSites platform for massive open online courses (MOOCs) are backing Open Badges.

  • SaaS/Big Data

    • Open Source in the Cloud – How Much Should You Care?

      In his opening keynote for Red Hat Summit, Jim Whitehurst, the CEO of Red Hat asked the audience: “Name an innovation that isn’t happening in Open Source – other than Azure!” I can certainly add iPhone and AWS to the mix but let me stick to the cloud topic with the following question: “How much Open Source matters in the cloud?”

    • Embracing OpenStack: How Red Hat commoditized open source cloud computing
    • Spark: Open Source Superstar Rewrites Future of Big Data

      Even after naming ex-Google star Marissa Mayer chief exec, Yahoo often is derided as a thing of the past, a fallen giant struggling to keep pace with the likes of Google, Facebook, and Twitter. Behind the scenes, though, thanks to people like Sriharsha, Yahoo is in many respects a step ahead of its much flashier competition — and has been for years.

    • Apache CloudStack Weekly News – 17 June 2013
    • Why US Defense Agencies are Moving to the Cloud

      When it comes to embracing cloud and virtualization technologies, the panel agreed that a few years ago there were some concerns. Barrette noted that within the USAF there was some doubt whether they could use open source in an operational command and control environment. It is work that is ongoing and might potentially leverage work that the U.S. Navy has already made with its ACS stack (Afloat Cores Services). ACS includes JBoss Middleware and Linux components used by the Navy.

  • Databases

    • Did Oracle put another nail in MySQL’s coffin? Changes man page licence

      While naive users believed that Oracle will emerge as a champion of free software and polish OOo and MySQL to compete with arch rival Microsoft – the company disappointed everyone, especially the manner in which it handled the Java-Android case. Once the most promising office suite OpenOffice has disappeared from the surface, MySQL is also heading in the same direction.

    • Is MariaDB replacing MySQL?

      From next month, MariaDB will replace MySQL as the default database in Fedora. And now RedHat has announced its doing the same. Even Wikimedia started using it.

      So what is MariaDB, why is the switch happening, and what are the implications?

    • MySQL Cluster 7.3 is finalised

      Oracle has released version 7.3 of its MySQL Cluster software as GA (Generally Available). Highlights of the release, which have been previewed over the last 12 months, include a NoSQL JavaScript Connector for Node.js and Foreign Key support. The new edition works with the latest MySQL 5.6 release and improves throughput of connections between nodes with more scalable thread provisioning. A new auto installer also simplifies the set-up process, allowing for graphical configuration of what Oracle says are production-grade, automatically tuned clusters.

  • Oracle/Java/LibreOffice

    • LibreOffice 4.0.4 available

      The Document Foundation, the organization behind the development of LibreOffice, has announced LibreOffice 4.0.4. This is the last release before 4.1 branch and brings minor updates. One of the most interesting feature of the upcoming release is that users will be able to open PFD files and edit them.

      According to the press statement, “LibreOffice 4.0.4 features many improvements in the area of interoperability with proprietary document formats. This ongoing activity has been instrumental for the choice of LibreOffice by all major migration projects to free software since early 2012, including several central and local governments in Europe and South America.”

  • Education

    • Getting started with HFOSS in the classroom

      If we look at the big picture view, most frequently people think of student contribution as code. But student learning can span HFOSS (Humanitarian Free and Open Source Software) as an item to be studied. You can draw artifacts from HFOSS and not contribute back, although that’s not the preferred model. Contributing back starts the cycle of students being involved in a community. You can start as small as one assignment.

  • Business

  • Funding

  • FSF/FSFE/GNU/SFLC

    • MediaGoblin 0.4.0 adds document support

      MediaGoblin, the free software decentralised alternative to Flickr, YouTube, SoundCloud and other media sharing platforms, has been updated to version 0.4.0 and is now able to share documents. The new document support leverages Andreas Gal’s pdf.js to display documents within the browser, surrounded by MediaGoblin’s document metadata and controls and comment area. Servers with LibreOffice installed can also convert a wide variety of formats into displayable PDF content and offer readers both the original document and the PDF conversion for download.

    • Meet the GNUnet Devs @ Ruby Hackathon Munich

      On this July’s Ruby Hackathon organized by the Munich Ruby Usergroup is a special GNUnet related topic.

  • Project Releases

  • Public Services/Government

    • France and Germany launch open source collaboration

      OSBA and CNLL are also looking to make it easier for their members to access markets in neighbouring countries and to develop a shared list of IT policy demands, based on the CNLL’s 10 proposals for an open software policyPDFFrench language link and the OSBA’s guidelines and demandsPDF. Both documents call for greater consideration to be given to open source software in public sector IT procurement, greater emphasis to be placed on interoperability based on open, royalty-free standards, and freedom from patents.

    • Code for new Polish consultation web site to be open sourced

      Some further information is available on the EC’s open source portal, Joinup: the consultation web site is based on Drupal with the Zend Framework used to create code that links the web site to the ministry’s document management system; it is this code that will be open sourced. The site and code are still undergoing testing but it is expected that this will be completed in about one month. After that time the code will be released as open source, but it is as yet undecided from which code repository it will be made available.

  • Openness/Sharing

    • Dimple: PMSI Launches Open Source D3 API

      Practical Management Solutions and Insights (PMSI) has launched an open-source API project for business analytics: dimple. Dimple aims to open up the flexibility and power of d3 to analysts. With little d3 knowledge needed, the dimple API gives analysts access to the tools capable of creating dynamic graphical representations of datasets.

    • Open Data

      • G8 Open Data Charter and Technical Annex

        1) The world is witnessing the growth of a global movement facilitated by technology and social media and fuelled by information – one that contains enormous potential to create more accountable, efficient, responsive, and effective governments and businesses, and to spur economic growth.

    • Open Hardware

      • The Open Source RepRap Simpson 3D Printer Design Reduces Friction, Uses Less “Vitamins”

        This is the Grounded Experimental Delta 3D printer, aka the Simpson, a project built by computer science teacher Nicholas Seward that does away with the excess frames, pulleys, and hardware associated with earlier models. Seward wanted a machine that could print itself and used “less vitamins,” namely metal parts that the machine couldn’t create from scratch. There are still motors and controllers, but there are fewer in this model than in any other I’ve seen.

  • Programming

    • LLVM 3.3 introduces full C++11 support

      The developers of the LLVM compiler infrastructure have announced the release of LLVM 3.3, bringing full support for the features of the C++11 language standard to its C/C++ compiler frontend Clang, and adding new target infrastructures with AArch64 and the AMD R600 GPU. As part of IBM System Z support, S390 systems can now also be targeted. The developers point out that this release makes Clang “the only compiler to support the full C++’11 standard, including important C++’11 library features like std::regex”, something the developers completed earlier this year.

Leftovers

  • Reverse Graffiti: Washing Walls to Create Art
  • BT Chief Ian Livingston Leaving For Ministerial Job

    CEO of BT Ian Livingston is leaving the company after five years leading the telecoms giant, taking up an unpaid role as minister for trade and investment.

    Livingston will join the House of Lords prior to his ministerial appointment, before handing over the reins to Gavin Patterson, who moves up from CEO of BT Retail. Livingston made the same jump up in 2008, when he took over from the then BT Group CEO Ben Verwaayen.

  • Science

    • Lies, Damned Lies and Benchmarks

      Benchmarks can reveal the truth – well, some of the truth – about technologies. A well-constructed benchmark can provide a way to compare performance, reliability and other metrics that can make a difference in comparing product quality and effectiveness. But you have to look closely at what a benchmark is measuring and how it was run – and, even then, take its results with a large grain of salt. Here’s how to approach benchmarks and their touted results.

      Let’s start with the fundamentals. We’d all like to have some magic number that reveals “The Truth” about how good any given device or program is. There are no such numbers. Anyone who tells you that there is such a single performance benchmark is either lying or is trying to sell you something.

    • Quark quartet opens fresh vista on matter

      First particle containing four quarks is confirmed.

    • Do hens have friends? It seems not

      A Royal Veterinary College study has found that hens reared in commercial conditions do not form friendships and are not particular about who they spend time with.

    • Chickens ‘cleverer than toddlers’
  • Hardware

  • Health/Nutrition

    • The scam of growth

      Our study showed that the limestone left in the mountains contributed more to the economy than its extraction through mining, because limestone is an aquifer and holds water in its cavities and caves. Friends of the Doon Valley mobilised the citizens and in 1983, the Supreme Court ordered the closure of the limestone mines and all the polluting industries dependent on it. The Doon Valley was declared an ecologically sensitive zone and a green valley.

      Thirty years later, in violation of all laws, the chief minister of Uttarakhand, Vijay Bahuguna, signed an MoU with Coca Cola to set up a plant in village Charba. Wherever Coca Cola goes, it brings famine and pollution. This was the case in Plachimada in Kerala, where women started a movement and shut down the Coca Cola plant. Similar is the case in Mehdiganj near Varanasi. Each plant uses 1.5-2 million litres of water per day. This can create scarcity in the most water abundant region. On May 29, 2013, citizens from across India and the Doon Valley joined a solidarity rally of the Charba community to stop the Coca Cola plant.

      Today, our forests and rivers are dying. And as a society, we don’t seem to care even though every community whose land, forests and water are being grabbed are rising in revolt. It is probably the biggest ecological movement in our history.

    • Buzz off, Monsanto

      Last week, the term “bee-washing” emerged in public conversation. It doesn’t refer to some new bee cleaning service, but to the insidious efforts of Monsanto and other pesticide corporations to discredit science about the impacts of pesticides on bees — especially neonicotinoids — by creating public relations tours, new research centers and new marketing strategies.

      This week, pesticide makers are showcasing these tactics during National Pollinator Week with offers of free seed packets to people who take their poorly named “pollinator pledge.” The “bee-washing” term has gained traction as scientists and groups like PAN continue to cut through the misinformation and point to the emerging body of science that points to pesticides as a critical factor in bee declines.

  • Security

    • EMET 4.0 catches SSL spies
    • Oracle releases fixes for 40 Java holes

      Oracle has published its June Critical Patch Update for Java SE and, as expected, the update fixes 40 security holes, none of which require authentication and 37 of which are exploitable over the network. The company recommends users install the update as soon as possible.

    • Security issue in iOS Personal Hotspot

      Security experts at the University of Erlangen-Nuremburg have identified a security issue in iOS’s Personal Hotspot feature. The feature, also known as tethering, allows a phone to be used as a hotspot for other devices. A paper from Andreas Kurtz, Felix Freiling and Daniel Metz describes vulnerabilities they discovered in the feature.

    • Trove of medical devices found to have password problems

      Up to 300 various medical devices from 40 vendors have been identified as vulnerable to a hard-coded password issue, and two government agencies are working to get the word out and protect against exploits.

    • 7 essentials for defending against DDoS attacks

      With hackers who pull off take downs getting stealthier and more vicious, security leaders across all industries need to be prepared

  • Defence/Police/Secrecy/Aggression

    • Chomsky: Obama is ‘dedicated to increasing terrorism’

      In a wide-ranging interview with GRITtv host Laura Flanders, MIT professor and author Noam Chomsky plainly stated that President Barack Obama’s administration is “dedicated to increasing terrorism” all around the world.

      In his view, the NSA spying scandal clearly illustrates how subservient to corporate and state power the American media has become. “There would be headlines saying this is a bad joke” if the press wanted to be truly independent, Chomsky told Flanders.

      “The Obama administration is dedicated to increasing terrorism,” he went on. “In fact, it’s doing it all over the world. Obama, first of all, is running the biggest terrorist operation that exists, maybe in history. The drone assassination campaigns, which are just part of it… All of these operations, they are terror operations.”

    • US-Taliban breakthrough: Talks to begin in Doha tomorrow

      The Taliban and the US announced on Tuesday that they would hold talks on finding a political solution for ending nearly 12 years of war in Afghanistan as the militant movement opened an office in Qatar.

    • US to join direct peace talks in Qatar with Taliban over Afghanistan’s future

      ‘Peace and reconciliation’ milestone comes after US drops request for formal rejection of al-Qaida as precondition to talks

    • Taliban peace talks: ‘Peace and reconciliation’ negotiations to take place in Qatar

      ‘Peace and reconciliation’ milestone comes after US drops request for formal rejection of al-Qaida as precondition to talks

    • Obama downplays rift as Karzai pulls out of Taliban peace talks
    • Ron Paul Suggests Edward Snowden Might Be Killed in a Drone Strike

      It’s hard to tell how serious he is because in the recording he’s kind of chuckling, but Ron Paul told a Fox Business interviewer Tuesday, “I’m worried about somebody in our government might kill him with a cruise missile or a drone missile,” referring to Edward Snowden. We know Paul has some strong feelings about U.S. drone strikes — he floated impeachment for Obama after Anwar al-Awlaki was killed, and of course his son Rand Paul did that thirteen-hour filibuster over drone strikes on Americans. But seriously suggesting that Snowden, a high-profile figure who people still can’t agree whether to call a hero or a traitor, would get blown up by an extrajudicial drone strike, shows a certain detachment from reality shared by luminaries such as Rush Limbaugh.

    • Ron Paul: Edward Snowden May Be Target Of U.S. Drone Strike
    • Sicily’s mafia plotted to kill with drones 20 years ago

      A mafia turncoat has revealed that Sicily’s Cosa Nostra was a pioneer in the use of killer drones, testing bomb-loaded remote-controlled aircraft in the early 1990s.

      Two decades before the United States began using Reaper drones to strike terrorist targets in the Middle East, mobsters in Palermo were testing ways to kill rivals from the sky, Gaspare Spatuzza told a court yesterday.

    • China Denies Allegations about Recruiting Former CIA Agent

      The spokeswoman of the Chinese Ministry of Foreign Affairs denied the claims that China has recruited a former U.S intelligence agent who resorted to Hong Kong.

      Chun Hua Ling described these allegations as “pure nonsense.”

    • Ex-CIA Whistleblower Snowden Denies Congressmen’s Charge: ‘Not a Chinese Spy’

      Edward Snowden, the ex-CIA whistleblower responsible for “the biggest intelligence leak in the National Security Agency’s (NSA) history,” denied allegations that he was a Chinese spy.

    • Man Who Ranted About Poison, CIA On Plane Had Worked For State Department

      The man was detained after passengers on board United Airlines Flight 116 said he caused a disturbance. He is an American believed to be in his 30s, and claimed his name is Daniel Morgan Perry, during an anti-government rant recorded on a cellphone about nine hours into the 16-hour flight.

      “Your life is in jeopardy!” he shouted. “Your life is in jeopardy if you work for the NSA, you work for the CIA, you work for the National Reconnaissance Office, your life is in jeopardy!”

      The man had been pacing the aisles repeating his name, age and hometown of Binghamton, N.Y., passengers told WCBS 880′s Marla Diamond. He then began his rant about the NSA whistleblower Edward Snowden, WCBS 880’s Marla Diamond reported Monday.

      “He complained about being shot with darts during the entire flight,” passenger Jacques Roizen told CBS 2’s Tracee Carrasco.

      “He never threatened any individual on the plane. He didn’t threaten to blow up the plane. He didn’t threaten to divert the plane. He was just saying he had information relating to Ed Snowden,” passenger Peter Jones added.

    • Pakistan hopes CIA to stop drone strikes in FATA soon

      Pakistan’s newly elected government is hopping that the CIA, the US premier spy agency, to halt its drone attacks in the country’s north western…

    • Michael Hastings Probed the CIA Before Fatal Hollywood Crash

      Michael Hastings, the Buzzfeed writer who appeared to have died in a fiery Hollywood crash early today, had reported extensively on the CIA and was rumored to be continuing work on that beat at the time of his demise.

    • Michael Hastings – journalists pay tribute to ‘fearless’ war correspondent

      Hastings was a contributing editor at Rolling Stone, a magazine that afforded him free rein to pursue truth and expose hypocrisy in war-ravaged Afghanistan and Iraq. The conflicts impacted Hastings personally: in 2007, his then-fiancee, the aide worker Andi Parhamovich, was killed in an ambush in Baghdad.

      The 26-year-old Hastings commemorated his tragically-curtailed relationship in the book, I Lost My Love in Baghdad: A Modern War Story.

      On a sabbatical from war reporting, Hastings last year sought out the WikiLeaks founder Julian Assange for a judiciously-arranged interview when he was based at a friend’s house in the Norfolk countryside. With two digital recorders on the coffee table, Hastings asked the world’s most wanted whistleblower: “Are you fucked?”

      Assange was not the only subject of Hastings’ occasional intemperance. In an exchange with Hillary Clinton’s aide, Philippe Reines, in September 2012, Hastings was asked: “Why do you bother to ask questions you’ve already decided you know the answers to?”

      He replied: “Why don’t you give answers that aren’t bullshit for a change?”

      The response prompted Reines to call Hastings an “unmitigated asshole” and add: “Now that we’ve gotten that out of our systems, have a good day. And by good day, I mean fuck off.”

    • Google’s deep CIA and NSA connections

      As Robert Steele, a former CIA case officer has put it: Google is “in bed with” the CIA.

    • Too Much Involvement of the RAW, EU & CIA in Nepal

      In name of world peace and human rights America has been trying to impose its influence over the world by forwarding UN and NATO. America through its intelligence agency ‘CIA’ has been trying to incite an ethnic and religious conflict in the world so as to disintegrate sovereign nations. UN could have straightened such controversial policy of America. But with its restraint UN has also become controversial by allowing itself to be trapped in the imperialist network. Then, it is requested to all imperialistic nations and their intelligence Agencies should be backed from Nepal for the sake of Nepal’s stability.

  • Environment/Energy/Wildlife

  • Finance

    • Goldman Sachs Concedes Existence of Too Big to Fail

      Global megabanks and their friends are pushing back hard against the idea that additional reforms are needed – beyond what is supposed to be implemented as part of the Dodd-Frank 2010 financial legislation. The latest salvo comes from Goldman Sachs which, in a recent report, “Measuring the TBTF effect on bond pricing,” denied there is any such thing as downside protection provided by the official sector to creditors of “too big to fail” financial conglomerates.

    • On Bilderberg

      I was invited to the Bilderberg conference this year — embarrassed I hadn’t known anything about it before, and more embarrassed I hadn’t known anything about the controversy around it.

    • More Obama Administration Secrecy: Rep. Grayson Can’t Discuss Classified Trans-Pacific Partnership Draft

      OK, you remaining Obama fans: tell me why we should trust the biggest baiter and switcher in the history of the Presidency, particularly when he insists on unprecedented levels of secrecy? Because he has nice teeth and cute kids?

  • Censorship

    • Google erases G8 venue from Earth: Microsoft doesn’t

      As all the world that cares knows, the leaders of the eight most powerful nations in the world have just been holding a summit meeting at the Lough Erne Resort in Northern Ireland. Most accounts suggest that this is a 5-star golfing hotel complex, but according to Google Maps and Google Earth it is just a muddy field:

    • Porn Summit Threatens Britain

      Until our politicians wise up to the fact that filtering solves nothing, endless knee-jerk proposals from politicians attempting populism will harm us all.

    • Internet Censorship and Control

      The Internet is and has always been a space where participants battle for control. The two core protocols that define the Internet – TCP and IP – are both designed to allow separate networks to connect to each other easily, so that networks that differ not only in hardware implementation (wired vs. satellite vs. radio networks) but also in their politics of control (consumer vs. research vs. military networks) can interoperate easily. It is a feature of the Internet, not a bug, that China – with its extensive, explicit censorship infrastructure – can interact with the rest of the Internet.

    • Culture Secretary: internet companies will proactively police child abuse images

      Maria Miller says internet companies have agreed a “fundamental change in the approach of the industry to removing child abuse images that are too readily available online”.

    • UK internet providers commit £1m to eradicate child porn

      The UK’s four largest Internet Service Providers (ISPs) have pledged £1m in funding at a No 10 summit today to tackle the abuse of children online.

  • Privacy

  • Civil Rights

    • Turkey’s ‘standing people’ protest spreads amid Erdoğan’s crackdown

      Protesters turn to passive resistance after four people die in Erdoğan’s brutal response to Taksim Square demonstration

    • What do Bosnia, Bulgaria and Brazil have in common?

      Once again, it’s kicking off everywhere: from Turkey to Bosnia, Bulgaria and Brazil, the endless struggle for real democracy resonates around the globe.

    • Brazil – Police refuse to follow orders and removed from the post
    • Judge slams police force’s approach to CRB as “fundementally flawed”

      A Judge has called South Yorkshire Police’s approach to CRB disclosure “fundamentally flawed” after the force decided to disclose the fact that a teacher had been involved in legal proceedings, despite the fact that the individual was not convicted of an offence.

      The ‘old’ CRB system has seen lives ruined and this case is a very clear example of over reliance on a flawed system. After being found not guilty, it is abhorrent that South Yorkshire Police took the legal system into their own hands and used CRB disclosure as a means of issuing their own punishment. There must clearly be a system that ensures children and vulnerable adults are protected, however this must be balanced against unjust intrusion into people’s lives. If something cannot be proven in court then it is not right for the police to disclose details that imply guilt.

    • In Brazil, the mask of democracy is falling

      If Brazil’s oppressors are forced to recognize that an era of real democracy has arrived, I will be very happy to pay 20 cents more for my bus rides.

    • Brazil’s Half-Miracle

      On all the social media networks, there’s a hashtag that I have kept seeing the last few days: #ChangeBrazil, associated with unrest across Brazil. Since I may be going there soon for the huge FISL open source conference, I wondered exactly what was going on. I asked one of my friends in Brazil and she sent me a link to a video to explain it.

    • 7,822 Injured with 59 in Serious Condition

      Turkish Doctors Union (TTB) released a statement, saying that at least 4 people lost their lives and 7,822 protestors were injured in Gezi Park demonstration in 13 cities across Turkey.

      The union said the statement included all police violence-related injuries until June 17 at 6 pm local time.

      TTB said public hospitals, private hospitals and volunteer infirmaries that station in approximate with hot clash zones admitted 7,882 patients.

      “The majority of injuries were due to pepper gas-related burnt and respiratory complications; injuries related to canister hits, plastic bullets and muscle-skeleton system traumas (soft tissues injuries, cuts, burns, broken bones); head traumas; eyesight problems extending to vision loses due to use of plastic bullets; and internal organ injuries.

      According to the statement 4 people lost their lives: Mehmet Ayvalıtaş (Istanbul), Abdullah Cömert (Antakya), Mustafa Sarı (polis officer, Adana), Ethem Sarısülük (Ankara).

    • NDAA Passes House, Indefinite Detention Still in Statute

      While the nation was fully focused on the NSA scandals and Edward Snowden, Congress passed the National Defense Authorization Act of 2014. Republicans who voted no on H. R. 1960, the National Defense Authorization Act of 2014, included Rep. Justin Amash (MI-03),and Rep. Thomas Massie (KY-04).

      Out of the nearly 200 NDAA amendments introduced to the House for voting, only one could have prevented the mandatory military custody of an American citizen without charge or trial: the Smith-Gibson Amendment would eliminate the indefinite military detention of any person taken into custody under the authority of the 2001 Authorization for Use of Military Force (AUMF). This amendment failed by receiving 200 ayes and 226 nays. Out of the 226 votes in opposition to this article, 213 came from Republican congressmen.

    • Radel introduces amendments to Defense act

      Radel said the amendments are designed to preserve the rights of citizens on American soil and allow them due process rather than face detention without formal charges or justification.

    • China was right all along: some thoughts on the PRISM case

      Recently the world has learned, thanks to the act of courage of a whistleblower named Edward Snowden, the exact proportions of the U.S. surveillance state.

      As a European citizen I find this, to say the least, very disturbing and hope that my country and all other European countries will do something to stand up against this blatant violation of users privacy.

      [...]

      This aspect is interesting for 2 reasons. The first is that I see this as a competitive advantage for companies that deal with personal information that are not based in the U.S. Why would I even want to have my personal data handled by a company that I know will collude with a rogue organization such the NSA?

      The second aspect is perhaps even more interesting and controversial. China has a long history of censorship and surveillance, however I think that this story demonstrates us how they were actually the most farsighted. Chinese citizens have a social contract with their state. They give up some of their personal freedoms in exchange for security. The freedoms that they give up are quite a bit, but their state, in this circumstance, has demonstrated to have managed to successfully protect them from some threats.

    • What’s happening in Bulgaria?

      protesters on the streets of Sofia need your support

      [...]

      At first glance, beautiful Bulgaria has a lot of democracy going on — laws, elections, a parliament, a president, markets, EU membership, free will, the works, we have it. Look from the outside, and it’s clearly there. The inside of this strange hologram, though, feels very different, especially if you’re a Bulgarian.

      [...]

      ДАНС (say “dance”) is kind of like the NSA, only smaller. Yet, much like the NSA, they too can listen in on communications. Imagine what happens when the (top-level access clearance) head of agency is a politician?

    • Wearing a mask at a riot becomes a crime today

      Maximum 10-year prison term for conviction of new offence

    • FBI director admits domestic use of drones for surveillance

      The FBI uses drones for domestic surveillance purposes, the head of the agency told Congress early Wednesday.

    • FBI admits to using surveillance drones over US soil
    • Naked Rambler Stephen Gough jailed for breaching asbo
  • DRM

    • German court forbids open-source download manager JDownloader

      A German court has ruled that the open-source download manager JDownloader2 is forbidden. The tool can be used to record DRM protected video streams. The developer of the software argues that the record feature has been removed and was only available in nightly builds.

  • Intellectual Monopolies

    • Exempt the NHS from the US/EU Free Trade Agreement

      The NHS changes have been both promoted and fought as a national issue. However, they are actually part of the preparation for a corporate-interest US/EU Free Trade Agreement.

    • WIPO: Informal Economy Innovates In The Absence Of Intellectual Monopolies

      One of the problems with the debates around copyright and patents is that they too often assume that intellectual monopolies are necessary in order to promote innovation or even basic economic activity. But that overlooks all kinds of domains where that’s not true. In the field of technology, free software and the other open movements based on sharing are familiar examples of this kind of thing. Less well known so are the so-called “informal economies” found in many parts of the world.

    • Copyrights

      • Public Outcry In Taiwan Kills Their Version Of SOPA

        At the end of May, we wrote about the Taiwanese government’s bizarre proposal to create a copyright bill that was like SOPA, but even worse. Apparently, the folks at the Taiwan Intellectual Property Office (IPO) had slept through the whole SOPA thing. Thankfully, the Taiwanese quickly did their own version of the SOPA blackout, with Wikipedia Taiwan and Mozilla Taiwan set to participate. However, seeing the writing on the wall (and, perhaps, someone showed the IPO folks what happened in the US), and the proposal was abandoned before the protest was even needed.

      • New Anti-Piracy Group Will Monitor File-Sharers and Block All Major Torrent Sites

        A spokesman for Telenor said that as far as they are concerned there is already a final judgment on how to deal with blocking requests for The Pirate Bay (i.e the law doesn’t allow for it) but if a new application is made to the courts in light of the new law, the ISP will deal with it accordingly.

      • Warning Letters Under UK’s Three Strikes Plan Unlikely To Be Sent Out Before 2016 — If Ever
      • Sweden Makes It Illegal To Take Photos In ‘Private Environments’ Without Permission

        But until the exact limits of that provision are defined, along with what “justifiable” means, it seems inevitable that the new law will have a chilling effect on investigative journalism in Sweden. That’s rather ironic, since you might expect that the abundance of digital cameras today would lead to the rich and powerful being caught out and called to account more often, not less.

      • Kim Dotcom: All Megaupload servers ‘wiped out without warning in data massacre’

        Kim Dotcom has accused the US government and Leaseweb, one of the hosting providers of former file-sharing site Megaupload, of deleting millions of personal files “without warning.”

      • Kim Dotcom: Petabytes of MegaUpload users’ data has been destroyed

        In late 2011, Kim Dotcom’s Megaupload file-sharing site was one of the top 100 Websites in the world. Then, the FBI, working in concert with New Zealand police, seized the site and all the user files within its servers.

      • Hollywood’s New Talking Point: Gatekeepers Are Awesome

        We’ve argued for years, that there are different kinds of middlemen involved in making markets. Some are efficient, leading to better reach, easier access, and more convenient transactions, while some are inefficient, blocking access, keeping prices inflated, and generally limiting a market. We tend to separate these into two camps: gatekeepers, who limit efficiency, and enablers, who increase efficiency. In truth, there’s a pretty big spectrum between those two endpoints, and a single company can shift back and forth along the spectrum between being a gatekeeper some of the time and an enabler at other times. Historically, it’s generally (though not always) been true that disruptive innovators are enablers, breaking down the walls set up by the gatekeepers, making markets more efficient, and generally distributing power away from a central gatekeeper out to the end points (the actual participants in the market, rather than the middleman). However, I had thought that it was at least generally recognized and accepted that gatekeepers tend to be bad for markets, and enablers tend to be good.

06.18.13

Links 18/6/2013: Ubuntu Linux for Phones Attracts Carriers, Nokia Might be Saved by China/Android

Posted in News Roundup at 4:55 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Cat-like robot runs like the wind, on Linux

    Researchers at EPFL’s Biorobotics Laboratory (Biorob) announced a cat-like robot that is claimed to be the fastest quadruped robot under 30 kilograms. The Cheetah-cub Robot, which runs real-time Xenomai Linux on an x86-based RoBoard control board, mimics the biomechanics of a cat to increase the speed and stability of it quadroped legs, helping it achieve speeds of 1.42m/s.

  • Desktop

    • Chromebooks: coming to more stores near you

      In Northern California where I live, summer is here, which means family vacations, kids’ camps, BBQs and hopefully some relaxation. But it also means back-to-school shopping is just around the corner. So in case you’re on the hunt for a laptop in addition to pens, paper, and stylish new outfits, your search just got a whole lot easier. Chromebooks—a fast, simple, secure laptop that won’t break the bank—will now be carried in over 3 times more stores than before, or more than 6,600 stores around the world.

    • Google adds more retailers for Chromebook

      Google’s Chromebook laptop will be carried by over 6,600 stores around the world, as the company signs on more retailers.

      Starting Monday, Walmart is offering an Acer Chromebook, which has a 16GB Solid State Drive, in about 2,800 stores across the U.S. for US$199, while from this weekend, Staples will offer Chromebooks from Acer, Hewlett-Packard and Samsung Electronics in its over 1,500 stores in the country.

  • Server

    • Containers—Not Virtual Machines—Are the Future Cloud

      Cloud infrastructure providers like Amazon Web Service sell virtual machines. EC2 revenue is expected to surpass $1B in revenue this year. That’s a lot of VMs.

    • China Bumps U.S. Out of First Place for Fastest Supercomptuer

      China’s Tianhe-2 is the world’s fastest supercomputer, according to the latest semiannual Top 500 list of the 500 most powerful computer systems in the world.

      Developed by China’s National University of Defense Technology, the system appeared two years ahead of schedule and will be deployed at the National Supercomputer Center in Guangzho, China, before the end of the year.

    • Linux continues to rule supercomputers

      If you want a really fast computer, then Linux is your operating system and Intel may be your chip manufacturer.

  • Kernel Space

    • Coreboot Doing AMD USB 3.0, Q35 QEMU Emulation

      In recent days there have been a number of interesting code commits made to the growing Google-backed Coreboot project.

    • Linux Scholarships Aim to Increase Access to In-Depth Linux Education: Apply Now

      Ninety-three percent of employers plan to hire a Linux pro in the next six months. Ninety percent of hiring managers say it’s difficult to find experienced Linux professionals. When they do find them, they’re offering higher salaries and more perks.

      These are the startling and exciting facts that are surfaced in this year’s Linux Jobs Report (Dice.com/Linux Foundation). But they pose both an opportunity and a challenge for the Linux community: the need to increase access to in-depth Linux training opportunities to help meet this unprecedented demand. And, The Linux Foundation is working on tackling this challenge with its comprehensive set of in-depth Linux training courses.

    • Graphics Stack

      • Intel GPU Driver Tries To Rip Out FBDEV Support

        Intel’s Daniel Vetter is attempting for the Intel DRM graphics driver to remove support for its FBDEV frame-buffer layer with a new patch-set entitled “fbdev no more!”, but will this finally usher in the killing of the Linux kernel’s FBDEV subsystem?

    • Applications

      • Gnome Encfs Manager

        The Gnome Encfs Manager (or short GEncfsM) is an easy to use manager and mounter for encfs stashes featuring per-stash configuration, Gnome Keyring support, a tray menu inspired by Cryptkeeper but using the AppIndicator API and lots of unique features. Whether you want to let it do things as simple as mounting a stash at startup, which is often used in conjunction with cloud-synced folders on services like Dropbox and Ubuntu one, or whether you want to let it automatically mount and unmount your stashes on removeable drives like USB-sticks, SD cards or even network-resources, GEncfsM is designed to do all the work for you.

      • Proprietary

      • Instructionals/Technical

      • Games

        • Incredipede on sale for half price on Steam, now free on Linux

          Northway Games’ Incredipede is on sale for half price on Steam for the next week, and the Linux version is now free on the game’s website, the studio announced today.

          The physics-based puzzle game, which was nominated for a 2013 Independent Games Festival award, is available on Windows PC, Mac and Linux. It regularly costs $9.99 on Steam, but the PC and Mac versions are available for $4.99 from today through June 24.

        • A contender to Unity for Linux appears, enter Leadwerks
        • Incredipede’s Linux version goes free

          Incredipede developer Colin Northway says he made the Linux version free “because Linux users are such strong supporters of indie games,” and because he enjoys its open source philosophy. Incredipede is available for Linux right here, and though it will run fine out of the gate Northway includes a list of tweaks to make it extra pretty.

    • Desktop Environments/WMs

    • Distributions

      • New Releases

      • Red Hat Family

      • Debian Family

        • Debian 7.1 update released

          Newly stable Debian 7 “wheezy” is receiving its first update, 7.1, which mainly includes bug fixes and corrections to security issues

        • Derivatives

          • Skolelinux 7.0.0 Alpha 2 Is Now Available for Testing

            The second Alpha release of the upcoming Skolelinux 7.0 (formerly Debian Edu) Linux operating system has been made available for download and testing last evening, June 10, 2013.

            Skolelinux 7.0.0 Alpha 2 is still based on the stable Debian GNU/Linux 7.0 (Wheezy) distribution and features Iceweasel 17, the xoscope oscilloscope application, the GTick metronome software, the Lingot musical instrument tuner, and Piano Booster, a MIDI file player.

          • Canonical/Ubuntu

            • System76 Galago UltraPro packs a Haswell chip and Ubuntu into a .75-inch thick chassis

              Linux boutique System76 pulled the wraps off several new laptops yesterday, including the Galago UltraPro. It’s a sleek new notebook that runs an Intel Core i7 Haswell chip — which means it should offer plenty of power and exceptional battery life. According to System76, the Galago UltraPro is also the first laptop under one inch thick to ship with Intel’s Iris Pro graphics.

            • Customized Ubuntu OS for kiosks and digital signs

              Logic Supply has signed a deal with RapidRollout to offer the latter’s custom Linux appliance platforms on embedded computers aimed at non-desktop applications such as interactive kiosks and digital signage. RapidRollout is a lightweight, customized version of Ubuntu enhanced with features like remote management tools and easy-to-use configuration and set-up utilities, says the company.

              RapidRollout’s “appliance OS” is a customized, open source version of Ubuntu Linux designed for kiosks and digital signage appliances. Aimed at customers that lack Linux expertise, the lightweight stack adds kiosk/signage features such as touchcscreen support, and removes unwanted desktop Linux features.

            • Ubuntu and XDA: An Awesome Relationship

              Ever since we first announced Ubuntu for phones on January 2nd this year, a fantastic relationship with our friends in the XDA community has formed. For quite some time now we have been releasing daily images of Ubuntu for phones/tablets and our friends in the XDA community have been working to enable these images for a wide range of devices.

            • Simplifying App Websites With Juju
            • Ubuntu Phone Gets Support From Eight Carriers

              Ubuntu Phone has been gradually getting attention not only of users and developers but also of network carriers, who will eventually make the device available to the masses. Canonical, the parent company of Ubuntu, announced today a new Carrier Advisory Group formed with founding members Deutsche Telekom, Everything Everywhere, Korea Telecom, Telecom Italia, LG UPlus, Portugal Telecom, SK Telecom and the leading Spanish international carrier. More information on CAG on Ubuntu’s Phone page.

            • Ubuntu Carrier Advisory Group Announced

              We are working on a powerful vision with Ubuntu; to build a convergent Operating System that runs on phones, tablets, desktops, and TVs. A core part of this vision is that this is a platform and ecosystem that you can influence, improve, and be a part of, significantly more-so than our competitors.

            • ‘Ubuntu on Android may help find next Einstein’

              Linux International boss suggests wiring brains into computers as a backup plan

            • Ubuntu phone OS has eight carriers signed on to boost development

              Canonical has formed a “Carrier Advisory Group” of eight mobile operators who will collaborate to influence the development of Ubuntu for smartphones.

              Canonical said the first members of the group are Deutsche Telekom, Everything Everywhere, Korea Telecom, Telecom Italia, LG UPlus, Portugal Telecom, SK Telecom, and “the leading Spanish international carrier.” Canonical declined to identify the Spanish carrier when we contacted them, although based on the description it may be Telefónica (also known as O2). With the exception of Deutsche Telekom, the owner of T-Mobile, the list doesn’t include any major US carriers. Canonical said that “any national or multinational carrier” may join.

    • Devices/Embedded

    Free Software/Open Source

    • [OSI] Individual Members Election 2013

      One of OSI’s main activities at present is to switch governance to become a member-based organization. Towards that goal, earlier this year we held an Affiliate election, and we are now announcing our first Individual Members Election.

    • OSI Seeks to Hire General Manager
    • Joeffice, an open source office suite one developer built in 30 days

      Don’t like Microsoft Office? Just build your own office suite—this guy did.

    • Project Cauã: revolutionising IT for the masses

      Project Cauã, the Free and Open Source Software and Hardware (FOSSH) project conceived by Linux International executive director Jon “Maddog” Hall to make it possible for people to make a living as a systems administrator, is set to launch in Brazil next month.

      The vision of Project Cauã is to promote more efficient computing following the thin client/server model, while creating up to two million privately-funded high-tech jobs in Brazil, and another three to four million in the rest of Latin America.

    • Web Browsers

    • Funding

      • Crowdfunding Experiment: Leadwerks for Linux

        Last week we launched our Steam Greenlight campaign to get Leadwerks into the hands of the Steam community. This week, we’re rolling out the second stage of our plan with a Kickstarter campaign to bring Leadwerks to Linux. This will let you build and play games, without ever leaving Linux. The result of this campaign will be Leadwerks 3.1 with a high-end AAA renderer running on Linux, Mac, and Windows, with an estimated release date before Christmas.

    • FSF/FSFE/GNU/SFLC

    • Programming

      • LLVM/Clang Now Uses Loop Vectorizer At New Levels

        The LLVM Loop Vectorizer is now being utilized by default at new optimization levels, in the name of faster performance.

      • LLVM 3.3 Release!

        LLVM 3.3 is the result of an incredible number of people working together over the last six months, but this release would not be possible without our volunteer release team! Thanks to Bill Wendling for shepherding the release, and to Ben Pope, Dimitry Andric, Nikola Smiljanic, Renato Golin, Duncan Sands, Arnaud A. de Grandmaison, Sebastian Dreßler, Sylvestre Ledru, Pawel Worach, Tom Stellard, Kevin Kim, and Erik Verbruggen for all of their contributions.

    Leftovers

    • Science

      • Are There Plenty of Fish in the Sea?

        Fish aggregating devices, also knows as FADs, generally refer to artificial structures that are deployed in the ocean to attract schools of fish. FADs function as open-ocean “meeting points” with multiple species gathering underneath them.

        While FAD fishing can be an efficient method for catching large schools of tuna, industrial-scale FAD fisheries can have significant adverse impacts on tunas and other species. Since the late twentieth century, FAD use in the world’s oceans has soared due to the new technologies that have allowed for their widespread use by industrial-scale purse seine vessels targeting tuna.

    • Security

      • Critical vulnerability in Blackberry 10 OS

        The exploit uses BlackBerry Protect, a service that allows users to manage their device without having to use the BlackBerry Enterprise Service (BES). Protect can use BES find lost devices, lock or delete them, and reset the password. It can also back up and restore data. Protect is off by default and must be activated by the user.

    • Defence/Police/Secrecy/Aggression

      • Cop Shot Litter of Kittens in Front of Screaming Children

        On Monday in Ohio, animal control Officer Barry Accorti shot and killed a litter of kittens in front of freaked-out children nearby. “He informed [a witness] that shelters were full and that these cats would be going to kitty heaven,” Ohio SPCA Executive Director Teresa Landon told the Sun News.

        Landon said the home owner, who had called for help, assumed the officer “would be trapping them or something and taking them to a shelter and they would be humanely euthanized if they were not adopted.”

        “Instead, he went to his truck and got a gun, which she thought was a tranquilizer gun, and walked around to the back of the house and approximately 15 feet from her back door shot and killed the 8- to 10-week-old kittens.”

        The stunned observer alerted the Ohio SPCA to the officer’s actions, and the animal rights group responded with a Facebook campaign to “expose” the behavior and call for accountability.

      • Syria and Sarin: Skepticism Still Warranted

        That’s the kind of language you’re likely to hear in the corporate media when it comes to Syria. And while it demonstrates a fundamental misunderstanding of what the word “confirm” means, it also betrays a lack of skepticism when it comes to government claims about the WMDs of “enemy” countries.

      • Drone Strikes on American Citizens Banned in New Defense Bill Amendment

        Amendment would allow strikes on those ‘actively engaged in combat’ against the United States

      • Undercover CIA agent files lawsuit over stalled war crimes inquiry – full court document
      • Undercover CIA agent sues agency over stalled probe of alleged war crimes

        A senior undercover CIA officer, accused by the spy agency of “war crimes”, has alleged that it halted an internal investigation that could have exonerated him and placed him under surveillance instead.

        The lawsuit, which comes as US intelligence is reeling from controversy over its surveillance of Americans’ communications records, is expected to be filed Friday in a Washington federal court by longtime intelligence attorney Mark Zaid.

      • Uri Geller psychic spy? The spoon-bender’s secret life as a Mossad and CIA agent revealed

        A new documentary claims the showbiz psychic is involved in global espionage – and that after 9/11 he was ‘reactivated’ as a pyschic spy. Geoffrey Macnab finds out more

      • Uri Geller ‘worked as a CIA spy against the Russians’

        Uri Geller allegedly worked as a CIA spy during the Cold War, according to a new documentary.

        The spoon-bender is said to have helped the US in a “psychic arms race” against Russia.

      • Black hole of CIA devours Poland

        The issue of secret CIA prisons has resurfaced in Poland again. Waleed Mohammed Bin Attash, a native of Yemen, appears as a victim of the new secret CIA prisons scandal. Amnesty International and the ECHR have already joined the case, while Poland has found itself in a storm of criticism. However, the official Warsaw continues to hold the line and drag out the investigation of the case.

      • Dilemma for the Warfare- Surveillance State: NSA and CIA Cannot be Sure that its Personnel “Will Obey the Rules”

        Agencies like the NSA and CIA — and private contractors like Booz Allen — can’t be sure that all employees will obey the rules without interference from their own idealism. This is a basic dilemma for the warfare/surveillance state, which must hire and retain a huge pool of young talent to service the digital innards of a growing Big Brother.

        With private firms scrambling to recruit workers for top-secret government contracts, the current situation was foreshadowed by novelist John Hersey in his 1960 book The Child Buyer. When the vice president of a contractor named United Lymphomilloid, “in charge of materials procurement,” goes shopping for a very bright ten-year-old, he explains that “my duties have an extremely high national-defense rating.” And he adds: “When a commodity that you need falls in short supply, you have to get out and hustle. I buy brains.”

      • Obama’s Drone-Master

        It is February, shortly after his raucous confirmation hearings for the top job at Langley, and he has agreed to a rare interview—so far as I can tell, still his only one this year—to talk about America’s drone campaign, a program he’d helped to steer. Outside estimates of the death toll range as high as 4,000 (numbers the administration scoffs at), including at least four American citizens. And though you and I are probably never going to join Al Qaeda or hang out with militants in Yemen, our government definitely thinks it could kill you if it thought you had joined up with Al Qaeda or were hanging out with militants in Yemen. It is a worrying indication of where things are headed that in his May counterterrorism speech, the president actually had to reassure people, “For the record: I do not believe it would be constitutional for the government to target and kill any U.S. citizen—with a drone, or with a shotgun—without due process, nor should any president deploy armed drones over U.S. soil.”

      • CIA Director Brennan Corrects The Record On Drone Program

        Sen. Bob Corker (R-Tenn.) is blocking millions in State Department funds for Afghanistan, until President Obama discloses details abut the CIA’s decade-long effort to funnel cash to Afghan leaders, including President Hamid Karzai.

        The ranking Republican on the Senate Foreign Relations panel has put a hold on $75 million in government aid to Kabul “until such time as I receive sufficient information” on the CIA program, Corker said Monday.

      • Corker blocks Afghan war funds over CIA ‘ghost money’ program

        Sen. Bob Corker (R-Tenn.) is blocking millions in State Department funds for Afghanistan, until President Obama discloses details abut the CIA’s decade-long effort to funnel cash to Afghan leaders, including President Hamid Karzai.

        The ranking Republican on the Senate Foreign Relations panel has put a hold on $75 million in government aid to Kabul “until such time as I receive sufficient information” on the CIA program, Corker said Monday.

        Read more: http://thehill.com/blogs/defcon-hill/policy-and-strategy/305991-corker-blocks-afghan-war-funds-over-cia-ghost-money-to-karzai-government-#ixzz2WYtabKZx
        Follow us: @thehill on Twitter | TheHill on Facebook

      • Why Did A Profile On The Incoming CIA Deputy Director Focus On Her Her Bookstore ‘Erotica’ Nights?

        Last week, President Obama made history by announcing the first-ever female deputy director of the CIA. Avril Haines immediately started getting all the attention the media gives to people once they realize this person exists and therefore they need to cover some kind of interesting angle on them for viewers/readers. The Daily Beast dug up a story that in the 90s, Haines ran a bookstore where a lot of erotic fiction was read. No, you did not read that wrong. Media Matters raises an important question about the highlighting of this particular detail: is this the kind of profile that only women get, and is it fair?

      • CIA’s New Deputy Director a Former Bookseller
      • Suspected Islamists Massacre Female Students in Pakistan: The Folly of CIA, MI6 and ISI

        In the past the government of Pakistan involved itself in Afghanistan alongside America, Saudi Arabia, the United Kingdom and other Gulf nations. The upshot of this was that Gulf petrodollars spread Takfiri and Salafi Islam alongside supporting indigenous Sunni Islamist militant organizations. America, Pakistan and the United Kingdom utilized the CIA, ISI and MI6 respectively in order to train Islamist fanatics against the communist government of Afghanistan in the 1980s. Several decades later and the folly of this policy can be seen by the fact that so many women reside in shadows in both Afghanistan and Pakistan. Of course, you have places in both nations which are more open but the darkness of religious bigotry resides within terrorist organizations and in state institutions in both countries.

      • Guantanamo detainee seeks victim status in Polish investigation into secret CIA prison

        A Yemeni man held at Guantánamo has become the third person to seek “victim status” in an ongoing investigation by the Polish Prosecutor’s Office into Poland’s involvement in the US-led rendition and secret detention programmes.

        This morning Mariusz Paplaczyk, the Polish lawyer of Yemeni national Walid bin Attash, announced that yesterday he had submitted an application requesting the Prosecutor’s Office grant his client “injured person” (victim) status. After his arrest in Pakistan in 2003, Bin Attash passed through a number of CIA “black sites”, including one in Poland, before being taken to Guantánamo, where he currently awaits trial by military commission.

      • Kerry condemns Assad for threatening peace talks as CIA ‘prepares’ to arm rebels

        On Saturday, the Washington Post reported that clandestine bases in Jordan and Turkey would serve as conduits for arms being delivered to the rebel fighters amidst fears American armaments would fall into the hands of Syria’s many Islamist factions.

      • CIA veteran’s lessons on arming rebels

        Thirty-year CIA veteran Milton Bearden knows a thing or two about providing arms to rebels. As a field officer in Pakistan and Afghanistan from 1986 to 1989, he oversaw the $3 billion covert program to arm the Afghan mujahideen to fight the Soviet occupation — a program that has become the textbook example of how arming rebel groups can have unintended consequences once the war is over.

      • Senator blocks money to Afghanistan until he gets answers about alleged CIA payments to Karzai
      • Marines’ Deaths Linked to CIA Narcotrafficking

        The murder of Marine Colonel James E. Sabow and other Marines whose deaths (officially ruled ‘suicides’) are linked to the use of El Toro assets during the 1980s and 1990s to import South American cocaine into the U.S and to export weapons to the Contra Rebel faction of Nicaragua.

      • Switzerland Questions U.S. Over CIA Drunk Driving Gambit

        The Swiss government has formally asked the U.S. for “clarification” on a claim from alleged NSA leaker Edward Snowden that CIA agents in Geneva pushed a banker to drink and drive as part of a dangerous recruitment ploy.

        Snowden, the man who claims to have given top secret documents on the National Security Agency’s vast surveillance programs to two major newspapers, briefly discusses the scheme in an interview with the U.K. newspaper The Guardian, saying it was a “formative” moment that led him to question the “rightness” of U.S. intelligence.

      • Former CIA Head Warns David Gregory: We’ll Have To Be ‘Less Effective To Be A Little More Transparent’

        Former CIA Director Michael Hayden told Meet the Press’ David Gregory on Sunday morning that security and transparency were a zero-sum game.

      • CIA deputy director Michael Morell retires

        CIA Deputy Director Michael Morell, who defended harsh interrogation techniques and was involved with the fallout after the attack on the diplomatic outpost in Benghazi, Libya, announced his retirement Wednesday.

      • Life as a CIA Operative / Putin’s Russia

        Michael Davidson is a former member of the CIA, a foreign affairs expert on Russia and author of the book Incubus all of which he discusses in this conversation with Bill Leff.

    • Cablegate

    • PR/AstroTurf/Lobbying

      • U.S. Supreme Court Strikes Down Another ALEC Voting Bill

        In a 7-2 decision, the U.S. Supreme Court has struck down an Arizona statute that imposes restrictions on voter registration, finding it conflicts with federal law. After becoming law in Arizona, the legislation at issue was adopted as a “model” by the American Legislative Exchange Council (ALEC).

        The decision in Arizona v. Inter Tribal Council of Arizona reaffirmed Congress’ power under the Elections Clause to determine when, where, and how elections are held.
        An Arizona law requiring that voters show proof of citizenship to register to vote, wrote Justice Antonin Scalia for the seven justice majority, conflicted with the federal National Voter Registration Act (NVRA) and was therefore preempted.

      • What Do Guns Have to Do With Immigration? For Gun Owners of America, Everything

        Gun Owners of America (GOA) has declared immigration reform a gun issue, warning that under the “scamnesty bill” currently in the U.S. Senate, “you can say buh bye to your guns and buh bye to the rest of your freedom.”

    • Censorship

    • Privacy

      • Journalists Need To Start Asking About Storage, Not Access

        It’s becoming pretty clear, particularly from today’s Snowden Q&A and the partial transcript from President Obama’s Charlie Rose interview, that we’re zeroing in on how the government accesses private individual data.

        If you’re not a “U.S. person,” there are few restrictions on what the U.S. government can do to monitor you. If you are a U.S. person then there are at least some restrictions, and the involvement of at least the secret FISA court, before that data can be accessed.

        What’s also clear are that these are just policy decisions, as Snowden puts it, and that things may have been different in the past and can be different in the future.

        [...]

        But here’s what journalists should be asking at this point: What data does the government store? How long have they been storing it? Do they ever delete it?

      • It’s Beyond Ridiculous That Email (But Not Mail) Has Been Left Out of Privacy Laws

        As with so many significant privacy violations of late by government agencies — from the NSA to the IRS — it’s become clear that technology has far outpaced law. Federal laws meant to protect our Fourth Amendment right “to be secure in [our] persons, houses, papers and effects, against unreasonable search and seizure” do not adequately cover Americans’ property online.

      • How Dozens of Companies Know You’re Reading About Those NSA Leaks

        As news websites around the globe are publishing story after story about dragnet surveillance, these news sites all have one thing in common: when you visit these websites, your personal information is broadcast to dozens of companies, many of which have the ability to track your surfing habits, and many of which are subject to government data requests.

      • NSA Boss Asks Congress For Blanket Immunity For Companies That Help NSA Spy On Everyone

        Basically, he’s arguing that if the NSA orders companies to do something illegal, the companies shouldn’t be liable for that. There’s some logic behind that, because when you get an order from the government, you often feel compelled to obey. But, of course, the reality is that this will give blanket cover for companies voluntarily violating all sorts of privacy laws in giving the NSA data. And, theoretically you could then sue the government over those violations, but we’ve seen in the past how well that goes over. First, the courts won’t give you “standing” if you can’t prove absolutely that your data was included. Then, if you get past that hurdle, the government will claim “national security” or sovereign immunity to try to get out of the case. And, even if it gets past all of that, and you win against the government, the feds shrug their shoulders and say “now what are you going to do?”

      • Snowden and Bob Schieffer Fight the Power

        Schieffer is, like a lot of other establishment journalists, no fan of NSA whistleblower Edward Snowden.

        As he explained on his Face the Nation program (6/16/13), “I don’t remember Martin Luther King Jr. or Rosa Parks running off and hiding in China.”

      • The NSA story isn’t “journalistic malfeasance” — it’s a story that is evolving in real time

        Some critics of the recent NSA surveillance stories by the Guardian and Washington Post say the reports are filled with so many errors that they amount to “journalistic malfeasance.” But is this really the case?

      • Data Protection Responses To PRISM “A Smokescreen”
      • I fear the chilling effect of NSA surveillance on the open internet

        I fear the collateral damage the NSA’s spying via technology will do to that technology. The essential problem is not the internet or internet companies or even the spies. The real problem is the law and what it does not prevent the American government from doing with technology, and how it does not protect the principles upon which this nation was founded.

        The damage to the net and its freedoms will take many forms: users may come to distrust the net for communication, sharing, and storage because they now fear – with cause – that the government will be spying on them, whether or not they are the object of that surveillance. International users – properly concerned that they are afforded even less protection than Americans – may ditch American platforms. The European Union and other national governments, which already were threatening laws targeting US technology companies, will work harder to keep their citizens’ data away from the US. Technologists may find it necessary to build in so many protections, so much encryption and caution, that the openness that is a key value of the net becomes lost.

      • How to Block the NSA From Your Friends List

        After recent revelations of NSA spying, it’s difficult to trust large Internet corporations like Facebook to host our online social networks. Facebook is one of nine companies tied to PRISM––perhaps the largest government surveillance effort in world history. Even before this story broke, many social media addicts had lost trust in the company. Maybe now they’ll finally start thinking seriously about leaving the social network giant.

      • Obama doubles down on NSA defense as poll numbers slip

        In an interview with PBS’s Charlie Rose, Obama argued it’s a “false choice” to suggest freedom must be sacrificed to achieve security, a phrasing that echoes comments he made on the campaign trail in 2008.

      • NSA surveillance: what Germany could teach the US

        Data protection is to the communication age is what environmental protection was for the age of industrialisation. We must not leave it too late to act

      • How Hollywood softened us up for NSA surveillance
      • Hong Kong protest backs ex-CIA whistleblower Snowden

        Hundreds of people in Hong Kong have marched to the US consulate in support of ex-CIA whistleblower Edward Snowden.

      • Cheney wrong on NSA surveillance program

        Former Vice President Dick Cheney was on “Fox News Sunday” on June 16, and one of the topics was the National Security Agency surveillance program. Mr. Cheney related how and why the program was originally implemented after Sept. 11, 2001, and I have no problem that. The problem I have with Mr. Cheney and others cheerleading the current NSA surveillance program is that they do not have current information to back up their claims. As for Mr. Cheney, he has been out of office for more than four years and admitted he has no current knowledge about the program.

        A new administration has made changes to the program, and naturally, they are all classified for obvious reasons, so how can anyone really know outside of NSA what is going on today?

      • Complaint forces European Privacy Association to confirm Facebook, Google, Microsoft and Yahoo are corporate backers

        Following an official complaint submitted last month, the European Privacy Association (EPA) has now updated its entry in the EU’s lobby transparency register. Corporate Europe Observatory (CEO) had complained to the register secretariat about the EPA’s failure to disclose its industry members (and funders), in violation of the rules of the transparency register.

      • Alexander: Snowden got call-tracking order during training

        The National Security Agency contractor who disclosed the spy agency’s collection of data on billions of telephone calls made by Americans apparently obtained a highly-classified court order about the program during a training stint at NSA’s headquarters in Maryland, NSA Director Gen. Keith Alexander said Tuesday.

        Alexander told reporters after a House Intelligence Committee hearing that the man who’s acknowledged being the source of the recent leaks, Booz Allen Hamilton information technology specialist Edward Snowden, had access to the Foreign Intelligence Surveillance Court order and related materials during an orientation at NSA.

      • Knowing The Government Is Spying On You Changes How You Act

        We’ve already had a few posts discussing why the whole “if you’ve done nothing wrong, you’ve got nothing to hide” argument is bogus, but this weekend’s edition of the radio show This American Life had a fantastic short section in which the host, Ira Glass, spoke to lawyers for detainees at Guantanamo Bay, who are all pretty certain that every one of their phone calls is being recorded and listened to. What’s amazing is the emotional response you hear from most of these lawyers, who recognize that they can no longer comfortably speak freely to anyone on the phone ever again. The stories of them not being able to be emotional with their children when speaking to them on the phone, or in which their friends accuse them of being especially curt and officious whenever they call are somewhat heartbreaking.

      • Multiple New Polls Show Americans Reject Wholesale NSA Domestic Spying

        In the 1950s and 60s, the NSA spied on all telegrams entering and exiting the country. The egregious actions were only uncovered after Congress set up an independent investgation called the Church Committee in the 1970s after Watergate. When the American public learned about NSA’s actions, they demanded change. And the Church Committee delivered it by providing more information about the programs and by curtailing the spying.

      • NSA chief says exposure of surveillance programs has ‘irreversible’ impact – as it happened
      • NSA Implementing ‘Two-Person’ Rule To Stop The Next Edward Snowden

        On Tuesday, National Security Agency Director Keith Alexander told a congressional hearing of the Intelligence Committee that the agency is implementing a “two-person” system to prevent future leaks of classified information like the one pulled off by 29-year-old Booz Allen contractor Edward Snowden, who exfiltrated “thousands” of files according to the Guardian, to whom he has given several of the secret documents.

      • Call Now to Oppose NSA Spying

        In the week since we launched, the stopwatching.us campaign has gathered over 215,000 signatures from individuals opposed to NSA surveillance. And we’ve made huge waves in the media with a coalition of companies and organization that the Atlantic called “perhaps the most diverse collection of groups in the modern history of American politics.”

      • The NSA has us snared in its trap – and there’s no way out

        A boycott of Facebook, Microsoft, Google et al is easy to talk about, but almost impossible to achieve

      • North Korea wades into NSA spying scandal branding US ‘kingpin of rights abuse’

        NORTH KOREA has somewhat ironically waded into the NSA spying scandal currently causing outrage across the globe, rushing to the defence of American civil liberties.

      • Why NSA Came Knocking At Google’s Door

        Over the last few weeks the world has been treated to a feast of information about how America’s most secretive intelligence outfit, the National Security Agency, does its work — courtesy of celebrity traitor Edward Snowden. If you’re one of those people who thinks the world is awash in conspiracies, then it’s no surprise that NSA is conducting domestic surveillance of the Internet and other communications. However, if you live in the real world of limited government and lawyers, NSA’s domestic surveillance program is a bit of a puzzle.

      • Al Gore: NSA’s secret surveillance program ‘not really the American way’

        The National Security Agency’s blanket collection of US citizens’ phone records was “not really the American way”, Al Gore said on Friday, declaring that he believed the practice to be unlawful.

        In his most expansive comments to date on the NSA revelations, the former vice-president was unsparing in his criticism of the surveillance apparatus, telling the Guardian security considerations should never overwhelm the basic rights of American citizens.

      • In the NSA we trust: the trouble with faith in an omniscient state

        Too many Americans think of their nation as inherently Christian and worthy of absolute trust, but the state is not benign

      • Snowden hits back against critics of NSA leaks

        The former National Security Agency contractor who revealed the U.S. government’s top-secret monitoring of Americans’ phone and Internet data fought back against his critics on Monday, saying the government’s “litany of lies” about the programs compelled him to act.

      • PRISM: Obama defends NSA spying system as ‘transparent’

        President Obama has dismissed claims that the US is spying on its citizens and said any intelligence gathering done by the security forces is legal and “transparent”, while at the same time asking the security services to look at how to declassify aspects of the programme.

      • Edward Snowden — the Globalisation of Whistleblowing

        I have held back from writ­ing about the Edward Snowden NSA whis­tleblow­ing case for the last week — partly because I was immersed in the res­ult­ing media inter­views and talks, and partly because I wanted to watch how the story developed, both polit­ic­ally and in the old media. The reac­tion of both can tell you a lot.

        That does not mean that I did not have a very pos­it­ive response to what Snowden has done. Far from it. The same night the story broke about who was behind the leaks, I dis­cussed the implic­a­tions on an RT inter­view and called what he did Whis­tleblow­ing 2.0.

      • PRISM, the NSA, Surveillance and the UK: Remaining unanswered questions for Parliament

        Last Monday the Foreign Secretary William Hague gave a statement to and answered questions from Parliament related to surveillance being conducted by the US National Security Agency (NSA). There are concerns about how UK citizens have been placed under surveillance, and whether UK authorities have had access to surveillance information from the NSA.

    • Civil Rights

      • At the Supreme Court, Divisions and Signs of Trouble to Come

        The United States Supreme Court decided two criminal law cases Monday morning that have very little in common, except that they both further define the contours of what jurors get to hear during the course of a criminal trial. In both cases, on issues of guilt and innocence and sentencing, the justices decided that jurors could be trusted to hear more, not less, about the evidence presented to them by lawyers and witnesses. You can decide for yourself whether these are good developments or bad ones. Whatever they are, and whatever they mean, they surely highlighted anew the Court’s ideological divide.

      • Effort to block indefinite detention (NDAA) fails in U.S. House

        Despite the efforts of Libety Republicans in the House of Representatives, an amendment to the 2014 NDAA bill that would have prohibited the indefinite detention of U.S. citizens without due process was defeated by a narrow margin today.

        When the 2012 version of the National Defense Authorization Act passed, it included the controversial provision to permit the indefinite detention of United States citizens without charges. The controversy over indefinite detention was an issue in the election and likely contributed to the defeat of some Tea Party Republicans like Allen West, whose denial of the existence of indefinite detention and support for the NDAA was seen as a betrayal of the grassroots voters who put them in office.

      • Act Locally to Nullify NDAA “Indefinite Detention”

        The most important thing you can do – right now – is act locally. On a local level, you have a far greater chance of finding an elected politician to listen to you, who might agree with you, and who could move legislation forward.

      • 2014 NDAA Passes the House, With Many Amendments
      • Rep. Smith’s proposed NDAA amendments on Guantanamo

      • White House Threatens Veto of NDAA
      • Amendments to NDAA introduced

        Radel said the amendments are designed to preserve the rights of citizens on American soil and allow them due process rather than face detention without formal charges or justification.

      • Obama Administration “Strongly Objects” to NDAA Religious Liberty Amendment
      • Action Alert: Nullify NDAA “Indefinite Detention” Locally in Colorado

        A Liberty Preservation Act that would have nullified indefinite detention in Colorado died during the recent legislative session.

        Political maneuvering by a few powerful lawmakers killed HB 13-1045, despite support on both sides of the aisle. Their lack of courage left Coloradans at the mercy of federal agents should they decide to exercise indefinite detention provisions written into the NDAA.

      • In Interview, Obama Defends NSA Data Collection
      • TSA agent tells teen to ‘cover herself’

        In it, Frauenfelder alleges that the TSA agent “humiliated and shamed my 15-year-old daughter.”

        “Here’s what happened, as my daughter described it in text messages to us,” he wrote.

        “She was at the station where the TSA checks IDs,” Frauenfelder continued. “She said the officer was ‘glaring’ at her and mumbling. She said, ‘Excuse me?’ and he said, ‘You’re only 15, COVER YOURSELF!’ in a hostile tone. She said she was shaken up by his abusive manner.”

        Read more: http://thehill.com/blogs/transportation-report/tsa/305963-tsa-agent-tells-teen-to-cover-herself#ixzz2WbL0Tedr
        Follow us: @thehill on Twitter | TheHill on Facebook

    • Intellectual Monopolies

      • Japan’s Prime Minister Mocks TPP Protestors On Facebook
      • Copyrights

        • MPAA’s Chris Dodd Will Be The Chair Of ‘Free Speech Week’

          This seems a bit wacky. MPAA boss Chris Dodd has been named the chairperson of the “advisory council” for “free speech week” in 2013. Now, I’m assuming that most people have no clue what “Free Speech Week” is, but it’s supposed to be a “celebration” promoting the First Amendment. That’s why it strikes me as completely ridiculous that Dodd would be put in charge of it. While the MPAA was a major proponent of the First Amendment a few decades ago (back when there were efforts to try to censor movies — which saw the MPAA stepping in to create a self-censorship regime known as the movie rating system), Chris Dodd’s contribution to the MPAA has been to push SOPA, a bill whose main purpose was directly in contrast to the First Amendment and free speech by setting up a system for internet censorship.

        • Pirate Bay co-founder can be extradited from Sweden to Denmark, court rules

          The Swedish co-founder of the Pirate Bay file-sharing website can be extradited to Denmark to face hacking charges, a Swedish court has ruled.

          Gottfrid Svartholm Warg is accused of involvement in one of Denmark’s biggest hacking attacks – on databases holding driving licence records, official email messages and millions of social security numbers. The attacks on the databases, all run by a Danish subsidiary of the US technology company CSC, took place between April and August last year. A 20-year-old Danish man, alleged to be Warg’s accomplice, is being held in custody in Denmark, having pleaded not guilty.

        • Pirate Bay Founder Will be Extradited to Denmark

          Pirate Bay founder Gottfrid Svartholm will be extradited to Denmark where he faces several new hacking charges. In Denmark, Gottfrid is accused of downloading a large number of files, including police records, from the mainframe of IT company CSC. The timing of the extradition is still unknown since among other things the Pirate Bay founder has to await the verdict in his Swedish hacking trial which is due later this week.

        • US Chamber Of Commerce: Bollywood Is So Successful Without Strong Copyrights That It Will Fail Unless India Strengthens Its Copyrights

          You’d think those are signs that copyright law was working (largest film industry in the world, largest employment sectors, over 1,000 films produced annually — about double Hollywood) and that this would imply that whatever level of copyright there is in India — which is supposed to be an incentive to creativity — was doing a decent job. But, no, apparently it’s all broken.

06.17.13

Links 17/6/2013: Android’s Extended Lead Over iOS, Sony Smartwatch Gets FOSS

Posted in News Roundup at 4:07 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • 2009: “IDC research finds that Linux users are clearly satisfied about their choice to deploy Linux”

    It’s definitely happening on small mobile devices, but how about the thick clients and thin clients on desks of business, schools and governments?

  • Windows Blue Blues, Symantec’s Kernel Confusion & More…
  • Strategic Test releases data acquisition software for Linux

    The sixth generation of the SBench 6 data acquisition software has now been released by Strategic Test, and now the software is available for both Windows or Linux users. SBench continues to support all of the companies PCI Express, PCI, PXI and CompactPCI digitizer, waveform generator and high-speed digital I/O cards, some 300 variants in total. The Base version of Sbench 6 is supplied at no-cost with each UltraFast card. In addition, a fully functional demo version of the Professional Version with a limited run time is also included. The software is also able to run simulated demo cards to allow full software test even without hardware.

  • Reality Check: Defining The True Success of Linux

    Editor’s Note: This is the second article in a new series by SUSE community marketing manager Brian Proffitt for Linux.com called “Reality Check” that will take a look at Linux in the real world. The first, 5 Linux Features You Want in Your Company, was published in May.

  • Pondering Life in a PRISM World

    “Terrorists can adapt to non-use of telephone/Internet just as Osama bin Laden did,” countered blogger Robert Pogson. “Despite $billions spent, it took many years to hunt him down.

    “PRISM and other such blunt instruments will not discourage alert terrorists,” he opined. “Further, terrorists could use PRISM to set false alarms or to entrap responders.”

    [...]

    “There is NO difference between left and right; all we have in this country is right-wing and ultra right-wing, nothing else,” he explained.

  • Desktop

  • Server

  • Audiocasts/Shows

  • Kernel Space

    • Stable kernels 3.9.6, 3.4.49, and 3.0.82
    • Linux 3.10-rc6 Kernel Brings In More Fixes

      Linus Torvalds has released the Linux 3.10-rc6 kernel on Saturday afternoon. While there’s still some time ahead before the official Linux 3.10 kernel release, the rate of change appears to be slowing.

      After worrying last week about all of the changes still being pushed for Linux 3.10, Torvalds threatened to be more strict about the changes he would permit. A week has passed and the rate of pull requests to take care of only regressions has decreased.

    • Linux 3.10-rc6
    • NSA Has Legitimate Code Running in Linux Kernel and Android

      The National Security Agency or NSA is now in the public eye for some nefarious surveillance, but Linux users should know that the agency also had an active role the Linux kernel development, with the addition of SELinux (Security-Enhanced Linux).

    • Graphics Stack

      • X.Org XDC2013 Announced For X, Wayland, Mesa

        The X.Org Foundation has finally announced the details concerning the 2013 X.Org Developers’ Conference.

      • Google Pushes More Mesa / Gallium3D Patches

        More Mesa / Gallium3D patches out of Google have come about this month for improving the open-source graphics stack.

        Google has been using Mesa/Gallium3D drivers for use on their Intel-powered Chromebooks. Google had invested heavily in the Intel Gallium3D driver for use on their older Chromebooks, but now they are starting to push more of their Mesa/Gallium3D changes that have been building up in months past.

    • Benchmarks

      • Optimized Binaries Provide Great Benefits For Intel Haswell

        Utilizing the core-avx2 CPU optimizations offered by the GCC 4.8 compiler can provide real benefits for the Intel Core i7 4770K processor and other new “Haswell” CPUs. For some computational workloads, the new Haswell instruction set extensions can offer tremendous speed-ups compared to what’s offered by the previous-generation Ivy Bridge CPUs.

      • Intel Haswell-Based Apple MacBook Air, HD 5000 Benchmarks
      • Min / Max FPS Comes To Test Results

        With Phoronix Test Suite 4.8 “Sokndal”, the minimum and maximum performance results are now being commonly displayed along side the rest of the results.

        Aside from showing the average performance result, the standard error, the actual result values, and other data already displayed through the Phoronix Test Suite and OpenBenchmarking.org has been to also display the minimum and maximum results. This min/max request has most commonly been for when displaying the frames-per-second (FPS) results on graphics tests. With Phoronix Test Suite 4.8, due out next quarter, this will commonly happen.

      • Intel Haswell HD Graphics 4600 vs. AMD Radeon Graphics On Linux

        Already published on Phoronix have been Intel HD Graphics 4600 benchmarks on Ubuntu Linux from the Intel Core i7 4770K “Haswell” processor and compared against previous generations of Intel HD Graphics. Being benchmarked today is the Intel HD Graphics 4600 on Linux compared against various AMD Radeon graphics cards using both the open and closed-source graphics drivers.

  • Applications

  • Desktop Environments/WMs

    • GNUstep Mythbusting
    • Freedesktop Summit

      A few days back I attended the first freedesktop summit/sprint where a few hackers from different free desktops met with the objective of working together. We were people from Razord-qt, GNOME, Unity and of course KDE.

    • K Desktop Environment/KDE SC/Qt

      • KDE 4.11 beta brings Wayland support to KWin

        The developers at the KDE project have released a first beta version of KDE 4.11 – including Plasma Workspaces, the KDE Platform and its associated applications. New features include experimental Wayland support in the KDE window manager KWin, the introduction of more Qt Quick elements to Plasma Workspaces and several improvements to file indexing and the desktop’s contact management application.

      • KDE Releases Beta of Plasma Workspaces, Applications and Platform 4.11

        With the large number of changes, the 4.11 releases need a thorough testing in order to maintain and improve the quality and user experience. Actual users are critical to maintaining high KDE quality, because developers simply cannot test every possible configuration. We’re counting on you to help find bugs early so they can be squashed before the final release. Please consider joining the 4.11 team by installing the beta and reporting any bugs.

      • First beta of KDE SC 4.11 released

        The KDE team have announced the release of first beta of KDE SC 4.11, which includes Workspaces (desktop environment), Applications and development platform. The KDE team will now focus on fixing bugs and polishing the software as API, feature and dependencies have been frozen.

      • Mastering Interfaces with QT
      • Finding Information in Human-Entered Search Queries
      • Plasma Workspace: present and future

        We saw last week the release of the first beta of KDE Plasma Workspace and applications 4.11

        From my side, that’s a very important milestone, because it’s pretty much the coronation of what we intended the 4.x series of the workspace to be. It was a long ride, but I think this future release will be pretty stable and “defined” in its own identity.

      • Hello World! Me, the blog, and GSoC

        The main purpose of this blog, or rather the reason it came into existence, is to write about Google Summer of Code, more specifically about my own GSoC project. The title of this proposal is Reimplement Amarok 1.4 (FastForward) & iTunes importers on top of Statistics Synchronization framework, and add Amarok 2.x and Rhythmbox as synchronization targets. Amarok is a legendary music player, part of the KDE software suite (I’d say it’s a Linux music player, but that’s not entirely true).

      • What KDE can learn from Cinnamon

        Well, this ought to be interesting. Battle royale, except we have no gentry, just the two seemingly and arguably dominant desktop environments for Linux. In my humble and narrow perception, there has been a dramatic shift in the Linux desktop usage in the past several years. Come the season of Gnome 3, a split happened in the community, breaking the decade old Gnome-KDE dominance. A whole generation of desktop environments was born, forked and knifed. Unity took its own path, Gnome 2 returned as MATE, and Gnome 3 was eclipsed by Cinnamon. Only KDE remained as it was, and now it was facing a new rival.

      • Choqok-devel mailing list
      • News from the 2013/05 Gentoo KDE team meeting

        Independent of the meeting, a stabilization request has already been filed for KDE 4.10.3; thanks to the work of the kde stable testers, we can keep everyone uptodate. And as a final note, my laptop is back to kmail1… Cheers!

      • KDE Commit-Digest for 26th May 2013
      • Coordinate Systems in KStars

        This post describes a few of the coordinate systems that KStars uses to keep track of the positions of various astronomical objects, and how they relate to one another.

        All of the points used in KStars can be thought of as lying on a sphere, because it really makes no difference how far away a sky object like a star is – we only care about the direction. We can then imagine that these points “live” on the celestial sphere, an imaginary sphere surrounding the Earth. The problem of rendering a map of the night sky is then the problem of figuring out how to transform this sphere onto the screen.

    • GNOME Desktop/GTK

  • Distributions

    • Linux Community Distro Poll

      Any distribution of GNU/Linux could be said to be a “community distro” in that it’s FLOSS and anyone including end-users could run, examine, modify and distribute it. The question really boils down to the health and vitality of the community surrounding particular distros. I recommend distros that have been around a while with large repositories and large numbers of contributors. Debian GNU/Linux is my particular favourite because, with the APT package management system, huge repository and huge fleet of mirrors around the globe there’s very little that can’t be accomplished with it and one person can easily manage a system large or small. What more can be asked of a distro? Debian is completely open with a large core of package managers, users able to examine and post bug-reports often with immediate responses and great documentation both within packages and on Debian sites. Of particular value to people who actually depend on IT to work or study or enjoyment is that Debian is serious about the quality of each package and the compatibility of the whole system with formal rules for packaging and releasing distros that all but guarantee working systems indefinitely. It is a healthy and vital community.

    • Do-over for Linux Community Distro Poll
    • New Releases

      • CRUX PPC GNU/Linux Project

        CRUX PPC is a volunteer driven non-profit project based on the releases of CRUX for x86. It contains software written by a lot of different people, each software comes with its own license, chosen by its author. Parts written by CRUX PPC Team are to intend as free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.

      • 2013-06-15: CRUX PPC 3.0 released!
    • Screenshots

    • Red Hat Family

      • Stock Downgrades: Red Hat Inc Goes Cap in Hand

        It felt fitting that an upgraded Groupon (GRPN) jumped 10.23% last week, for the market overall reduced many investors to coupon-clipping penury. Shares slumped as a global trail of tears extended from Tokyo to Istanbul, whose customs officials have happily maintained an enduring faith in unicorns amid a crisis in the capital’s central square.

      • Will Red Hat Beat Earnings in 1Q?

        Red Hat Inc. (RHT – Snapshot Report) is set to report its first-quarter 2014 results on Jun 19. In the previous quarter, the company’s earnings of 25 cents beat the Zacks Consensus Estimate by 19.05%. Let’s see how things are shaping up for the company in this quarter.

      • Can Red Hat do for OpenStack what it did for Linux?

        Red Hat made its first $1 billion commercializing Linux. Now, it hopes to make even more doing the same for OpenStack.

        Red Hat executives say OpenStack – the open source cloud computing platform – is just like Linux. The code just needs to be massaged into a commercially-hardened package before enterprises will really use it. But just because Red Hat successfully commercialized Linux does not guarantee its OpenStack effort will go as well.

      • For Red Hat, the Cloud Beckons

        Red Hat has made a name for itself as the only U.S.-based public company that is exclusively focused on open source, and it has proven that its Linux-focused strategy is very profitable. In fact, the company is the first open source-focused company to hit the $1 billion revenue mark. That said, though, Wall Street has been questioning where else the company might be able to generate revenues in the future.

      • Fedora

        • Fedora 19/20 logfile explosions

          PSA: if you’re running Fedora 19 or 20, I highly recommend you stop what you’re doing right now and do this instead. There are a couple of unfortunate bugs in F19/F20 right now which may well be screwing the hell out of your log files.

    • Debian Family

      • Updated Debian 7: 7.1 released

        The Debian project is pleased to announce the first update of its stable distribution Debian 7 (codename “wheezy”). This update mainly adds corrections for security problems to the stable release, along with a few adjustments for serious problems. Security advisories were already published separately and are referenced where available.

      • Debian 7.1 Rounds In Some Bug-Fixes
      • Debian 7.1 coughs up first Wheezy fixes
      • The Linux Setup – Gregor Herrmann, Debian Developer
      • Debian is missing a tool, want to write it?
      • Derivatives

        • Canonical/Ubuntu

          • System76 Galago UltraPro Runs On Haswell Processor And Ubuntu

            Intel’s latest mobile processor to see action in majority of the coming Ultrabooks out there in the market has been given the codename Haswell, and this time around, we are treated to the System76 Galago UltraPro which is powered by an Intel Haswell processor no less (it offers more than decent processing performance without sipping up too much juice along the way), with Ubuntu as the operating system of choice. The System76 Galago UltraPro is a sleek new notebook which is touted to be the first notebook that measures under 1″ of thickness, all the while sporting Intel’s Iris Pro graphics. Anyone out there who wants to dispute that particular claim?

          • Ubuntu now available for Mini PCs powered by RK3188 Processors

            For any PC powered by Rockchip’s RK3188 quad-core processor, Ubuntu and other Linux operating systems are now available to run on the devices as well as the standard Android OS that probably came with the device.

          • Ubuntu Support: How to Get Help

            For those of us Linux users who are more adventurous, switching to a new operating system can be pretty exciting. Unfortunately, problems tend to crop up when a new user seeking help isn’t familiar with the best practices for finding support.

          • Ubuntu Unity tips

            A FUNNY thing happened on my Macbook Air the other day. Out of habit, I went to the left side of the screen to look for my launcher.

            Now any Mac user will consider this strange behavior, because the default location for the dock on OS X—and many other user interfaces—is at the bottom of the screen. You can change this to any of the other three sides of the screen, but it’s an option most folks will leave alone.

          • The Ubuntu PC Case Mod Pt. 2 Pick a Case

            Since my last post i’ve got a lot more done towards this project. I’ve made a crowdfunding account so i can get sponsored. I’ve got a shortlist of cases, the poll is here. I also have a PSU and sleeving is on it’s way. If you have advice or want more frequent updates, either use the comments here, my email ( noskcaj@ubuntu.com ) or http://forums.atomicmpc.com.au/index.php?showtopic=54532

          • Main Machine: Finally on Ubuntu 13.04

            When Ubuntu 13.04 was released I had been running the OS on my Lenovo T500 for almost five months, but I was not able to migrate my main laptop due to two bugs.

          • Flavours and Variants

  • Devices/Embedded

    • 3 Portable Options For The Raspberry Pi

      The Raspberry Pi – I just can’t stop tinkering with it. Fresh from setting it up as a media centre and a retro games console, I’ve recently started looking at the possibilities of the device as something more important.

      You may have seen one of our earlier posts about the unusual uses for a Raspberry Pi. One of these was using it as the computer in a low-budget space program, something that would make the Pi more portable than most computers on earth! Sticking to the point, however – there are several ways in which a grounded Raspberry Pi can break free of power supply and its compact little Perspex or Lego case and be used as a an actual laptop computer.

    • Linux-based surveillance cameras start at $70

      D-Link has begun shipping four new models in its line of Linux powered surveillance-oriented “Cloud Cameras,” and has updated its web-based “Mydlink” software with new remote monitoring and video management features. The new cameras boast improved sound/motion detection, 802.11n WiFi extender capabilities, enhanced night vision, and weatherproof casing.

      The new cloud cameras, which include the Cloud Camera 1050 and 1150, the Pan & Tilt Day/Night Network Camera, and the Outdoor HD Wireless Day/Night Network Camera boost D-Link’s embedded Linux-based Cloud Camera line from 10 to 14 models. All the devices connect via WiFi to the company’s cloud-based Mydlink monitoring and control platform.

    • Phones

    • Sub-notebooks/Tablets

Free Software/Open Source

  • Researcher To Open-Source Tools For Finding Odd Authentication Behavior

    Rather than watching for communications between infected systems and command-and-control servers, companies can detect stealthy malware when it attempts to spread

  • Experimental coding project opens up Sony SmartWatch

    Sony has pushed its Bluetooth SmartWatch project to a more open status with an invitation to software application developers to now design, develop and code applications and ancillary firmware and/or other extensions to the device.

  • Sony SmartWatch goes open-source, looking for more innovation
  • Sony allows hacking of its unloved SmartWatch
  • Sony Opens Up Its SmartWatch for Developers
  • Sony Smartwatch now open-sourced

    Wearable gadgets have become a real trend. While the other giants like Google, Apple, Microsoft and Samsung are busying with their wearable gadget plans, Sony already has a smartwatch in the market. Although the small device didn’t get too much attention from the tech fans when it launched but it may get a little more from now with Sony’s recent announcement that its smartwatch has now become open-sourced.

  • Open-source software aids NPOs

    Three years later, the foundation’s thesis has given rise to an open-source software platform called Mobile Technology for Community Health (Motech), which an increasing number of nonprofit and nongovernmental organizations and humanitarian groups are using to address pandemics such as tuberculosis and HIV.

  • Sony Smartwatch Gets Open Source Treatment
  • Sony’s SmartWatch goes open source
  • Joeffice, an open source office suite one developer built in 30 days

    Don’t like Microsoft Office? Just build your own office suite—this guy did.

  • S.H.O.V.E.L. Is An Open Source Multi-Tool

    S.H.O.V.E.L. is yet another multitool, but an unusual one. It sports a combined fork/spoon for eating, a serrated edge for cutting things, a bottle opener and a length of paracord. It’s also open source so you can customise it yourself.

  • WANdisco Snaps Up Dev Site to Boost Open-Source Mojo

    WANdisco announced that it has snagged TortoiseSVN.net, the website that hosts the open source Subversion client of the same name. According to the company, this domain attracts 500,000 unique visitors each month and supports over five million downloads each year. Terms of the deal were not disclosed, but WANDisco revealed that lead developer Stefan Küng will be joining its ranks.

  • Web Browsers

    • Chrome

      • VP9 Codec Now Enabled By Default In Chrome

        Google has just enabled their new, royalty-free VP9 video codec within their Chromium / Chrome web-browser.

        We have known for a while that VP9 was coming, the codec successor to the increasingly-used VP8 codec. In May we learned that VP9 was nearly ready and now as of today it’s enabled by default within the latest Chrome web-browser.

    • Mozilla

      • Introducing the Mozilla Science Lab

        We’re excited to announce the launch of the Mozilla Science Lab, a new initiative that will help researchers around the world use the open web to shape science’s future.

        Scientists created the web — but the open web still hasn’t transformed scientific practice to the same extent we’ve seen in other areas like media, education and business. For all of the incredible discoveries of the last century, science is still largely rooted in the “analog” age. Credit systems in science are still largely based around “papers,” for example, and as a result researchers are often discouraged from sharing, learning, reusing, and adopting the type of open and collaborative learning that the web makes possible.

      • Mozilla-backed Stop Watching Us blows past 100,000 signatures to fight NSA surveillance

        The legal battle over PRISM and the NSA’s phone records program is only getting under way, but advocacy groups are striking while the issue is hot. Stop Watching Us, a website that encourages citizens to digitally sign a letter that will be emailed to their elected representatives, today passed the 100,000 signature mark.

        That milestone, passed this morning, comes less than 48 hours after the start of the program. Currently Stop Watching Us has collected 112,279 total signatures. A quick multiplication indicates that 336,837 emails will be generated, at a minimum; each person has two Representatives and one Senator.

      • Mozilla Launches Science Lab Project, Seeks Better Scientific Collaboration
  • Databases

    • Red Hat to ditch MySQL for MariaDB in RHEL 7

      In a surprise move, Red Hat has announced that version 7 of Red Hat Enterprise Linux (RHEL) will ship with the MariaDB database installed by default, in place of MySQL.

    • Ditching MySQL: Red Hat shows its prowess in spin

      In the aftermath of one of its most dramatic announcements, Red Hat, the premier Linux company, continues to demonstrate that its main strengths lie in things other than technology.

    • Report: Red Hat to Switch Up MySQL for MariaDB

      Back in 2010, when Oracle acquired Sun Microsystems, MySQL founder Monty Widenius (shown) was very vocal about the acquisition, and raised many questions about the future of the open MySQL database, which he founded. In fact, we did an interview with Monty here on OStatic, where he said, “It’s clear that Oracle is in the game for the profit and it’s in their interest to get out as much money from MySQL as they can over the long term.”

      Monty went on to become the lead developer of MariaDB, a fork of MySQL, and now there are reports that Red Hat will switch the default database in its RHEL enterprise product, from MySQL to MariaDB, upon the release of version 7. That’s a big vote of confidence in MariaDB.

  • Oracle/Java/LibreOffice

    • Java EE 7 at a glance

      Around three and a half years have passed since the last major version jump of the Java Enterprise Edition (Java EE). It was intended that Java EE 6, which was designed with developer performance and simplification in mind, would become technologically more powerful in Java EE 7 through the addition of cloud support. These plans proved too ambitions at quite a late stage. As a result, the version that was completed in mid-April contains very few fundamentally new aspects and just represents a consistent effort to round off existing features.

  • CMS

  • Funding

    • Leadwerks crowdfunding native Linux development

      Middleware outfit looking to help facilitate expansion of Linux games library

      Game engine provider Leadwerks is attempting to crowdfund native Linux development using its tech on Kickstarter.

      The company is looking for $20,000 to fund the engine’s compatibility with Linux operating systems, starting with Ubuntu 12.04.

  • Public Services/Government

    • NYC opens the books, and the source code, on Checkbook 2.0

      Checkbook NYC illustrates how the city government spends its nearly $70 billion annual budget. Using a dashboard that combines graphs and user-friendly tables, the site displays up-to-date information about the city’s revenues, expenditures, contracts, payroll and budget. It also offers that information programmatically via APIs.

    • Open source by default?

      “Over the last ten years, open source has become unremarkable. I think that’s a great achievement. We no longer argue about whether it’s secure or not, or whether it’s safe to use. We focus now on how best to use open source to get the best value for every tax dollar,” said Gunnar Hellekson, Chief Technology Strategist for Red Hat’s US Public Sector Group.

  • Licensing

    • Should Governments Specify Licence Conditions?

      I have been made aware of a meme passing around Government purchasing circles to the effect that Government ought not to be dictating licence terms in the course of procurement. This has two variants, a strong variant that Government ought not be specifying, for example, a class of licence that ought to apply to the procurement and a less strong variant to the effect that Government ought not be specifying particular licence terms.

  • Openness/Sharing

    • Open Hardware

      • X-Cube 3D Printed Open Source Puzzle Cube: Rubikulous

        Dane Christianson’s X-Cube is not the weirdest, most complex or most sophisticated puzzle cube I’ve ever seen. But Dane didn’t really want to make the world’s most difficult or intimidating take on the Rubik’s cube. His aim with the X-Cube was to make a fun and relatable product to raise people’s awareness about 3D printing.

  • Programming

Leftovers

  • Business donations to judges’ campaigns often equal friendly rulings

    State supreme court justices are favoring the corporate interests that finance their election campaigns, a comprehensive new study concludes.

  • Health/Nutrition

    • Monsanto Wins Again in Federal Circuit: Organic Farmers Have No Standing to Challenge Patent

      In 2011, Dan Ravicher at PubPat led a group of 23 plaintiffs in a lawsuit against Monsanto seeking declaratory judgment of non-infringement and invalidity of Monsanto’s genetically modified seed patents. Although not directly related, the patents challenged here are the same as those that Monsanto has asserted against dozens of farmers for growing unlicensed versions of its Round-Up Ready Soybeans. See, e.g., Bowman v. Monsanto (2013). In the present case, however, none of the plaintiffs want to grow genetically modified crops. Instead, the case asserts that the organic and heritage seed growers are in fear of becoming liable for inadvertently growing patented seeds. In many ways, patent infringement can be considered a strict liability tort and, as such, the unknowing use of another’s patented invention still creates liability for patent infringement. Thus far, Monsanto has promised that it will not sue farmers who inadvertently grow its patented crops so long as the farmers do not take
      advantage of their glyphosate resistant properties and so long as the farmer’s do not intentionally re-plant GM progeny. However, Monsanto has not offered any clear covenant-not-to-sue for inadvertent growing. Recent news that Monsanto’s experimentally genetically modified and non-FDA approved wheat has inadvertently spread even though Monsanto had attempted to destroy all of the crops.

  • Security

    • Patients Put at Risk By Computer Viruses
    • ICS-CERT issues warning about unsafe medical devices

      Industrial Control System CERT (ICS-CERT) of US-CERT and the US Food and Drug Administration (FDA) have published an advisory that some 300 medical devices from around 40 firms can be easily manipulated because they use hard-coded passwords. A growing number of medical devices have embedded web servers that are connected to the internet or the hospital’s network and could potentially be open to attack.

  • Finance

  • PR/AstroTurf/Lobbying

    • Koch brothers blast Reed Hundt’s remarks on newspaper ownership

      Hundt, a Democrat, said in an interview that the Koch statement “proves my point that they distort public dialogue.” He reiterated from his remarks last week that a lot has changed in the media landscape over the past decade as new platforms have emerged and led the way for more diversity of news and analysis.

    • Join CMD for ALEC Exposed Panel at Netroots Nation 2013

      Join the Center for Media and Democracy at this year’s Netroots Nation conference in San Jose, California. On Friday, June 21, CMD is hosting a panel called “ALECexposed: Strategies and Tactics for our 2013 Campaign” taking place at 10:30am in the Town Square. See the panel description here.

      This session will focus on the strategies and tactics being used by groups and individuals working to expose ALEC, including our work on ALECexposed.org and our reporting on ALEC at PRWatch.org. It will include new angles to our corporate campaign, new tactics in our outreach to legislators and new research on ALEC “stink tanks” and on immigration, guns, voting, climate, federal legislation among other issues.

    • ALEC Tours Tar Sands, Works with Industry Groups to Block Low-Carbon Fuel Standards

      The American Legislative Exchange Council (ALEC) recently adopted a “model” bill from an oil-industry lobby group, that would limit the ability of states to negotiate regional “low-carbon fuel standards” (LCFS), a mechanism designed to reduce the carbon intensity of transportation fuels. If agreed by states, LCFS could have a significant impact on the sale of fuels derived from Canadian tar sands in the United States, regardless of any decision the Obama administration makes over the proposed Keystone XL pipeline.

  • Censorship

    • ISPs to include porn filters as default in the UK by 2014

      Parental filters for pornographic content will come as a default setting for all homes in the UK by the end of 2013, says David Cameron’s special advisor on preventing the sexualization and commercialization of childhood, Claire Perry MP.

      Internet service providers (ISP) will be expected to provide filtering technology to new and existing customers with an emphasis on opting out, rather than opting in.

      “[In the UK] we will have filters where if you do nothing, the parental filters will come pre-ticked,” said Perry, speaking at a Westminster eForum on 14 June.

      The move is part of a government effort to force ISPs to make filtering a standard option across industry and to make the technology easier for consumers to use. As ISPs are voluntarily rolling out filtering technology, it will require no new legislation or regulations.

    • Jargon File blocked by O2, Youtube by Orange

      We regularly collect blocking reports from mobile users, via blocked.org.uk – and we’ve recently had some interesting ones.

  • Privacy

    • Slides from Simon Phipps Communications Data Bill Zombie Talk

      The slides from this weeks talk on the ‘Snoopers Charter’ are available here : wmk.me/10bdcFq

    • Google: The Thin Line between Search and Surveillance

      One could argue that Google is a corporation whose content and cash flow results from their ability to survey the Internet with unfettered access to users’ information under protection of the Safe Harbor Provision of the DMCA. The provision is a corporate loop-hole that allows Google to not be held responsible for content that might otherwise be personal, private, or illegal as defined by the U.S. Constitution and The Geneva Accords. Google claims to be software without moral judgment and purposely refuses to admit that it may be facilitating mafia-style corporations counterfeiting without license and thus profiting through illegal gain by eradicating people’s property rights as otherwise guaranteed.

    • Seeking Surveillance Safe Search Engines

      While helping our colleague Dave Bean as he worked to get his essay on Google and the NSA ready for publication, I found myself wondering if any of this latest news on the government’s forcing their nose into everybody-in-the-world’s business would have any lasting effect. Sadly, I figured not–if there was any change, it’d only be temporary. I’ve spent too many years on this planet to expect too much in the way of permanent change for the better.

    • NSA admits listening to U.S. phone calls without warrants

      National Security Agency discloses in secret Capitol Hill briefing that thousands of analysts can listen to domestic phone calls. That authorization appears to extend to e-mail and text messages too.

    • Six ways to protect yourself from the NSA and other eavesdroppers

      1) Abandon the cloud

    • How Long Can Edward Snowden Stay in Hong Kong?

      Such criticism of the treatment of Manning could make Hong Kong judges less willing to accept any U.S. request for extradition.

    • Why We’re ‘Shocked, Shocked’ At NSA Surveillance Revelations

      For those of us who had been following the story for a decade, this was no “bombshell.” No “leak” was required. There was no need for an “expose” of what had long since been exposed.

      As the Cato Institute’s Julian Sanchez and others reminded us, the NSA’s surveillance activities, and many of the details breathlessly reported last week, weren’t even secret. They come up regularly in Congress, during hearings, for example, about renewal of the USA Patriot Act and the Foreign Intelligence Surveillance Act, the principal laws that govern the activity.

    • How the U.S. PRISM and Blarney Programs Mine Your Data for Intelligence

      Two programs go beyond phone calls to email and cloud storage to gather info about terrorism and provide it to the NSA and British intelligence.

    • Why PRISM kills the cloud

      The migration from desktop computing to the cloud is on every tech firm’s playlist this season, with Apple [AAPL] expected to deliver improvements to its iCloud service later today — but recent revelations regarding the US government’s PRISM surveillance technology could be the kiss of death to these future tech promises. (You may also wish to read this more recent report).

    • To understand Edward Snowden’s motivations, look to Aaron Swartz

      Since the 29-year-old intelligence contractor Edward Snowden outed himself as the source of the NSA leaks on Sunday, reporters and pundits—heck, even Snowden himself—have compared him with Bradley Manning, the Army private on trial for passing classified material about the Iraq and Afghanistan wars to Wikileaks. There’s obviously something to the comparison—both men were apparently dedicated enough to the cause of transparency to risk their lives for it. But, after reading the early biographical reporting about Snowden, I can’t help recalling another transparency activist in the news recently: Aaron Swartz, who committed suicide in January while awaiting trial for downloading millions of pages from JSTOR, the online database of academic articles.

    • The PRISM Details Matter

      Glenn Greenwald and Ewan MacAskill’s account of the NSA’s “PRISM” program in the Guardian is woefully short on technical details of how the program works. This lack of clarity should be troublesome to those attempting to decide whether they should be outraged. Does this program allow the government to look at private communications on a company’s central servers without a valid court order, or is it something more benign?

      [...]

      These details matter. These details completely change the nature of the story, and they shouldn’t just be brushed aside as a minor technical footnote. Serious accusations were made, and have been roundly denied by the implicated parties. There is no aspect of this story more important than finding out which account is accurate.

    • Expert says Kiwis under constant surveillance

      An Otago University-based security expert believes Kiwis are under constant surveillance and the Government should own up to its part in the operation.

      University of Otago information science Associate Professor Hank Wolfe made the comments today after ex-CIA whistle blower Edward Snowden revealed electronic data was being collected from around the globe by a massive US intelligence monitoring programme called Prism.

      “The [National Security Agency] has built an infrastructure that allows it to intercept almost everything,” Snowden said.

      “With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife’s phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards.’’

    • Patents Illustrate Crafty Surveillance Techniques
    • Who watches the watchers? Apparently, no one

      And yet Booz Allen, and through the company the NSA, gave Snowden a $200,000 salary and access to and apparent operational control over the most sensitive, powerful surveillance instrument ever devised by man. By Snowden’s account, he had no trouble whatsoever in assembling the data about the program and taking it out of the office. He claims to have had “full access to the rosters of everyone working at the NSA, the entire intelligence community, and undercover assets all around the world, the locations of every station we have, what their missions are and so forth.”

      If he had wanted to turn that data over to the Chinese or Russians, he could have done so. As he described his operational authority, he could have tapped into the email stream of any person in the world, up to and including President Obama, without oversight. And presumably he could have used information gathered through the program as he saw fit, from leaking it to celebrity magazines to turning it to blackmail to using it for financial gain in the markets.

      Now, is all that true? Former NSA employees have told the media that it’s highly doubtful, but they also express astonishment at the range of material, including a subpoena from a top-secret federal court, that Snowden was clearly able to acquire. So the truth is that we don’t know, and that’s kind of the point. When you give these agencies immense power and huge budgets and cloak them in invisibility, accountability disappears.

    • How Big Is the NSA Police State, Really?

      Early last month, even while he was finalizing his discussions with Edward Snowden, The Guardian’s Glenn Greenwald reported on a conversation between Tim Clemente, a former FBI agent, and CNN host Carol Costello. In the interview about the Boston Marathon investigation, as seen at right, Clemente makes the claim that “all digital communications are — there’s a way to look at digital communications in the past.” Costello refers to a previous appearance in which Clemente claimed the government could access phone calls, even “exactly what was said in that conversation.”

    • ACLU Files Lawsuit Challenging NSA’s Patriot Act Phone Surveillance
    • Senators propose bill to declassify orders behind NSA spying

      A bipartisan group of eight prominent US senators announced a new bill today to declassify the court opinions that give the US National Security Agency the legal power to carry out the sweeping internet surveillance program known as PRISM and the separate phone records surveillance program, both revealed last week by leaked documents. “Americans deserve to know how much information about their private communications the government believes it’s allowed to take under the law,” said Senator Jeff Merkley (D-OR), the architect of the bill, a version of which he originally introduced last December, but which failed to gain traction at the time.

    • Europe warns US: you must respect the privacy of our citizens

      EU officials demand answers on what data snooping programmes entail and whether they breach human rights

    • Edward Snowden: “I am not here to hide”

      Edward Snowden has surfaced again, according to a local Hong Kong newspaper, telling them he has no intention of hiding from whatever may come next….”People who think I made a mistake in picking Hong Kong as a location misunderstand my intentions. I am not here to hide from justice; I am here to reveal criminality,” Snowden told the paper.

    • Treason charges for Snowden would be rare, challenging

      Several key U.S. senators are lobbying for treason charges against Edward Snowden, the former analyst who leaked information about government spy programs. So how rare and unusual would that be?

    • No, Edward Snowden probably didn’t commit treason
    • FISA Court Rejects Catch-22 Secrecy Argument in FOIA Case

      In the first publicly known victory by a non-government party before the Foreign Intelligence Surveillance Court (FISC), the secret court today granted a motion filed by EFF related to an ongoing Freedom of Information Act lawsuit.

    • Europe rallies against PRISM

      German Justice Minister Sabine Leutheusser-Schnarrenberger characterised PRISM as “dangerous”.

    • The Government’s Word Games When Talking About NSA Domestic Spying

      Government officials have made many statements about the warrantless surveillance since it became public in 2005. They’ve done so in court, in Congress, and in the media. Unfortunately, their words have too often served to evade or obscure, rather than clarify, their actions.

    • Feds May Have To Reveal FISA Phone Records In Murder Case

      There’s been a lot of focus elsewhere concerning the FISA rulings that were leaked, showing that the government is scooping up the details of pretty much every phone call. However, a case concerning some guys who were trying to rob an armored truck may lead to some interesting revelations related to what the government collects. Daryl Davis, Hasam Williams, Terrance Brown, Toriano Johnson, and Joseph K. Simmons were charged with trying to rob a bunch of armored Brink’s trucks, in which one of the robberies went wrong and a Brink’s employee was shot and killed. As part of the case against the group, the DOJ obtained call records. However, during discovery, the government refused to hand over call records for July of 2010, claiming that when they sought them from the telco, the DOJ was told that those records had been purged. Terrance Brown’s lawyer is now claiming that since it appears the NSA has sucked up all of this data for quite some time, it would appear that the government should, in fact,
      already have the phone records from July 2010, which he argues would show that he was nowhere near the robbery when it happened.

    • Secret Court Ruling Put Tech Companies in Data Bind

      In a secret court in Washington, Yahoo’s top lawyers made their case. The government had sought help in spying on certain foreign users, without a warrant, and Yahoo had refused, saying the broad requests were unconstitutional.

      [...]

      But the decision has had lasting repercussions for the dozens of companies that store troves of their users’ personal information and receive these national security requests — it puts them on notice that they need not even try to test their legality. And despite the murky details, the case offers a glimpse of the push and pull among tech companies and the intelligence and law enforcement agencies that try to tap into the reams of personal data stored on their servers.

      It also highlights a paradox of Silicon Valley: while tech companies eagerly vacuum up user data to track their users and sell ever more targeted ads, many also have a libertarian streak ingrained in their corporate cultures that resists sharing that data with the government.

    • Reddit co-founder on NSA snooping

      Alexis Ohanian discusses the NSA’s controversial surveillance program and says it’s time to ‘draw a line in the sand’ for what’s off-limits in the digital age.

    • GAP Statement on Edward Snowden & NSA Domestic Surveillance

      Snowden disclosed information about a secret program that he reasonably believed to be illegal. Consequently, he meets the legal definition of a whistleblower, despite statements to the contrary made by numerous government officials and security pundits. Sen. Rand Paul (R-Ky), Sen. Mark Udall (D-Co), Rep. Loretta Sanchez (D-Ca), Rep. Thomas Massie (R-Ky), and Sen. Bernie Sanders (I-Vt) have also expressed concern about the potential illegality of the secret program. Moreover, Rep. Jim Sensenbrenner (R-Wi) who is one of the original authors of the Patriot Act – the oft-cited justification for this pervasive surveillance – has expressed similar misgiving.

    • GCHQ intercepted foreign politicians’ communications at G20 summits

      Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.

      The revelation comes as Britain prepares to host another summit on Monday – for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week.

      The disclosure raises new questions about the boundaries of surveillance by GCHQ and its American sister organisation, the National Security Agency, whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey.

      [...]

      A second review implies that the analysts’ findings were being relayed rapidly to British representatives in the G20 meetings, a negotiating advantage of which their allies and opposite numbers may not have been aware: “In a live situation such as this, intelligence received may be used to influence events on the ground taking place just minutes or hours later. This means that it is not sufficient to mine call records afterwards – real-time tip-off is essential.”

      In the week after the September meeting, a group of analysts sent an internal message to the GCHQ section which had organised this live monitoring: “Thank you very much for getting the application ready for the G20 finance meeting last weekend … The call records activity pilot was very successful and was well received as a current indicator of delegate activity …

    • G20 summit: NSA targeted Russian president Medvedev in London

      American spies based in the UK intercepted the top-secret communications of the then Russian president, Dmitry Medvedev, during his visit to Britain for the G20 summit in London, leaked documents reveal.

      The details of the intercept were set out in a briefing prepared by the National Security Agency (NSA), America’s biggest surveillance and eavesdropping organisation, and shared with high-ranking officials from Britain, Australia, Canada and New Zealand.

    • 3 NSA veterans speak out on whistle-blower: We told you so

      In a roundtable discussion, a trio of former National Security Agency whistle-blowers tell USA TODAY that Edward Snowden succeeded where they failed.

    • Edward Snowden Q and A: NSA whistleblower answers your questions

      The whistleblower behind the biggest intelligence leak in NSA history answered your questions about the NSA surveillance revelations

    • The Government says NO to blanket pub snooping

      Having recently posted about local councils reducing the number of CCTV cameras in their local area it seems that the Government has taken the additional step to ensure that pub landlords aren’t forced into using CCTV when it is not necessary to do so.

    • Work for the UN

      GCHQ and the NSA between them employ tens of thousands of people. I am bemused by the shock at the “revelation” they have been spying. What on Earth did journalists think that spies do all day? That includes electronics spies.

    • Jerrold Nadler Does Not Think the NSA Can Listen to U.S. Phone Calls

      An exchange between Rep. Jerrold Nadler and FBI director Robert Mueller is coming under some scrutiny after a reporter claimed it concretely proves that NSA analysts can listen to domestic phone calls without a warrant.

      CNet’s Declan McCullugh published a story Saturday night purporting to prove Edward Snowden’s claim that NSA analysts can wiretap domestic phone calls without a warrant. His case was built entirely around an exchange between Rep. Jerrold Nadler and FBI director Robert Mueller that happened during an FBI oversight hearing with the House Judiciary committee on Thursday.

  • Civil Rights

  • DRM

    • Apple’s Cue Says Publishers Pushed for Higher E-Book Prices

      According to the government, Cue was the main intermediary between Apple and five major publishers, and the “chief ringleader” of an alleged conspiracy to shift the e-book industry from the wholesale pricing model established by Amazon to an agency model where publishers, not retailers, set e-book prices, sending them higher than they had been in the past. But on the witness stand Thursday, Cue maintained he was anything but.

    • Apple Executive Denies E-Books Conspiracy

      Apple is the last defendant standing in the government’s antitrust case against six of the world’s leading publishers and two subsidiaries. Hachette, HarperCollins, and Simon & Schuster all settled in April 2012. Penguin joined the settling bandwagon in December, and Macmillan copped to its role in the scheme two months later.

  • Intellectual Monopolies

    • Copyrights

      • Filmmaker picks a copyright fight with “Happy Birthday”

        The copyright on the world’s most popular song? A new lawsuit says it’s bogus.

      • File-Sharers Are Well Educated and Earn More Money

        New research commissioned by the Australasian Performing Right Association reveals that Australian file-sharers are more affluent and better educated than their non-downloading counterparts. One in three Aussie Internet pirates earn more than $100,000 and one in four enjoyed a university education. The results further confirm that pirates tend to be relatively young, with 44% of file-sharers under 30 years of age.

06.15.13

Links 15/6/2013: IBM and KVM, KDE 4.11 Beta

Posted in News Roundup at 2:43 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Turning to Linux: A guide for SMBs

    A partial Linux solution could solve Windows 8 woes

  • What Linux Taught Me About Productivity

    I’ve spent the past two years interviewing people about their desktop Linux setups, asking them about the Linux distributions they chose, the desktop environments they use, and the software upon which they rely. Over the past 73 interviews, a number of common lessons have emerged. Most of these apply to anyone who relies on a computer to do their work, Linux user or not. Here are a few of the lessons I’ve learned from these interviews:

  • Five apps to make the Linux desktop business-ready

    It used to be quite the challenge to make a Linux desktop business-ready. Most every business depended upon niche, proprietary software that simply could not be run on anything but Windows. However, times have changed and so much of business is now handled through a web browser. Add to that how much the Linux platform has matured and you have the makings for a big win on the open source front.

  • One Window Successfully Shut; budding authouress Daughter Sarah’s voluntary testimonial

    Being a broke university student who couldn’t afford a technician’s fee, a client of this new ISP’s (and hardly servile at that), and with no other ISP options due to the grand monopolization of the region and who knows, maybe price fixing, I looked to my father and brother for advice. Brother recommended reinstalling Windows XP. Father recommended Debian GNU/Linux.

    And so it was. I didn’t want to deal with virus scanners and paying heed to time allocated to ensuring my shit was safe, so I went Father’s way with a free disk from Brother.

    The first few times I ran Ubuntu GNU/Linux (my brother deviated from Debian), the new ISP couldn’t give me a connection, leaving me to call their tech people yet-a-friggin’-gain. Since I changed network names and passwords, there’ve been no issues in that regard, though I am still using their provided modem.

  • Desktop

  • Server

    • The Meteoric Rise of DigitalOcean
    • IBM unveils two new power systems linux centers

      At the recent Red Hat Summit in Boston, IBM, the giant international computer and server company, has announced its plan to expand the adoption of Linux accross its enterprise. There will be two new Power Systems Linux Centers in Austin and New York and support for Kernel-based Virtual Machine (KVM) will be extended to its Power Systems portfolio of server products.

      In July, the two first North American IBM Power Systems Linux Centers will be opened, in Austin, Texas and in New York. With these centers, software developers will find it easier to develop and deploy new softwares for big data, cloud, mobile and social business computing on open-sourced technology building blocks using the latest IMP processor technology and Linux.

  • Audiocasts/Shows

    • Podcast Season 5 Episode 10

      In this episode: It looks like Rockwell was right – somebody was watching him (and us). There’s a great new Raspberry Pi installer called NOOBS and the President of the US promises action against patent trolls. Ubuntu’s ‘bug one’ has been fixed and the EFF objects to DRM in HTML 5. As ever, hear our discoveries and your opinions in this epic length podcast.

  • Kernel Space

  • Applications

  • Desktop Environments/WMs

    • Improve Your Xfce Desktop with the Zen Suite 0.11.3 Theme

      Zen suite, a theme compatible with GTK+ 2.x and GTK+ 3.x that aims to be simple, consistent and visually appealing, is now at version 0.11.3.

    • If You Hate Flat Themes and Icons, You Are Going to Love Sphere 1.2.5

      A lot of users have turned to the flat model for their themes, but if you don’t like this type of embellishments, you can go the other way and install spherical icons.

    • K Desktop Environment/KDE SC/Qt

      • Mir Still Causing Concerns By Ubuntu Derivatives

        With Canonical’s planned adoption of their in-house Mir Display Server over the next year rather than using an X.Org Server or Wayland, derivatives such as KDE-based Kubuntu continue to fear the change and what exactly the options will be.

        KDE will not support Mir as long as it remains a one-distribution solution. With KDE not coming to Mir for the foreseeable future, Jonathan Riddell of Kubuntu started a new technical discussion about non-Unity flavors and Mir.

      • Fanboys in Free Software

        Years ago I had a clear political opinion. I was a civil-rights activist. I appreciated freedom and anything limiting freedom was a problem to me. Freedom of speech was one of the most important rights for me. I thought that democracy has to be able to survive radical or insulting opinions. In a democracy any opinion should have a right even if it’s against democracy. I had been a member of the lawsuit against data preservation in Germany. I supported the German Pirate Party during the last election campaign because of a new censorship law. That I became a KDE developer is clearly linked to the fact that it is a free software community.

        But over the last years my opinion changed. Nowadays I think that not every opinion needs to be tolerated. I find it completely acceptable to censor certain comments and encourage others to censor, too. What was able to change my opinion in such a radical way? After all I still consider civil rights as extremely important. The answer is simple: Fanboys and trolls.

        When one starts to have a blog in free software one learns the hard way that being a relatively good developer means that you get hated. If you achieve something you get attacked, you get insulted, you get called a dictator [1], you get compared to Hitler [2], etc. etc. People say that you need a thick skin if you want to work in free software. I disagree. There shouldn’t be a need to have a thick skin. We are improving the world, we donated lots of our spare time to work on free software, we donate the source code we write for the public good and we are thanked by insults. This is not acceptable! Even if people dislike some specific software or are a great supporter of another software there is no reason to insult the people or the products. It never is! Not even if it is Microsoft or Apple or Google. There is no reason to attack them.

        [...]

        Final remark: please don’t come and tell me that I’m the same by criticizing Mir. It’s not the same. Criticizing decisions and having discussions is important, but of course critic has to be constructive. I have never attacked any of the Mir developers or have attacked the software in any way. I criticized the decision and the reasoning and pointed out the problems it causes for us, but I have in no way attacked Canonical, Ubuntu or Mir.

      • New Krita Web-shop!
      • KDE Ships First Beta of Plasma Workspaces, Applications and Platform 4.11

        Today KDE released the beta of the new versions of Workspaces, Applications, and Development Platform. With API, dependency and feature freezes in place, the KDE team’s focus is now on fixing bugs and further polishing.

      • KDE 4.11 Beta Released, Works On Wayland
      • Choqok Twitter client handed over to community

        Mehrdad Momeny, the developer of the KDE microblogging client Choqok, has announced that he plans to hand development of the application over to the community. Momeny had previously apologised for not finding a maintainer to take over the project after admitting that personal circumstances did not leave him enough time and energy to continue development.

      • Disabling semantic-desktop at runtime

        Today we bumped KDE SC 4.11 beta 1 (4.10.80) in the gentoo kde overlay. The semantic-desktop use flag is dropped in >=kde-base/4.10.80, as you may already noticed or read in dilfridges blog post. So if your hardware is not powerful enough or you just don’t want to use the feature you can easily disable it at runtime.

      • Status and plans for plasma-nm
      • SFLPhone-KDE 1.2.3 released!

        SFLPhone-KDE 1.2.3 have been released today as a bug fix release 6 months after 1.2.2. This version is (hopefully) the last in the 1.2.* serie. The next generation (1.3) is under heavy development since the last release. According to git diff –stat, 1.3 branch have a massive 16000 lines of changes. It is also 10x faster, less memory hungry and usable (more on that in an upcoming blog post(s)). As for 1.2.3, the new features include macro support, new command line options and being able to be invoked from KaddressBook. Important bug fixes include compilation fix on Fedora 19 beta, prevent race condition when launching SFLPhone-KDE in autostart. On the daemon side, many bugs have been fixed there too. Overall, this release should be quite stable.

    • GNOME Desktop/GTK

      • GNOME 3, Windows 95 Disconnected

        About a week and a half ago, I was nearly taken-in when an item appeared on The Register that tied recent Linux desktop woes to behind the scenes moves by Microsoft to enforce patents against GNOME. Supposedly, GNOME was violating Redmond’s patented designs of the Windows 95 desktop, most specifically the Start Menu and the Start button. According to the story painted by reporter Liam Proven, KDE was also guilty of violating the same patents, but got a pass as they benefited from the famous Novel/Microsoft patent swap deal, being they were the default desktop in SUSE.

      • Who’s birthday is it today?

        Users today have countless ways of knowing or getting notified when their friends and family have birthdays. The most popular way comes from social networking where such data is shared publicly, but is there a way to get Gnome Shell notifications about this?

  • Distributions

    • Divergence in the distros: how the Linux community is splitting into a two-tier system

      Look at any major service provider: Heroku, Google, Amazon, Apple. All of them offer different levels of access to what they offer, usually at different prices. There’s even an established route to enticing customers towards the paid plans, via the well-worn ‘freemium’ model.

      Let’s be clear about this: Linux isn’t dividing into paid and unpaid. It’s not going the freemium route (although the cynical will suggest that Canonical might be thinking about it). What we’re seeing, though, is the development of a clear split. A kind of meiosis.

    • New Releases

    • Screenshots

    • PCLinuxOS/Mageia/Mandrake/Mandriva Family

    • Gentoo Family

    • Red Hat Family

      • Red Hat Honors Rafael Guimaraes as 2013 Red Hat Certified Professional of the Year
      • Red Hat Announces Red Hat Storage Integration with Red Hat OpenStack
      • Where Is Red Hat Enterprise Linux 7?

        In a standing room-only set of sessions at the Red Hat Summit here this week, the future of Red Hat Enterprise Linux was revealed.

        Red Hat Enterprise Linux (RHEL), the Linux vendor’s core platform, had its last major release with the debut of RHEL 6 in November of 2010. Red Hat has been releasing major new RHEL platforms every two to three years, and at its 2012 Summit event the company had hinted that 2013 could be the year in which RHEL 7 might be released.

      • Red Hat bets its cloud future on OpenStack

        The message coming out of Red Hat’s annual Red Hat Summit is that while Linux is Red Hat’s foundation, OpenStack is its future.

      • Red Hat Launches New Initiative to Help Enterprises Chart Course to Open Source Middleware

        As more enterprises develop technology-dependent products and services, interest in robust and reliable middleware continues to grow. These enterprises are reconsidering existing investments in middleware as they look at open hybrid clouds, yet may find themselves unable to proceed as easily as they would like with proprietary middleware solutions because of “cloud unfriendly” features and practices, including rigid architectures, prohibitive license structures, and lack of portability. In addition, the technical complexity and mission-critical nature of enterprise applications present numerous migration challenges when the time comes to change platforms.

      • Red Hat + Hortonworks Tag-Team Open Source Big Data Storage on Apache Hadoop

        At the Red had Summit 2013 yesterday, Hortonworks and Red Hat announced an engineering collaboration to advance open source big data community projects. The engineering partnership will be a collaboration effort on enabling more storage file systems to work with Apache Hadoop. In order to accelerate the enablement of the broader file system ecosystem being used with Apache Hadoop, the engineering teams at Hortonworks and Red Hat will be working directly with the Apache Hadoop Community.

      • Red Hat launches new initiative to help enterprises chart course to open source middleware

        Linux Warehouse, the premier distributor of enterprise open source software for southern Africa and an authorised distributor in southern Africa for Red Hat, today announced the latter’s new community resources designed to help enterprises migrate to open source middleware technologies, including a community-driven JBoss Migration Centre and new tooling to ease the process of migrating from proprietary application server technologies to the open source JBoss platform.

      • Red Hat Summit: Open source trends, cloud outlook, innovation and more
      • Red Hat updates virtualisation and OpenStack products

        Full Storage Live Migration support and a framework for plugins are two of the new features included in the now available version 3.2 of Red Hat Enterprise Virtualisation (RHEV). Storage Live Migration allows the storage media that is used by virtual machines to be migrated from one storage domain to another at runtime. The new plugin framework enables programs to access the management interface of Red Hat’s virtualisation platform and offer additional interface features to administrators; companies such as HP, NetApp and Symantec plan to use it to provide maintenance and operational features for their products this way.

      • Cisco and Red Hat Enterprise Linux

        Cisco has over 10,000 RHEL instances.

      • What Do You Want to Ask a Linux Journalist?

        This morning I was on a panel at the Red Hat Summit with Scott Merrill from TechCrunch and Jon Brodkin from Ars Technica with moderation from 451 Groups John Abbot.

        Officially the session was titled, “Hot Off the Press: Top Journalists on Today’s Tech Trends” but it really could have just been called – What Do You Want to Ask a Linux Journalist?

        We had about 60 people or so in the room and the primary topic of discussion – not surprisingly – was cloud . Also not surprising is the fact that no one in the audience had actually deployed an OpenStack cloud. Considering that this is a Red Hat conference, that’s not terribly surprising either – since Red Hat’s full product is not yet available.

      • Red Hat Virtualization 3.2 announced, available world wide

        New features in Red Hat Virtualization include Storage Live Migration, new third-party plug-in framework and support for new AMD and Intel chips

    • Debian Family

      • Users warned to remove Debian Multimedia repository

        The Debian project is warning users that the unofficial Debian Multimedia repository now has to be considered unsafe. According to the Debian maintainers, the debian-multimedia.org domain is not being used by the maintainers of the unofficial repository any more and is now registered to a party unknown to the Debian project. This means that the repository is no longer safe to use and users should remove it from their sources.list file as soon as possible.

      • Derivatives

        • Canonical/Ubuntu

          • System76 launches high-end Ubuntu-powered laptops

            Galago UltraPro and Gazelle Professional combine Linux smarts with ultrabook style

          • The Ubuntu App Developer Cookbook Announced

            In recent months we have been seeing tremendous growth and interest in the Ubuntu SDK that is at the heart of building applications for Ubuntu for phones, tablets, desktops, and TVs. The SDK provides the ability to build rich native applications in QML/Qt that hook right into the system, platform services, messaging, social media and more. We will also be providing support for HTML5 apps soon (with deep platform integration), and for OpenGL apps too.

          • Printed Certificates for Ubuntu Members

            The Ubuntu community is a core part of what makes us what we are, and right at the center of that are our Ubuntu Members. Ubuntu Members provide significant and sustained contributions over a wide range of areas such as packaging, documentation, programming, translations, advocacy, support, and more. We always want to do our best to recognize and appreciate our many members in the Ubuntu family, across these many different teams and our flavors.

          • The sorry state of services in Ubuntu

            Read the post How do I choose which way to enable/disable, start/stop, or check the status of a service?. Compare that with systemctl enable/disable/start/stop/status service and tell me, for a user, which is easier?

          • Ubuntu Desktop Convergence

            This is where it starts to get exciting, folks. The future starts now.

            Ubuntu is an operating system for the server, the cloud, the desktop, and the mobile device. One single OS. That makes it different from Apple’s OSes (Mac OS X on the desktop, iOS on the mobile) and Microsoft’s current OSes (Windows 8 on the desktop, Windows RT on the mobile, and Windows Server 2012 on the server and in the cloud).

          • Canonical: OpenStack Cloud Computing Platform Ready for Prime Time

            Has OpenStack, the open source cloud computing platform, come into its own? Canonical, the company behind Ubuntu Linux—which happens to be the most popular OS for OpenStack deployments—is saying so this week as it touts the rapid maturity of the software. Now, the question becomes: Does the channel agree?

          • Flavours and Variants

            • Review: Linux Mint 15 “Olivia” Cinnamon + MATE

              It’s that time of the year again. Linux Mint has just released the latest version of its distribution, and I’m going to review it.

            • Best Newbie Distro? You Say Linux Mint.

              According to our “Newbie” Distro Poll, someone considering moving from Windows or Mac to Linux should consider taking Linux Mint for a spin. The poll asked the question, “What Linux distro would you be most likely to recommend to a new Linux user?” Evidently this was a subject that interested many of you, because a whopping 1,339 votes were cast in this poll, making it the most number of votes one of our polls has ever received.

  • Devices/Embedded

Free Software/Open Source

  • Coping with Loss (in Open Source)
  • FLAG to discuss the Open Source landscape – Lawyer Monthly Magazine
  • Apps & the City from London-based app developer

    London-based software development company AppShed has detailed plans to migrate its app development platform towards an Open Source footing.

  • The Open Source Internet of Things has some big aspirations

    Internet of Things (IOT) advocate Michael Koster fixated makers and hackers at the recent Maker Faire in San Mateo, California, a few weeks ago. Standing in front of samples of many versions of Arduino, Rasberry Pi, and sensors, he spoke of an open source horizontal platform that will unify the IOT. He changed people’s perspectives from looking up from a small control circuit of dedicated sensors and actuators to seeing the unique value that will be created by looking down at a unified world of horizontally interconnected sensors.

  • Open-source game developers have the power to sink mega conferences like E3

    Contrary to popular belief, the Electronic Entertainment Expo, known as E3, was alive and well, this year. But the rise of Ouya, Steam Box, and GamePop later this year could mark the end of an era. With relatively small revenue generated by a typical open-source game, indie developers simply won’t be able to afford to go.

    At the same time, there’s going to be more and more of them, playing a huge part in the gaming ecosystem.

  • Web Browsers

  • SaaS/Big Data

    • NoSQL, Hadoop Power NSA PRISM, Big Data War on Terror?

      The National Security Agency (NSA) apparently uses Hadoop, NoSQL and other open source software to wage its Big Data war against terrorism, according to anecdotal evidence and industry pundits who spoke with The Wall Street Journal.

    • SolidFire, Red Hat: SSD Storage for OpenStack Cloud

      It’s been a big week for solid-state device (SSD) storage and the channel. Earlier this week, Intel (INTC) unveiled a new line of SSD hardware for the cloud and Big Data. Then, a day later, SolidFire, which provides SSD storage infrastructure for cloud hosts, announced a partnership with Red Hat (RHT) that will integrate the company into Red Hat’s OpenStack Cloud Infrastructure Partner Network. Here are the details on this latest news.

    • Cray Rolls Out Hadoop Cluster Solution
  • Databases

    • Red Hat ditches MySQL, switches to MariaDB

      Red Hat will switch the default database in its enterprise distribution, RHEL, from MySQL to MariaDB, when version 7 is released.

    • RethinkDB 1.6 gets regex and array functions

      The open source JSON document database RethinkDB has gained fourteen new array operations and the ability to match regular expressions within stored documents in its latest version, RethinkDB 1.6 code-named “Fargo”. RethinkDB is a rapidly developing database which works with Python, Ruby, or JavaScript in Node.js and supports clustering, sharding and replication. The developers compare it to MongoDB.

  • Oracle/Java/LibreOffice

    • LibreOffice 4.1 will shine cleaner!

      Maybe the most important thing about LibreOffice’s 4.0 release was the work done in cleaning the code and making it more efficient, while also doing the biggest API cleanup that has ever occurred since the beginning of the project. This would theoretically help boost the project’s development tempo and make things easier for contributors.

    • Try The New LibreOffice Flat Icon Set

      It looks like LibreOffice will get a new set of flat icons, based on Gnome’s symbolic icons. The icon set isn’t completed yet, but you can try it already – below you’ll find instructions on how to easily try the new icons.

    • Libre Office Version 4 – Tantalizingly Close

      Some of the Linux faithful will look at this and say: “There he goes again, bashing open-source. He’s just a Microsoft shill.” They will use the fact I am an MCSE as ‘proof’ of their opinion.

    • LibreOffice Gets More Code Clean-up for 4.1.0

      LibreOffice 4.1.0 is right around the corner and developers are busy as beavers getting it ready. One of the things featured this release might be hard for ordinary users to see, but is every bit as important. Continued code refinement and clean-up will make LibreOffice 4.1.0 more efficient, smaller, and easier to contribute to and compile.

    • Java EE 7 melds HTML5 with enterprise apps

      Oracle has announced public availability of Java EE 7, the first major release of the enterprise formulation of Java since the database giant took control of the platform in 2010. The last version shipped way back in 2009.

  • Public Services/Government

    • European Parliament adopts open data strategy

      EU flag On Thursday, the European Parliament approved new rules, introduced by the European Commission, for re-using public sector information. These changes will require that administrative data is published according to open data principles. When implemented, all documents made accessible by public organisations will be re-usable for any purpose, unless they are protected by third party copyright.

  • Openness/Sharing

  • Programming

    • Google App Engine gets git push support

      The latest version of Google’s App Engine, version 1.8.1, adds the ability to git push deployments of Python and PHP applications to its PaaS (Platform as a Service). Once developers have enabled “Push-to-Deploy” in their applications, they will then be able to clone a repository from the project. After making changes locally, they can then deploy the changed application with the command git push appengine master.

    • Eclipse faces challenges with adoption and popularity

      The latest Eclipse Community Survey results highlight some challenges for the Java IDE. For example, new version adoption for the annually updated IDE has slumped: in 2012, 76.9% of users were using the then current release Eclipse 3.7, but in 2013, only 56% are using Eclipse 4.2. Ian Skerrett, Marketing Director at the Eclipse Foundation, believes that this is most likely “the result of the performance issues found in Eclipse 4.2″. He notes in a blog post that overall satisfaction with Eclipse has dropped from last year’s 90% to only 81% being satisfied or very satisfied this year. This is something Skerrett hopes will be addressed “as the Eclipse 4.x platform continues to mature,” but, as it stands, it isn’t very good news.

Leftovers

  • Hardware

    • Notebook ODMs bracing for price war

      Notebook brand vendors have recently started the request-for-quotation (RFQ) process for 2014 orders. But because of the notebook industry’s weak shipments and Lenovo increasing in-house production, competition between ODMs are expected to be fierce. Upstream suppliers may also see gross margins fall, according to sources from the upstream supply chain.

  • Security

    • Snowden: US has been hacking Hong Kong and China for years

      NSA whistleblower Edward Snowden has prompted a change of direction in the debate that has been going on for months around China’s alleged hacker attacks on the US. The former Booz Allen Hamilton employee and contractor to the US National Security Agency (NSA) told Hong Kong-based South China Morning Post newspaper that the intelligence agency has been launching hacking attacks on targets in Hong Kong as well as mainland China.

    • There Are Reasons M$ Is Losing The Web, Besides The Horrific Costs

      Folks who are comfortable with the cost, complexity and vulnerability of M$’s OS have not experienced the joy of IT that works, works for the user instead of for M$. M$ is all about “getting value” from its OS above all else. It is an OS designed by salesmen who love to sell more cost and complexity as “new features”. Unfortunately for the world, that brings vulnerabilities galore. Fortunately for the world, there is an alternative Debian GNU/Linux and other distributions of Free Software.

  • Defence/Police/Secrecy/Aggression

    • Preparing to Bomb Syria

      Quite simply I do not believe the US, UK and French government’s assertion that the Syrian government has used chemical weapons against rebels “multiple times in small quantities”. Why on earth would they do that? The claim that “up to 150 people have died” spread over a number of incidents makes no sense at all. In a civil war when tens of thousands of people have died, where all sides have been guilty of massacres of scores at a time, I cannot conceive of any motive for killing a dozen or so at any one time with the odd chemical shell. It makes no military sense – chemical weapons are designed for use against population centres and massed armies. They are not precision weapons for deployment against small groups.

    • Syria and Chemical Weapons: What Do We Know?

      abc-assad-chemIf you watched ABC World News last night (6/13/13), the story of Syria and the use of chemical weapons had shifted pretty dramatically. Anchor David Muir declared at the top of the show: “The White House now confirming Syria’s president has in fact used chemical weapons to kill.”

    • The Forbidden Truth: The U.S. is Channeling Chemical Weapons to Al Qaeda in Syria, Obama is a Liar and a Terrorist

      Who has Crossed the “Red Line”? Barack Obama and John Kerry are Supporting a Terrorist Organization on the State Department List

  • Finance

  • Censorship

    • Website filtering problems are a “load of cock”

      On Tuesday, I spoke at an event organised by the Sunday Times and Policy Exchange about online pornography and child protection. This was in the run-up to the opposition debate that took place in Parliament on Wednesday on these topics.

  • Privacy

    • Edward Snowden: change you can believe in

      I voted for Barack Obama in his first term. I had seri­ous doubts about him even then, and today I wish I hadn’t done it, but I did vote for him. I wouldn’t say I com­pletely fell for the “change you can believe in” baloney, but I decided to give the guy the ben­e­fit of the doubt.

    • Government Built Spy-Access Into Most Popular Consumer Program Before 9/11

      In researching the stunning pervasiveness of spying by the government (it’s much more wide spread than you’ve heard even now), we ran across the fact that the FBI wants software programmers to install a backdoor in all software.

    • The fight against the snoopers charter rages on

      It seems that the fight against the ‘snoopers charter’ rages on. In a letter to The Times, signed by Jack Straw, David Blunkett, Alan Johnson, Lord Baker, Lord King and Lord Carlile, called for the ‘snoopers charter’ to be revived. The intention of the letter seems to be to put increasing pressure on Nick Clegg to drop his opposition to the draft Bill

      In the letter, the group state that “coalition niceties must not get in the way of giving our security services the capabilities they need to stay one step ahead of those that seek to destroy our society”.

    • You do have the right to record council meetings

      In positive step towards transparency Eric Pickles MP, the Communities and Local Government Secretary, has published new guidance which explicitly states that Councils should allow the public to overly film and council meetings.

      DCLG was forced to publish the guidance after a string of councils had prevented individuals from recording council meetings on health and safety and legal grounds. The guidance will only apply to English councils, but it certainly creates a serious precedent for councils in Wales.

      Public access to meetings is a key part of holding local councils and public bodies to account and it’s wholly wrong for people not being able to film or tweet in public meetings for spurious legal reasons.

    • Beat the CIA

      The World Wide Web is the greatest system for sharing information ever created – but how do you stop it sharing too much? Ben Everard investigates.

    • Baroness Ludford’s proposals take away your privacy choices

      Many amendments proposed by Liberal Democrat MEP Baroness Ludford to the Data Protection Regulation would leave us with less control of our personal information. In this post, we focus on consent and loopholes.

      Yesterday we wrote about Baroness Ludford’s amendment to the Data Protection Regulation (amendment number 1210) that would mean your data could be transferred to a third country or international organisation without you being told. In the light of the PRISM revelations, we suggested this amendment should be withdrawn.

    • EU Commission caved to US demands to drop anti-PRISM privacy clause

      Reports this week revealed that the US successfully pressed the European Commission to drop sections of the Data Protection Regulation that would, as the Financial Times explains, “have nullified any US request for technology and telecoms companies to hand over data on EU citizens.

      The article, (as you can read below), would have prohibited transfers of personal information to a third country under a legal request, for example the one used by the NSA for their PRISM programme, unless “expressly authorized by an international agreement or provided for by mutual legal assistance treaties or approved by a supervisory authority.”

    • Has the NSA “poisoned the well” for responsible disclosure?

      Revelations about the PRISM project involve US tech companies have been compelled to provide special assistance to US intelligence agencies. This has also drawn fresh attention to “responsible disclosure” systems regarding information about security vulnerabilities in those companies’ products.

    • How to break out of PRISM

      NSA scandal has exploded fears of being watched on the Internet, but a new website lists ways to escape the Panopticon

    • Tech companies working with the NSA are making a Faustian bargain

      Whatever the details might be, it seems clear that dozens of technology companies — and perhaps even more — have co-operated with the NSA on its surveillance program. And they could pay a high price for doing so.

  • Civil Rights

  • Internet/Net Neutrality

    • The EU, safeguarding the open internet for all

      Thank you for inviting me to speak. Net neutrality can be a polarising debate. But I often find there is much we agree on. We agree that the internet is a great place to exercise and enjoy liberty. A great place to innovate, and implement new ideas without having to ask permission. And an open forum for all kinds of activity.sentence

  • Intellectual Monopolies

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts