EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.04.16

Links 4/10/2016: KDE Plasma 5.8, Google Pixel and Andromeda Predictions

Posted in News Roundup at 3:07 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • 26 open source projects from Linux’s 25 years

    Linux is often credited for pioneering the open source development model and it has led to the creation of many open source projects and communities. Here are some of the major open source projects that were created around Linux in the past 25 years.

  • Server

    • Keeping Linux containers safe and secure

      Linux containers are helping to change the way that IT operates. In place of large, monolithic virtual machines, organizations are finding effective ways to deploy their applications inside Linux containers, providing for faster speeds, greater density, and increased agility in their operations.

      While containers can bring a number of advantages from a security perspective, they come with their own set of security challenges as well. Just as with traditional infrastructure, it is critical to ensure that the system libraries and components running within a container are regularly updated in order to avoid vulnerabilities. But how do you know what is running inside of your containers? To help manage the full set of security challenges facing container technologies, a startup named Anchore is developing an open source project of the same name to bring visibility inside of Linux containers.

    • The History of Pets vs Cattle and How to Use the Analogy Properly

      I have been meaning to write this post for a long time, but one thing or another has gotten in the way. It’s important to me to provide an accurate history, definition, and proper usage of the Pets vs Cattle meme so that everyone can understand why it was successful and how it’s still vital as a tool for driving understanding of cloud. The meme has taken off because it helped created an understanding of the “old way” vs. the “new way” of doing things. That’s great, but the value of the meme becomes muddied when misused. We can all agree there’s enough muddy terminology and phraseology already, such as “cloud,” “hybrid,” and “DevOps”. So this post aims to set the record straight and assure a canonical history that everyone can reference and use.

    • Running Stateful Applications in Kubernetes: Storage Provisioning and Allocation

      To appreciate how Kubernetes manages storage pools that provide persistence to applications, we need to understand the architecture and the workflow related to application deployment.

      Kubernetes is used in various roles — by developers, system administrators, operations, and DevOps teams. Each of these personas, if you will, interact with the infrastructure in a distinct way. The system administration team is responsible for configuring the physical infrastructure for running Kubernetes cluster. The operations team maintains the Kubernetes cluster through patching, upgrading, and scaling the cluster. DevOps teams deal with Kubernetes to configure CI/CD, monitoring, logging, rolling upgrades, and canary deployments. Developers consume the API and the resources exposed by the Kubernetes infrastructure. They are never expected to have visibility into the underlying physical infrastructure that runs the master and nodes.

    • [Old] Technical Debt

      Building happy engineering teams needs to be your top priority if you want to build great products. Through collective ownership, increasing trust, removing noise, and being bold with new ideas, you can begin to not only improve your practices but also allow new ideas to flourish organically. Allow new eyes to push you to both fix issues and take their fresh perspective not as criticism but as a catalyst for change.

      After our strategic investments, our paging volume is down, service quality is up, and we’re better positioned to move even faster to make email suck less.

    • “I just want to run a container!”

      I wrote “what’s up with containers: Docker and rkt” a while ago. Since then I have learned a few new things about containers! We’re going to talk about running containers in production, not on your laptop for development, since I’m trying to understand how that works in September 2016. It’s worth noting that all this stuff is moving pretty fast right now.

      The concerns when you run containers in production are pretty different from running it on a laptop — I very happily use Docker on my laptop and I have no real concerns about it because I don’t care much if processes on my laptop crash like 0.5% of the time, and I haven’t seen any problems.

      Here are the things I’ve learned so far. I learned many of these things with @grepory who is the best. Basically I want to talk about what some of the things you need to think about are if you want to run containers, and what is involved in “just running a container” :)

    • Hot Startup Nets $5 Million to X-ray and Secure Software Containers
    • Anchore Gets $5M For Software Container Security
    • Anchore 1.0 Delivers Container-Based Compliance and Certification
  • Kernel Space

  • Applications

  • Desktop Environments/WMs

    • LXQt Memory Usage On Par With LXDE, Lower Than Xfce

      LXQt developers have done a desktop memory consumption comparison to show that Qt programs are not necessarily bloated.

      The tests done by developer “PCMan” show that LXQt 0.11 uses a bit more memory than the GTK2-based LXDE while using less memory than the GTK2-based Xfce.

    • Benchmark: Memory Usage: LXQt desktop environment vs XFCE

      It has always been rumored that Qt is bloated so programs written in Qt should be bloated. Some even argued that the LXDE developers made a wrong decision on the migration to LXQt.
      Why not replace the assumptions with some experiments?
      In fact, LXQt 0.11 even uses slightly less memory than XFCE (with gtk+ 2). After cold boot, LXQt uses 112 MB in the testing environment.

    • K Desktop Environment/KDE SC/Qt

    • GNOME Desktop/GTK

      • Sysprof Plans for 3.24

        The 3.24 cycle is just getting started, and I have a few plans for Sysprof to give us a more polished profiling experience in Builder. The details can be found on the mailing list.

        In particular, I’d love to land support for visualizers. I expect this to happen soon, since there is just a little bit more to work through to make that viable. This will enable us to get a more holistic view of performance and allow us to drill into callgraphs during a certain problematic period of the profile.

      • GNOME From Scratch Project

        This morning i got an email from Rafael Tavares about his new project, GFS (GNOME From Scratch), a personal project that makes possible to use GNOME on Slackware GNU/Linux operating system without systemd or wayland programs. The GFS project will attempt to bring GNOME 3.22 to Slackware Linux. This is the latest version of GNOME available at this moment.

      • WebRTC in WebKit/WPE

        For some time I worked at Igalia to enable WebRTC on WebKitForWayland or WPE for the Raspberry Pi 2.

        The goal was to have the WebKit WebRTC tests working for a demo. My fellow Igalian Alex was working on the platform itself in WebKit and assisting with some tuning for the Pi on WebKit but the main work needed to be done in OpenWebRTC.

  • Distributions

    • Hardware Firewall: Choosing the Right Firewall Distribution

      Over the years I’ve bought some less than impressive consumer routers, so these days I run my own self-built hardware firewall appliance. Surprisingly, deciding on which option was best for my needs was not as easy as I had hoped.

      Building a hardware firewall requires you to decide on the hardware your firewall/router computer operating system will be installed on. Like myself, some people might use an old PC. Others might decide to install their selected firewall operating system onto a rack mount server. However one decides to do this, the completed act of installing this OS onto the dedicated hardware creates a dedicated hardware firewall.

      And unlike a software firewall, hardware firewalls serve a single dedicated purpose – to act as a gateway appliance for your network. Having had experience with three popular firewall operating systems in the past, I found that choosing the “right one” is a matter of perspective.

      In this article, I’m going to share my experience and overall impressions about those three different firewall solutions. Some of these are highly advanced while others are incredibly easy to use. Each of these solutions share something that I feel good about sharing with my readers. All of the firewalls are easily downloadable without any annoying sign-up pages (I’m looking at you, Sophos).

    • New Releases

    • PCLinuxOS/Mageia/Mandriva Family

      • The October 2016 Issue of the PCLinuxOS Magazine

        The PCLinuxOS Magazine staff is pleased to announce the release of the October 2016 issue. With the exception of a brief period in 2009, The PCLinuxOS Magazine has been published on a monthly basis since September, 2006. The PCLinuxOS Magazine is a product of the PCLinuxOS community, published by volunteers from the community. The magazine is lead by Paul Arnote, Chief Editor, and Assistant Editor Meemaw. The PCLinuxOS Magazine is released under the Creative Commons Attribution- NonCommercial-Share-Alike 3.0 Unported license, and some rights are reserved.

      • Our warm thanks to a long time contributor and friend

        It is with a heavy heart that we address our warmest thanks to our friend Thomas Spuhler for his Mandriva and Mageia contributions over the last decade. After fighting colon cancer for over a year, he finally had to surrender on Saturday September 17, 2016, at the age of 68. He leaves behind his beloved wife, sons and grandchildren, to whom our thoughts go in this difficult time.

        Thomas had been contributing to Mageia, and Mandriva before that, since 2009 as a packager, and much earlier already partaking in email discussions and bug reports. His packaging interests were mostly web and server-related components, for which his contributions were invaluable. He had to step back from his Mageia responsibilities in early August due to his health condition.

    • Gentoo Family

      • GNUnet for Gentoo

        In summer 2015 I started to package GNUnet for Gentoo as contributor to the youbroketheinternet-overlay.

    • Red Hat Family

      • Finance

      • Fedora

        • AppData content ratings for games shipped in Fedora

          GNOME Software developer Richard Hughes recently e-mailed the Fedora developers mailing requesting Fedora package maintainers to update their AppData files to include age ratings using OARS.

        • Linaro Connect Las Vegas 2016

          I spent last week at Linaro Connect in Las Vegas. Nominally I was there for some discussions about Ion. The week ended up being fairly full of the gamut of ARM topics.

          IoT is still a top buzzword. Linaro announced the founding of the LITE (Linaro IoT and Embedded) group. The work that this group has done so far is mostly related to Cortex-M processors which don’t run Linux. This is a change of pace from a consortium that has exclusively focused on Linux. The Linux Foundation has done the same thing, given their focus on the Zephyr Project. I see this shift for three reasons: 1) vendors want an end-to-end solution and reduced fragmentation and Linaro/Linux Foundation provide a good forum to do this because 2) both Linaro and the Linux Foundation are very good at courting companies and engaging in ‘corporate hand holding’ through open source projects especially 3) when bootstrapping relatively new projects. This is not intended to be a negative, sometimes companies need to throw money at outside entities to inform them what needs to be done (even when internal employees are shouting the same thing). Corporate influence in open source can certainly be critiqued but I’m optimistic about that not being a problem for Linaro.

          Red Hat also announced its involvement in the LITE group. Red Hat’s interest aren’t in the RTOS Microcontroller space but the higher level gateway. All those IoT devices have to communicate somewhere and a centralized gateway makes it easier to manage those devices, especially for industrial use cases. Hearing the full-stack story of IoT was a good learning experience for me, as I mostly have my head in the kernel. Everyone seems to be learning everywhere and most of the work is brand new. The Zephyr project was talking about writing new IP stacks which should give you some idea of where these projects are right now.

        • How to debug Fedora rawhide compose problems
        • Fedora Linux’s DNF Package Manager Hits the 2.0 Milestone, Now in Fedora Rawhide

          On October 3, 2016, DNF developer Jan Šilhan proudly announced the release of the DNF 2.0.0 package manager for Fedora Rawhide, the development version of the Fedora Linux operating system.

          DNF 2.0.0 is a major update of the default package management system used in the Red Hat-based Fedora distribution, but it doesn’t look like it landed in the stable Fedora 25 version just yet, most probably because of the incompatibilities with the DNF 1.x series. Therefore, DNF 2.0.0 is now available in Fedora Rawhide.

        • HackMIT meets Fedora

          HackMIT is the annual hackathon event organized by students at the Massachusetts Institute of Technology in Cambridge, Massachusetts. HackMIT 2016 took place on September 17th and 18th, 2016. This year, the Fedora Project partnered with Red Hat as sponsors for the hackathon. Fedora Ambassadors Charles Profitt and Justin W. Flory attended to represent the project and help mentor top students from around the country in a weekend of learning and competitive hacking. Fedora engaged with a new audience of students from various universities across America and even the globe.

        • HackMIT meets Fedora
    • Debian Family

      • HPE Donates Hardware to Debian Project, GNOME Sans systemd

        The Debian project today announced the “in-kind” donation of several servers to “boost reliability of Debian’s core infrastructure.” The new hardware will be deployed in Canada, US, and Australia to replace some aging machines as well as expand core services and storage. In other news, a new project aims to provide GNOME 3.22 to Slackware without systemd or Wayland, right as a new ugly systemd bug gives another reason to avoid it. Mageia bid farewell to a lost friend and contributor today and Matt Hartley shared his picks for best firewall distribution.

      • Harden Debian with PIE and bindnow!

        Shipping Position Independent Executables and using read-only Global Offset Table was already possible for packages but needed package maintainers to opt-in for each package (see Hardening wiki) using the “pie” and “bindnow” Dpkg hardening flags.

        Many critical packages enabled the extra flags but there are still way more left out according to Lintian hardening-no-bindnow and hardening-no-pie warnings.

        Now we can change that. We can make those hardening flags the default for every package.

      • My Free Software Activities in September 2016

        Welcome to gambaru.de. Here is my monthly report that covers what I have been doing for Debian. If you’re interested in Android, Java, Games and LTS topics, this might be interesting for you.

      • Several donations boost reliability of Debian’s core infrastructure

        Over the last several months, Hewlett Packard Enterprise (HPE), one of Debian’s primary hardware partners, has made several large in-kind donations in support of Debian core services. The donated equipment will be deployed in the data centers of multiple hosting partners in Canada, the United States, and Australia.

      • Gitano – Approaching Release – Work

        I have been working quite hard, along with my friend and colleague Richard Maw, on getting Gitano ready for a release suitable for inclusion into Debian Stretch.

  • Devices/Embedded

    • $39 network switching Pico-ITX SBC runs Linux on Cortex-A53

      Globalscale’s “EspressoBin” network switching Pico-ITX SBC offers Marvell’s dual-core, Cortex-A53 Armada 3720 SoC, plus 2x GbE, 1x WAN, SATA, and mini-PCIe.

      Globalscale Technologies and its hardware partner Marvell, which have previously collaborated on products such as the Armada 370 Mirabox, have joined forces on a Linux-fueled EspressoBin network switching single-board computer. The EspressoBin is based on a more powerful Marvell Armada SoC: a dual-core, Cortex-A53 Armada 3720 clocked to 1.2GHz.

    • Open IoT gateway SBCs run Linux on NXP QorIQ and i.mX6 SoCs

      ArgonBoards has launched two Linux-driven SBCs for IoT gateways: an i.MX6 SoloLite reference board and an open source QorIQ LS1021A SBC.

      India-based embedded manufacturer VVDN Technogies, which owns RadiumBoards, the makers of products such as the HD Camera Cape for the BeagleBone Black and MIPI Camera Board for the Wandboard, has also launched a single-board computer subsidiary. The ArgonBoards SBC division recently announced a $499, open source LS1021A Community Board and a $199 i.MX6SL IoT gateway reference board based on the SoloLite SoC, both running Linux. (VVDN is a member of NXP’s partner ecosystem.)

    • Dueling Arduinos reunite with new Arduino Foundation

      Arduino LLC and Arduino Srl have settled their legal disputes, and will reunify under an Arduino Holding company and a not-for-profit Arduino Foundation.

      At the World Maker Faire New York, the Arduino LLC (Arduino.cc) and Arduino Srl (Arduino.org) organizations announced they have signed a settlement agreement concerning the legal dispute that has, for the past two years, split the open source MCU-oriented Arduino hardware community in two. The forked entities will reunite before the end of the year under a new “Arduino Holding” company and not-for-profit “Arduino Foundation.” The identical announcements were posted at Arduino.cc and Arduino.org.

    • Two Arduinos become one (Arduino Blog)
    • Two Arduinos become one

      Arduino, the world’s leading open-source ecosystem for educators, Makers and IoT developers of all ages, today announced that Arduino LLC (aka Arduino.cc) and Arduino srl (aka Arduino.org) have settled their differences and signed a settlement agreement.

      Massimo Banzi and Federico Musto took the stage today at World Maker Faire New York to announce the good news.

      At the end of 2016, the newly created “Arduino Holding” will become the single point of contact for the wholesale distribution of all current and future products, and will continue to bring tremendous innovations to the market.

    • Phones

      • Tizen

        • Create your own Tizen themes with the Tizen Theme Editor

          Tizen’s theme store is one of the main ways in which users can customize their Tizen smartphones. However, if you are not impressed by all the themes available in the store, then Samsung’s Tizen Theme Editor tool is just what you should be looking out for. This Windows desktop only program lest you create your Tizen themes. The theme editor doesn’t require you to have any programming knowledge as the process only involves clicks, drags and drops to get most of the work done.

        • Samsung and SoftBank discuss IoT cooperation

          Samsung Electronics Co. and Japanese internet and telecommunications conglomerate SoftBank Group Corp. met recently to discuss how both companies could co-operate in the world of Technology as well as the Internet of Things (IoT) , according to sources. The meeting took place between Lee Jae-yong, vice chairman of Samsung Electronics, and SoftBank Chairman Masayoshi Son at the Samsung office in Seocho Ward.

          SoftBank made the news lately with its $32 billion deal to acquire ARM Holdings PLC, the UK based company that produces the microprocessors that power over 95% of the world’s smartphones. Both companies are known to want to increase their presence in the IoT sector and can complement each other in this regard.

      • Android

        • 3 Android phones that offer long battery life
        • ‘Andromeda’ will be Google’s NT

          If you were to design a client operating system with the goal of being used by two billion people, what would it look like?

          We might soon find out what Alphabet’s looks like. Today’s announcement’s from Alphabet’s Google is expected to reveal “Andromeda”, the merged Android/Chrome OS. Executives have been hyping today’s event as the most “significant” since the first Android device in 2008, and we already know they’re writing a new operating system from a clean slate. We can also have a good guess about what it looks like.

          Google’s goal for the successor is to unify the rival Chrome and Android platforms while providing a clean code base free of the Java legacy. Google’s big advantage here is that it now has a blank slate.

          After Google acquired Android in 2005, Sun Microsystems’ then CEO Jonathan Schwartz offered Google “congratulations on the announcement of their new Java/Linux phone platform”. Android founder Andy Rubin had already figured Java worked, and seen how it decreased time to market, and how much developers liked it. (Anything was preferable to writing for Symbian, the dominant smartphone platform of the time.)

        • Full Google Pixel and Pixel XL specifications leaked by retailer

          Google just found out, the hard way, how difficult it can be to coordinate a major smartphone launch. Details about its first self-branded smartphones, the Pixel and Pixel XL, have been published by several retailers ahead of their official unveiling tomorrow.

          The most revealing leak comes from Carphone Warehouse. The British retailer put up, and quickly removed, product listings for the Pixel and Pixel XL. The listings confirm much of what we were anticipating thanks to older leaks, and add a handful of new details. A mirror of the Pixel XL is available here, thanks to Reddit user krackers.

        • Live from Google’s mega announcement: Pixel phones, Android updates, 4K Chromecast and more!

          Google is hosting a press event today in San Francisco… and if the rumors are true, it should be a doozy. We’ve heard whispers about everything from new phones, to new Chromecasts, to a new VR headset, to a complete rethinking of Android as we know it.

          You might’ve assumed we’d be at the event covering it live with up-to-the-second updates from the scene… and, well, you’d have assumed right.

          The event is scheduled to start at 9 a.m. Pacific, so tune in then. In fact, chances are good we’ll start warming up the ol’ liveblog a bit before then — so if you don’t want to miss anything, tune in early.

        • Xiaomi’s 4K Android TV box is now on sale in the U.S. for $69

          We told you last month that Xiaomi’s Android TV box would go on sale in the U.S. in October, and true to our word it has. The Chinese company is best known for its affordable smartphones, but today it launched a set-top box priced at $69 that looks like great value.

          Originally unveiled at Google I/O in May, the new Mi Box offers 4K video at 60 FPS and supports Dolby Digital Plus audio playback and HDR content. Xiaomi partnered with Google to integrate Google Cast and Google voice search while there are Android games and apps for the likes of Netflix, HBO, and Showtime alongside support for Sling TV, which itself brings TV shows without the need for cable.

        • The Mi Box is officially launching today for $69

          Google unveiled the Mi Box with Android TV way back in May at Google I/O. Then for months, nothing. We were starting to wonder if the device would ever come out when it began appearing on Walmart shelves last month. Now, the Mi Box is official. It’s going on sale today on Mi.com and at Walmart for $69.

          The Mi Box is one of only a few Android TV boxes that have been released. Google’s original Nexus TV was a flop, and the Razer Forge TV never even got support for Netflix (which is absolutely insane). The NVIDIA Shield has been the only Android TV box worth having, but it’s $200. The Mi Box includes many of the features of the SHIELD for a lot less cash.

        • Why Android Fans Are Feeling Anxious Ahead of Google’s Next Hardware Event

          Recently there has been some anxiety amongst Android enthusiasts who are frustrated by Google’s apparent disregard for consumer satisfaction.

          So what gives? A few days ago Google released a new mobile messaging app called Allo that seeks to insert some Amazon Echo-like smarts into a familiar chat interface. While the app appears to be doing well on the charts, some Android fans have criticized its mobile-only approach (it can’t be used on the desktop) and the fact that it can’t be used to talk to people using Hangouts, another Google messaging app.

        • Google has until October 31 to reply to EU’s Android antitrust charges [Ed: Google has until October 31 to reply to Microsoft’s Android antitrust charges; EU as a Microsoft proxy here]

          Alphabet’s Google has been given until the end of October, the fourth extension, to rebut EU antitrust charges that it uses its dominant Android mobile operating system to block competitors, the European Commission said on Monday.

          The Commission in April said the U.S. technology giant’s demand that mobile phone makers pre-install Google Search and the Google Chrome browser on their smartphones to access other Google apps harms consumers and competition.

          The EU watchdog had initially set a July 27 deadline for Google to respond to the charges. This had been extended three times at the company’s request, with the previous deadline Sept. 20.

          The new deadlines are Oct. 31 for the Android case and Oct. 26 and Oct. 13 for cases relating to online search advertising and shopping.

        • Why Google’s EU Android Probe Bears Close Watching [Ed: Why Google’s [Microsoft proxy attack via regulators against] Android Probe Bears Close Watching]
        • Nokia’s Android-powered return? New mid-range smartphone surfaces [Ed: Microsoft had ruined Nokia before this happened]

          Details have surfaced on a benchmarking site that suggest Nokia may have a new mid-range phone waiting in the wings.

          For Nokia, IoT tech is firmly in its future plans, while smartphones are out. But die-hard Nokia fans may still be able to get their hands on a Nokia smartphone thanks to a little-known Finnish firm called HMD, which has a license and $500m to design, make, and market Nokia-branded smartphones running Android.

          The licensing deal was signed in May, but HMD has yet to announce its first phone, leaving fans with little more than speculation about future launches.

        • iPhone 7 comes last in battery test against Android smartphones

          If you want a smartphone with a long battery life, then testing carried out by UK consumer magazine Which? suggests that you’re far better off going with an Android device from HTC, LG, or Samsung. In fact, when the new iPhone 7 was pitted against the HTC 10, LG G5 and the Samsung Galaxy S7, it came last in all the tests.

        • How to factory reset an Android phone
        • How to Recover Deleted Photos on Android
        • Everything you need to know about Android 7.1 Nougat and the Pixel Launcher
        • Google Maps Now Displays Google Calendar Events on Android
        • Alert: some cards losing Android Pay support October 14th
        • [Finally] Nexus 6 gets official Android 7.0 Nougat with October 5th security patch

Free Software/Open Source

  • Open Source for Business: Pros and Cons

    Open source software offers benefits like high quality and faster application development, but some businesses have concerns about support and security.

  • OSI Welcomes Powering Potential: Open Source Advocates Extending Education in Tanzania

    The Open Source Initiative® (OSI), the premiere organization working globally to champion open source in society through education, infrastructure and collaboration; announced today that Powering Potential has joined the OSI as an Affiliate Member.

    Powering Potential provides access to educational resources on solar-powered computers running open source software at schools in rural Tanzania. The technology initiative works to enhance education and stimulate imagination of students in Tanzania while respecting and incorporating values of the local culture.

    “The Board of Directors at the OSI is pleased to have Powering Potential as an OSI Affiliate Member,” said Patrick Masson, general manager and director at the Open Source Initiative. “Their work fully aligns with our mission to raise awareness and adoption of open source software, and as our first African Affiliate Member, build bridges among different constituencies in the open source community.”

  • Riot Founder Describes Vision of Open Source Collaboration

    Initially built by developers for developers, Riot is free and open source software. It publishes all of the code on GitHub, where anyone can see, modify and run it.

  • Yahoo Open Sources Porn-Hunting Neural Network

    The artificial intelligence system is trained to automatically identify risque images using a probability scale between zero and one. Scores below 0.2 indicate the image is likely safe for all eyes. But those above 0.8 signal the high probability of a long chat with your boss if they spot your computer screen.

  • Yahoo is open sourcing its deep learning model to identify pornography
  • Avoiding quality assurance disasters with openQA

    OpenQA started in 2009 inside the openSUSE community and is now an integral part of the openSUSE ecosystem. It tests software the same way a human being does: Input is given by keyboard and mouse and results are recorded by comparing screenshots of the process to a set of predefined images. Just like a human tester, openQA detects failures and error messages by comparing what it sees with what it expects.

    The first step is the package submission to a new operating system (OS) build. OpenQA runs through a basic pre-build package set to detect basic issues very early. After building a new version of the OS in the Open Build Service, this ISO will be automatically recognized by openQA and validated. The next step is extended “post-validation” testing.

  • SOGo v3.2.0 released

    The Inverse team is pleased to announce the immediate availability of SOGo v3.2.0. This is a major release of SOGo which focuses on important new features and improved stability over previous versions.

  • Recent ownCloud Releases

    Even though we just had the nice and successful ownCloud Contributor Conference there have quite some ownCloud releases happened recently. I like to draw your attention to this for a moment, because some people seem to fail to see how active the ownCloud community actually is at the moment.

    There has been the big enterprise release 9.1 on September 20th, but that of course came along with community releases which are in the focus here.

    We had server release 8.0.15, server release 8.1.10, server release 8.2.8 and release 9.0.5. There are maintenance releases for the older major versions, needed to fix bugs on installations that still run on these older versions. We deliver them following this plan.

    The latest and greatest server release is release 9.1.1 that has all the hardening that also went into the enterprise releases.

    Aside a ton of bugfixes that you find listed in the changelog there have also been interesting changes which drive innovation. To pick just one example: The data fingerprint property. It enables the clients to detect if the server got a backup restored, and saves changes on the clients to conflict files if needed. This is a nice example of solutions which are based on feedback from enterprise customers community running ownCloud, who help with reporting problems and proposing solutions.

  • Evolving Your Open Source Project Infrastructure: There’s No Such Thing As Done

    When it comes to infrastructure for your open source project, you are never done, said Amye Scavarda, Gluster Community Lead at Red Hat, and Nigel Babu, Gluster CI/Automation Engineer at Red Hat. One theme during their LinuxCon Europe talk, “Making More Open: Creating Open Source Infrastructure for Your Open Source Project,” is that you can get closer to being done, but there is no such thing as “done” when it comes to infrastructure. Momentum is important – things are always moving, changing, and evolving. The work never ends as you figure out what can be left behind, what should be upgraded and how you can move into the future to incorporate new technologies.

    Amye and Nigel talked about how when you start an open source project, you tend to focus on shipping and releasing your code. You don’t necessarily worry too much about how you got there and what you did to get it shipped. In the early days of Gluster, almost everyone had root access to the build machine, since it was only a few people working closely together. Fast forward a few years now that Red Hat has acquired Gluster, and there are many people across a wide variety of time zones working on the project. How to manage communication across a large, growing open source project became a big challenge.

  • WalmartLabs open sources the application platform that powers Walmart.com

    Walmart probably isn’t the first company that comes to mind when you think about open-source software (or the second or third, really), but WalmartLabs, Walmart’s innovation-focused tech division, has already launched a number of open-source projects into the wild. The most interesting of these so far was OneOps, its DevOps platform, but today it is launching a similarly ambitious project.

    Over the course of the last year, Walmart.com — a site that handles 80 million monthly visitors and offers 15 million items for sale — migrated to React and Node.js. In the process of this transition, the WalmartLabs team built Electrode, a React-based application platform to power Walmart.com. It’s now open sourcing this platform.

    Electrode provides developers with boilerplate code to build universal React apps that consist of a number of standalone modules that developers can choose to add more functionality to their Node apps. These include a tool for managing the configuration of Node.js apps, for example, as well as a React component that helps you render above-the-fold content faster.

  • Walmart Open Sources Key Infrastructure Tool That Runs its Site
  • Events

    • Linux Foundation Leader Jim Zemlin to Keynote Postgres Vision 2016

      The Linux Foundation Executive Director Jim Zemlin will keynote Postgres Vision 2016, the international conference for technology and industry visionaries to explore the future of enterprise Postgres, open source, entrepreneurship, and innovation. Postgres Vision will be held October 11-13, 2016, at the iconic Innovation Hangar (iHangar) in the Palace of Fine Arts, San Francisco.

  • Web Browsers

    • Mozilla

      • Mozilla awards $300,000 to four open source projects

        Mozilla’s love of open source is nothing new — just look to the Mozilla Open Source Support (MOSS) program. Loving a philosophy is one thing, but Mozilla has also put its money where its mouth is.

        In the third quarter of this year, MOSS awarded more than $300,000 to four projects which it either already supported, or which were aligned with the organization’s mission. One of the smallest awards — $56,000 — was made to Speech Rule Engine, a text-to-speech style component that makes mathematical and scientific content more accessible.

      • MOSS supports four more open source projects in Q3 2016 with $300k
      • Mozilla Funds a Series of Promising Open Source Projects

        You can always count on Mozilla for an interesting spin on open source. Last year, Mozilla launched the Mozilla Open Source Support Program (MOSS) – an award program specifically focused on supporting open source and free software. As The VAR Guy notes: “The Mozilla Foundation has long injected money into the open source ecosystem through partnerships with other projects and grants. But it formalized that mission last year by launching MOSS, which originally focused on supporting open source projects that directly complement or help form the basis for Mozilla’s own products.”

        Now, the company has announced that In the third quarter of this year, MOSS awarded over $300,000 to four projects which it either already supported, or which were in line with the Mozilla mission.

      • Is Chrome faster than Firefox in Linux?

        The browser wars have been raging for many years now, and Linux users have often been on one side or the other. One Linux redditor recently noted that Chrome was much faster for him than Firefox, and a long discussion ensued with folks sharing their experiences with Chrome and Firefox.

  • Databases

    • What’s new in PostgreSQL 9.5

      Fedora 24 ships with PostgreSQL 9.5, a major upgrade from version 9.4 that is included in Fedora 23. The new version 9.5 provides several enhancements and new features, but also brings some compatibility changes, as it has been very common between PostgreSQL major versions. Note that in the PostgreSQL versioning scheme, 9.4 and 9.5 are two major versions, while the first number is mostly marketing and increments when major features are introduced in the release.

  • Oracle/Java/LibreOffice

    • NetBeans IDE 8.2 Download is available now

      NeatBeans doesn’t need an introduction but still who doesn’t know about NetBeans IDE then NetBeans IDE is an IDE(integrated development environment) that supports multiple programming languages like JAVA,HTML5,JAVAScript,C/C++,PHP etc. Well,It’s vastly used by many coders and developers for developing mobile,pc or web applications.
      NetBeans has a great set of pre-installed tools that makes coding and developing more convenient and easy on fingers.The GUI builder really makes the things easy on head when it comes to developing JAVA SE applications.

  • BSD

    • OpenBSD 6.0 – an exercise in precision

      The OpenBSD project is well known for its strong focus on security and for its precise documentation. The OpenBSD operating system generally gives preference to security and properly behaving software over features. OpenBSD is lightweight, sparse and relatively locked down by default. This makes the platform particularly popular among administrators who need a firewall or other minimal and stable platform.

      OpenBSD 6.0 introduces many small changes and a handful of important ones. Looking through the release notes we find support for the VAX platform has been dropped. There have been several security updates to the OpenSSH secure shell service. Perhaps one of the more interesting security features in the operating system is strict enforcement of W^X: “W^X is now strictly enforced by default; a program can only violate it if the executable is marked with PT_OPENBSD_WXNEEDED and is located on a file system mounted with the wxallowed mount option. Because there are still too many ports which violate W^X, the installer mounts the /usr/local file system with wxallowed. This allows the base system to be more secure as long as /usr/local is a separate file system. If you use no W^X violating programs, consider manually revoking that option.”

      I decided to play with the 64-bit x86 build of OpenBSD which is 226MB in size. Booting from this ISO presents us with a text console where we are asked if we would like to install OpenBSD, upgrade an existing copy of the operating system or perform an auto-install. I chose to perform a normal installation.

    • OpenBSD and NetBSD machines at Open Source Conference 2016 Nagaoka

      The Japan NetBSD Users’ Group and Echigo BSD Users Group members held booth at the Open Source Conference 2016 Nagaoka on Oct.1 2016…

  • FSF/FSFE/GNU/SFLC

  • Licensing/Legal

    • GCC RISC-V Support Allegedly Held Up Due To University Lawyers

      While there has been talk about RISC-V architecture support in the GCC compiler and for LLVM too going back months, a developer is reporting that the GCC RISC-V support is being delayed due to UC Berkeley lawyers.

      Contributions to the GNU Compiler Collection (GCC) require a copyright assignment to the Free Software Foundation for this GPLv3-licensed compiler. It turns out the University of California Berkeley lawyers are taking issue with this, temporarily holding up the compiler back-end from merging.

  • Openness/Sharing/Collaboration

    • France is developing a free consultation platform for public authorities

      Etalab and the CNNum (Conseil National du Numérique, the National Digital Council) planned to collaborate with civil society members and the Open Government ecosystem in France to develop an consultation platform. The idea was presented during an Open Democracy Now Hackathon, which took place in Paris on September 17 and 18.

    • France to develop a toolbox for Open Government

      Etalab, the French government agency in charge of Open Data and Open Government, and the French authorities are currently working, in collaboration with other OGP members, on an Open Government toolkit.

      This is aimed at helping governments to implement Open Government principles in their countries. This OGP Toolkit is to be finalised for the OGP Paris Summit in December. Every OGP member will have access to the toolkit.

      “This toolkit is designed to facilitate the implementation of OGP commitments, by referencing the available solutions and documenting their uses”, Etalab said on its website.

      It is being developed to be “a database of digital tools and uses made of them by organisations and citizens all over the world”. Basically, “the aim of this catalogue is to increase the visibility of these tools and encourage their sharing and reuse”.

    • Open Access/Content

      • Rutgers libraries launch open source textbook program

        It’s no secret that textbooks are expensive, but Rutgers Libraries are giving students’ wallets a break with a new open source textbook program.

        “Hopefully going forward we will have more students who will not have to make the difficult decision of deciding whether or not to purchase a book for their class because of the cost,” said Lily Todorinova, undergraduate experience librarian and liaison to School of Communication and Information.

        The Rutgers libraries are working closely with the New Jersey Public Interest Research Group to launch the Open and Affordable Textbook Project for all Rutgers campuses — New Brunswick, Camden and Newark, she said.

Leftovers

  • 4chan is running out of money

    The infamous message board 4chan is struggling to stay afloat and will have to make changes to reduce costs, the site’s owner wrote in a post on Sunday. “4chan can’t afford infrastructure costs, network fee, servers cost, CDN and etc, now,” writes Hiroyuki Nisimura, who bought the site from its founder last year.

    Nisimura says ads haven’t been effective enough to support the site, nor have subscriptions offering additional features. “We had tried to keep 4chan as is. But I failed,” Nisimura writes. “I am sincerely sorry.”

  • How to prevent coworker competition from ruining company culture

    Over the next few weeks, they would unknowingly be the subjects of one of the most widely known psychological studies of our time. And the ways these groups bonded and interacted with each other draw some interesting parallels to our understanding of workplace culture.

  • Man Gets Attacked Twice By Grizzly Bear, Films Video Of Himself Covered In Blood

    Todd Orr’s story isn’t for the faint of heart.

    The 50-year-old was enjoying a solo hike Saturday near Ennis, Montana, when he was attacked by a grizzly bear.

    Bitten and bleeding, Orr managed to start back down the trail toward his truck ― only to be attacked again by the same bear a few minutes later.

    The encounter left him mangled and drenched in blood, but alive.

    “Legs are good, internal organs are good, eyes are good,” Orr says in a graphic 50-second video that he filmed just after the second attack. “I just walked out three miles and now I’ve got to go to the hospital.”

  • Science

    • Uncovering Texas’ Strategy to Slash Much-Needed Special Education Services

      Federal law mandates that school districts provide special education services to students with disabilities–physical, emotional or developmental. But outside the public’s view, the state of Texas has decided that fewer students should get those services. It pressured school districts to meet an artificial benchmark of 8.5 percent, a rate far below that of any state, according to a Houston Chronicle investigation.

      The article, by Brian M. Rosenthal, documents how “unelected state officials have quietly devised a system that has kept thousands of disabled kids” out of special education.

      “We were basically told in a staff meeting that we needed to lower the number of kids in special ed at all costs,” one former teacher told Rosenthal. “It was all a numbers game.”

  • Health/Nutrition

    • Polish women strike over planned abortion ban

      Women wearing black clothes and waving black flags are demonstrating across Poland, boycotting their jobs and classes as part of a nationwide strike in protest against a new law that would in effect ban abortion.

      Many men also took part in demonstrations on the streets of Warsaw, Gdańsk and elsewhere across the largely Catholic nation.

      Thousands of people also protested on Saturday in front of the parliament in Warsaw. Women were wearing black in a sign of mourning for the feared loss of reproductive rights; they have also warned that some women will die if the proposal passes as it stands now.

      Poland already has some of the most restrictive abortion laws in Europe, with terminations legally permitted only when there is severe foetal abnormality, when there is a grave threat to the health of the mother, or if the pregnancy resulted from rape or incest.

      But the new law would criminalise all terminations, with women punishable with up to five years in prison. Doctors found to have assisted with a termination would also be liable for prosecution and a prison term.

  • Security

    • Security updates for Monday
    • Impossible is impossible!

      Sometimes when you plan for a security event, it would be expected that the thing you’re doing will be making some outcome (something bad probably) impossible. The goal of the security group is to keep the bad guys out, or keep the data in, or keep the servers patched, or find all the security bugs in the code. One way to look at this is security is often in the business of preventing things from happening, such as making data exfiltration impossible. I’m here to tell you it’s impossible to make something impossible.

      As you think about that statement for a bit, let me explain what’s happening here, and how we’re going to tie this back to security, business needs, and some common sense. We’ve all heard of the 80/20 rule, one of the forms is that the last 20% of the features are 80% of the cost. It’s a bit more nuanced than that if you really think about it. If your goal is impossible it would be more accurate to say 1% of the features are 2000% of the cost. What’s really being described here is a curve that looks like this

    • What is the spc_t container type, and why didn’t we just run as unconfined_t?

      If you are on an SELinux system, and run docker with SELinux separation turned off, the containers will run with the spc_t type.

    • The importance of paying attention in building community trust

      Trust is important in any kind of interpersonal relationship. It’s inevitable that there will be cases where something you do will irritate or upset others, even if only to a small degree. Handling small cases well helps build trust that you will do the right thing in more significant cases, whereas ignoring things that seem fairly insignificant (or saying that you’ll do something about them and then failing to do so) suggests that you’ll also fail when there’s a major problem. Getting the small details right is a major part of creating the impression that you’ll deal with significant challenges in a responsible and considerate way.

      This isn’t limited to individual relationships. Something that distinguishes good customer service from bad customer service is getting the details right. There are many industries where significant failures happen infrequently, but minor ones happen a lot. Would you prefer to give your business to a company that handles those small details well (even if they’re not overly annoying) or one that just tells you to deal with them?

    • Why health implants should have open source code

      As medical implants become more common, sophisticated and versatile, understanding the code that runs them is vital. A pacemaker or insulin-releasing implant can be lifesaving, but they are also vulnerable not just to malicious attacks, but also to faulty code.

      For commercial reasons, companies have been reluctant to open up their code to researchers. But with lives at stake, we need to be allowed to take a peek under the hood.

      Over the past few years several researchers have revealed lethal vulnerabilities in the code that runs some medical implants. The late Barnaby Jack, for example, showed that pacemakers could be “hacked” to deliver lethal electric shocks. Jay Radcliffe demonstrated a way of wirelessly making an implanted insulin pump deliver a lethal dose of insulin.

      But “bugs” in the code are also an issue. Researcher Marie Moe recently discovered this first-hand, when her Implantable Cardioverter Defibrillator (ICD) unexpectedly went into “safe mode”. This caused her heart rate to drop by half, with drastic consequences.

    • Hack Crashes Linux Distros with 48 Characters of Code

      With just a mere 48 characters of code, Linux admin and SSLMate founder Andrew Ayer has figured out how to crash major Linux distributions by locally exploiting a flaw in systemd.

      Ayer said the following command, when run as any user, will crash systemd: “NOTIFY_SOCKET=/run/systemd/notify systemd-notify”

    • Systemd is not Magic Security Dust

      Systemd maintainer David Strauss has published a response to my blog post about systemd. The first part of his post is replete with ad hominem fallacies, strawmen, and factual errors. Ironically, in the same breath that he attacks me for not understanding the issues around threads and umasks, he betrays an ignorance of how the very project which he works on uses threads and umasks. This doesn’t deserve a response beyond what I’ve called out on Twitter.

      In the second part of his blog post, Strauss argues that systemd improves security by making it easy to apply hardening techniques to the network services which he calls the “keepers of data attackers want.” According to Strauss, I’m “fighting one of the most powerful tools we have to harden the front lines against the real attacks we see every day.” Although systemd does make it easy to restrict the privileges of services, Strauss vastly overstates the value of these features.

    • A single command needed to crash Linux server – expert
    • Bitcoin Linux Users Need To Beware of Critical Systemd Vulnerability
    • This Single Line Of Code Can Crash Your Linux System In No Time
    • 48 characters enough to crash most Linux distros, says sysadmin
    • ‘We’re From Microsoft and We’ve Been Remotely Watching Your Computer’

      We are going into our third year of living in the Gardens of Taylor. When you come off of the city street and onto this property, you can sometimes get a creepy feeling, like this is familiar in an unpleasant sort of way. It can feel like you’ve just stepped into Stepford Village. Every yard has been manicured to match the ones on either side of it. The edging along all driveways and sidewalks is a perfect two inches across and if a weed or mushroom happens to grow within that etched space, it is gone the next time you look for it.

      Stuff like that just vanishes. Spooky like.

      Fact is, the property manager pays the lawn service to make a drive through every other day in order to take care of any anomalies. Once I got used to it, I became comfortable with living here, being that it’s for people with physical disabilities and age 55 or over.

      On moving-in day, we hadn’t been there an hour before people began to take notice of us from across the street. They would stop just long enough to pretend they weren’t checking us out, then they would be on their way. Some even stopped to help.

      [...]

      Now Claude and Jane both run Linux. Their money is safe, and if anyone calls giving them instructions how to get a virus off of their Windows’ computer, they just laugh and hang up, but not before telling them they run Linux.

      There will come a day, maybe sooner than any of us think, when a scam like this might actually work on a Linux machine. In the past two years we’ve seen stories of Linux servers being compromised, and there is constant news that this or that piece of malicious code might be making its way to Linux computers soon.

      Being prudent, I run both Avast for day-to-day stuff and various Clam iterations for biweekly sweeps for rootkits. I exchange a lot of Windows stuff with my Reglue kids, so that’s only smart. Not that I expect anything to go south in the near future. Everything I’ve seen coming down the Linux pike demands hands-on the target computer to inject the badware.

      Here’s a Helios Helpful Hint: Don’t let someone you don’t know have access to your computer, sans the repair guy.

      However I do believe in preparedness. Jane’s Linux Mint install runs the same security as mine and I administrate it remotely (from home. I’ll get Claude up to speed on Wednesday.

      How long ago was it that many of us gave up on the “disconnected generation?” For a while I didn’t work with people who were so set in their ways that they bucked any suggestion of having to learn something new. And honest-to-goodness, a lady in the neighborhood asked me to make her computer the same way it was when she bought it. That would be the Windows Vista release. Sigh.

      “No ma’am. Not for any amount of money. Sorry.”

      I’m not into any more stress than necessary these days.

      Vista? Really?

    • Security Design: Stop Trying to Fix the User

      Every few years, a researcher replicates a security study by littering USB sticks around an organization’s grounds and waiting to see how many people pick them up and plug them in, causing the autorun function to install innocuous malware on their computers. These studies are great for making security professionals feel superior. The researchers get to demonstrate their security expertise and use the results as “teachable moments” for others. “If only everyone was more security aware and had more security training,” they say, “the Internet would be a much safer place.”

      Enough of that. The problem isn’t the users: it’s that we’ve designed our computer systems’ security so badly that we demand the user do all of these counterintuitive things. Why can’t users choose easy-to-remember passwords? Why can’t they click on links in emails with wild abandon? Why can’t they plug a USB stick into a computer without facing a myriad of viruses? Why are we trying to fix the user instead of solving the underlying security problem?

    • Security Design: Stop Trying to Fix the User [It says (scroll down) "Getting a virus simply by opening an email was an urban legend, a technically impossible but scary sounding thing to frighten normies with, as late as the 90s. ...Microsoft made that myth real with the first release of Outlook"]
    • A tiny PC as a router

      We needed a router and wifi access point in the office, and simultaneously both I and my co-worker Ivan needed such a thing at our respective homes. After some discussion, and after reading articles in Ars Technica about building PCs to act as routers, we decided to do just that.

      The PC solution seem to offer better performance, but this is actually not a major reason for us.

      We want to have systems we understand and can hack. A standard x86 PC running Debian sounds ideal to use.

      Why not a cheap commercial router? They tend to be opaque and mysterious, and can’t be managed with standard tooling such as Ansible. They may or may not have good security support. Also, they may or may not have sufficient functionality to be nice things, such as DNS for local machines, or the full power if iptables for firewalling.

      Why not OpenWRT? Some models of commercial routers are supported by OpenWRT. Finding good hardware that is also supported by OpenWRT is a task in itself, and not the kind of task especially I like to do. Even if one goes this route, the environment isn’t quite a standard Linux system, because of various hardware limitations. (OpenWRT is a worthy project, just not our preference.)

  • Defence/Aggression

    • Race and Militarism from Ferguson to Syria: A letter to African Americans

      “A Winchester rifle should have a place of honor in every black home, and it should be used for that protection which the law refuses to give. When the white man who is always the aggressor knows he runs as great risk of biting the dust every time his Afro-American victim does, he will have greater respect for Afro-American life.” Ida B. Wells

      The Black radical tradition has always understood the inextricable link between racism and militarism: racism as a manifestation of white supremacist ideology, and militarism as the mechanism to enforce that ideology.

      That fundamental link grounds our analysis of the Obama administration’s policies in Iraq and Syria. But the link between race ( white supremacy) and the deployment of violence to enforce the interests of white supremacy also explains the repressive mission and role of the police in the colonized barrios and segregated African American communities within the U.S.

    • United Nations: Targeting Wikileaks Founder With Drone Strike Criminal Violation of Human Rights

      Targeting or “taking out” Wikileaks founder Julian Assange via military drone strike would be a criminal violation of international human rights laws, a United Nations envoy said Monday.

      “A State could theoretically seek to justify the use of drones by invoking the right to anticipatory self-defence against a non-state actor and by arguing that it had no means to capture their targets or cause another state to capture the target,” said Dr. Agnes Callamard, United Nations Special Rapporteur on Extra-Judicial Executions during an interview with True Pundit. “To do so, the State would have to demonstrate an ‘instant, overwhelming, leaving no choice of means and no moment of deliberation’ necessity. This is not only a very high threshold to meet; it is also impossible to see how this could be used or justified in the case of Mr. Julian Assange.”

      Dr. Callamard’s statements come on the heels of a scathing published account by True Pundit detailing that in 2010 Secretary of State Hillary Clinton reportedly asked top aides if it was possible to use a drone strike against Assange. While Dr. Callamard said she had no knowledge of the assertions contained in the True Pundit story, she did speak to the alarming generalities of using a drone strike to silence someone of Assange’s global stature. Dr. Callamard stated “the use of drones for targeted killing outside the context of armed conflict, is almost never likely to be legal and to meet human rights law limitations on the use of lethal force.”

      Dr. Callamard, an expert on human rights and humanitarian work globally, in civil society organizations, the United Nations and in academia. Prior to her post at the UN, Dr. Callamard spent nine years as the Executive Director of ARTICLE 19, the international human rights organization promoting freedom of expression globally. Dr. Callamard also serves as director of Columbia University’s Global Freedom of Expression initiative.

    • Hillary Clinton considered drone attack on Julian Assange – report

      Democratic presidential candidate Hillary Clinton reportedly wanted to drone Wikileaks founder Julian Assange when she was secretary of state.

      According to True Pundit, Clinton and the state department were under pressure to silence Assange and Wikileaks in the months before the whistleblowing site released a massive dump of 250,000 diplomatic cables from 1966 up to 2010, dubbed CableGate.

      “Can’t we just drone this guy?” Clinton asked, according to unidentified state department sources.

      Published by True Pundit on Sunday, Wikileaks posted a link to the story on their official Twitter account on Monday, along with a screenshot of the article.

    • Hillary Clinton suggested taking out Wikileaks founder Julian Assange with drone: Report

      A new report reveals that an angry and frustrated Hillary Clinton once pondered obliterating Wikileaks’ Julian Assange with a drone strike.

      The shocking revelation comes as the Democratic presidential nominee and the party’s brain trust brace themselves for an “October Surprise” from Assange.

      Wikileaks has vowed to unleash a torrent of emails expected to be highly damaging to the former secretary of state — and her bid for the White House.

      The True Pundit says the U.S. government was tasked with neutralizing Assange. And Clinton was the point person.

      “Can’t we just drone this guy?” she pondered during one high-charged meeting, State Department sources reportedly told True Pundit. According to the website, others in the room laughed.

      But not Clinton, who called the Assange a “soft target.”

    • Pentagon Paid for Fake ‘Al Qaeda’ Videos

      The Pentagon gave a controversial U.K. PR firm over half a billion dollars to run a top secret propaganda program in Iraq, the Bureau of Investigative Journalism can reveal.

      Bell Pottinger’s output included short TV segments made in the style of Arabic news networks and fake insurgent videos which could be used to track the people who watched them, according to a former employee.

      The agency’s staff worked alongside high-ranking U.S. military officers in their Baghdad Camp Victory headquarters as the insurgency raged outside.

      Bell Pottinger’s former chairman Lord Tim Bell confirmed to the Sunday Times, which has worked with the Bureau on this story, that his firm had worked on a “covert” military operation “covered by various secrecy documents.”

    • CNN Celebrates Iraqi Housewife Who Beheaded and Then Cooked the Skulls of ISIS fighters

      When Islamic State beheads someone it is terrorism. When an Iraqi housewife beheads an ISIS fighter and cooks his skull, it is freedom. That is the CNN doctrine.

      CNN reports the story of 39-year-old Wahida Mohamed aka Um Hanadi, an Iraqi woman who supposedly leads a tribal militia force of around 70 men south of Mosul. She and her band allegedly helped “government forces” drive Islamic State out of a small town.

      “I began fighting the terrorists in 2004, working with Iraqi security forces and the coalition,” she told CNN. CNN cites no other source other than Um Hanadi herself and Facebook in its coverage.

      As a result, Um Hanadi said, she attracted the wrath of what eventually became al Qaeda in Mesopotamia, which later morphed into ISIS. “I received threats from the top leadership of ISIS, including from Abu Bakr al-Baghdadi himself,” she says. “I’m at the top of their most wanted list, even more than the [Iraqi] Prime Minister.”

  • Transparency/Investigative Reporting

    • It Seems Like Nobody’s Getting the Cash Bonuses Promised by the Reducing Over-Classification Act

      It often feels like everyone inside and outside the government agrees that over-classification of government records is a major problem. Yet a series of Freedom of Information Act requests by EFF has found that even when Congress allowed agencies to offer cash rewards to government employees to be less secretive, nobody has been collecting the money.

      Recognizing the threat posed by over-classification, Congress passed legislation in 2010 to counter the pervasive problem of bureaucrats making benign government records secret. One of the most highlighted provisions of the Reducing Over-Classification Act (ROCA) was a new tool for agencies: cash incentives for employees who accurately classify (and declassify) documents.

      Congress hoped that by offering a proverbial carrot to the line-level employees making initial and derivative classification decisions within federal agencies, it could increase transparency and allow greater information sharing between federal agencies and local law enforcement. Responses to EFF’s FOIA requests with 27 agencies demonstrates, however, that those carrots have rotted on the shelf.

  • Environment/Energy/Wildlife/Nature

    • Scientist: World won’t avoid dangerous warming mark

      A team of top scientists is telling world leaders to stop congratulating themselves on the Paris agreement to fight climate change because if more isn’t done, global temperatures will likely hit dangerous warming levels in about 35 years.

      Six scientists who were leaders in past international climate conferences joined with the Universal Ecological Fund in Argentina to release a brief report Thursday, saying that if even more cuts in heat-trapping gases aren’t agreed upon soon, the world will warm by another 1.8 degrees Fahrenheit by around 2050.

      That 1.8 degree mark is key because in 2009 world leaders agreed that they wanted to avoid warming of 3.6 degrees above pre-industrial levels. Temperatures have already risen about 1.8 degrees Fahrenheit, so that 2 degree goal is really about preventing a rise of another degree going forward.

      Examining the carbon pollution cuts and curbs promised by 190 nations in an agreement made in Paris last December, the scientists said it’s simply not enough.

    • [Older] 7 Popular Foods That Might Disappear Because of Climate Change

      Search is on for ancient or near-extinct crops that might be better suited for this new reality

      Throughout history, different types of food have surged and dropped in popularity, and some foods that existed at one point just aren’t around anymore. But we’re not talking about foods that aren’t popular, quite the opposite in fact. Some of our favorite foods and drinks could be considered “endangered” because the places where they are grown are being severely impacted by climate change. If this isn’t proof that we need to do something about climate change, I don’t know what is. To start off, here are a few foods that are part of our every lives that might not be around for long.

    • India ratifies Paris climate agreement

      India, one of the world’s largest greenhouse gas emitters, has ratified the Paris global climate agreement.

      Under the deal, India has committed to ensuring that at least 40% of its electricity will be generated from non-fossil sources by 2030.

      CO2 emissions are believed to be the driving force behind climate change.

      Last December in Paris, countries agreed to cut emissions in a bid to keep the global average rise in temperatures below 2C.

      The Paris deal is the world’s first comprehensive climate agreement.

      It will only come into force legally after it is ratified by at least 55 countries which between them produce at least 55% of global carbon emissions.

      Prime Minister Narendra Modi announced last month that India would ratify the agreement on 2 October, the birthday of Mahatma Gandhi, the leader of the struggle for independence from Britain.

    • FMI: September warmer than usual for eighth year running

      According to the Finnish Meteorological Institute FMI, September’s balmy weather was caused by temperatures that were one to two degrees higher than usual across the country. Temperatures were particularly mild in northwest Lapland, where they were from two to four degrees higher than the norm.

      Last month’s highest temperature, 23.2 degrees Celsius was recorded at Kumpula in Helsinki on September 7. It was coolest in Naruska, Salla, in the northeast on September 18, when the mercury dropped to -5.3 degrees.

      The summery conditions persisted throughout the month, given that the last time daytime highs crossed the 20-degree mark was on the 15th and even as late as the 27th, highs passed 17 degrees as far north as Oulu.

      September marked the eighth year running that temperature records were higher than usual. Last year, the month that typically heralds autumn and the advent of decidedly cooler conditions was even warmer than this September. However according to FMI it’s still too early to make predictions about what the rest of the autumn will be like.

  • Finance

    • IMF cuts UK economic forecast for second time since Brexit vote

      The International Monetary Fund has cut its forecast for the UK economy next year for the second time since the Brexit vote.

    • Alyn Smith: Theresa May’s speech killed off lingering hope of salvaging something from the ruins of Brexit

      ANYONE who did not believe that the European Question is the defining attribute of politics in these islands is in no doubt after Sunday. Different people come to independence for different reasons. I’ve always been motivated by the difference Scotland could make in the world, and the difference we could make to the lives of Scots by taking control over our own lives and making decisions here.

      So Sunday was a stand-out awful day in what has been a pretty bleak few months, watching a Tory party we didn’t vote for making statements about how we’ll interact with the world, and presuming to make the decisions for us, to boot. And by any yardstick not giving one jot about the national interest, neither ours nor the UK’s. We have seen, clearly, that the UK Government’s first priority is the unity of the governing party itself.

      Party conferences can be awful things for outsiders. Part reunion, part beauty contest, part theatre and, somewhere among the open or crypto power-struggles, some business might actually get done. But, much as it pains me, this Tory conference matters, and isn’t just the usual theatre because it is the first glimpse of a carefully constructed facade put forward by the people who seek to make decisions over our lives and the lives of future generations. And it isn’t pretty. I was actually more hopeful. I still had some hope that the canny Remain-voting new PM was keeping her powder dry while the UK civil service worked on a clever fix. But even I have to admit now that the extremists are in charge.

    • Petition: make the FBI explain why they didn’t bring criminal charges against bank execs

      Last month, Senator Elizabeth Warren published an open letter to FBI director James Comey observing that, in revealing details of its investigation into the Clinton email scandal, the Bureau had seemingly abandoned its longstanding policy of not sharing its deliberations, meaning that there was no longer any reason to keep secret its reasoning for not bringing criminal charges against the bankers who did trillions of dollars’ worth of damage to the world economy, sparking wars, starvation, and personal ruin for millions of people.

    • Saudi Arabia switches to ‘Western’ Gregorian calendar so it can pay workers less and save money

      Saudi Arabia has switched to the “Western” Gregorian calendar to pay its civil servants in one of a number of financial reforms announced by the Council of Ministers.

      The Kingdom has used the lunar-based Hijri calendar since it was founded in 1932, but switched to the solar-based Gregorian calendar for paying public sector staff on 1 October.

    • Robert Reich: Why it’s time to start considering a universal basic income

      Imagine a little gadget called an i-Everything. You can’t get it yet, but if technology keeps moving as fast as it is now, the i-Everything will be with us before you know it.

      A combination of intelligent computing, 3-D manufacturing, big data crunching, and advanced bio-technology, this little machine will be able to do everything you want and give you everything you need.

      There’s only one hitch. As the economy is now organized, no one will be able to buy it, because there won’t be any paying jobs left. You see, the i-Everything will do … everything.

      We’re heading toward the i-Everything far quicker than most people realize. Even now, we’re producing more and more with fewer and fewer people.

      Internet sales are on the way to replacing millions of retail workers. Diagnostic apps will be replacing hundreds of thousands of health-care workers. Self-driving cars and trucks will replace 5 million drivers.

  • AstroTurf/Lobbying/Politics

    • Clinton manager ‘reticent to comment’ on report about droning Assange

      Hillary Clinton’s campaign manager declined Monday to comment on recent reports alleging the Democratic nominee once suggested sending a drone strike after WikiLeaks founder Julian Assange.

      “I’m reticent to comment on anything that the WikiLeaks people have said. They’ve made a lot of accusations in the past,” Robby Mook said Monday in an interview with WTTG.com.

      WikiLeaks tweeted a screen grab Sunday evening from a report alleging that Clinton once asked during a State Department briefing, “Can’t we just drone this guy?”

      She supposedly asked this when she served as secretary of state.

    • Biden: Trump ‘completely uninformed’ on veterans and PTSD

      Vice President Joe Biden chastised Donald Trump Monday for his comments about veterans with post-traumatic stress disorder (PTSD), calling the GOP presidential nominee “thoroughly and completely uninformed.”

      Many have interpreted remarks Trump made Monday about veterans and PTSD as a slight, though the campaign insists his comments were misrepresented by the media.

      “Where in the hell is he from?” Biden asked at a campaign stop for Hillary Clinton in Sarasota, Fla.

      “I don’t think he was trying to be mean. He is just so thoroughly, completely uninformed.”

      Biden, who said he has been “in and out” of Afghanistan and Iraq more than 29 times, said the U.S. has only one sacred obligation and that is to “care for those we send to war and to care for them and their family when they come home.”

      “What are the chances Trump honors commitment to those who are wounded?

      “It’s not just that he doesn’t get it. He doesn’t want to find out,” Biden added.

    • The New York Times and Trump’s Taxes: Another Marker on the End of Journalism

      I don’t support Trump. I don’t support Clinton. But what I really don’t support is shoddy journalism, and that’s what is all awhirl regarding the leak of three pages of Trumps’ federal tax return from 21 years ago.

    • More Media B.S. — OMG, Trump Company Legally Rented Office Space to Iranian Bank!

      Once again a story that Trump did nothing illegal is somehow front page news. His crime this time? Continuing to legally rent out office space to a bank already in a building he bought 18 years ago.

      So the big news is that Donald Trump’s real estate organization rented space to an Iranian bank later linked to Iran’s nuclear program.

      Bank Melli, one of Iran’s largest state-controlled banks, was already a tenant in 1998 when Trump purchased the General Motors Building, above, in Manhattan, but he kept them on for another five years, until 2003.

    • Ron Paul criticizes Gary Johnson, praises Jill Stein
    • Third-Party Voters Know What They Want

      On Tuesday night, two men who want to be vice president will face off in a debate. If Bill Weld had his way, he’d be up on that stage, too.

      Mr. Weld, who served as governor of Massachusetts in the 1990s, is running as the Libertarian Party’s vice-presidential pick this year, alongside Gary Johnson, the former governor of New Mexico. Last week, Mr. Weld spoke to students and supporters at Temple University in Philadelphia. Outside Morgan Hall, two students wearing Gary Johnson shirts directed people to the event.

      A group of young white men wearing baseball caps walked past, saw the Gary Johnson shirts, and jeered: “What’s Aleppo?”

      One of Mr. Johnson’s supporters, Alex Pack, rolled his eyes. Were those guys Trump supporters?

      “Oh, yeah,” he said. “Backward hats.”

    • Here Are 7 Questions Mike Pence Should Be Asked at the Vice Presidential Debate

      When Republican Mike Pence and Democrat Tim Kaine take the stage Tuesday night for the 2016 vice presidential debate, there are a few things we hope that debate moderator Elaine Quijano of CBS News will ask Pence to account for.

      While promoted as the sane member of a GOP ticket headed by the likes of Donald Trump, Pence, who is governor of Indiana, uses a demeanor of reasonableness to offset some mighty extreme views on the role of women, climate change, creationism and Social Security, to name a few. The vice presidential candidates meet only once before a national television audience, so this forum will likely be an introduction of these candidates to most voters.

      Kaine, the U.S. senator from the Commonwealth of Virginia, is pretty much your basic liberal; not much by way of surprise in his background. But Pence, a convert to hard-core right-wing Protestant evangelicalism, embraces a range of positions far afield of the views of mainstream voters—views he doesn’t flaunt on the campaign trail. He’s a favorite of donors to the Koch network, as well as Tim Phillips, president of Americans for Prosperity, the ground-organizing group founded by Charles and David Koch, the billionaire brothers at the helm of Koch Industries. (According to Follow the Money, David Koch has spent some $300,000 on Pence’s political campaigns.) Pence has also enjoyed the largess of Erik Prince, founder of the mercenary firm once known as Blackwater (since renamed Academi), from whom he received thousands of dollars in donations for his congressional campaigns.

      If voters are to know what they’re getting when they pull the lever on November 8, Quijano will need to dig deep into Pence’s record. Here a few topics that would prove most enlightening to the electorate.

  • Censorship/Free Speech

    • Fair Processes, Better Outcomes

      Yesterday we exposed the dangers of Shadow Regulation; the secretive web of backroom agreements between companies that seeks to control our behavior online, often driven by governments as a shortcut and less accountable alternative to regulation.

    • Record Labels Make New Grab For Website-Blocking Power in YouTube-MP3 Suit

      Once again, major record labels are asking a court to give them power over the Internet’s basic infrastructure. This is the very power that Congress has refused to give them, and the very power they have proven unable and unwilling to use responsibly. This time, their alleged target is the website Youtube-MP3.org, a site that extracts the audio tracks from YouTube videos and allows users to download them. But as in other recent lawsuits, the labels’ real target appears to be nearly every company that operates or supports the operation of the Internet. The labels are seeking a court order that would bind all of these companies to assist the labels in making Youtube-MP3 disappear from the Internet.

      Even if that website is found to be liable for copyright infringement, the law doesn’t give copyright or trademark holders such sweeping power to edit the Internet. And it never should.

      Record labels have been filing many lawsuits against websites that they deem to be connected to copyright infringement. These sites, run from outside the U.S., don’t bother appearing in U.S. court to defend themselves—and the labels know this. When one party doesn’t show up to court and the other wins by default, judges often grant the winning party everything they ask for. Record labels, along with luxury brands and other frequent filers of copyright and trademark suits, have been using this tactic to write sweeping orders that claim to bind every kind of Internet intermediary: hosting providers, DNS registrars and registries, CDNs, Internet service providers, and more. Some of these requested orders claim to cover payment providers, search engines, and even Web browsers. Judges often sign these orders without much scrutiny.

      Then, the labels and brands, armed with an overbroad and often, in our view, legally invalid order they wrote themselves, try to force Internet intermediaries into helping make the website disappear, and sometimes to filter their services to keep the website from coming back. The central defect of these orders is that they purport to bind third-parties who have no notice or opportunity to challenge them before they issue. Some intermediaries, faced with these orders, cut off websites without asking questions. Others, including Automattic (WordPress), CloudFlare, and the domain name registrar Tucows, have stood up for Internet users by insisting on proper, legally binding orders. A group of major Internet companies including Google, Facebook, Tumblr, Twitter, and Yahoo! also pushed back against this abuse in an amicus brief last year.

    • Singapore Jails Teen Blogger for Videos Critical of Islam, Christianity

      Amos Yee, 17, a blogger from Singapore, has been sentenced to six weeks in prison, plus a fine of $1,500 U.S., because he “deliberately elected to do harm by using offensive and insulting words and profane gestures to hurt the feelings of Christians and Muslims.”

      Such was the pronouncement of district judge Ong Hian Sun, according to CNN, which reports Yee was facing six charges of “wounding religious feeling” with his social media posts — he has a preference for YouTube rants. He was also slapped with two charges of failing to report to the police station when summoned.

    • Microsoft Bing Debuts New DMCA Notice Dashboard

      Microsoft’s Bing has just debuted a new system which allows any copyright holder to submit and monitor the status of their DMCA complaints to the search engine. At the center of the tool is a brand new dashboard, available to anyone with a Microsoft account.

    • Cox Wants Music Group to Pay for False Copyright Claims.

      Internet provider Cox Communications is demanding over $100,000 in compensation from Round Hill Music, for the legal fees it incurred based on false copyright claims. The music group sued Cox last year over alleged infringements committed by the ISP’s subscribers, without actually owning any of the copyrights in question.

    • DOJ To Anti-Muslim Troll Pam Geller: You’re Suing The Wrong Entity, Genius

      There simply aren’t enough derogatives in the dictionary to apply to Pam Geller’s lawsuit against the DOJ for its “enforcement” of Section 230. Geller doesn’t appear to know what she’s doing, much less who she’s suing. Her blog posts portray her lawsuit against the DOJ as being against Facebook. Facebook has earned the ire of Geller by enforcing its terms of use — rules Geller clearly disagrees with.

      Somehow, Geller has managed to construe the actions of a private platform as government infringement on her First Amendment rights. The connective tissue in her litigious conspiracy theory is Section 230 — the statute that protects service providers from being sued for the actions of their users.

      Considering Geller’s fondness for posting inflammatory content, you’d think the last thing she’d want to attack is Section 230. A successful dismantling of this important protection would mean Geller would be even less welcome on any social media platform.

      But the burning stupidity propelling Geller’s white-hot hazardous waste dump of a lawsuit knows no bounds. Somehow, actual lawyers — working in concert with Geller — came up with this breathtakingly wrong interpretation of Section 230.

    • Students, alumni, faculty ‘ban together’ against censorship

      In a small room in the back of Wicker Park’s Davenport Piano Bar Sept. 26, performers, including Columbia students and alumni, squeezed onto the small stage to act out 14 scenes with censored content previously deemed unworthy for theater.

      The censored content performed at the bar, 1383 N. Milwaukee Ave., is part of “Banned Together: A Censorship Cabaret” and was chosen after being challenged or banned by schools and organizations in the past. “A Censorship Cabaret” was organized by the Dramatists Legal Defense Fund, a nonprofit organization created by the Dramatists Guild to advocate freedom of expression in theater.

  • Privacy/Surveillance

    • After Appeals Court Flip-Flop, Aaron Graham Asks Supreme Court To Examine Warrantless Access To Cell Location Info

      Aaron Graham — the defendant at the center of a Fourth Amendment dispute over the warrantless acquisition of cell site location info — is hoping to get one more court to take a look at his case.

      Last summer, the 4th Circuit Court of Appeals became the first appeals court to institute a warrant requirement for historical CSLI. As was noted then, the court found that the records generated by cell phones (and held by phone companies) had an expectation of privacy — at least when obtained for a significant period of time. In Graham’s case, the government obtained 221 days of historical cell site location data — the sort of extended period the Appeals Court found troubling… originally.

      The government appealed and attempted to differentiate its long-term, post-facto tracking of Graham’s movements with eight months of CSLI from the Supreme Court’s Jones decision — which (sort of) found that deploying a surreptitious GPS tracker required the use of a warrant. It claimed this form of location tracking was completely different than the other form of location tracking, mainly because in Graham’s case the tracking was done by the phone company. The government simply benefitted from the warrantless collection of records the phone company was already compiling.

      The court bought the government’s arguments the second time around. The short-lived warrant requirement was removed and the 1979 definition of the Third Party Doctrine (Smith v. Maryland) was reinstated. The dissent correctly pointed out that no cell phone user voluntarily turns over location data to service providers. It’s just something that has to happen for phones to make calls or access data. It also pointed out that, unlike other third-party records, customers aren’t allowed to access their own cell site location data. Only the phone company and the government can do that, even though it’s the customer generating the records and paying for their collection and storage.

    • Victory! Gov. Brown Signs Bill to Overhaul California’s Broken Gang Databases

      Over the last few weeks, a broad coalition of civil liberties and social justice organizations rained down letters, tweets, and op-eds on Gov. Jerry Brown, urging him to sign A.B. 2298, a bill to begin the process of overhauling the state’s CalGang gang affiliation database.

      On Wednesday, it all paid off.

      Gov. Brown signed the legislation, creating a requirement that law enforcement inform a person before they add them to a shared gang database such as CalGang. The new law also gives the person the opportunity to challenge their inclusion in a gang database in court. Starting in January 2018, law enforcement agencies will be required to produce detailed transparency reports on each of their shared gang databases.

    • Trump calls for U.S. to use offensive cyberweapons

      The U.S. government needs to be ready to use its offensive cyberweapons in response to attacks from other nations, Republican presidential candidate Donald Trump said Monday.

      The U.S. has significant offensive cybercapabilities, but it has been shy about deploying them, Trump said during a speech in Herdon, Virginia. “This is the warfare of the future,” he said.

      The U.S. should also increase its use of cyberweapons to attack terrorists, Trump said.

      President Barack Obama has failed to protect the nation’s cybersecurity and a new focus is needed, added Trump, who has largely avoided technology issues in his campaign.

    • Trump Calls For ‘Crippling’ Cyberwar Attack Capabilities

      Donald Trump has made no secret of his “bomb the s&*$t out of them” approach to foreign conflict. But when it comes to America’s digital security, his prescriptions have mostly been limited to vague calls to “get tough on cyber” and invitations to Russians to hack Hillary Clinton’s email. Today, however, Trump got a bit more specific about the digital security postures he would favor as president—and set a new benchmark for a hawkish approach the online world.

      “As a deterrent against attacks on our critical resources the United States must possess…the unquestioned capacity to launch crippling cyber counter attacks,” Trump told the crowd at a Retired American Warriors town hall in Virginia today. “I mean crippling. Crippling.”

    • Facebook eyeing data centre in Odense

      There is strong evidence that the US social media colossus Facebook is keen on setting up shop in Denmark by erecting a massive 184,000 sqm data centre near Odense.

      According to Fyens Stiftstidende newspaper, Facebook wants to build three large server halls and a number of other buildings in the business area of Tietgenbyen, located just south of Odense.

      Facebook, meanwhile, has not yet revealed any of its hands, although it has conceded it is interested in the Odense site.

  • Civil Rights/Policing

    • The Playpen Story: Rule 41 and Global Hacking Warrants

      The warrant the FBI used in the Playpen investigation—which resulted in the delivery of malware to over a thousand computers, located around the world—violated Rule 41, an important rule of federal criminal procedure. Although Rule 41 may seem obscure, it plays a vital role in limiting when federal law enforcement agencies can conduct lawful searches and seizures.

    • This November, Know Your Voting Rights

      When voters go to the polls this November, they will encounter a patchwork of different laws and policies, many of them new since the 2012 presidential election — on everything from new voter registration deadlines to new identification requirements at the polls.

      Since the last presidential election, 17 states have sought to implement new barriers to voting — including states like Alabama, Kansas, and Texas — with new ID requirements, disproportionately affecting minorities and low-income communities. As discussed below, some but not all of these laws have been blocked thanks to litigation by the ACLU and other organizations.

    • In Syracuse, A Child Can Be Thrown in Solitary for Singing Whitney Houston

      A NYCLU lawsuit exposes a nightmarish jail where children are kept for months in isolation for minor misbehavior.

      Charnasha still suffers through sleepless nights because of her experience at the Onondaga County Justice Center.

      The Syracuse, New York, jail keeps 16- and 17-year-old children — many of whom have mental illness — locked up in solitary, often for weeks or even months for transgressions as insignificant as wearing the wrong shoes or getting into a water fight. For the benign “offense” of speaking too loudly, Charnasha was sentenced to solitary for 32 days.

      Young girls in solitary at the Justice Center are watched by adult male guards and forced to shower without a curtain. Charnasha described a guard making comments about her naked body and calling her and other girls “little bitches.” Her experience in solitary was so traumatic that Charnasha wrote a letter to her mom telling her she wanted to end her life.

      “I felt uncomfortable and exposed. I still can’t sleep at night because of the nightmares,” Charnasha said. “No other kids should be allowed to go through what we went through.”

      Since 2015, at least 86 children were placed in solitary more than 250 times at the Onondaga County Justice Center.

    • ‘Air passengers are treated like cash cows’: Fury over Government’s plan to let travellers pay £17.50 to beat queues at airport security

      Passengers are to be charged up to up to £17.50 for the chance to jump lengthy queues at airport passport control points.

      Ministers have confirmed they are ‘working closely’ with airports across the country to extend a scheme that allows travellers to pay a premium to avoid delays at border security when they arrive in the UK.

      The ‘fast-track’ fees would be aimed at easing congestion at passport desks, which has soared to unprecedented levels at some airports.

    • Grooming gang leader loses appeal after claiming all-white jury was part of anti-Islam conspiracy

      A paedophile who led a child a child sex grooming ring in Rochdale tried – and failed – to overturn his convictions with a European court claiming an all-white jury was part of a conspiracy to scapegoat Muslims.

      Shabir Ahmed wrote to the European Court of Human Rights (ECHR) claiming his convictions for child sex offences were part of anti-Islam witch hunt.

      The 63-year-old attempted to use human rights laws to argue his criminal convictions were unsafe and unfair, but failed.

      Ahmed is in Wakefield prison having being caged in 2012 and given a 19-year sentence.

      European Court of Human Rights papers show he claimed the all-white jury at his trial was biased.

      He desperately claimed that breached Article 6 of the European Convention on Human Rights, which guarantees a fair trial.

    • Hadi: Only Islam can rule, others must be ‘pak turut’

      As various opposition parties begin to corral against BN, PAS president Abdul Hadi Awang said those who want to court them must be mindful that only “Islam” can rule the country.

      “Islam has to be the leader and ruler, those who are not of Islam must be followers (pak turut).

      “Let’s not place religion and politics in separate corners,” he was reported saying in Sinar Harian today.

      “Don’t ask PAS to cooperate with you, when you will not make any change towards (prioritising) Islam, that is wrong.

      “As long as the power of Islamic governance isn’t upheld, then those who rule would not care about sin and reward, would rob the people’s wealth and so on.

      “Only Islam can correct people’s (behaviour). PAS can only cooperate with those who are willing to uphold Islam only,” he was reported saying at an event in Kemaman last Thursday night, at the launch of the Harapan Semua (Harap) gathering attended by roughly 1,500.

    • Extremist Imam Tests F.B.I. and the Limits of the Law

      For more than a decade, Suleiman Anwar Bengharsa has served as a Muslim cleric in Maryland, working as a prison chaplain and as an imam at mosques in Annapolis and outside Baltimore. He gave a two-week course in 2011 on Islamic teachings on marriage at the Islamic Society of Baltimore, where President Obama made a much-publicized visit this year.

      But in the last two years, Imam Bengharsa’s public pronouncements have taken a dark turn. On Facebook, he has openly endorsed the Islamic State, posted gruesome videos showing ISIS fighters beheading and burning alive their enemies and praised terrorist attacks overseas. The “Islamic Jurisprudence Center” website he set up last year has condemned American mosques as un-Islamic and declared that homosexual acts should be punished by death.

    • Are students in Detroit being denied their right to literacy? Lawsuit filed against state officials in Michigan says yes

      This month, a unique lawsuit was filed in Michigan against Gov. Rick Snyder and numerous state education officials, claiming that students in Detroit are being denied their constitutional right to literacy. The 133-page complaint, filed by the pro-bono Los Angeles-based firm Public Counsel, is attempting to gain class action status.

      The lawsuit highlights poor conditions in Michigan schools, like classrooms so hot teachers and students literally vomit, vermin in schools, outdated and limited books, an overall lack of teachers, and much more. Detroit’s school districts have some of the lowest performing schools in the country.

      “In one elementary school, the playground slide has jagged edges, causing students to tear their clothing and gash their skin, and students frequently find bullets, used condoms, sex toys, and dead vermin around the playground equipment,” the lawsuit reads.

      The lawsuit is attempting to build off of the 1954 U.S. Supreme Court case Brown vs. Board of Education, and assert that students have a right to literacy under the Fourteenth Amendment. That may sound like a heavy lift, but many legal scholars not involved in the case believe the case could be successful and historic.

    • Federal Court Says Ballot Selfie Ban Is Like Burning Down the House to Roast a Pig

      In First Amendment victory, the court unanimously struck down New Hampshire’s law banning “ballot selfies.”

      In a victory for the First Amendment, a federal appeals court unanimously struck down New Hampshire’s law banning “ballot selfies.”

    • Keith Lamont Scott’s Disability May Have Gotten Him Killed, and He’s Not The Only One

      Last week in Charlotte, North Carolina, police shot and killed Keith Lamont Scott, a Black man with a disability. This happens with gut-wrenching frequency. It happened again this week in El Cajon, California, where police shot and killed Alfred Olango, a Black man with mental illness. Yet disability is often overlooked as a factor in police killings and use of force.

      A recent widely cited report on the issue estimates that up to one half of all use of force incidents involve individuals with disabilities, noting that “[d]isability is the missing word in media coverage of police misuse of force.” People with mental disabilities, especially people of color, are particularly at risk of being shot or beaten by the police.

      Mr. Scott’s horrific killing, captured on video, is far too typical. Just before police shot and killed Mr. Scott while he was sitting in his car, his wife shouted, “He has a TBI. He’s not going to do anything to you guys. He just took his medicine.”

      A “TBI” is a traumatic brain injury, and it’s a term widely known within law enforcement and other emergency service providers. As with a number of disabilities in the U.S., African-Americans are more likely to have a TBI. People with brain injuries experience problems in cognitive skills and typically think, speak, and process information more slowly than other people. A person with a traumatic brain injury easily becomes confused with sudden changes in their environment and may not be able to immediately understand and comply with police commands.

    • John Oliver Takes On Police Accountability And The Colossally-Stupid ‘Bad Apple’ Defense

      And that’s exactly what has happened. Officers — sheltered by extra rights, less-than-strenuous internal investigations, policies that allow for the destruction of discipline records, civil immunity, revolving door policies that allow “bad apples” to infect new law enforcement agencies — basically answer to no one.

      In rare, rare cases, police officers have been convicted and jailed. But this is usually the end result of outside pressure or behavior so repulsive and toxic the agency housing the officer can’t bring itself to defend them.

      As Oliver points out, when officers are caught committing criminal acts, they’re often given the option to resign rather than face an investigation. In other cases, they’re swiftly cleared of serious charges and allowed to desk job their way back into their old positions.

      Until recently, the DOJ and FBI expressed zero interest in compiling data on police use of force — to say nothing about regular, non-deadly police misconduct. Years of neglect have resulted in a data gap, with private citizens picking up the government’s slack to produce more credible numbers about civilians killed by law enforcement officers.

    • Yes, Police Are Snooping Through Criminal Databases For Personal Reasons All The Time

      The more journalists and other FOIA enthusiasts gain access to public records, the more we discover that a combination of access and power tends to result in abuse. Even as this abuse goes unaddressed, law enforcement agencies are striving to add more personal information to their databases, extending far past the usual “name/last known location” to encompass a vast array of biometric data.

      Privacy watchdogs have been fighting against these for good reason: very little is known about the contents of these databases or the controls put in place to protect the info from inappropriate access. What is known is that these databases are misused by law enforcement officers routinely. What’s also been discovered is that this routine misuse is rarely ever punished to the extent the law allows. Warnings about possible jail time are meaningless when the usual punishment usually ranges from nothing at all to short suspensions.

      The Associated Press has obtained another pile of documents from public records request that show little has changed. Abuse of access is still a common occurrence, as is the lack of meaningful consequences. There’s no almost no oversight and no federal law enforcement body holding agencies accountable for misuse of databases under their control.

  • DRM

  • Intellectual Monopolies

    • Copyrights

      • EFF Asks Court To Block The DOJ From Prosecuting Researcher For DMCA Violations

        A few more wrinkles have appeared in the EFF’s attempted legal destruction of the DMCA’s anti-circumvention clause. Back in July, the EFF — along with researchers Bunny Huang and Matthew Green — sued the government, challenging the constitutionality of Section 1201 of the DMCA. As it stands now, researchers are restricted by the limitations built into the anti-circumvention clause. The Library of Congress can grant exceptions, but these are only temporary, lasting three years and generally vanishing at the end of that term.

        Projects and research efforts continue to be thwarted by this provision, opening up those who circumvent DRM and other protective measures to the possibility of prosecution. And their options when facing charges are severely limited. There is no “fair use” exception to Section 1201 of the DMCA — something the EFF would like to see changed.

        The threat of prosecution may be mostly existential, but it’s still far from nonexistent. This is why the EFF has requested a preliminary injunction that would prevent the DOJ from trying to put its client in jail.

      • MPAA Applauds Derailment of FCC Cable Box Competition Plan Because, Uh, Jobs!

        Last week we noted how the FCC had to scrap its plan to bring competition to the cable box after an unprecedented PR and disinformation campaign by the cable and entertainment industries. In short, using consultants, think tanks, payrolled politicians, a soundwall of misleading editorials and even the US Copyright Office, the cable industry was able to convince many in the press, public and even at the FCC that the plan would have ripped the planet off its very orbital access, violated copyright, eroded consumer privacy, and even harmed diversity programming.

        [...]

        Except the FCC’s proposal wouldn’t hurt jobs in the slightest. Under the FCC’s plan, customers still would pay for cable, they’d just have more flexibility in how that programming is consumed. And if anything, you’d see more jobs as the cable hardware itself was opened to multiple hardware competitors and streaming vendors looking to make headway in the space. But just like their previous whining session on this subject, the MPAA can’t just admit it’s terrified of evolution and consumer empowerment, so it apparently has to conflate “copyright” with a loss of control.

        Meanwhile, while many media outlets continue to insist this plan is simply on hold, there’s really only two likely outcomes moving forward thanks to cable lobbyists, the US Copyright Office, and folks like the MPAA: either the plan gets scrapped entirely, or the end result winds up being so watered down as to be utterly useless.

      • European Allows Copyright Owners to Demand Open Wifi Networks be Password Protected

        The European Court of Justice (ECJ) recently announced its decision in Sony v McFadden with important consequences for open wireless in the European Union. The court held that providers of open wifi are not liable for copyright violations committed by others, but can be ordered to prevent further infringements by restricting access to registered users with passwords. EFF reported on the legal aspects of the case last year and collaborated on an open letter to the ECJ on the costs to economic growth, safety and innovation of a password lockdown.

        Free wifi is rare in Germany compared with other EU countries due to legal uncertainty generated by the doctrine of Störerhaftung, a form of indirect liability for the actions of others, which has deterred cafes, municipalities and others from offering free connectivity. Many in Germany hoped that the McFadden case would remove these doubts, but it is now clear that a legislative fix is needed instead.

      • Will the European Commission’s copyright rules spell destruction for Wikimedia?

        The European Commission’s Copyright Directive – full of bad ideas, or full of the worst ideas ever?

        That’s the question that many of us campaigning for positive copyright reform are asking ourselves in the wake of the Commission’s recently announced copyright package.

        We’ve extensively discussed the problems with the Commission’s link tax – see here, here and here – but equally important, are the Commission’s proposals with regards to intermediaries, such as websites like Wikipedia which host user-generated content, and the role of ‘Internet cops’ they will be forced to play if the Commission is successful in its aims.

        Right now, many such websites have an exemption under the current rules and, quite sensibly, are not expected to police the activities of all their users. Unfortunately this might not be the case for much longer. In the Commission’s new paradigm, websites will suddenly be responsible for monitoring the activity of their users, and filtering content to disable and remove instances of alleged copyright infringement.

10.03.16

Links 3/10/2016: GNU Linux-Libre 4.8, DNF 2.0.0

Posted in News Roundup at 3:03 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Down the rabbit hole, part 3: Linux and Tor are key to ensuring privacy, security

      So, I’ve decided I need to improve the privacy and security of my life (especially as it relates to computing). And I’ve come to the conclusion that in order to effectively do this, I need to focus on utilizing open source software as much as possible.

      What next?

      Let’s start at a very simple, basic level: the operating system of my laptop computers (I don’t actually have a desktop currently, but the same ideas will apply) and how they connect to the internet.

  • Server

    • Mellanox Deploys Standard Linux Operating Systems over Ethernet Switches

      Today Mellanox announced the availability of standard Linux kernel driver for the company Open Ethernet, Spectrum switch platforms. Developed within the large Linux community, the new driver enables standard Linux Operating Systems and off-the-shelf Linux-based applications to operate on the switch, including L2 and L3 switching. Open Ethernet provides data centers with the flexibility to choose the best hardware platform and the best software platform, resulting in optimized data center performance and higher return on investment.

    • Mellanox Introduces New Driver for Open Ethernet, Spectrum Switch Platforms
    • Mesos and Kubernetes on a hybrid (IBM Power and x86) architecture scenario

      Currently, there are several popular containers clustering system for Linux®, such as Kubernetes, Mesos and so on. Google Kubernetes and Apache Mesos are probably two commonly used tools to deploy containers inside a cluster. Both are created as helper tools that can be used to manage a cluster of containers. However, they differ greatly in their approaches.

      Always, our customs have a hybrid architecture that includes IBM® Power® and x86. So, this article provides the reference solutions about how to apply Mesos and Kubernetes into Linux on a hybrid architecture (including Power and x86) environment.

      See Figure 1 for the reference architecture.

  • Kernel Space

    • GNU Linux-libre 4.8-gnu Released, Deblobs More Drivers

      Hot off the release of the official upstream Linux 4.8 kernel, the GNU Linux-libre 4.8-gnu kernel is now available as the deblobbed code that strips out support for loading non-free firmware and other references to non-free kernel support.

      With GNU Linux-libre 4.8-gnu, there is a change to allow AMD Evergreen GPUs to be able to successfully initialize correctly without any binary-only blobs, a port from a change these developers did back for R600 hardware on an earlier kernel.

    • Linux Kernel 4.8 released with Microsoft Surface 3 touchscreen support [Ed: How on Earth have some people spun a Linux release as a “Microsoft” thing? Part of the “Microsoft loves Linux” Big Lie or is “Microsoft” the biggest Linux feature now? Maybe just headline baiting.]
    • Linux 4.8 kernel will support newer hardware, including your Microsoft Surface 3
    • Systemd bug allows ordinary user to crash Linux systems

      The systemd project is yet to release a fix for a bug that was disclosed on 28 September but at least one GNU/Linux distribution has patched the same.

      The bug, allowing a user to crash a system by using a short command as an ordinary user, was disclosed by a developer named Andrew Ayer.

      After running this command, according to Ayer, “You can no longer start and stop daemons. inetd-style services no longer accept connections. You cannot cleanly reboot the system. The system feels generally unstable (e.g. ssh and su hang for 30 seconds since systemd is now integrated with the login system).”

    • Major Linux distributions suffer from the latest system crippling bug

      A system administrator, Andrew Ayer discovered a crippling bug while working with his Linux System. He reported the issue at length in a blogpost pointing out how anyone could crash Systemd by one single tweet. The system will not collapse as soon as the tweet is rendered on screen by the system. Instead, what it meant was that any Linux distribution could be crippled by a command that can fit into one tweet. He even posted a tweet with the command to prove his point.

    • Linux 4.9′s CPUFreq To Make Greater Use Of Scheduler Info, IOWait Boosting

      The past few kernel releases there’s been a redesign of CPUFreq and P-State code for being able to make use of the kernel’s scheduler utilization data by these CPU frequency scaling drivers. That work also led to the introduction of the Schedutil governor. Work along this line has continued for Linux 4.9.

    • EFI Test Driver Added To The Mainline Linux 4.9 Kernel

      The EFI material is one of the early pull requests for the Linux 4.9 kernel and its bringing a new driver via EFI_TEST.

    • Linux 4.9 On x86_64 To Support Vmapped Stacks

      With the forthcoming Linux 4.9 kernel, x86_64 builds will support CONFIG_VMAP_STACK where kernel stacks are allocated with vmalloc_node for greater security.

    • Mellanox Platform Support Coming In Linux 4.9

      The x86/platform updates for the Linux 4.9 kernel that entered development on Sunday is bringing initial support for the Mellanox systems platform.

    • Linux Should Soon Start Receiving “Make WiFi Fast” Improvements

      In the months ahead the Linux kernel should start receiving the work out of the “make-wifi-fast” initiative for improving WiFi reliability and performance.

      The Bufferbloat project has been working on the Make-WiFi-Fast project because “the current Linux WiFi stack and drivers are far from optimal.” The project aims to reduce latency, develop new packet scheduling and AQM techniques, and improve the stack to allow 802.11ac MU-MIMO to properly work.

  • Applications

  • Distributions

    • Screenshots/Screencasts

      • Apricity OS, a beautiful way to to enter Arch era

        Last time we told you about Manjaro Linux, which is an Arch based linux distribution. Now the point is there is not only one fork but there are others too. Today we will discuss about another fork of Arch in this 12th segment of “Introduction with Linux Distro”. The distribution we will see today is one of the most beautiful distributions in linux world and it is named Apricity OS.

    • Red Hat Family

      • Finance

      • Fedora

        • DNF 2.0.0 and DNF-PLUGINS-CORE 1.0.0 Released

          DNF-2.0 is out! This major version release of DNF brings many user experience improvements such as more understandable dependency problem reporting messages, weak dependencies shown in transaction summary, more intuitive help usage invoking and others. Repoquery plugin has moved into DNF itself. Whole DNF stack release fixes over 60 bugs. DNF-2.0 release was focused on getting rid of yum incompatibilities i.e. treat yum configuration options the same (`include`, `includepkgs` and `exclude`). Unfortunately this release is not fully compatible with DNF-1. See the list of DNF-1 and DNF-2 incompatible changes. Especially plugins will need to be changed to the new DNF argument parser. For complete list of changes see DNF and plugins release notes.

        • DNF 2.0 Released For Improved Package Management On Fedora

          Version 2.0 of the DNF package manager is now available in release candidate form as a major update to this Yum successor. Meanwhile, DNF-Plugins-Core reached version 1.0 for testing.

        • When every Beta closes another Alpha opens…

          As many of you may know, deadlines for Beta packaging for Fedora 25 have recently come and gone. With this said, designs for the default wallpaper are underway and I’m continuing to work through quirks in the design in order to represent the subtle, yet bold and memorable aesthetic that is present in Fedora wallpapers. Getting closer to the Alpha package deadline, I figured that I’d post another progress picture of where I’m at so far. Be sure to check out https://fedorahosted.org/design-team/ticket/473 for more information as to the background and thought process of the design as well!

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu Software Can Now Show Screenshots of Snap Apps

            A small fix this one, but it’s something that will help Snap apps stand out in the Ubuntu Software store.

            Snap apps are already available to find and install from the GNOME Ubuntu Software app, on both Ubuntu 16.04 LTS and Ubuntu 16.10. As there’s (still) no way to search for Snap app specifically you need to know the Snap app you want to find before you can find it.

            But until recently Snap apps didn’t display application screenshots, a valuable feature of any app store.

  • Devices/Embedded

    • Arduino on Arduino battle ends in reconciliation, merger

      On Saturday, the two rival groups—Arduino LLC (Arduino.cc) and Arduino Srl (Arduino.org)—announced that they had “settled their differences,” and agreed to merge. At present, the similarly-designed sites both carry the official Arduino logo, and both sell official Arduino products.

      The electronics platform Arduino describes itself as “the world’s leading open-source ecosystem for educators, Makers and IoT developers of all ages.” Its board plans are published under Creative Commons (CC) licences, while its software is released as open source. Ars interviewed one of Arduino’s co-founders, Massimo Banzi, back in 2013.

    • ROS: An Open Source Robotics Platform on Linux

      ROS is an open source framework allowing you to create advanced robots. Using ROS takes much of the tedious work out of creating useful robots because it supplies code for navigation, arm manipulation, and other common robot tasks. ROS allows various software components to communicate between one or more computers and microcontrollers, and it allows you to control one or more machine robot networks from a desktop, web browser, and/or other input device. Although ROS stands for Robot Operating System, it is really a framework that sits on top of an existing operating system such as GNU/Linux. Packages are provided for Ubuntu Linux to help get your robot up and rolling.

    • ORWL Open Source, Physically Secure Personal Computer $699 (video)

      First unveiled back in 2012 the ORWL open source personal computer has been designed with your data security in mind and is being marketed as the very first open source physically secure computer.

      What’s the promotional two-minute video below to learn more about the ORWL and how it can be used to keep your personal data safe. ORWL is currently in the final days of its crowdfunding campaign and has nearly raised double what the team requires to take the secure personal computer into production. For more information, full specifications and to make a pledge jump over to Crowd Supply via the link below.

    • Phones

      • Linux V4.8 on N900

        Basics work, good. GSM does not work too well, which is kind of a problem. Camera broke between 4.7 and 4.8. That is not good, either.

      • Android

        • Best Phones for Rooting and Modding

          If you’re not content with the software some company decided you are allowed to use and are willing to roll up your sleeves and do something about it, the Nexus 5X is the best phone to do it with.

          Because it’s a phone directly from Google, the bootloader is easy to unlock using tools and directions Google gives you, and you’ll have no restrictions on the software you can install. If you keep going until the phone just stops working getting back to the factory software is just as easy, and Google provides a downloadable image you can use to restore.

        • EU to Google: stop Android anti-competitive deals, or else [Ed: Remember Microsoft was behind this, remember Android is Linux based, ask yourself if "Microsoft loves Linux"]
        • White Google Pixel and Pixel XL leaked by Bell
        • Google Maps for Android Update Brings Calendar Integration, Shows Upcoming Events
        • Most Secure Android Phone

          The Nexus 6P is the most secure Android phone you can buy, and one of the most secure phones of any available today.

          Without disabling any security protections, the Nexus 6P is protected against known public security exploits and remote installations are monitored by Google’s scanning software which blocks potential malicious content. While security and privacy are two very different things, when you decide you want private things to stay private you need to make sure your phone is secure to keep them that way.

Free Software/Open Source

  • How startups can use open source software to compete against the big guys

    Open source software allows more small businesses in industries that haven’t yet been completely disrupted by technology to create agile software with a small team. This kind of access is what helped my team create our own content marketing software to better service our clients in-house. We did it with a small dev team, and we aren’t alone in that. I think we’re going to start seeing more companies use open source software to create custom tech solutions to fit their needs and make them more competitive against industry giants. – John Hall, Influence & Co.

  • Zeppelin: a Secure Smart Contracts Open-Source Framework for Blockchain Applications

    On September 15, the roadmap proposal for Zeppelin, a MIT licensed open source framework for building secure smart contracts, was published. This comes at an appropriate time as evidenced by the number of talks and discussions at DevCon2 surrounding formal verification of smart contracts.

    Demian Brener and Manuel Aráoz, founders of Smart Contract Solutions, are pioneering the effort around Zeppelin. Zeppelin is a community effort to enable the development of secure, tested and audited smart contract code. Earlier this year, “The DAO”, the largest smart contract application to date, was hacked for $60M by exploiting a loophole in its smart contract. This has justified many concerns in the community bringing formal verification to the forefront.

  • Google Open Sources Powerful Image Recognition Tool

    On the artificial intelligence front, there is a true renaissance going on right now, and it includes a slew of new open source tools, many of which are likely to give rise to businesses built around them. For example, Google recently open sourced a program called TensorFlow. It’s based on the same internal toolset that Google has spent years developing to support its AI software and other predictive and analytics programs. You can find out more about TensorFlow at its site, and you might be surprised to learn that it is the engine behind several Google tools you may already use, including Google Photos and the speech recognition found in the Google app.

    Now, Google has open sourced a “Show and Tell” algorithm to developers, who can purportedly use it recognize objects in photos with up to 93.9 percent accuracy, and help to automate smart photo captioning. It’s based on TensorFlow, and here are details.

  • Events

    • OpenStack Summit to Include Distinguished Contributor Awards

      Not long ago, the OpenStack Foundation created a Superuser publication to facilitate knowledge sharing and collaborative problem solving among individuals who are running OpenStack clouds. It’s actually become a very rich site, and if you are at all involved with OpenStack, it’s worth investigating.

      As the Superuser site has announced, at the upcoming OpenStack Summit in Barcelona, a special round of community awards will be handed out by the OpenStack Foundation. The idea is to recognize esteemed contributors, and here are the details on how you can enter a submission for consideration.

  • Oracle/Java/LibreOffice

  • FSF/FSFE/GNU/SFLC

    • GnuCash A Free & Open Source Accounting Software For Linux

      GnuCash is a free open source accounting program launched in 1998 for small business. GnuCash implements a double entry bookkeeping system. It was first designed for Linux but later in 2004 it was released for Mac and in 2007 was available for Windows. Its current version is 2.6.14. GnuCash is also available for Android in Playstore.

  • Public Services/Government

Leftovers

  • Security

    • security things in Linux v4.7
    • Microsoft warns Windows security fix may break network shares

      The latest of these, Preview Build 14936 – for testers on what Microsoft refers to as the Fast Ring – comes with the usual set of updates, new features, and fixes for things that the previous release managed to break.

      However, what caught our eye was a warning that after updating, users may find that shared devices such as NAS boxes have mysteriously disappeared from the home network folder, and that any previously mapped network drives are unavailable.

      Microsoft offers a fix for this; if you change your network to “private” or “enterprise”, it should start working again.

      It seems that the cause of this hiccup is a fix that Microsoft made earlier in September to address a security hole severe enough that it might allow remote code execution with elevated permissions on an affected system, although this would require an attacker to create a specially crafted request.

      The fix addresses this by, among other things, “correcting how Windows enforces permissions”.

      Windows Insiders are typically no newbies and used to preview builds breaking stuff, but it is likely that this change will find its way into the Windows 10 code everybody else is running sooner or later.

    • Android Devices Are Targeted By New Lockscreen Ransomware
  • Defence/Aggression

    • Inside the Shadowy PR Firm That’s Lobbying for Regime Change in Syria

      On September 30, demonstrators gathered in city squares across the West for a “weekend of action” to “stop the bombs” raining down from Syrian government and Russian warplanes on rebel-held eastern Aleppo. Thousands joined the protests, holding signs that read “Topple Assad” and declaring, “Enough With Assad.” Few participants likely knew that the actions were organized under the auspices of an opposition-funded public relations company called the Syria Campaign.

    • Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Proposed Drone Strike on Julian Assange

      Julian Assange and his free-speech brainchild Wikileaks were once lauded as global heroes of public service among United States politicians and policy makers. But by 2010, four years after its inception during the President George W. Bush administration, Assange and his organization were no longer considered lovable troublemakers and mavericks.

      A year into President Barack Obama’s first term, Wikileaks was suddenly considered an out-of-control free-speech Frankenstein wreaking havoc on United States foreign policy and intelligence gathering at the direction of Assange, its proverbial Dr. Frankenstein.

      The honeymoon for the whistle-blower web site, once a darling of the Democratic Party, was now over. Even more alarming, Assange’s personal safety and organization were increasingly at risk from U.S. concerns.

      By November 2010, Assange was a household name globally, but especially on Capitol Hill. And in the State Department alone his prowess of releasing otherwise secret, damning military documents and emails were filling conference rooms at Foggy Bottom and the White House with policy wonks and bureaucrats desperately seeking to squelch the upstart Wikileaks. At the State Department, meeting after meeting was conducted about how Secretary of State Hillary Clinton and her inner circle were going to squash Assange and Wikileaks latest planned document dump on the United States. Deemed “CableGate,” Assange planned to release confidential cables, or communications, unveiling damaging internal conversations between State Department personnel and its foreign assets and allies.

      Prodded by the looming CableGate, Clinton met with staff on Tuesday November 23, 2010 shortly after 8 a.m. on Mahogany Row at the State Department to attempt to formulate a strategy to avert Assange’s plans to release an enormous batch of 250,000 secret cables, dating from 1966 to 2010. Assange had professed for months to rain the internal cables down on Clinton and President Obama. The collective fear was the context of the secret cables would hamper U.S. intelligence gathering and compromise private correspondences and intelligence shared with foreign governments and opposition leaders. Splashing such juicy details on television news shows and the front pages of major newspapers in the country was great for the media but lousy for intelligence and foreign policy. Many, including Clinton and her elected boss, expressed fear these revelations would embarrass and expose intelligence allies of the United States and set America’s already fragile foreign policy back decades.

    • The Empire Strikes Back

      A decade ago left-wing governments, defying Washington and global corporations, took power in Brazil, Argentina, Paraguay, Venezuela, Uruguay, Bolivia and Ecuador. It seemed as if the tide in Latin America was turning. The interference by Washington and exploitation by international corporations might finally be defeated. Latin American governments, headed by charismatic leaders such as Hugo Chavez in Venezuela, Luiz Inácio Lula da Silva in Brazil, Evo Morales in Bolivia and Rafael Correa in Ecuador, won huge electoral victories. They instituted socialist reforms that benefited the poor and the working class. They refused to be puppets of the United States. They took control of their nations’ own resources and destinies. They mounted the first successful revolt against neoliberalism and corporate domination. It was a revolt many in the United States hoped to emulate here.

      But the movements and governments in Latin America have fallen prey to the dark forces of U.S. imperialism and the wrath of corporate power. The tricks long practiced by Washington and its corporate allies have returned—the black propaganda; the manipulation of the media; the bribery and corruption of politicians, generals, police, labor leaders and journalists; the legislative coups d’état; the economic strangulation; the discrediting of democratically elected leaders; the criminalization of the left; and the use of death squads to silence and disappear those fighting on behalf of the poor. It is an old, dirty game.

      President Correa, who earned enmity from Washington for granting political asylum to Julian Assange four years ago and for closing the United States’ Manta military air base in 2009, warned recently that a new version of Operation Condor is underway in Latin America. Operation Condor, which operated in the 1970s and ’80s, saw thousands of labor union organizers, community leaders, students, activists, politicians, diplomats, religious leaders, journalists and artists tortured, assassinated and disappeared. The intelligence chiefs from right-wing regimes in Argentina, Bolivia, Chile, Paraguay, Uruguay and, later, Brazil had overseen the campaigns of terror. They received funds from the United States and logistical support and training from the Central Intelligence Agency. Press freedom, union organizing, all forms of artistic dissent and political opposition were abolished. In a coordinated effort these regimes brutally dismembered radical and leftist movements across Latin America. In Argentina alone 30,000 people disappeared.

    • Colombia referendum: Voters reject Farc peace deal

      Voters in Colombia have rejected a landmark peace deal with Farc rebels in a shock referendum result, with 50.2% voting against it.

      The deal was signed last week by President Juan Manuel Santos and Farc leader Timoleon Jimenez after nearly four years of negotiations.

      But it needed to be ratified by Colombians in order to come into force.

      Addressing the nation, President Santos said he accepted the result but would continue working to achieve peace.

    • Democracy At Its Worst – Colombians Choose War

      The recent result in Colombia is very unsatisfactory. It allows both sides to see victory is achievable with a little more killing or screaming or whatever…

      The world is not a better place when democracy decides that war is better than a few compromises and wider participation of groups in society. Let’s hope that cooler heads prevail and people care enough to do the right thing sooner or later.

  • Environment/Energy/Wildlife/Nature

    • Reykjavík: the geothermal city that aims to go carbon neutral

      Reykjavík used to be marketed as a place of ‘pure energy’, run on geothermal power – and now Iceland’s capital is trying to become the world’s first carbon neutral city.

      Last month, Iceland became the one of the first countries to ratify the Paris climate deal with a unilateral parliamentary vote, shortly after Reykjavik announced its aim to be carbon neutral by 2040.

      It wants to reduce its greenhouse gas emissions from 2.8 tonnes per person in 2013 to zero – largely by changing the shape of the city to reverse urban sprawl and encouraging Icelanders out of their beloved cars to walk, cycle or use public transport.

      The city already has a head-start thanks to its reliance on geothermal energy. The US, for example, has a greenhouse gas footprint of 16.5 tonnes per person.

  • Finance

    • 589 million Chinese tourists will spend $72 billion in just seven days celebrating “Golden Week”

      Nearly 600 million Chinese tourists will flock to local tourist spots or fly overseas during the country’s 67th National Day holiday, a seven-day break nicknamed “Golden Week.” Unexpectedly, the new hot destination is Morocco, the North African country.

      South Korea, Thailand and Japan continue to be the top 10 most popular travel destinations (link in Chinese) for Chinese tourists, but there was a 3500% year-on-year increase in visa applications to Morocco processed by Ctrip, a Nasdaq-listed travel agency based in Shanghai, China, according to a 2016 National Day Holiday travel prediction report by Ctrip and the state-backed China Travel Academy. The report also said the United Kingdom, Cambodia, Russia and New Zealand will each see a 60% year-on-year increase.

    • After article 50, Brexit will be easy. A trade deal will be anything but

      Article 50, providing for Brexit, will be triggered by the end of March next year, Theresa May has promised. Two years after it is triggered, Britain will find itself outside the European Union, unless there is unanimous agreement among the other member states to extend the time limit.

  • AstroTurf/Lobbying/Politics

    • Trump Campaign Threatens To Sue NY Times For Sharing His 1995 Tax Returns

      It’s kind of amazing how quickly Donald Trump’s lawyers seem to threaten any media outlet for publishing information about him that he doesn’t like. The latest target is the NY Times which ran a big story over the weekend with some leaked pages of his 1995 tax returns, suggesting that the guy who repeatedly claims he’s great at business, reported personal losses of $916 million. We’ll leave the analyzing of the tax returns to those who do that sort of thing (though I will recommend reading this analysis, which suggests that it’s likely a key part of the NYT article is wrong concerning Trump’s ability to use those losses to avoid taxes for 18 years), but we did want to focus in on something more relevant to what we discuss here at Techdirt.

      [...]

      But, it’s not that simple. The NY Times would have a pretty strong First Amendment defense that what they’re doing here is very much in the public interest. After all, Trump himself has made his tax returns (and his supposed acumen as a business man) an issue in this campaign by refusing to release them, despite every other major party candidate for President releasing tax returns going back decades (and even Trump himself mocked Mitt Romney for taking too long to release his own tax returns in 2012). So there’s no argument here that this isn’t newsworthy. It clearly is, and that certainly helps the NY Times’s case. To me it seems like it should be a clear First Amendment win for the Times — and plenty of others agree.

      Plus, there’s the fact that if Trump actually did sue, he’d have to admit the returns are really his and are accurate.

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Hackers auctioning NSA code disappointed in bidding
    • NSA Secrets Could Be Yours for Only $1,083!
    • Hacker group finds no takers for NSA exploits
    • Nobody wants hacked NSA tools; The Shadow Brokers go on an angry rant in broken English
    • No-one wants to buy the Shadow Brokers’ stolen NSA tools
    • The Peculiar Case of Email in the Cloud [Ed: All E-mail goes through a server; stop using the Clown Computing buzzword, it’s misleading and harmful]

      If you install Postfix on your server, it’s possible to use a Gmail account to send all e-mail on your system. There are a few downsides to this method, but the configuration is simple, and Google’s e-mail servers are very reliable. Plus, because you’re not acting as an e-mail server yourself, you don’t have to worry about having your e-mail rejected by recipients. It’s legitimately coming from gmail.com.

      The first unfortunate consequence is that for its simplest implementation, you need to enable “less secure apps” to log in to your Gmail account. I actually set up a separate gmail.com account for my server, and then I don’t worry about the less secure setting. Thankfully, if this is a concern, it’s possible to use two-factor authentication (more on that later).

    • Snowden — see this film!

      You’ve seen the news stories, and maybe the documentary. The film Snowden will still scare and inspire you. Oliver Stone has made a film that will draw you in, engage you, and even feel anxious about Snowden’s safety. Joseph Gordon-Levitt is amazingly like the man you’ve seen on TV or Youtube.

      Imdb says about Snowden: Its performance during its opening weekend was the lowest opening of Oliver Stone’s career for a film playing in over 2,000 theaters. So go to a theater near you, and see it!

  • Civil Rights/Policing

    • UNSOLVED: The Murder of Ferguson Activist Darren Seals

      It’s been three weeks since the body of 29-year-old Ferguson, Missouri protester Darren Seals was discovered inside his burning vehicle with a gunshot wound to the head. St. Louis County police say the homicide investigation is still without leads. However, some community members are questioning the legitimacy of that investigation.

      Darren Seals was one of the most visible and vocal activists to emerge from Ferguson following the 2014 police shooting of unarmed black teenager Michael Brown. Seals was known as a “day one-er” – meaning he was a visible presence from the very beginning.

      Watching, from just outside the yellow police tape on the afternoon of August 9th, 2014, as Brown’s body lay in the middle of Canfield Drive, and then demonstrating later that same day just a few blocks away on West Florissant Avenue – where clashes between police and protesters would eventually capture the world’s attention.

    • Chelsea Manning’s Integrity

      In Laura Poitras’s documentary, Citizenfour, Edward Snowden worries to Poitras and Glenn Greenwald that “they” (the press and government) will use his “personality” as a distraction when Greenwald starts publishing stories about the documents that Snowden has leaked. Snowden’s concern was meaningful considering the media coverage of Chelsea Manning, who was on trial at the time Poitras was filming the documentary for charges arising from the Espionage Act, including the charge of aiding the enemy.

      Manning’s queerness, gender nonconformity (she now identifies as trans*), and experiences of being bullied in the Army made her an easy target for claims that her leaking of documents was not true whistleblowing, but amounted simply to a private vendetta against the Army and government. In one of the first articles on Manning in the New York Times, for example, Ginger Thompson suggested that Manning might have leaked documents as a way of seeking revenge for being bullied in the military, or for her struggles under Don’t Ask Don’t Tell, or out of “delusions of grandeur.”

    • Arkansas Congressman Who Helped Protect Citizens’ Right To Record Police Arrested For Recording Police

      While the recording of police activities has been covered here for years, I think we’re starting to see what is at least a slight ratcheting down of the drama over the issue. Once almost universally rejected by law enforcement groups, the freedom to record police as they go about their public duty has become more recognized rather than less. That doesn’t mean the issue is settled, though, as shown in a recent example in which Arkansas police arrested a state Congressman who had helped push through a state law protecting the rights of citizens to film police.

    • Arkansas lawmaker who pushed law protecting right to video police is arrested for videoing an arrest

      Officer Jeff Thompson of the Little Rock Police Department arrested Arkansas state Representative John Walker for recording their treatment of a black man who had been put in handcuffs during a traffic stop.

    • Green Party vice presidential candidate Ajamu Baraka on Palestine and Syria

      Ajamu Baraka: Well, of course. The linking of these struggles for liberation in Central America and South Africa with the struggles in the US is a part of the tradition of black internationalism, the center of which is a struggle against the continuity of the colonial, capitalism system. So the quite natural connection has always been with Palestine. In fact, one of the first real structural, organizational connections we point to is the fact that SNCC, the Student Non-Violent Coordinating Committee issued a statement standing in solidarity with the liberation aspirations of the Palestinians in the mid-1960s. And of course there was a very negative backlash for that. So solidarity with Palestinian struggles for self-determination has always been part of the black internationalist tradition. The connection for us has always been clear.

  • Internet Policy/Net Neutrality

    • Domain name system transitions to private sector

      ICANN, the body that regulates the domain name system, is no longer under US government oversight as of October 1

      The contract between ICANN and the US Department of Commerce National Telecommunications and Information Administration to perform the Internet Assigned Numbers Authority (IANA) functions expired at midnight on Friday.

  • Intellectual Monopolies

    • Big Week For WIPO Marrakesh Treaty On Access For Visually Impaired; Human Rights Side Under Focus [Ed: WIPO is attacking its own staff and Gurry needs to resign]

      The Marrakesh Treaty to Facilitate Access to Published Works for Persons Who Are Blind, Visually Impaired or Otherwise Print Disabled was adopted on 27 June 2013, and the 20th WIPO member ratified it on 30 June 2016, bringing it into force 90 days later on 30 September. The first-ever meeting of the Marrakesh Treaty Assembly is scheduled to take place on 5 October at WIPO.

      The Social Forum of the UN Office of the High Commissioner for Human Rights (OHCHR) is taking place from 3-5 October at the UN Palais. The theme of the 2016 session of the Social Forum is the “promotion and full and equal enjoyment of all human rights and fundamental freedoms by all persons with disabilities in the context of the tenth anniversary of the adoption of the Convention on the Rights of Persons with Disabilities (CRPD),” according to the event website.

    • External Offices, WIPO Normative Work At Heart Of General Assemblies

      WIPO Director General Francis Gurry, in his opening speech, said “very good process has been made across the organisation over the course of the past 12 months.” He remarked on the last biennium’s (2014-2015) overall surplus of CHF 70.3 million (US$ 72.3 million). WIPO is faring well in the current biennium, he said, and is foreseen to yield an overall surplus as well.

    • Copyrights

      • Phoneix Police Issues Totally Bogus Cease & Desist To Trump Campaign Claiming Copyright Infringement

        Yes, yes, we know that resorting to copyright to take down speech from a politician you don’t like is pretty common. Most of the time it involves musicians not liking politicians playing songs, but lately we’ve seen some other ones as well. Last week, for example, we wrote about a photographer successfully using the DMCA to remove the now infamous image of a bowl of Skittles that Donald Trump Jr. tweeted.

        The latest, however, is even more ridiculous. The city of Phoenix Arizona has sent a cease & desist letter to the Donald Trump campaign, arguing (incorrectly) that Trump was violating their copyrights and publicity rights, by using imagery of Phoneix police officers in an advertisement (first reported by a local NBC affiliate in Arizona). The ad is available on YouTube, and don’t blink or you might miss the Phoneix police officers. It’s a pretty generic politician ad, frankly, but there’s a very brief shot of Trump shaking hands with some Phoneix police officers on a tarmac somewhere (I’m guessing Phoenix…). It appears to last all of about a second.

Links 3/10/2016: Linux 4.8 Released, Steam Survey Shows GNU/Linux Growth

Posted in News Roundup at 3:31 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • The Bug Report

      So I get a bug report. It is on GNU/Linux, of course, because that is the only ecosystem that sends bug reports.

      So first I boot up my work box (Computer #1, Windows 10) which is the one that has the sweet monitor and try to VPN to the Server box (Computer #2, GNU/Linux Fedora Server, amd64). But, of course, at one point I’d stripped all the non-console-mode functionality off of the server, so VPN is a fail. I could have done the fix easily via ssh and emacs-nox, but, I figure it will only take a minute to get a graphical environment up and running.

      There’s a GNU Linux VM running on VirtualBox on the work box, but, I get distracted from the actual problem when I can’t figure out how to get VirtualBox to create a large screen. Totally not a problem, but, I get obsessed with this minutiae and can’t let it go. I waste time tweaking the virtual graphics card settings with no effect.

    • Doom for Windows [Ed: by the creator of DirectX, who isn't pleased with Windows Update.]

      Windows failed to make the leap to new business models and new distributed computing paradigms such that now in the year 2016 Microsoft is on the cutting edge of adopting Apple’s 2007 business model for Windows 10. Here’s why Microsoft has reached the end of its road. They lost the mobile market, they lost search, they’re struggling to compete in the cloud and all they have left is a legacy OS with an architecture from the days of personal computing when connectivity was something only nerds and IT managers worried about. Now the idea of personal computer security is collapsing. It is readily becoming apparent that NOTHING can stop malicious attackers from eventually penetrating the best most advanced security measures of any personal device. Furthermore, as the Edward Snowden scandal has made plain to us all, if malicious attackers aren’t breaking into our computers, then the worlds governments are requiring companies to make their products vulnerable to intrusion. The idea that a lowly personal computer behind a frail consumer router… made in China… stands any chance of resisting serious hacking attempts is a fast fading dream.

      Back when I was making online game publishing DRM (Digital Rights Management) Solutions we measured the time it took Chinese and Russian hackers to crack our best latest security attempts in weeks. Today it can take a matter of days or hours.

      The Windows Operating system has become vast, bloated and cumbersome to maintain. It faces constant security bombardment by the entire worlds connected hacker community and government security agencies. The volume of patches it needs to maintain even the most rudimentary pretext of stability and security requires a constant and overwhelming flood of Windows updates. The seriousness of the situation and the sheer flood of data Microsoft is constantly sending to our computers is staggering. I wanted to show a screen shot of my HUGE Windows Update history but mysteriously, after this most recent disastrous update… Microsoft has seen fit to clear my machine of that information…

    • No Free Upgrades, No New Users: Windows 10 Declines for First Time Since Launch [Ed: based on Microsoft-connected firm]

      The latest batch of market share statistics provided by Net Applications for desktop operating systems puts Windows 10 on the second position in the rankings, but it also reveals something totally unexpected that happened last month.

      Windows 10 has actually lost market share last month despite the fact that everyone expected the operating system to continue its growth, which could be a sign that Microsoft’s 1 billion devices running Windows 10 goal might take a bit longer to become reality.

  • Kernel Space

    • You can crash Linux Systemd with a single Tweet

      System administrator Andrew Ayer has discovered a potentially critical bug in systemd which can bring a vulnerable Linux server to its knees with a single command line.”After running this command, PID 1 is hung in the pause system call. You can no longer start and stop daemons.

    • How to reignite a flamewar in one tweet (and I still don’t get it)
    • Multiple Linux Distributions Affected By Crippling Bug In Systemd

      System administrator Andrew Ayer has discovered a potentially critical bug in systemd which can bring a vulnerable Linux server to its knees with one command. “After running this command, PID 1 is hung in the pause system call. You can no longer start and stop daemons. inetd-style services no longer accept connections. You cannot cleanly reboot the system.” According to the bug report, Debian, Ubuntu, and CentOS are among the distros susceptible to various levels of resource exhaustion. The bug, which has existed for more than two years, does not require root access to exploit.

    • Lennart’s Look At Systemd This Year, What’s Going To Happen In 2017

      We have already covered some of the interesting talks from this year’s systemd conference including how to use it for application sandboxing, a new wireless daemon coming to replace wpa_supplicant, and BUS1 is on the way. But saving the best for last in another presentation to watch this weekend for those interested in systemd: Lennart Poettering’s state of the union address for systemd and a look ahead to 2017 features.

      Lennart’s systemd presentation covered recent improvements/features to systemd as well as a look ahead at some of the ideas baking for future releases. A lot of emphasis was placed on Portable Services for systemd and sandboxing of applications. Some other future ideas are having a Dbus daemon within systemd, more work on containers support, and a variety of new tunables coming. Some of the future options coming include ProtectKernelLogs, ProtectClock, ProtectKernelModules, ProtectMount, ProtectKeyRing, DataDirectory, CacheDirectory, and RestrictNamespaces.

    • October Should Be Very Exciting For Linux Enthusiasts
    • Legends of Linux Part 1: Linus Torvalds

      AS PART of our visit to LinuxCon this week we’re going to ask five key players in the Linux story the same 10 questions to get an idea of where Linux has been, where it is and where it’s going.

      And who better to start with than Linus Torvalds, the often outspoken creator of Linux itself. Torvalds isn’t actually attending the celebrations this year, but was kind enough to chat to the INQUIRER by email.

    • Linux Kernel 4.8 Released By Linus Torvalds — Here Are The 10 Best Features
    • Linux Kernel 4.8 Officially Released, Merge Window for Kernel 4.9 Now Open

      Today, October 2, 2016, Linus Torvalds proudly announced the release and availability for download of the Linux 4.8 kernel branch, which is now the latest stable and most advanced one.

      Linux kernel 4.8 has been in development for the past two months, during which it received no less than eight Release Candidate (RC) testing versions that early adopters were able to compile and install on their GNU/Linux operating system to test various hardware components or simply report bugs. That’s right, the Linux 4.8 kernel series was one of those special ones that received that eighth Release Candidate.

    • Linux 4.8 Kernel Released

      The Linux 4.8 kernel is now officially available.

      Linus Torvalds tagged Linux 4.8.0 and kept the codename as “Psychotic Stoned Sheep.”

    • The Best Features Of The Linux 4.8 Kernel

      If all goes according to plan, the Linux 4.8 kernel will be officially released this afternoon by Linus Torvalds.

    • Graphics Stack

      • Mesa May Move To A Date-Based Versioning System

        Beginning next year, Mesa developers so far appear favorable to moving towards a date-based versioning concept.

        Per the proposal laid out yesterday by AMD’s Marek Olšák, Mesa would move to a date-based version string. He explained, “2017 would start with 17.0, then 17.1, 17.2, 17.3 for following quarters of the year, respectively. 2018 would start with 18.0, then 18.1, 18.2, 18.3. The motivation is that you can easily tell when a specific Mesa version was released with an accuracy of 3 months.”

  • Applications

  • Desktop Environments/WMs

    • GNOME Desktop/GTK

  • Distributions

    • New Releases

      • 4MRecover 20.0 Data Recovery Live CD Is Now in Beta, Includes TestDisk 7.0

        4MLinux developer and project leader Zbigniew Konojacki informs Softpedia today, October 2, 2016, about the release and immediate availability for download of the Beta pre-release version of the upcoming 4MRecover 20.0 Live CD.

        As you might know already, the 4MLinux 20.0 and 4MLinux Core 20.0 GNU/Linux distributions are in the works, which means that Zbigniew Konojacki is also preparing new versions of his other projects, including 4MRecover, a Live CD that can be used for data recovery independent of a computer operating system.

        Therefore, 4MRecover 20.0 Beta is based on the Beta release of the 4MLinux 20.0 operating system, which should be officially promoted to the stable channel on the first day of November 2016, and it ships, as usual, with the powerful TestDisk 7.0 data recovery and PhotoRec 7.0 image recovery software.

    • Arch Family

    • OpenSUSE/SUSE

      • openSUSE Tumbleweed Gets Linux Kernel 4.7.5, openSSL 1.0.2j, and Firefox 49.0.1

        Today, October 2, 2016, Douglas DeMaio from the openSUSE project announced that the rolling release Tumbleweed distro received five new snapshots during the last week of September, which brought many goodies to users.

        As mentioned before, these new snapshots brought several updated components and applications for the openSUSE Tumbleweed operating system, which continually received the latest software releases a few days after they’re announced upstream. The most important one being the Linux 4.7.5 kernel.

        We’ve already reported last week that openSUSE Tumbleweed was the first stable GNU/Linux distribution to include the recently released GNOME 3.22 desktop environment, and the openSUSE team now reveals the fact that KDE Plasma 5.8 LTS is coming soon as well, along with Bash 4.4, Qt 5.7, Mono 4.6, and FreeType 2.7.

    • Red Hat Family

    • Debian Family

      • Derivatives

        • DebEX KDE Live DVD Updated with KDE 4.14.2 and Plasma 5, Linux Kernel 4.8 RC8

          GNU/Linux developer Arne Exton informs us about the release of a new stable build of his Debian-based DebEX KDE Live DVD, which ships with the latest stable Linux kernel packages and up-to-date software components.

          Based on the Debian GNU/Linux 8.6 “Jessie” operating system, DebEX KDE Live DVD Build 161001 is out as a drop-in replacement to version 160604, but it looks like Arne Exton managed to implement the latest Release Candidate (RC) version of the just announced Linux 4.8 kernel, which should be out any moment now.

        • Parsix GNU/Linux 8.5 Reached End of Life, Upgrade to Parsix GNU/Linux 8.10 Now

          As reported last month, the Parsix GNU/Linux 8.5 operating system was about to reach the end of its life on September 30, 2016, so today being October 2 means that you need to upgrade your system right now.

          Dubbed Atticus, Parsix GNU/Linux 8.5 was announced approximately months ago, on the 14th of February, and it was entirely based on the Debian GNU/Linux 8.5 “Jessie” operating system, which means that is shipped with the long-term supported Linux 4.1.17 kernel and thes GNOME 3.18 desktop environment with GNOME Shell 3.18.3.

  • Devices/Embedded

Free Software/Open Source

  • CoursePad to Become Open Source

    Cornell’s most popular course scheduling website, CoursePad.me, became an open source platform on Github last Thursday after enjoying two years of popularity among students, according to Jingsi Zhu ’16, the website’s sole developer.

    Zhu explained that he chose to open source his website — or make its code freely available for modification and redistribution — after he graduated last semester and realized that he would need to devote more time to his work than to CoursePad.

  • Yahoo open sources its NSFW-detecting neural network

    Yahoo has open-sourced its NSFW (not suitable/safe for work) detecting neural network, allowing developers to work towards improving the algorithm. Jay Mahadeokar and Gerry Pesavento of Yahoo explained in a blogpost that defining NSFW material on Internet is subjective and identifying such images is non-trivial. “Since images and user-generated content dominate the Internet today, filtering NSFW images becomes an essential component of Web and mobile applications,” they said.

  • Open source drives companies to change hiring and development

    “Do I want to play with this open source thing?” This was the question most people asked 20 years ago when I started reviewing PostgreSQL bug fixes and assembling like-minded database colleagues to help start the PostgreSQL Global Development Group.

    It’s mind-blowing to see how much things have changed.

    Today, not becoming a follower of some open source community almost means you’re cobaling yourself—excluding yourself from the reality of how organizations use open software today. As engineers, we always want to keep up with the latest technologies not only to satisfy our desire to create and innovate, but also to remain marketable in a business world where products and technology constantly evolve. What’s happened with the open source movement is different.

    Open source today is not just about the products and technologies that companies use, but rather a whole rainbow of adjustments that have penetrated the corporate culture beyond the engineering department.

    I heard some of the best examples of this during a discussion for data industry leaders at the forefront of open source software innovation this summer. The event was co-hosted by EnterpriseDB (EDB) and MIT Technology Review. We shared our experiences of data transformation with Postgres, NoSQL, and other solutions, and really learned a lot from each other.

  • Security analytics platform now an Apache open source project

    Infosec pros have been hoping for some time that big data and analytics can be harnessed to improve cyber security. A fledgling open source project with genes from Intel and Cloudera is another step in that direction.

  • Events

    • Indian language localization community meets in New Delhi

      Localization is one of the less glamorous aspects of computing. Despite the fact that less than 6% of the world speaks English, a majority of projects don’t feel inclined to accommodate the rest of the population. One of the primary reasons for sticking to English is the steep learning curve and the lack of standardization in various aspects of the localization process.

      The FUEL Project organized the GILT conference in New Delhi, India September 24-25 to highlight and address these issues. The annual event showcases the efforts of language technology organizations and volunteer communities, but this year’s also gave a platform for non-technical users to voice their concerns. The Indic computing developers were joined by academics, reporters, language researchers, publishers, and entrepreneurs who rely on localization tools to connect and interact with audiences in the various regional languages in India. The brainstorming between the two groups, both on and off the stage, was one of the highlights of the conference.

  • SaaS/Back End

  • Openness/Sharing/Collaboration

    • Open Hardware/Modding

      • Rehab Addict’s Nicole Curtis and Hackers Agree : Open Hardware Rules

        They say necessity is the mother of invention and it also happens to be responsible for transforming Nicole Curtis from a waitress/real estate agent into the TV star of Rehab Addicts. Much like the dozens of high-tech makers highlighted in Thomas’s book Making Makers, Nicole’s early challenge of “I had no money” galvanized her to find ways to turn beat up old houses and trash into high-value treasures.

        Her approach has been enormously successful. Nicole routinely shows her Rehab Addict fans how to remodel their homes and save a fortune. For example, she redid a bathroom by upcycling what others discarded for a tenth of the cost of putting in a new bathroom. Her videos provide the how tos for anyone with similar problems -they represent the “source code” to rehab a house.

Leftovers

  • French man walks into Apple store and smashes all of its iPhones, shouting ‘this is happening!’

    A man has been caught on camera smashing thousands of pounds worth of new iPhones on display in an Apple shop.

    The unidentified man, who is wearing dark glasses and carrying a steel ball used for boules, methodically removes display phones from their upright holders, and smashes the ball down onto the phones’ Retina HD displays.

    Footage shows him destroying at least 12 iPhones at the shop in Dijon, before he is challenged by security.

  • EU plans to give free Interrail pass to every 18-year-old in Europe on their birthday

    Plans to give all teenagers living in the EU a free Interrail pass on their 18th birthday are to be debated at the European Parliament.

    The proposal aims to give young Europeans a “sense of belonging” to the continent and comes after the President of the European Commission Jean-Claude Juncker called for greater cooperation within the EU during his State of the Union speech in Strasbourg.

  • Revealed: How one Amazon Kindle scam made millions of dollars

    He spent a little over 10 years working as a software development engineer for various companies, including Microsoft. He went on to co-found a startup, Alteroxity, which claims to help authors publish ebooks that are already “done for you” — that includes the writing, the creation, the publishing, and even “dozens of honest positive reviews”.

  • Science

    • 80% of data in Chinese clinical trials have been fabricated

      A Chinese government investigation has revealed that more than 80 percent of the data used in clinical trials of new pharmaceutical drugs have been “fabricated”.

      The report uncovered fraudulent behaviour at almost every level, and showed that some pharmaceutical companies had hidden or deleted records of potentially adverse side effects, and tampered with data that didn’t meet their desired outcomes.

      In light of the findings, 80 percent of current drug applications, which were awaiting approval for mass production, have now been cancelled.

      The investigation, led by the Chinese State Food and Drug Administration (SFDA), looked at data from 1,622 clinical trials for new pharmaceutical drugs currently awaiting approval. The applications in question were all for Western medicine, not traditional Chinese medicine.

    • Vint Cerf: Modern Media Are Made for Forgetting

      Vint Cerf, the living legend largely responsible for the development of the Internet protocol suite, has some concerns about history. In his current column for the Communications of the ACM, Cerf worries about the decreasing longevity of our media, and, thus, about our ability as a civilization to self-document—to have a historical record that one day far in the future might be remarked upon and learned from. Magnetic films do not quite have the staying power as clay tablets.

      It’s more than a then-vs-now thing. It’s a progression through history. Clay tablets are more resilient than papyrus manuscripts are more resilient than parchment are more resilient than printed photographs are more resilient than digital photographs.

      At stake, according to Cerf, is “the possibility that the centuries well before ours will be better known than ours will be unless we are persistent about preserving digital content. The earlier media seem to have a kind of timeless longevity while modern media from the 1800s forward seem to have shrinking lifetimes. Just as the monks and Muslims of the Middle Ages preserved content by copying into new media, won’t we need to do the same for our modern content?”

  • Health/Nutrition

    • This Is The Scariest Thing About Health Care In America Today

      I got an email from my husband’s nephrologist the other day that said: “I honestly do not think he will recover.” Before you gasp in horror and go to your dark place, just know that he and I have made our peace with this information. Kidney dialysis is a game-changer, not a game-ender.

      No, it actually wasn’t that particular sentence at all that made my heart sink. The Titanic that overcame me was when his doctor referred him to a vascular surgeon who is not within our insurance company’s network.

      The horrifying reality of my husband’s month-long hospitalization early this summer is that many of the doctors who paraded through his room and stayed for all of about 90 seconds were also out-of-network. And I have the bills to prove it.

      “Well gee, she probably has a cheap-o plan or should be blaming Obamacare,” you may be thinking. You’d be wrong. I work for a large company and we are covered by my large company’s group plan. We bought the best ― and most expensive ― plan offered, one that allowed us to go see any out-of-network doctor if we really wanted to. But somehow, during a hospitalization, the “if we really wanted to” part leaves your control.

    • In Year Since Water Crisis Began, Flint Struggles In Pipe Replacement Efforts

      It’s been one year since health officials in Michigan warned people in the city of Flint to stop drinking the tap water after a research team from Virginia Tech discovered elevated lead levels.

    • In Major Settlement, States Gang Up to Strike Deal with Soldier-Suing Company

      A coalition of attorneys general representing 49 states and the District of Columbia announced a settlement today with USA Discounters, requiring it to pay $40 million in penalties and wipe out more than $95 million in debt for its past customers.

      When ProPublica published its investigation of USA Discounters in 2014, the company was operating two dozen stores, most of them right outside the country’s largest military installations.

      To buy the marked-up furniture, appliances, and electronics the company offered in its showrooms, service members took out loans laden with high interest rates and extra fees. Soldiers who couldn’t pay were then subject to the company’s collection machine, which filed tens of thousands of collection suits in a local Virginia court regardless of wherever in the world the soldier might be.

      Late in 2014, the company underwent a rebranding, dubbing itself “USA Living.” Then, last year, it began to close its stores and later filed for bankruptcy.

  • Security

    • Your next DDoS attack, brought to you courtesy of the IoT

      The internet is reeling under the onslaught of unprecedented denial-of-service attacks, the sort we normally associate with powerful adversaries like international criminal syndicates and major governments, but these attacks are commanded by penny-ante crooks who are able to harness millions of low-powered, insecure Internet of Things devices like smart lightbulbs to do their bidding.

      Symantec reports on the rising trend in IoT malware, which attack systems that “may not include any advanced security features” and are “designed to be plugged in and forgotten” without “any firmware updates” so that “infection of such devices may go unnoticed by the owner.”

      The USA and China are the two countries where people own most of these things, so they’re also where most of the malicious traffic originates. Symantec ran a honeypot that recorded attempts to login and compromise a system that presented as a vulnerable IoT device, and found that the most common login attempts used the default passwords of “root” and “admin,” suggesting that malware authors have discovered that IoT owners rarely change these defaults. Other common logins include “123456,” “test” and “oracle.”

    • Meet Linux.Mirai Trojan, a DDoS nightmare
    • Linux.Mirai Trojan Carries Out DDoS Attacks
    • Fears of a hacked election may keep 1 out of every 5 voters home, says report

      Recent hacks of the Democratic National Committee, the Democratic Congressional Campaign Committee and election databases have increased fears that cybercriminals will try to interfere with the upcoming U.S. presidential election.

      Concerns leading up to election day on November 8 could have a real impact on voter turnout, according to a study from cybersecurity firm Carbon Black. More than one in five registered U.S. voters may stay home on election day because of fears about cybersecurity and vote tampering, the study — an online survey of 700 registered voters aged 18-54 — found.

    • Hostile Web Sites

      I was asked whether it would be safe to open a link in a spam message with wget. So here are some thoughts about wget security and web browser security in general.

    • Bug Bounty Hunters Can Earn $1.5 Million For A Successful Jailbreak Of iOS 10
    • How To Ensure Trustworthy, Open Source Elections [Ed: This reminds us Microsoft must be kicked out of election process [1, 2]

      A strong democracy hinges not only on the right to vote but also on trustworthy elections and voting systems. Reports that Russia or others may seek to impact the upcoming U.S. presidential election—most recently, FBI evidence that foreign hackers targeted voter databases in Arizona and Illinois—has brought simmering concerns over the legitimacy of election results to a boil.

    • Source Code for IoT Botnet ‘Mirai’ Released

      The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices.

      The leak of the source code was announced Friday on the English-language hacking community Hackforums. The malware, dubbed “Mirai,” spreads to vulnerable devices by continuously scanning the Internet for IoT systems protected by factory default or hard-coded usernames and passwords.

  • Defence/Aggression

    • Pentagon Paid for Fake ‘Al Qaeda’ Videos

      The Pentagon gave a controversial UK PR firm over half a billion dollars to run a top secret propaganda program in Iraq, the Bureau of Investigative Journalism can reveal.

      Bell Pottinger’s output included short TV segments made in the style of Arabic news networks and fake insurgent videos which could be used to track the people who watched them, according to a former employee.

      The agency’s staff worked alongside high-ranking U.S. military officers in their Baghdad Camp Victory headquarters as the insurgency raged outside.

      Bell Pottinger’s former chairman Lord Tim Bell confirmed to the Sunday Times, which has worked with the Bureau on this story, that his firm had worked on a “covert” military operation “covered by various secrecy documents.”

      Bell Pottinger reported to the Pentagon, the CIA and the National Security Council on its work in Iraq, he said.

    • As Brazil’s New Ruler Admits Lie Behind Impeachment, US Press Closes Eyes

      The Intercept‘s Inacio Vieira notes that the economic plan that Rousseff refused to implement called for widespread cuts to social programs and privatization, a radically different agenda from the one approved by the 54.5 million Brazilian voters who gave Rousseff’s Workers’ Party its fourth electoral victory in 2014.

      But Temer’s remarkable confession was not seen as newsworthy by virtually anyone in US corporate media—though the New York Times (9/19/16) did report on the speech by Temer to the United Nations a few days earlier in which he insisted in reference to the impeachment, “Everything happened with absolute respect for the constitutional order.”

    • When Is Direct Military Intervention Not Direct Military Intervention?

      “President Obama has long refused to approve direct military intervention in Syria,” the New York Times asserted in an editorial (9/29/16) about “Vladimir Putin’s Outlaw State.”

      That’s a peculiar thing to say, given that the Times regularly covers the United States’ ongoing direct military intervention in Syria. Since 2014, according to official Pentagon figures, the US has carried out 5,337 airstrikes in Syria. According to the monitoring group Airwars, these airstrikes (along with a few hundred strikes by US allies) have likely killed between 818 and 1,229 Syrian civilians.

      Nor is direct US military intervention in Syria limited to aerial attacks. In May 2015, the New York Times (5/16/15) reported on a combat raid by US Delta Force commandos in eastern Syria. Later that year, the Times (10/30/15) observed that President Barack Obama had announced he was sending (in the paper’s words) “several dozen” special forces troops on an “open-ended mission” inside Syria.

    • It’s Personal Now: Apologizing to My Daughter for the Last 15 Years of War

      4929686071_970be30b8d_o

      I recently sent my last kid off for her senior year of college. There are rituals to these things, and because dad-confessions are not among them, I just carried the boxes and kept quiet.

      But what I really wanted to say to her — rather than see you later, call this weekend, do you need money? — was: I’m sorry.

      Like all parents in these situations, I was thinking about her future. And like all of America, in that future she won’t be able to escape what is now encompassed by the word “terrorism.”

    • Bring Back The Cold War

      Pundits have declared a “New Cold War.” If only!

    • Colombia’s Santos, FARC scramble to revive peace after shock vote

      Colombia’s government and Marxist FARC guerrillas will scramble on Monday to revive a plan to end their 52-year war after voters rejected the hard-negotiated deal as too lenient on the rebels in a shock result that plunged the nation into uncertainty.

      Putting on a brave face after a major political defeat, President Juan Manuel Santos offered hope to those who backed his four-year peace negotiation with the Revolutionary Armed Forces of Colombia (FARC) in Cuba.

      Latin America’s longest conflict has killed 220,000 people.

      “I will not give up, I will keep seeking peace until the last minute of my term,” he said moments after losing Sunday’s plebiscite to those who want a re-negotiation of the deal or an obliteration of the FARC on the battlefield.

    • Colombia’s Brexit moment as politicians misjudge popular anger at Farc amnesty

      Colombia’s rejection of a peace deal with Farc rebels to end 52 years of war does not mean an automatic return to hostilities, but it makes the possibility of peace, which had looked close enough to touch, once again a faraway prospect.

      All the pieces were in place to begin implementation of a deal that was four years in the making after talks between government and Farc negotiators in Havana. The Farc had ratified the accord at a national conference, President Juan Manuel Santos and Farc leader Timochenko had signed it in a public ceremony and UN monitors were ready to oversee the bringing together and disarmament of the Farc’s 5,800 fighters. The Nobel committee was reportedly considering a peace prize for Colombia.

  • Environment/Energy/Wildlife/Nature

    • Bees added to US endangered species list for the first time

      Seven types of bees once found in abundance in Hawaii have become the first bees to be added to the US federal list of endangered and threatened species.

      The listing decision, published on Friday in the Federal Register, classifies seven varieties of yellow-faced or masked bees as endangered, due to such factors as habitat loss, wildfires and the invasion of non-native plants and insects.

      The bees, so named for yellow-to-white facial markings, once crowded Hawaii and Maui but recent surveys found their populations have plunged in the same fashion as other types of wild bees – and some commercial ones – elsewhere in the United States, federal wildlife managers said.

  • Finance

    • How Donald Trump could have – legally – paid no taxes

      Trump claimed a $916 million loss in 1995, according to a few pages from his state tax returns obtained by the New York Times.

      Because of how Trump structured his businesses and because of the vast array of tax breaks available to real estate developers, it’s a loss that he could have used to reduce the income tax he might otherwise owe.

      CNN has not independently verified the authenticity of the documents published by the New York Times.

    • ‘The Gender Pay Gap Follows Women Into All Areas’

      Janine Jackson: Every now and again, media will release a list of “best places to work if you’re a woman,” citing companies that treat women, well, fairly. Surely meant to be a spotlight on good guys, these features give the dispiriting impression that fair treatment for women at work is a matter of noblesse oblige, and the onus is on women to shop around till they find a job where they won’t be discriminated against.

      A fundamental reflection of that discrimination is, of course, the gender pay gap. The census data used to figure out the pay gap was released recently, and the American Association of University Women has put together their report analyzing it. Here to talk about where we’re at is Kevin Miller, senior researcher at AAUW and author of the new report, The Simple Truth About the Gender Pay Gap. He joins us now by phone from Washington, DC. Welcome to CounterSpin, Kevin Miller.

    • Post-Debate, NYT Scores Points on Trade–Not So Much on Accuracy

      While China has recently been trying to keep up the value of its currency by selling reserves, it still holds more than $4 trillion in foreign reserves, counting its sovereign wealth fund. This is more than four times the holdings that would typically be expected of a country its size. These holdings have the effect of keeping down the value of China’s currency.

      If this seems difficult to understand, the Federal Reserve now holds more than $3 trillion in assets as a result of its quantitative easing programs of the last seven years. It raised its short-term interest rate by a quarter point last December; nonetheless, almost all economists would agree the net effect of the Fed’s actions is to keep interest rates lower than they would otherwise be. The same is true of China and its foreign reserve position.

      The piece goes on to say that NAFTA has “for more than two decades has been widely counted as a main achievement of her husband,” Bill Clinton. It doesn’t say who holds this view. The deal did not lead to a rise in the US trade surplus with Mexico, which was a claim by its proponents before its passage. It also has not led to more rapid growth in Mexico, which has actually fallen further behind the United States in the two decades since NAFTA.

    • Alice O’Connor on the Politics of Poverty

      This week on CounterSpin: New data showing a drop in the percentage of Americans living below the poverty line is being rightly celebrated. But if eliminating poverty is really our goal, wouldn’t there be keener interest in asking exactly why the number went down—or what it means that it didn’t go down for everyone? For that matter, is monitoring the ups and downs in the poverty rate really the most useful way to think about the problem of persistent social inequity and hardship—or the best measure of the adequacy of the responses we’ve developed?

      We talk about the limits of how we talk about poverty with Alice O’Connor. She’s a professor of history at the University of California/Santa Barbara and author of Poverty Knowledge: Social Science, Social Policy and the Poor in 20th Century US History.

  • AstroTurf/Lobbying/Politics

    • Why Facts Don’t Matter to Donald Trump or the 2016 Electorate

      Between the hours of 3 AM and 5 AM Friday morning, Republican presidential nominee Donald Trump went on a tweetstorm in which he was, you know, just saying that maybe Hillary Clinton helped former Miss Universe (and a target of Trump’s misogyny) Alicia Machado become a US citizen “so she could use her in the debate.”

      Is that true? Almost certainly not—but in this election season, truth and facts hardly seem to matter. Trump’s attacks on Machado are just the latest data point in an election cycle that has seen wild speculation, rampant exaggeration, and outright lies become accepted as fact by huge swaths of the electorate on both sides of the aisle.

    • Challenge Donald Trump: The media needs to stop acting like the Republican nominee is reality TV

      According to the most recent polls — Donald Trump is now leading Hillary Clinton in the critical swing states of Ohio and Florida.

      And if their behavior in the primaries is any indication — the U.S. media is about to deliver this nation into the hands of Donald J. Trump, and there’s probably very little any of us can do about it.

      The “how” of this has played out in front of us for a year: While Bernie Sanders and Hillary Clinton were debating issues on the Democratic side — and being largely ignored — Trump was getting wall-to-wall coverage as he bullied his Republican opponents in the primary.

      So the “how” was grounded in editorial and business decisions about who to cover and how.

    • Trump Tax Records Obtained by The Times Reveal He Could Have Avoided Paying Taxes for Nearly Two Decades

      Donald J. Trump declared a $916 million loss on his 1995 income tax returns, a tax deduction so substantial it could have allowed him to legally avoid paying any federal income taxes for up to 18 years, records obtained by The New York Times show.

      The 1995 tax records, never before disclosed, reveal the extraordinary tax benefits that Mr. Trump, the Republican presidential nominee, derived from the financial wreckage he left behind in the early 1990s through mismanagement of three Atlantic City casinos, his ill-fated foray into the airline business and his ill-timed purchase of the Plaza Hotel in Manhattan.

      Tax experts hired by The Times to analyze Mr. Trump’s 1995 records said that tax rules especially advantageous to wealthy filers would have allowed Mr. Trump to use his $916 million loss to cancel out an equivalent amount of taxable income over an 18-year period.

  • Censorship/Free Speech

  • Privacy/Surveillance

    • There’s exactly one way to prevent misuse of surveillance data: to never collect it in the first place

      A key conclusion in my latest column deserves elaboration: why all available empiric data tells us that the only way to prevent misuse of surveillance data is to never collect it in the first place. This is a very unpopular fact with surveillance hawks, but it’s nevertheless the truth: all collected surveillance data will be abused and turned against the citizen, and that with a mathematical level of certainty.

      While it can’t be logically proven that all surveillance data has been misused and that the surveillance power has been abused, there comes a point in time in any activity where all available empiric data gives the same indication of failure forcefully enough to make people stop and ask “hey, maybe this wasn’t such a good idea”. We’re there with the so-called War on Drugs, we’re there with a number of activities, but the establishment is still fighting forcefully for more surveillance – even though all the data against it is there, and has been for decades.

      Let’s take one example of a super-benign data collection. Around 125 years ago, the Netherlands wanted to serve their citizens better in city planning to make sure everybody had a place of worship nearby, so they started collecting data on people’s faith and where they lived, in order to make sure everybody had a short distance to walk to places of worship.

      There’s absolutely nothing wrong with this on the surface, right? Making sure people have access to services? And yet, this is squarely in the “what could possibly go wrong” category.

    • Shadow Brokers rant about people wanting stolen NSA-linked hacking tools for free

      The hacking group trying to auction off NSA-linked Equation Group hacking tools is unhappy because no one has coughed up the big bucks yet to buy the exploits.

      On Saturday, the Shadow Brokers took to Medium to release the group’s third message. The hackers sound hurt that people don’t trust them and – if cursing is any indication – the hackers are angry that the Equation Group cyber weapons auction has flopped so far.

  • Civil Rights/Policing

    • This U.S. chess champion is missing the world contest in Iran to protest country’s hijab policy

      One female chess player is protesting Iran’s hijab laws by missing the world tournament.

      Nazi Paikidze-Barnes is the reigning U.S. women’s chess champion. But she won’t be going to the Women’s World Championship being held there in February.

      She explained her decision on Friday in a Facebook post in which she called the World Chess Federation’s decision to have the contest in Tehran “unacceptable.”

      SEE ALSO: Models in hijabs make history at New York Fashion Week

      “I think it’s unacceptable to host a WOMEN’S World Championship in a place where women do not have basic fundamental rights and are treated as second-class citizens,” she wrote on the site.

    • O.C. Woman Says Airline Made Her Move Because 2 Pakistani Monks Can’t Sit Next To Female

      An Orange County woman said she is the victim of discrimination.

      Mary Campos says her pre-booked ticket was given away by United Airlines. The reason? She’s a woman, and two men didn’t want to sit next to a female.

      It’s a story that is Only On 2. Stacey Butler spoke to Campos.

      A a million-mile flier, Campos — a mom who lives in Coto de Caza — said she thought she’d seen it all.

      Until a gate agent handed her a new boarding pass just before she got on a flight to Houston last Monday.

      “He said this is your new seat,” Campos said, “And I said, ‘Excuse me?’ And he said, ‘I don’t know how to tell you this’”

      She said she continued by saying, “Yes?”

      [...]

      The letter said, in part, “What if I were handicapped, or transgender?” she wrote. “What if your entire crew were female? Any belief that prevents individuals from interacting with females should not travel on commercial aircraft.”

      She got a reply that said United would look into it. She said she didn’t hear from them again.

      But Butler did. A company spokesperson wrote, in part:

      “We regret that Ms. Campos was unhappy with the handling of the seat assignments on her flight. United holds its employees to the highest standards of professionalism and has zero tolerance for discrimination.”

    • Egyptian MP calls for women to undergo virginity tests before being admitted to university

      An Egyptian MP has called for women to be forced to undergo virginity tests before being admitted to university, it has been reported.

      Parliamentary member Elhamy Agina called on the Minister of Higher Education to issue a mandate requiring him or his officials to enforce the virginity tests, Egyptian Streets reports. He has suggested that university cards could only been issued to female students on completition of a virginity test.

      In an interview with local media, he said: “Any girl who enters university, we have to check her medical examination to prove that she is a Miss. Therefore, each girl must present an official document upon being admitted to university stating she’s a Miss.”

      The term “Miss” in Egyptian culture is often used to refer euphemistically as to whether a woman is a virgin.

    • Operators of baby factory risk 10 years imprisonment

      Henceforth, operators of baby factories, racketeering with human pregnancy and those involved in sale of new born baby across the country on conviction by Court of any competent jurisdiction will be subjected to 10 years imprisonment.

      The punitive measure was contained in the bill for an Act to amend “trafficking in persons (Prohibition) law enforcement and administration Act No. 28 of 2005 to prohibit racketeering with human pregnancy or operation of baby prosecution factory, harbouring or pregnancy persons under the age of 18 and above or selling or attempting to sell new born baby and for related matters, 2016.”

    • California Governor Signs Major Civil Forfeiture Reform – Institute for Justice

      Today, California Governor Jerry Brown signed SB 443, a major overhaul of the state’s civil forfeiture laws. The bill marks one of the nation’s most significant reforms of its kind.

      “Civil forfeiture is one of the most serious assaults on due process and private property rights in America today,” said Institute for Justice Legislative Counsel Lee McGrath. “By generally requiring a criminal conviction, SB 443 would go far in curbing this abuse of power.”

    • Don’t Abandon Due Process, Not Even For Terrorism

      The clash in American history between liberty and safety is as old as the republic itself. As far back as 1798, notwithstanding the lofty goals and individualistic values of the Declaration of Independence and the Constitution, the same generation — in some cases the same human beings — that wrote in the First Amendment that “Congress shall make no law…abridging the freedom of speech” enacted the Alien and Sedition Acts, which punished speech critical of the government.

      Similarly, the Fifth Amendment’s guarantee of due process has been ignored by those in government charged with enforcing it when they deal with a criminal defendant whom they perceive the public hates or fears. So it should come as no surprise that no sooner had the suspect in the recent New Jersey and New York City bombings been arrested than public calls came to strip him of his rights, send him to Gitmo and extract information from him. This is more Vladimir Putin than James Madison.

    • Big Papers Want Foreign Companies, Not War Crime Victims, to Sue US

      Notice that the possibility of other countries suing the US for war crimes its government commits is automatically assumed to be undesirable. The Washington Post puts “terrorism” in irony quotes because, of course, the US could never actually commit terrorism; claims to this effect could only be invoked “when convenient” by greedy non-Americans.

      The New York Times uses its trademark euphemisms to describe how the US is “engaged in the world” with “drone operations.” A nice way of saying the US uses drones to bomb people in a half-dozen countries with—so far—legal impunity. Changing this state of affairs is simply glossed over as a nonstarter.

      USA Today frames any attempt at legal recourse over American terrorism overseas as “retaliation”—presumably for some righteous kill executed by the United States in the service of freedom.

      The New York Times, Washington Post and USA Today are saying that exposing American military and intelligence personnel to foreign liability is per se bad—a nativism so casual and matter-of-fact one might hardly notice it until circumstances force them to explicitly state it. No account is taken of the 7 billion non-Americans or their rights. No explanation is given as to why victims of US terror–of which there are many–shouldn’t register in our moral calculus. They just don’t.

      The irony is that none of these publications were overly concerned with exposing the US to foreign lawsuits when they offered support for the Trans-Pacific Partnership, a corporate trade deal that includes a provision for Investor-State Dispute Settlement—meaning it permits corporations to sue governments, including the US, in the event that a regulation undermines corporate profits. So increased exposure to liability to the US government when it gives more power to corporations is permissible, even desirable, but when it might provide recourse for victims of US war crimes? Not so much.

    • Death threats force Muslim woman into hiding

      Liberal Party politician Mostafa Geha was one of several speakers at the demo, arranged by the local Liberal Party and GAPH, an organisation against “honour violence.” It came in response to a sustained campaign of intimidation and violence on 21-year-old Walaa, who lives in Hedemora.

      In an interview with local radio station P4 Dalarna, she claimed that she has been harassed by both men and women in the town for “not living in the right way”. Tension heightened during a confrontation when she was hit in the face by a young man who had been harassing her over a long period.

      Walaa reported the incident to the police but in the following days the row spread over social media and the story was picked up by local Liberal Party leaders.

      “I decided we should organise a demonstration because that is the way we solve conflict in Sweden. We do it by trying to hold a discussion and say “this is not right”, Anna Eling, chairperson for the Liberals in Hedemora told TT.

  • Internet Policy/Net Neutrality

    • US government no longer manages internet’s technical functions

      The US government has ceded control of the technical management of the internet, in what has been called the “most significant change in the internet’s functioning for a generation”.

      Following a long legal battle, the California-based NGO Internet Corporation for Assigned Names and Numbers (ICANN) will gain control over the organisation of unique online identifiers.

      The change will not affect ordinary internet users but is a reflection of the rapidly shifting online landscape and attitudes to it.

  • Intellectual Monopolies

    • Copyrights

      • “If KickassTorrents is a Criminal Operation, Google Should Start Worrying”

        Polish authorities have extended the arrest of Artem Vaulin, the alleged owner of KickassTorrents. His defense team is currently preparing to fight the U.S. extradition request, which will start next month. According to Artem’s U.S. lawyer, operating a torrent site is not a criminal offense. “If KickassTorrents is a criminal operation, then Google should start worrying,” he says.

      • Watching Pirate Streams Isn’t Illegal, EU Commission Argues

        This week the European Court of Justice heard a crucial case that will give more clarity on the infringing nature of unauthorized streaming. Dutch anti-piracy group BREIN and the Spanish authorities argued that offering or watching pirate streams is a violation of the EU Copyright Directive. However, the European Commission believes that consumers who watch unauthorized streams are not breaking the law. […]

        Based on the hearing the Advocate General will issue a recommendation later this year, which will be followed by a final verdict from the EU Court of Justice somewhere early 2017.

      • Record Label Picks Copyright Fight — With The Wrong Guy

        An Australian record label may have picked a fight with the wrong guy. The label sent a standard takedown notice threatening to sue after YouTube computers spotted its music in a video.

        It turns out that video was posted by one of the most famous copyright attorneys in the world, and Lawrence Lessig is suing back.

10.02.16

Links 2/10/2016: Wine 1.9.20, Raspberry Pi PIXEL

Posted in News Roundup at 6:28 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Windows vs. Linux vs. Mac: the channel comparison

    Linux is open source meaning you can customise and modify the code any which way you like. This flexibility has made the system hugely popular amongst the developer community. This is not the same in Windows and Mac. Neither the Windows and Mac programmes nor the operating systems are open source.

    So there we have it, three entirely different operating systems offering unique experiences that can meet the differing demands of the modern user, whilst offering unique opportunities throughout the channel. So the real question now is, are you a Mac Linux or Windows user?

  • Linux Journal October 2016

    There was a show a few years back called, “Extreme Makeover: Home Edition”. The premise of the show was to find families who needed their houses overhauled, but couldn’t afford to do it on their own. Generally, those chosen had sacrificed for others rather than spend time and money on themselves. Then the show would completely redo their houses, making it so nice the happy families no longer could afford the taxes, and they’d soon be homeless. I might have missed the point of the show, but the idea of improving on outdated infrastructure certainly rings true for IT folks. This month, we look at improving our lives by improving on the tech we depend on every day.

  • Desktop

  • Server

    • Kubernetes 1.4 Improves Container Security

      The latest release of the open-source container orchestration technology adds new security features, including TLS bootstrap.
      The open-source Kubernetes 1.4 release, which debuted Sept. 26, provides users with a host of enhanced security capabilities for container deployment and orchestration.

      Kubernetes originated at Google and is now part of the Cloud Native Computing Foundation, benefiting from the contributions of multiple vendors.

      Among the new features in Kubernetes 1.4 is TLS bootstrap, which is designed to improve the use of encryption for data in motion across a cluster. TLS (Transport Layer Security) is widely used on the internet today for encryption.

      “The TLS bootstrapping work done in Kubernetes 1.4 is a step toward automating the addition of new hosts to the Kubernetes cluster,” Clayton Coleman, Red Hat’s lead architect for OpenShift, explained to eWEEK.

  • Kernel Space

    • Why kernel development still uses email

      In a world full of fancy development tools and sites, the kernel project’s dependence on email and mailing lists can seem quaintly dated, if not positively prehistoric. But, as Greg Kroah-Hartman pointed out in a Kernel Recipes talk titled “Patches carved into stone tablets”, there are some good reasons for the kernel community’s choices. Rather than being a holdover from an older era, email remains the best way to manage a project as large as the kernel.

      In short, Greg said, kernel developers still use email because it is faster than any of the alternatives. Over the course of the last year, the project accepted about eight changes per hour — every hour — from over 4,000 developers sponsored by over 400 companies. It must be doing something right. The list of maintainers who accepted at least one patch per day contains 75 entries; at the top of the list, Greg himself accepted 9,781 patches over the year. Given that he accepts maybe one third of the patches sent his way, it is clear that the patch posting rate is much higher than that.

      Finding tools that can manage that sort of patch rate is hard. A poor craftsman famously complains about his tools, Greg said, but a good craftsman knows how to choose excellent tools.

      So which tools are available for development work? Greg started by looking at GitHub, which, he said, has a number of advantages. It is “very very pretty” and is easy to use for small projects thanks to its simple interface. GitHub offers free hosting and unlimited bandwidth, and can (for a fee) be run on a company’s own infrastructure. It makes life easy for the authors of drive-by patches; Greg uses it for the usbutils project and gets an occasional patch that way.

    • Fireside Chat with David Rusling and Linus Torvalds
    • The Problem with Linux Kernel Documentation, and How We’re Fixing it

      The Linux Kernel has one of the biggest communities in the open source world; the numbers are impressive: over 4,000 contributors per year, resulting in about 8 changes per hour. That results in 4,600 lines of code added every day and a major release every 9-10 weeks. With these impressive numbers, it’s impossible for a traditional printed book to follow the changes because by the time the book is finally written, reviewed and published, a lot of changes have already merged upstream. So, the best way to maintain updated documentation is to keep it close to the source code. This way, when some changes happen, the developer that wrote such changes can also update the corresponding documents. That works great in theory, but it is not as effective as one might think.

    • How To Use Systemd For Application Sandboxing & How To Easily Crash Systemd

      Another one of the interesting systemd.conf 2016 presentations in Berlin was a talk by Djalal Harouni of EndoCode for using systemd to carry out application sandboxing.

    • Graphics Stack

      • Experimental Unity Vulkan Demos For Linux

        Some of the exciting news this week was Unity releasing their Vulkan renderer in preview form and this initial debut did contain Linux support. There are now some unofficial Unity demos built for Linux with the Vulkan renderer enabled.

        Levi Bard is hosting some sample Linux player builds with the Vulkan preview support enabled. There are two demos currently offered: Corridor Lighting Example and Viking Village. There are both x86 and x86_64 builds and should work with newer Vulkan Linux drivers.

      • The Talos Principle native radv vulkan amdgpu (SI)
      • We Might Never See A New OpenGL Version, At Least Not For A Long Time

        During past Khronos press briefings about OpenGL/Vulkan and in other communications, while Vulkan is the organization’s big graphics API focus, it was implied during these conversations that OpenGL would continue to march to its own beat and evolve as needed. While OpenGL continues to be significantly used by cross-platform graphics application/game developers, it turns out there might not be a new official version for a long time – if ever.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • KDE neon Korean Developer Edition (… and future CJK Edition?)

        Among many other locations around the planet, the local community in Korea is planning to put on a KDE 20th Anniversary birthday party in Seoul on October 14th. The KDE neon Korean Developer Edition was directly created on request for this event, to be made available to attendees.

        That said – this is actually something we’ve been wanting to do for a while, and it’s not just about Korean.

        None of the bits that make up the new image are new per-se; KDE has supported Korean for a long time, both with foundational localization engineering and regular maintenance activity. And as of the Plasma 5.6 release, our Input Method Panel is finally bundled with the core desktop code and gets automatically added to the panel on first logon in a locale that typically requires an input method.

        Yet it’s pretty hard to keep all of this working well, as it requires tight integration and testing across an entire stack, with some parts of the whole living upstream or downstream of KDE.org. For example: After we attempted to make the Plasma panel smarter by making it auto-add the Input Method Panel depending on locale, we couldn’t actually be sure it was working as desired by our users, as it takes time for distros to get around to tuning their dependency profiles and for feedback from their users to loop back up to us. It’s a very long cycle, with too many opportunities to lose focus or domain knowledge to turnover along the way.

      • Qt Champion nominations for 2016 now open
      • MediaWikiToLearn Hackathon + Editathon
      • Mobile IMG 20160930-021219
      • KIO GDrive 1.0 released

        I’m happy to finally announce the first stable release of KIO GDrive. KIO GDrive enables KIO-aware applications (such as Dolphin, Kate or Gwenview) to access and edit Google Drive files on the cloud.

        Given the lack of an official Google Drive client for Linux, KIO GDrive can be used as replacement for managing your Drive files with Dolphin. Even better, you don’t have to use space on your disk! The files are still in the cloud, yet you can edit them as if they were locally stored on your machine.

        For example you can edit a text file in Kate or crop an image in Gwenview, and just save those files as you normally would. The edited file will be automatically uploaded on the cloud. This will also work with non-KIO applications, for example Libreoffice, but in this case a dialog will explicity ask if you want to upload the new version of the file.

      • In Defence for Permissive Licences; KDE licence policy update
      • My Adventures and Misadventures in Qt Quick Land

        I have the worst sense of timing when adopting technologies and always find myself at transition points. Python 2 to 3, OpenGL fixed to programmable pipeline, and Qt widgets to Qt Quick. Perhaps the most significant thing to come out of Nokia’s short stewardship of Qt, Qt Quick (originally Qt QUICK, or Qt User Interface Creation Kit) is perhaps the biggest, and somewhat most controversial, change in Qt in recent years. Unless The Qt Company makes a highly unlikely U-turn, it is also probably Qt’s future (without discarding regular widgets, of course). It is also definitely the future for Plasma, the KDE desktop. In fact, it is already its present. Of course, I just had to sink my teeth into it, if only briefly. Since I still wasn’t yet set firmly in the ways of the Widget, I thought it might be easier to wrap my head around this new way of coding. I was both wrong and right. Here is my story.

      • Qt on Android: How to create an Android service using Qt
      • Using Qt Quick for prototyping
      • KDAB talks at QtCon 2016
      • Tomorrow is a New Day – Joining Blue Systems
      • [Krita] New Stable and Development Builds
      • Kubuntu 16.10 Beta 2 is here! Test Test Test! And then more Testing
      • RFC: How to fix a tricky leak in QFormLayout?
      • Kirigami 1.1
      • Kirigami 1.1
      • Emoji restyling

        I started to restyling and try to finish the Emoji.

    • GNOME Desktop/GTK

      • An Introduction to GNOME Boxes (virtualization) on Linux

        GNOME Boxes is a system virtualization application that is a core part of the GNOME desktop environment. Based on the QEMU machine emulator, it offers a simplified and user-friendly approach to the whole OS virtualization idea. This post is just an introduction to its capabilities and a statement that it finally works in other distributions besides Fedora.

        Once you launch Boxes, you are greeted with a message to press the “New” button to add a new system. Doing so will let the application quickly search in your home folder to find any supported image files. You may either select from the list, navigate your disk, or even insert a URL address.

  • Distributions

    • This Week in Solus – Install #36

      Welcome to the 36th installation of This Week in Solus.

    • Reviews

      • Sabayon Bizarre But Useful

        Sabayon, which gets its name from the the Italian egg-derived dessert known as zabaione, is a distribution that we don’t hear too much about these days, although the British Linux press gave it some love a few years ago. It was unassuming…with a hint of mystery. I tried it back then, when I was still fairly new to actually using Linux and thought it was a nice effort, but a little too weird. That wasn’t their fault; that was mine. I was still clinging sharply to Ubuntu at the time. Plus, I was a bit more shallow in those days because I was really set on the idea that an operating system had to look good before I would really put some hours into using it. I still am in many respects. I’m just not crazy about boring.

        So when I approached Matt with the idea of documenting a revisitation to Sabayon, he greenlighted it immediately. Team Sabayon has been very busy. It still has a hint of mystique that I find very attractive. It’s got a lot of applications at default and offers you a lot of decision-making power as well. More on that later.

    • Screenshots/Screencasts

    • OpenSUSE/SUSE

      • Mesa, Kernel, GNOME, KDE apps update in Tumbleweed

        Another week and another five snapshots for openSUSE’s rolling release Tumbleweed produced updates for openSSL, GNOME 3.22, Mesa and the Linux Kernel.

        Dominique Leuenberger, a core member of the openSUSE release team, informed subscribers of the openSUSE Factory Mailing List about some of the packages that were updated during the week and some packages users can expect over the next couple of weeks.

        Snapshot 20160928 produced an update for openSSL to 1.0.2j, which patched a high severity Online Certificate Status Protocol vulnerability. The same snapshot also gave users the updated 4.7.5 Linux Kernel.

    • Red Hat Family

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu Phone pre OTA 14 quick view
          • Canonical Brings Kubernetes to Ubuntu

            It appears as if the guys and gals at Canonical have been working overtime to stay ahead in the cloud, where its Linux distribution, Ubuntu, is the decisive winner as far as the number of deployments goes. Evidently, they’d like to keep it that way. On Tuesday the company unveiled its own fully supported enterprise distribution of Kubernetes. This comes only a week after the company announced it had worked with IBM to bring its own implementation of OpenStack to Big Blue’s hardware.

            If you don’t know, Kubernetes is a container tool for DevOps that was originally developed by Google but which is now managed by the Cloud Native Computing Foundation and available under the Apache open source license. To develop its own distribution, Ubuntu copied its IBM mainframe move and worked with the source, in this case Google. They’ve come up with what Canonical founder Mark Shuttleworth is calling a “pure, vanilla version” of the platform.

          • Flavours and Variants

            • Mintbox Mini Pro: A Cheap Linux Machine With Compelling Specs

              The Mintbox Mini has been received a major hardware upgrade and it is now called Mintbox Mini Pro. The Linux machine comes at a price of $395 and features an all-metal casing which eliminates the need for a cooling fan. Significant bumps having been given to the storage, RAM, processor, wireless, and other hardware components.

            • budgie-remix 16.10 beta 2 is now available
            • Addressing FUD

              I find it really despicable to see developers, maintainers and communities from competing projects create and spread FUD about Linux Mint in an effort to promote their own distribution.

              At this cost, getting more users is futile. Of course, a project needs a large audience to succeed, but what matters the most is how happy your users are. If you want your project to work, make it great. If you want to promote it, highlight your own work and efforts.

              At the time when Ubuntu was dominant in the Linux market, it continuously received a huge amount of FUD. It was unfair, it was stupid and frankly, it was embarrassing for the entire Linux community. It still is and it has gotten worse for us because we’re now receiving a significant chunk of that FUD, some of it coming from the very same project who already suffered so much from it.

            • Monthly News – September 2016

              Many thanks to you all for your help, support and donations. This month has been very exciting for us because the release cycle was over, the base jump to the new LTS base was achieved, we had plenty of ideas to implement, nothing got in our way and we could focus on development. Not only that but the development budget was high, and that’s thanks to you, and it tightens the bonds a little more between us. It makes everybody happy, some developers start looking for a new laptop, others use the money to relax. No matter how it’s used, it always helps, and because it helps them, it helps us.

              Another team was set up recently to gather artists and web designers who are interested in improving our websites. This is a new team, with 9 members who just started to get to know each others. It’s hard to predict how the team will evolve, or if it will be successful. It’s hard to know also who in this team might end up being central to our designs and maybe not only to our websites but also to our software, our user interfaces.

  • Devices/Embedded

Free Software/Open Source

  • Trainline creates open source platform to help developers deploy apps and environments in AWS

    The Trainline, the independent rail ticket retailer, has created an open sourced standardised way for its developers to deploy and manage individual applications and environments in Amazon Web Services’ public cloud.

    The company has 150 staff in its development area, who focus on improving user experience, and in order to ensure that its underlying infrastructure wasn’t a constraint on time to market, the firm recently migrated all of its development, staging, UAT and production environments from a legacy private data centre to Amazon’s public cloud.

  • Trainline creates open source platform to let developers test apps in AWS
  • Yahoo open-sources machine learning porn filter

    Yahoo is the latest tech company to open source its computer vision code. The beleaguered outfit’s application for it? Filtering porn. Yahoo hopes that its convolutional neural net (CNN) will empower others to better guard innocent eyes, but admits that because of the tech’s very nature (and how the definition of “porn” can vary wildly), that the CNN isn’t perfect.

    “This model is a general purpose reference model, which can be used for the preliminary filtering of pornographic images,” a post on the Yahoo Engineering Tumblr says. “We do not provide guarantees of accuracy of output, rather, we make this available for developers to explore and enhance as an open source project.” The code is available on Github at the moment, and if you need any testing material, well, there isn’t exactly a shortage of it on Tumblr. Just ask Indonesia.

  • Jahshaka VR alpha release

    We have finally managed to release the alpha version of the Jahshaka VR authoring toolkit under the GPL and wanted to invite people to jump in, look at the code and help out. We have been working on it for 6 months now and its starting to stabilize.

  • Events

    • The Linux Foundation Announces Session Lineup for ApacheCon(TM) Europe
    • OpenShift Commons Gathering event preview

      We’re just two months out from the OpenShift Commons Gathering coming up on November 7, 2016 in Seattle, Washington, co-located with KubeCon and CloudNativeCon.

      OpenShift Origin is a distribution of Kubernetes optimized for continuous application development and multi-tenant deployment. Origin adds developer and operations-centric tools on top of Kubernetes to enable rapid application development, easy deployment and scaling, and long-term lifecycle maintenance for small and large teams. And we’re excited to say, the 1.3 GA release of OpenShift Origin, which includes Kubernetes 1.3, is out the door! Hear more about the release from Lead Architect for OpenShift Origin, Clayton Coleman.

  • Web Browsers

    • Mozilla

      • Firefox ready to block certificate authority that threatened Web security

        The organization that develops Firefox has recommended the browser block digital credentials issued by a China-based certificate authority for 12 months after discovering it cut corners that undermine the entire transport layer security system that encrypts and authenticates websites.

        The browser-trusted WoSign authority intentionally back-dated certificates it has issued over the past nine months to avoid an industry-mandated ban on the use of the SHA-1 hashing algorithm, Mozilla officials charged in a report published Monday. SHA-1-based signatures were barred at the beginning of the year because of industry consensus they are unacceptably susceptible to cryptographic collision attacks that can create counterfeit credentials. To satisfy customers who experienced difficulty retiring the old hashing function, WoSign continued to use it anyway and concealed the use by dating certificates prior to the first of this year, Mozilla officials said. They also accused WoSign of improperly concealing its acquisition of Israeli certificate authority StartCom, which was used to issue at least one of the improperly issued certificates.

        “Taking into account all the issues listed above, Mozilla’s CA team has lost confidence in the ability of WoSign/StartCom to faithfully and competently discharge the functions of a CA,” Monday’s report stated. “Therefore we propose that, starting on a date to be determined in the near future, Mozilla products will no longer trust newly issued certificates issued by either of these two CA brands.”

      • Firefox gains serious speed and reliability and loses some bloat

        There’s no way around it. Firefox has struggled. As of this writing, Firefox 47 is the top of the Firefox market share heap at a scant 3.14 %. Given that Chrome 52 holds 23.96 % and IE 11 holds 17.74 %, the chances of Firefox displacing either, anytime soon, is slim. If you scroll way down on the browser market share listing, you’ll notice Firefox 49 (the latest release) is at .19 %. Considering 49 is the stable release candidate that was only recently unleashed, that is understandable (to a point).

        Thing is, Firefox 49 is a really, really good browser. But is it good enough to give the open source browser any significant gains in the realm of market share? Let’s take a look at what the Mozilla developers have brought to the fore with the latest release of their flagship browser and see how much hope it holds for the future of the software that was once leader among its peers.

      • Mozilla’s Project Mortar Wants Pepper API Flash & PDFium In Firefox

        This week word of Mozilla’s “Project Mortar” surfaced, which aims to explore the possibility of bringing the PDFium library and Pepper API based Flash plugin into Firefox. This project is being led by various Mozilla engineers.

        Mozilla is so far developing Project Mortar in private while they plan to open it up in the future.

  • SaaS/Back End

    • What’s Happening in OpenStack-Ansible (WHOA) – September 2016

      Welcome to the fourth post in the series of What’s Happening in OpenStack-Ansible (WHOA) posts that I’m assembling each month. OpenStack-Ansible is a flexible framework for deploying enterprise-grade OpenStack clouds. In fact, I use OpenStack-Ansible to deploy the OpenStack cloud underneath the virtual machine that runs this blog!

  • Pseudo-Open Source (Openwashing)

  • BSD

    • Next Tech Book

      Instead, I’m starting a book on OpenBSD’s web stack.

  • FSF/FSFE/GNU/SFLC

    • ​For lessons on digital swaraj, Gandhi is an open source

      Gandhi engaged with the copyright law to subvert the economics he disagreed with, and to infuse it with values close to his heart, wrote a US law professor in a 2013 paper titled ‘Gandhi and Copyright Pragmatism’. “Toward the later part of his life, he also came to deploy copyright law to curtail market-based exploitation when he could. In many ways then, Gandhi’s approach did with copyright law what open source licensing and the Creative Commons Project would begin doing with copyright in the 21st century,” wrote Shyamkrishna Balganesh of University of Pennsylvania Law School.

      Now, consider the life and work of Richard M Stallman (callsign RMS in the geek-verse). A champion of the movement for Free and Open Source Software (FOSS), he is more commonly known as the pioneer of ‘Copyleft’. “If you want to accomplish something in the world,” says his Wikiquote page, “idealism is not enough — you need to choose a method that works to achieve the goal. In other words, you need to be pragmatic.” RMS was among the first to call for a free online encyclopaedia. Wikipedia, no surprise, is governed by Creative Commons licensing.

    • GNU project- the free software movement turns 33

      On September 27, 1983 he had announced the launch of GNU, which was a free software replacement for UNIX.

  • Openness/Sharing/Collaboration

Leftovers

  • The makers of the video game “No Man’s Sky” are under investigation for false advertising

    No Man’s Sky was billed as a revolutionary video game—one that contained such multitudes of programmatically generated planets and animals that the developers said even they weren’t sure what players would find in its vast universe.

  • Science

    • Sexual harassment in STEM: ‘It’s tragic for society’

      These are the experiences of three women who spoke to CNN about a culture of pervasive sexual harassment in academia, especially in the sciences. They were harassed by different men, throughout different parts of their education and careers.
      “We see it in anthropology, we see it in philosophy, we see it in physics, we see it in the humanities, we see it in the social sciences. We see it in engineering in particular. Astronomy just happened to be, sort of, first” to get attention, said Alessondra Springmann, a rocket scientist at the University of Arizona who studies asteroids and comets.
      Distinguished scientists in the field of astronomy have been making headlines for harassing students they are supposed to be advising.
      And it’s happening at the same time as a nationwide push to get more American women into science careers. Young girls are increasingly encouraged to embrace STEM — the acronym for science, technology, engineering and mathematics — in elementary and middle school.

    • 9 Bizarre and Surprising Insights from Data Science

      Data is the world’s most potent, flourishing unnatural resource. Accumulated in large part as the byproduct of routine tasks, it is the unsalted, flavorless residue deposited en masse as organizations churn away. Surprise! This heap of refuse is inherently predictive. Thus begins a gold rush to dig up insightful gems.

      Does crime increase after a sporting event? Do online daters more consistently rated as attractive receive less interest? Do vegetarians miss fewer flights? Does your e-mail address reveal your intentions?

  • Health/Nutrition

    • Clinical Trial Reporting Biased; Full Disclosure, Transparency Needed, Speakers Say

      A conference on clinical drug trials held today shed a harsh light on the availability and honesty of clinical trial reports. Many factors concur to possible distortion of results, speakers said, calling for more stringent obligations to provide all data for analysis. They also noted legislative efforts to tackle the issue. Speakers also pointed out a growing trend for pharmaceutical companies to conduct clinical trials in developing countries.

    • Developing Countries Should Be Able To Shield Their Markets From Cheap Food Imports, Panel Says

      On the first day of the World Trade Organization Public Forum, which took place from 27-29 September, a panel organised by Our World Is Not for Sale (OWINFS), and The Right to Food campaign, looked at ways to reduce hunger and achieving the right to food in Africa, Asia, and the Middle East. In particular, the panel considered the possibility of developing countries investing in domestic production for food security.

    • DEA has kratom users holding their breath, lawmakers write more letters

      Starting today, the US Drug Enforcement Administration is free to list a popular herbal supplement called kratom as a Schedule I controlled substance. This would put kratom in the same lineup as heroin and make its sale and use a felony. But, in statements to the press, the agency said it has no timetable for officially listing kratom—it could be next week or longer—leaving users on the edge of their seats.

      Since the DEA announced its plan to ban kratom at the end of last month, thousands of users have frantically sought to reverse the decision, as well as buy up as much of the drug as they can. Users claim kratom, or Mitragyna speciosa, a tree in the coffee family, is effective at treating chronic pain, as well as depression, anxiety, PTSD, and other ailments. The main active ingredients in kratom are mitragynine and 7-hydroxymitragynine, which can interact with opioid receptors in the brain. While the data to back up medical use of the plant is scant, users are adamant that it’s a lifesaver, allowing them to kick deadly and all-too-common opioid addictions.

  • Security

    • Report: Linux security must be upgraded to protect future tech

      The summit was used to expose a number of flaws in Linux’s design that make it increasingly unsuitable to power modern devices. Linux is the operating system that runs most of the modern world. It is behind everything from web servers and supercomputers to mobile phones. Increasingly, it’s also being used to run connected Internet of Things (IoT) devices, including products like cars and intelligent robots.

    • security things in Linux v4.6

      Hector Marco-Gisbert removed a long-standing limitation to mmap ASLR on 32-bit x86, where setting an unlimited stack (e.g. “ulimit -s unlimited“) would turn off mmap ASLR (which provided a way to bypass ASLR when executing setuid processes). Given that ASLR entropy can now be controlled directly (see the v4.5 post), and that the cases where this created an actual problem are very rare, means that if a system sees collisions between unlimited stack and mmap ASLR, they can just adjust the 32-bit ASLR entropy instead.

    • Let’s Encrypt Wants to Help Improve the CA Model

      Let’s Encrypt, a non-profit effort that brings free SSL/TLS certificates to the web, was first announced in November 2014 and became a Linux Foundation Collaborative Project in April 2015. To date, it has provided more than 5 million free certificates.

      While having an SSL/TLS certificate to encrypt traffic is an important element of web security, it’s not the only one, said Josh Aas, executive director of the Internet Security Research Group and leader of Let’s Encrypt.

      “There is a lot in the total picture of what makes a website secure, and we can do a lot to help a certain part of it,” he said in a video interview.

    • How to Throw a Tantrum in One Blog Post

      The systemd team has recently patched a local denial of service vulnerability affecting the notification socket, which is designed to be used for daemons to report their lifecycle and health information. Some people have used this as an opportunity to throw a fresh tantrum about systemd.

  • Defence/Aggression

    • Rodrigo Duterte compares himself to Hitler and pledges to ‘slaughter three million drug addicts’

      The Philippine President has likened his national crackdown on drug crime to the Holocaust, saying he would be “happy” to kill as many addicts as Hitler slaughtered Jews.

      Rodrigo Duterte said he had been compared to a “cousin of Hitler” by critics during a press conference in southern Davao city on Friday. “Hitler massacred three million Jews… there’s three million drug addicts. I’d be happy to slaughter them,” he said.

      At least six million Jews and other minority groups are known to have been killed by the Nazis before and during the second world war.

      Since taking up office in June, Mr Duterte has overseen a vicious anti-drug campaign in which more than 3,000 suspected drug dealers and users are understood to have been killed by police operations or vigilantes. The bodies of those killed are often left in the streets with signs listing their crimes.

  • Finance

    • Panic, Anxiety Spark Rush to Build Luxury Bunkers for L.A.’s Superrich

      Given the increased frequency of terrorist bombings and mass shootings and an under-lying sense of havoc fed by divisive election politics, it’s no surprise that home security is going over the top and hitting luxurious new heights. Or, rather, new lows, as the average depth of a new breed of safe haven that occupies thousands of square feet is 10 feet under or more. Those who can afford to pull out all the stops for so-called self-preservation are doing so — in a fashion that goes way beyond the submerged corrugated metal units adopted by reality show “preppers” — to prepare for anything from nuclear bombings to drastic climate-change events. Gary Lynch, GM at Rising S Bunkers, a Texas-based company that specializes in underground bunkers and services scores of Los Angeles residences, says that sales at the most upscale end of the market — mainly to actors, pro athletes and politicians (who require signed NDAs) — have increased 700 percent this year compared with 2015, and overall sales have risen 150 percent. “Any time there is a turbulent political landscape, we see a spike in our sales. Given this election is as turbulent as it is, we are gearing up for an even bigger spike,” says marketing director Brad Roberson of sales of bunkers that start at $39,000 and can run $8.35 million or more (FYI, a 12-stall horse shelter is $98,500).

  • AstroTurf/Lobbying/Politics

    • USA TODAY’s Editorial Board: Trump is ‘unfit for the presidency’

      In the 34-year history of USA TODAY, the Editorial Board has never taken sides in the presidential race. Instead, we’ve expressed opinions about the major issues and haven’t presumed to tell our readers, who have a variety of priorities and values, which choice is best for them. Because every presidential race is different, we revisit our no-endorsement policy every four years. We’ve never seen reason to alter our approach. Until now.

      This year, the choice isn’t between two capable major party nominees who happen to have significant ideological differences. This year, one of the candidates — Republican nominee Donald Trump — is, by unanimous consensus of the Editorial Board, unfit for the presidency.

      From the day he declared his candidacy 15 months ago through this week’s first presidential debate, Trump has demonstrated repeatedly that he lacks the temperament, knowledge, steadiness and honesty that America needs from its presidents.

      Whether through indifference or ignorance, Trump has betrayed fundamental commitments made by all presidents since the end of World War II. These commitments include unwavering support for NATO allies, steadfast opposition to Russian aggression, and the absolute certainty that the United States will make good on its debts. He has expressed troubling admiration for authoritarian leaders and scant regard for constitutional protections.

    • A principled option for U.S. president: Endorsing Gary Johnson, Libertarian

      As Nov. 8 looms, a dismayed, disconsolate America waits and wonders: What is it about 2016?

      How has our country fallen so inescapably into political and policy gridlock? How did pandering to aggrieved niche groups and seducing blocs of angry voters replace working toward solutions as the coin of our governing class? How could the Democratic and Republican parties stagger so far from this nation’s political mainstream?

      And the most pressing question: What should tens of millions of voters who yearn for answers do with two major-party candidates they disdain? Polls show an unprecedented number of people saying they wish they had another choice.

    • Jill Stein Eagerly Pointed Out All The Holes In The First Debate

      After being escorted away from Hofstra University ahead of the first presidential debate on Monday, Green party candidate Jill Stein took to Twitter to share her views as the two major party candidates faced off. Stein fell far short of the Commission on Presidential Debate’s requirement that candidates must be polling at 15 percent or more to earn a spot on the stage — Stein was averaging 3.2 percent, according to the commission. But still, she jumped on the opportunity to have her policies lined up next to Hillary Clinton’s and Donald Trump’s. Ultimately, Stein’s tweets made me wish she had debated on the main stage to present her extremely progressive politics.

      Stein’s policies skew much farther left than those of Clinton or Trump on nearly every issue — and even farther left than many of Vermont Sen. Bernie Sanders’ proposals. Given the impact that Sanders arguably had on Clinton’s positions throughout the primaries, it would have been interesting to see if Stein’s presence on the debate stage exerted a leftward pull on not only Clinton, but Trump as well. But more importantly, it would have been a service to the viewing public to hear from someone other than the major-party candidates, with whom the electorate is not thrilled.

    • Poll: Desire for major third party grows

      Most Americans say that the country needs a third major political party according to a Gallup poll released Thursday.

      Fifty-seven percent say that the two major parties aren’t enough to represent the country’s voters.

      The majority opinion represents an increase from recent elections. In 2012, some 46 percent said a third party was needed.

      Those who currently want to see another major party include 73 percent of independents, 51 percent of Republicans and 43 percent of Democrats.

    • Ukip denies that Farage is coaching Donald Trump for next debate

      Ukip has denied reports that Nigel Farage has flown to the US to coach the Republican presidential nominee, Donald Trump, for his next debate with Hillary Clinton.

      Farage hinted in his farewell speech at Ukip’s conference last month that he might return to Trump’s side following an appearance with the Republican candidate in August, saying: “Who knows, I may even go back to the United States of America at some point.” Ukip sources at the conference also confirmed Farage would travel to the US to help support Trump before the election.

    • Leaked Tape Exposes Hillary Mocking Bernie’s Supporters in Front of Big Donors

      The Democratic nominee said that Bernie’s supporters believed in a fictional world and are “living in their parents’ basement” hoping the United States becomes “Scandinavia, whatever that means.”

      A leaked audio recording of Hillary Clinton from a high-dollar fundraiser in February shows the Democratic nominee mocking not just progressive firebrand Bernie Sanders, but also the cadre of young supporters who favored the insurgent candidacy of the Vermont Senator, a revelation that is bound to have damning ramifications for Clinton’s campaign.

  • Censorship/Free Speech

    • [Older] Facebook thanks Norway PM after censorship row [Ed: publicity stunt after an ugly act of revisionism by censorship]

      After a protracted debate on censorship and Facebook’s outsized role in today’s media world, the social media giant has thanked Prime Minister Erna Solberg for raising “important issues”.
      Facebook restored a post by Solberg which it had taken down over an iconic Vietnam War photo of a naked girl escaping a napalm bombing. The world’s leading social network later backtracked on the decision to remove the PM’s post, which is believed to be the first such online censorship involving a government leader.

    • Evidence of Feared Israel-Led Censorship as Zuckerberg Facebook Bans Palestinian Editors
    • To Stage Or Not To Stage: Theatre Censorship in India

      In December 1872, the Calcutta National Theatrical Society staged Nil Darpan, a play written by Dinabandhu Mitra, that exposed the atrocities committed by British indigo planters on Indian farmers. While the play received glowing reviews in most newspapers with nationalistic leanings, it was expectedly criticised by the British press. There was a demand that the play be banned. Other plays followed, criticising and making fun of the white rulers. Finally, in 1876, came the Dramatic Performances Act, putting restrictions on the public performance of plays.

      Cut to 2016. Nearly seven decades after the country’s independence from British rule, actor-director Amol Palekar moved the Mumbai high court in September, challenging rules framed under provisions of the Bombay Police Act, 1951, which make pre-censorship of drama scripts mandatory by the Maharashtra State Performance Scrutiny Board. In his petition, Palekar said the rules framed under the provisions of the Act were arbitrary and violated citizens’ fundamental right to freedom of expression, guaranteed under the Constitution. However, on September 26, the state government told the Bombay High Court that in March this year, the then commissioner of police had repealed the rule which required prior scrutiny of theatre scripts. Palekar has not replied to HT’s email requesting an interview. Repeated calls to advocate Sugandh Deshmukh, who is representing him in court, also went unanswered. But veteran theatre personality Alyque Padamsee who had filed an affidavit in support of Palekar’s petition said he is not surprised by the court proceedings. “It is the way bureaucracy works,” he says.

    • Your right to read trumps censorship

      “I Know Why the Caged Bird Sings.” “To Kill a Mockingbird.” “Harry Potter and the Sorcerer’s Stone.”

      Three very different books that share a common thread.

      Each year, individuals across the country take it upon themselves to decide what books you should and should not read. These are three that apparently you should not.

      Yes, censorship and attempts at censorship are alive and well in 2016. In most instances, the censor is someone who is sincerely concerned about a societal issue and feels strongly that censoring a book, magazine, film or artwork will improve society, protect children, and restore their idea of moral values.

      However, the First Amendment to the United States Constitution gives each of us the right to read, view and listen to things that others might find offensive. No one, no matter how well-intentioned, can take away that right.

    • Recreation of removed art echoes 40-year-old accusations of censorship

      A piece of public art is set to be erected in the Plateau next week, 40 years after its predecessor was torn down amid accusations of censorship towards city hall – accusations being echoed towards the current mayor.

      A reclining cross, designed by artists Pierre Ayot, once sat at the corner of Park and Pine, but it didn’t last long.

      Longtime resident Michael Hendricks remembered how in 1976, just before Montreal would host the Olympic Games, then-Mayor Jean Drapeau ordered 16 large works of art torn down.

      “For us, it was a shock,” he said. “It was so beautiful.”

      “It was done in the night, a sneaky dirty trick and that was the end of it,” he added. “The artists weren’t respected, nobody was respected.”

      At the time, Drapeau called the artworks “indecent” because some of them criticized overspending on the Olympics.

    • Racist social media users have a new code to avoid censorship

      Racist online communities have developed a new code for racial, homophobic and bigoted slurs in an attempt avoid censorship, according to an online report from Buzzfeed News.

      The code, using terms like Google, Skittle, and Yahoo as substitutes for offensive words describing blacks, Muslims and Mexicans, appears to be in use by various accounts on Twitter and elsewhere. Many tweets using the code are doing so in support of Republican Presidential nominee Donald Trump.

  • Privacy/Surveillance

    • The U.S. presidential candidates on technology, privacy issues

      Stein: “End-to-end encryption should be an internet standard, just like SSL for financial transactions.”

    • ‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files

      The hacking group responsible for stealing a large cache of National Security Agency hacking tools is very upset that no one seems to be bidding on their pilfered files.

      Early Saturday morning, the person or group which calls itself “TheShadowBrokers” authored another bizarre rant, expressing their annoyance at the seeming lack of interest in ponying up bitcoins to release the full set of stolen files.

    • Hackers Angry That People Don’t Want To Pay For The NSA Tools They Stole
    • Spotify’s 40 Million Tunes Won’t Go Far With CD-Happy Japanese [Ed: music that spies on the listeners]

      On a recent muggy afternoon in Tokyo, 21-year old Shintaro Naganuma joined several hundred customers browsing CDs at the eight-story downtown outpost of music retail chain Tsutaya.

      Having discovered a couple of new rock artists on YouTube, the third-year university student hit Tsutaya Co.’s flagship store in trendy Shibuya to look up their albums. That process encapsulates the dilemma now facing Spotify Ltd.’s head Daniel Ek, who on Thursday presided over the music streaming service’s long-awaited entry into the world’s second-largest music market.

      On the one hand, the nation’s consumers have grown accustomed to finding music or listening casually through smartphones, which should help the Swedish company attract users for its free ad-supported version. But when it comes time to hand over the cash, most people in Japan continue to buy CDs and even vinyl. That’s largely because record labels remain wary of signing away their music to streaming services.

    • The US government can’t protect its dirtiest laundry, so what makes anyone think a government is capable and willing to protect data about you?

      Governments collect insane amounts of data about ordinary people, and officials get caught red-handed again and again using governmental surveillance networks to stalk private relations. It’s been the NSA, it’s been the FBI, and now it’s the police abusing collected data. The U.S. government has shown it can’t even protect its own dirtiest laundry, so what makes anyone think any government is willing and capable of protecting the data of a random citizen?

      Yesterday, there was yet another story breaking about abuse of surveillance, as police was discovered abusing law enforcement surveillance to spy on basically anybody they were personally interested in. It’s not the first story and it won’t be the last.

    • Networks of Control by Wolfie Christl and Sarah Spiekermann

      The collection, analysis and utilization of digital information based on our clicks, swipes, likes, purchases, movements, behaviors and interests are now part of everyday life. But, while individuals become increasingly transparent, companies take control of the recorded data. Wolfie Christl and Sarah Spiekermann show in their book “NETWORKS OF CONTROL” how today’s networks of corporate surveillance are constantly tracking, profiling, categorizing and rating the lives of billions – across platforms, devices and life contexts.

    • On Phone Numbers and Identity

      Coinbase sees a lot of motivated attackers, it’s one of the things that makes working in security at Coinbase so interesting. I want to deep dive into one recent attack for a few reasons: 1) when we share we all get stronger; 2) It was a really interesting way to end-run around a lot of traditional security protections and highlights, the extent of which personal and corporate systems are linked; 3) we found very little in the way of public discussion around this set of attack vectors and want to help move it from ‘theoretical’ to ‘this really happens’. To be crystal clear, I’m happy to say, no customer data or funds were lost or at risk of loss.

      Rewind back to 25 Aug. It’s around 9 AM when one of our high profile employees wrote in to our on call security engineer. The user said that something weird was happening with his phone.

    • GCHQ gave private Dutch data to Australian firm: report

      The private conversations of thousands of Dutch citizens have ended up in the hands of the Australian technology company Appen which develops software for converting speech into text.

      A report in the Dutch online site Volkskrant said telecommunications experts had opined that the only way this could have happened was by the British spy agency GCHQ tapping the information and then handing it over to Appen.

      Both Appen and GCHQ have been contacted for comment.

      According to Volkskrant, the matter came to light through a Dutch woman who had been employed by Appen in the UK. The company has four main offices: in Sydney, Seattle, San Rafael (California) and Davao City (the Philippines).

  • Civil Rights/Policing

    • Women competitors must wear hijabs at chess world championship, oddly awarded to Iran

      If you thought soccer’s world cup being awarded to baking-hot Qatar marked the zenith of sporting corruption, give FIDE a chance: the international chess federation’s forthcoming world championship is headed to Iran, and women players must wear the hijab to compete. UK tabloids quote leading women chess players as threatening to quit the tournament rather than obey.

    • Female chess players from around world outraged after being told to wear hijabs at tournament in Tehran

      The world’s top female chess players have reportedly been told they must wear hijabs if they wish to compete in next year’s world championships.

      The next Women’s World Championships are due to be held in Tehran, Iran in March 2017 but several Grandmasters have threatened to boycott the tournament if female players are forced to conform to the country’s strict clothing laws.

      Iran, which has been welcomed back into the diplomatic fold after signing a nuclear deal with the US and several other countries last year, is a theocratic country which strictly polices how women dress, behave and where they go.

    • Justice Watchdog Rips D.E.A.’s Use of Confidential Sources

      The Drug Enforcement Administration is running a freewheeling confidential sources program that leaves the agency vulnerable to fraud and constitutional abuses, according to an audit by the Department of Justice’s Inspector General (OIG).

      While DEA officials boast that the use of informants is the “bread and butter” of their enforcement, the agency does not adequately oversee their activities. Nor does it sufficiently track the payments made to them, the investigation found.

      The lack of oversight, according to the report: “exposes the agency to an unacceptably increased potential for fraud, waste, and abuse, particularly given the frequency with which DEA offices utilize and pay confidential sources.”

      Over the last five years, the DEA has employed more than 18,000 sources, paying them roughly $237 million. The inspector general stated, however, that the agency is unable to analyze the quality of information they provide.

    • Ex-drug squad chief gets three-year prison sentence

      Former head of the Helsinki Police anti-drug unit, Jari Aarnio, was handed a three-year unconditional prison sentence in Helsinki Appeal Court on Friday after being convicted of charges including malfeasance, fraud and accepting bribes.

    • Saudi Arabian teen arrested for online videos with American blogger

      A male Saudi Arabian teenager has been arrested in Riyadh over a series of online videos of conversations between him and a female Californian streaming-video star that went viral.

      A Riyadh police spokesperson, Colonel Fawaz Al-Mayman, said the teenager, known online as Abu Sin, was arrested on Sunday for engaging in “unethical behaviour” in videos with Christina Crockett, a popular broadcaster on the conversational live-streaming site YouNow. Abu Sin’s real name is not known.

      “His videos received many comments and many of the commenters of the general public demanded for him to be punished for his actions,” Al-Maymann added, according to the Saudi Gazette.

      The two amassed thousands of fans on the YouNow network, and later on YouTube after videos of the two speaking were uploaded there. The videos featured Abu Sin – a nickname given to him for his broken teeth – and Crockett communicating despite their significant language barriers.

      The popularity of the videos of the two of them surprised Crockett, she told the Guardian in an interview. As a broadcaster on YouNow, she can invite her fans to join her broadcasts on split-screen, which is known as “guesting”.

    • Kodi boxes are now a key target in the UK government’s piracy crackdown

      Kodi boxes and other devices which can be configured to enable the streaming of pirated content are to become key targets in a UK government intellectual property crime crackdown.

      Revealing the extent to which so-called “fully-loaded” Kodi boxes are being used to circumvent copy protection laws, the Federation Against Copyright Theft (FACT) has stated that half of its investigations currently centre around streaming devices using third party piracy software or add-ons.

      Set top boxes are of course legal, and the open-source Kodi software in its vanilla configuration is a harmless media centre. But, Kodi can be tweaked to facilitate the illegal streaming of premium content, ranging from current cinema releases to streams of cable TV channels.

  • Internet Policy/Net Neutrality

    • Last Formal Tie To Historic US Internet Control Is Cut

      “The federal court in Galveston, Texas denied the plaintiffs’ application for declaratory and injunctive relief. As of 1 October 2016, the IANA functions contract has expired.” This two-sentence statement from Assistant US Commerce Secretary for Communications and Information and National Telecommunication and Information Administration Administrator Lawrence Strickling ended an era of direct United States oversight over changes to the authoritative root zone of the internet domain name system, and as a contractor for a set of core internet databases.

  • Intellectual Monopolies

    • Copyrights

      • J.J. Abrams Can’t Stop Copyright Lawsuit Against Star Trek Fan-Film

        Paramount Pictures and CBS Studios have no plans to end their lawsuit against the crowdfunded Star Trek spin-off ‘Prelude to Axanar’. Director J. J. Abrams previously announced that the case would be dropped soon. However, paperwork filed in court this week reveals that the movie studios dismiss this claim as an irrelevant third party statement.

      • RIAA Label Artists & A-List Stars Endorse Megaupload In New Song

        MegaUpload is currently being portrayed by the MPAA and RIAA as one of the world’s leading rogue sites. But top music stars including P Diddy, Will.i.am, Alicia Keys, Snoop Dogg and Kanye West disagree and are giving the site their full support in a brand new song. TorrentFreak caught up with the elusive founder of MegaUpload, Kim Dotcom, who shrugged off “this rogue nonsense” and told us he wants content owners to get paid.

      • ‘When Is A Chair Just A Chair?’ And Other Annoying Copyright Questions

        Last year, the UK decided to repeal a part of its copyright law that enforced a drastically reduced copyright term for “industrially exploited artistic works” including “works of artistic craftsmanship” — in other words, the industrial design of manufactured objects that are primarily functional, like appliances and furniture. Rather than the full life-plus-seventy term, the copyright on such works was limited to 25 years from the date of manufacturing, making it somewhat closer to the US approach where functional designs can’t be copyrighted but can qualify for 15-year design patents. It was a sensible rule (at least far more sensible than giving them full copyright, even if giving them any at all is still questionable) that allowed industrial designs to rapidly enter the public domain and be used by multiple manufacturers for everything from inexpensive reproductions to retro-chic luxuries — or, in the eyes of IP maximalists and the furniture industry, it was a travesty of a rule that cruelly robbed aging designers and flooded the market with cheap knockoffs and brazen cash-grabs.

        In any case, the rule was repealed and it was repealed retroactively: furniture designs that had already entered the public domain were shoved back under life-plus-seventy copyrights, and the industry was given a grace period to purge their stocks. The repeal officially came into effect in July, and the transitional window will end in January. Then we can watch the lawsuits begin to flow — and they are going to involve a whole lot of wrangling over stupid, highly subjective questions, with lots of flowery protestations about artistry and judges thrust unwittingly into the role of critic, because the question of what exactly this law applies to is one big gray area.

10.01.16

Links 1/10/2016: Linux 4.7.6 and 4.4.23, Blender 2.78

Posted in News Roundup at 3:21 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Linux Unable To Boot Lenovo Yoga 900 & 900; Is Microsoft At Fault?

      The popular device developer Lenovo has verified the claims that Lenovo Yoga 900 and 900s unable to boot Linux OS but only Microsoft Windows 10. The new Lenovo convertible laptop, Lenovo Yoga 900 and 900s, would reject and decline any attempt to install Linux operating system, making users turn their heads to Microsoft as the suspect for this issue.

      [...]

      This issue about the OS started when an identity of BaronHK posted on Reddit about installing Linux on the latest Lenovo Yoga book in which BaronHK encountered being blocked by a locked solid state drive (SSD) which Linux cannot define itself, and come up to link the issue to Microsoft.

  • Server

    • Why Good Linux Sysadmins Use Markdown

      The Markdown markup language is perfect for writing system administrator documentation: it is lightweight, versatile, and easy to learn, so you spend your time writing instead of fighting with formatting.

      The life of a Linux system administrator is complex and varied, and you know that documenting your work is a big time-saver. A documentation web server shared by you and your colleagues is a wonderful productivity tool. Most of us know simple HTML, and can whack up a web page as easily as writing plain text. But using Markdown is better.

    • How to Effectively and Efficiently Edit Configuration Files in Linux

      Every Linux administrator has to eventually (and manually) edit a configuration file. Whether you are setting up a web server, configuring a service to connect to a database, tweaking a bash script, or troubleshooting a network connection, you cannot avoid a dive deep into the heart of one or more configuration files. To some, the prospect of manually editing configuration files is akin to a nightmare. Wading through what seems like countless lines of options and comments can put you on the fast track for hair and sanity loss.

      Which, of course, isn’t true. In fact, most Linux administrators enjoy a good debugging or configuration challenge. Sifting through the minutiae of how a server or software functions is a great way to pass time. But this process doesn’t have to be an exercise in ineffective inefficiency. In fact, tools are available to you that go a very long way to make the editing of config files much, much easier. I’m going to introduce you to a few such tools, to ease some of the burden of your Linux admin duties. I’ll first discuss the command-line tools that are invaluable to the task of making configuration more efficient.

  • Kernel Space

    • Linux 4.7.6

      I’m announcing the release of the 4.7.6 kernel.

      All users of the 4.7 kernel series must upgrade.

    • Linux 4.4.23
    • Linux Kernel 4.7.6 Is Out with MIPS and OCFS2 Improvements, Updated Drivers

      Today, September 30, 2016, renowned Linux kernel developer Greg Kroah-Hartman announced the release of the sixth maintenance update to the latest stable Linux 4.7 kernel series.

      Linux kernel 4.7.6 comes only five days after the release of the previous maintenance version, Linux kernel 4.7.5, and, according to the appended shortlog and the diff from the last update, it changes a total of 76 files, with 539 insertions and 455 deletions. In summary, it updates multiple drivers, adds improvements to various filesystems and hardware architectures, and improves the networking stack.

    • Linux Kernel 4.4.23 LTS Has ARM and MIPS Improvements, Updated Filesystems, More

      Immediately after announcing the release of Linux kernel 4.7.6, Greg Kroah-Hartman proudly informed the community about the general availability of the Linux 4.4.23 LTS kernel.

      The Linux 4.4 kernel is a long-term supported branch, the latest and most advanced one, used in many stable and reliable GNU/Linux operating systems, including Ubuntu 16.04 LTS (Xenial Xerus) and Alpine Linux 3.4. Therefore, it is imperative for it to receive regular updates that bring fixes to the most important issues, as well as other general improvements.

    • From NFS to LizardFS

      If you’ve been following me for a while, you’ll know that we started our data servers out using NFS on ext4 mirrored over DRBD, hit some load problems, switched to btrfs, hit load problems again, tried a hacky workaround, ran into problems, dropped DRBD for glusterfs, had a major disaster, switched back to NFS on ext4 mirrored over DRBD, hit more load problems, and finally dropped DRBD for ZFS.

    • IBM’s Ginni Rometty Tells Bankers Not To Rest On Their Digital Laurels
    • BUS1, The Successor To KDBUS, Formally Unveiled — Aiming For Mainline Linux Kernel

      BUS1 has been in development as an in-kernel IPC mechanism building off the failed KDBUS project. An “RFC” will soon be sent out to Linux kernel developers about BUS1 and the subject will be discussed at next month’s Kernel Summit.

      David Herrmann, one of the BUS1 developers, presented at this week’s systemd.conf conference about the new capability-based IPC for Linux. He talked about how BUS1 is superior to KDBUS, how BUS1 is similar to Android’s Binder, Chrome’s Mojo, Solaris’ Doors, and other common IPC implementations.

    • A New Wireless Daemon Is In Development To Potentially Replace wpa_supplicant

      In addition to the BUS1 presentation, also exciting from the systemd.conf 2016 conference is a thorough walkthrough of a new wireless daemon for Linux being developed by Intel’s Open-Source Technology Center.

      Intel has been developing a new wireless daemon for Linux to potentially replace wpa_supplicant. This new daemon isn’t yet public but the code repositories for it will be opened up in the next few weeks. This new daemon has improvements around persistency, WiFi management, reduced abstractions for different operating systems and legacy interfaces, and changes to operation. This daemon is designed to be very lightweight and work well for embedded Linux use-cases especially, including IoT applications.

    • Graphics Stack

      • Libinput X.Org Driver Updated For X.Org Server 1.19

        Peter Hutterer has announced the release of a new version of xf86-input-libinput, the X.Org DDX driver that makes use of libinput for input handling on the X.Org Server.

      • xf86-input-libinput 0.20.0

        Most important fix is the use of input_lock() instead of the old SIGIO stuff to handle the input thread in server 1.19.

      • Mesa 13.0 Planning For Release At End Of October, Might Include RADV Vulkan

        Following the mailing list talk over the past two days about doing the next Mesa release, plans are being discussed for releasing at the end of October and it might have just got a whole lot more exciting.

        Emil Velikov, Collabora developer and Mesa release manager for the past several release series, has commented on that previously discussed mailing list thread. He mentioned he was secretly waiting in hopes of seeing the RADV Radeon Vulkan driver merged for this next release! He said he’d even be willing to see it merged even if it’s “not perfect/feature complete.”

    • Benchmarks

      • FreeBSD 11.0 Comes Up Short In Ubuntu 16.04 vs. macOS Sierra Benchmarks

        Yesterday I published some macOS 10.2 vs. Ubuntu 16.04 LTS benchmarks from a Mac Mini and MacBook Air systems. For those curious if BSDs can outperform macOS Sierra on Apple hardware, I tested the MacBook Air with FreeBSD 11.0 compared to the Linux and macOS results on that Core i5 system. Here are those results.

      • Early Benchmarks Of The Linux 4.9 DRM-Next Radeon/AMDGPU Drivers

        While Linux 4.9 will not officially open for development until next week, the DRM-Next code is ready to roll with all major feature work having been committed by the different open-source Direct Rendering Manager drivers. In this article is some preliminary testing of this DRM-Next code as of 29 September when testing various AMD GPUs with the Radeon and AMDGPU DRM drivers.

        Linux 4.9 does bring compile-time-offered experimental support for the AMD Southern Islands GCN 1.0 hardware on AMDGPU, but that isn’t the focus of this article. A follow-up comparison is being done with GCN 1.0/1.1 experimental support enabled to see the Radeon vs. AMDGPU performance difference on that hardware. For today’s testing was a Radeon R7 370 to look at the Radeon DRM performance and for AMDGPU testing was the Radeon R9 285, R9 Fury, and RX 480. Benchmarks were done from the Linux 4.8 Git and Linux DRM-Next kernels as of 29 September.

      • How Ubuntu 16.10 Beta 2 Performance Compares To Some Other Linux Distros

        The final Ubuntu 16.10 Beta for “Yakkety Yak” was released this week and we found its performance doesn’t differ much from Ubuntu 16.04 LTS (with the exception of the newer graphics stack) while here are some results comparing it to other modern Linux distributions.

        Tested for this quick, one-page-article comparison were Ubuntu 16.04.1 LTS, Ubuntu 16.10 Beta 2, Clear Linux 10660, Fedora 24, openSUSE Tumbleweed 20160927, and the Arch-based Antergos 16.9-Rolling release.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Qt 3D WIP branches
      • New Qt 3D Functionality Is Being Worked On

        Sean Harmer of KDAB is organizing work around some upcoming “major Qt 3D features” for the open-source toolkit.

        It’s not known if the next round of Qt 3D features will be ready for the Qt 5.9 tool-kit release, but KDAB is looking to have these new branches for feature work with continuous integration coverage.

    • GNOME Desktop/GTK

      • GNOME Calendar App to Feature a New Sidebar, Week View & Attendees in GNOME 3.24

        GNOME developer Georges Stavracas wrote an in-depth blog post the other day to inform the GNOME, Linux, and Open Source communities about the upcoming improvements and new features coming to the GNOME Calendar apps.

        Now that some of us are already enjoying the recently released GNOME 3.22 desktop environment, the GNOME developers are hard at work to improve the GNOME apps and core components by either adding new exciting features and technologies or improving existing ones.

      • Cinnamon 3.2 in Linux Mint 18.1 Supports Vertical Panels, Better Accelerometers

        After informing the community a few days ago about the Mintbox Mini Pro PC and the upcoming improvements and new features shipping with the XApps software projects in Linux Mint 18.1, Clement Lefebvre just published the monthly Linux Mint newsletter.

      • Cross-compiling WebKit2GTK+ for ARM

        Of course, I know for a fact that many people use local recipes to cross-compile WebKit2GTK+ for ARM (or simply build in the target machine, which usually takes a looong time), but those are usually ad-hoc things and hard to reproduce environments locally (or at least hard for me) and, even worse, often bound to downstream projects, so I thought it would be nice to try to have something tested with upstream WebKit2GTK+ and publish it on trac.webkit.org,

      • Should we drop Vala?

        Is it Vala development a waste of time? Is Vala suitable for long term support libraries?

  • Distributions

    • LXLE: A Linux distro to give new life to old hardware

      I’ll bet that somewhere, perhaps at home and most likely at work, you’ve got some old hardware lying around. What to do with it? It still works but what’s it running? Windows XP? Vista? Windows 7 Starter or Home Basic?

      Yep, you’re stuck on some old version of Windows but moving that machine up to a newer version of Windows could be tricky ‘cause one or more of those old graphics cards and printer drivers have probably have fallen out of the update cycle.

      Even if those subsystems are still available, you’ll still have a problem as the newer OSs’ are pretty much guaranteed to suck the life out of old processors with the result that performance and therefore usability will be marginal at best.

      So, what to do? Before you start looking for a deal on a new machine and an e-waste disposal site, consider moving to Linux and, most specifically, consider migrating to LXLE, the LXDE eXtra Luxury Edition (though some people also claim it stands for Lubuntu Extra Life Extension).

    • OpenSUSE/SUSE

    • Red Hat Family

      • Red Hat, Logicalis in digital transformation partnership in Latin America

        PromonLogicalis, a provider of information technology and communication solutions and services in Latin America, and Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, announced a collaboration that aim to help organizations navigate the digital transformation of their infrastructures to pave the way for cloud and the software-defined technologies, and to advance open source technology awareness in the region.

        Open source is delivering significant advancements in many areas of technology through community-powered innovation, including cloud computing, mobile, big data, and more. And, as companies embrace modern technology as a competitive advantage via digital transformation efforts, many are turning to open source because of the flexibility and agility it can enable.

      • Finance

      • Fedora

        • PHP version 5.6.27RC1 and 7.0.12RC1
        • An Easy Way To Try Intel & RADV Vulkan Drivers On Fedora 24

          Fedora 25 should have good support for the open-source Vulkan Linux drivers (particularly if it lands the next Mesa release) while Fedora 24 users can now more easily play with the latest Mesa Git RADV and Intel ANV Vulkan drivers via a new repository.

          A Phoronix reader has setup a Fedora Copr repository that is building Intel’s Vulkan driver from Mesa Git plus the RADV Radeon Vulkan driver re-based from its source (David Airlie’s semi-interesting GitHub branch). Fedora COPR, for the uninformed, is the distribution’s equivalent to Ubuntu PPA repositories.

        • Meeting users, lots of users

          Every year, I introduce Fedora to new students at Brno Technical University. There are approx. 500 of them and a sizable amount of them then installs Fedora. We also organize a sort of installfest one week after the presentation where anyone who has had any difficulties with Fedora can come and ask for help. It’s a great opportunity to observe what things new users struggle with the most. Especially when you have such a high number of new users. What are my observations this year?

    • Debian Family

  • Devices/Embedded

Free Software/Open Source

  • 10 reasons why CIOs should consider open source software

    A recent survey shows 78 percent of companies run part or all of their operations on open source software. Indeed, open source continues to gain market traction as more companies adopt open technology to speed innovation, disrupt industries and improve overall productivity.

    Those who remain hesitant about adopting open source are in danger of being left behind. Because open source architecture lends itself to more frequent updates, and because of the openness, open source provides the freedom to innovate and mature in the way that enterprises need.

  • Kubernetes Arrives in New Flavors

    Kubernetes has taken center stage in recent days, and, as we’ve been noting in recent posts, the open source container cluster manager is heading in new directions. Google has just announced the release of Kubernetes 1.4, which makes the tool much easier to install.

    Meanwhile, Canonical has now launched its own distribution of Kubernetes, with enterprise support, across a range of public clouds and private infrastructure. It’s Kubernetes at the core, but features a number of extra bells and whistles.

  • 2016 Women in Open Source Award Winners

    We hope you enjoy and are inspired by this short video celebrating Preeti Murthy and Jessica McKellar, the winners of this year’s Red Hat Women in Open Source Awards.

  • Tech, talent and tools: The secret to monetizing open-source

    “In California during the gold rush, you didn’t make money digging for gold; you made money selling shovels,” said Mehta. A fitting metaphor for the idea that investing in talent and tools, especially tools, is how to turn a profit. The actual data, databases, algorithms and so on would be open source. Money would come from the tools to use that technology to benefit specific areas, such as automation of healthcare.

    And healthcare is a good place to start. “Big Data is all about making life cheaper, better. … If we forget about how to solve problems for humans, we’ve lost. We want to be known for enriching life,” said Mehta.

  • Changing the way we design for the web

    On the one hand, open source should mean lower cost of entry for people from poorer communities (like me, growing up). But on the other, I feel it is hard to contribute when under- or unemployed. I had a grant to work on the Web Animations API documentation, but I can’t do as much as I’d like with other animation features (motion paths, advanced timing functions) because I need to spend a lot of time working on my own business, getting paid.

    Essentially this leads to an awkward model where the only contributors are employed programmers—and when it comes to open source animation or design APIs, platforms, etc, this lack of user input really starts to show. Or, the only products with thriving open source development teams are those that have financially lucrative futures, turning the open source software (OSS) model into a capitalist one.

  • Asterisk 14 Improves Open-Source VoIP

    Digium, the lead commercial sponsor behind the Asterisk open source PBX project announced the release Asterisk 14 this week, continuing to evolve the decade old effort, making it easier to use and deploy.

  • Yahoo open-sources a deep learning model for classifying pornographic images

    Yahoo today announced its latest open-source release: a model that can figure out if images are specifically pornographic in nature.

    The system uses a type of artificial intelligence called deep learning, which involves training artificial neural networks on lots of data (like dirty images) and getting them to make inferences about new data. The model that’s now available on GitHub under a BSD 2-Clause license comes pre-trained, so users only have to fine-tune it if they so choose. The model works with the widely used Caffe open source deep learning framework. The team trained the model using its now open source CaffeOnSpark system.

    The new model could be interesting to look at for developers maintaining applications like Instagram and Pinterest that are keen to minimize smut. Search engine operators like Google and Microsoft might also want to check out what’s under the hood here.

    “To the best of our knowledge, there is no open source model or algorithm for identifying NSFW images,” Yahoo research engineer Jay Mahadeokar and senior director of product management Gerry Pesavento wrote in a blog post.

  • Events

  • Web Browsers

    • Chrome

      • CloudReady by neverware

        I thought I would put together a quick “installation” review of a product called CloudReady by neverware. What is CloudReady? CloudReady is basically a project to bring Chromium OS to those who would like to convert traditional laptops into Chromebook-like devices. I stumbled on them several months ago and finally decided to see how hard it was to install Chromium OS and how functional it actually was as a Chromebook-like device. I have a few low end (netbook-like) devices and I have been trying to figure out how I could make them functional for my boys, I thought this might be the solution.

    • Mozilla

      • Mozilla tells Firefox OS devs to fork off if they want to chase open web apps vision

        The Mozilla Foundation’s Firefox development team has decided enough is enough and will stop supporting Windows XP and Vista in March 2017 and also bin Firefox OS.

        The OS first. In this post Mozillans Ari Jaaksi and David Bryant, respectively the head of connected devices and veep for platform engineering, write that “By the end of 2015 Mozilla leadership had come to the conclusion that our then Firefox OS initiative of shipping phones with commercial partners would not bring Mozilla the returns we sought.”

        That decision means that “as of the end of July 2016 have stopped all commercial development on Firefox OS.”

  • SaaS/Back End

    • Cloudera Delivers Release Built on Apache Spark 2.0, and Advances Kudu

      Cloudera, focused on Apache Hadoop and other open source technologies,has announced its release built on the Apache Spark 2.0 (Beta), with enhancements to the API experience, performance improvements, and enhanced machine learning capabilities.

      The company is also working with the community to continue developing Apache Kudu 1.0, recently released by the Apache Software Foundation, which we covered here. Kudu is an open source columnar storage engine built for the Apache Hadoop ecosystem designed to enable flexible, high-performance analytic pipelines. Taken together, Cloudera’s new tools are giving it more diverse kinds of presence on the Big Data scene.

      Cloudera claims it was the first Hadoop big data analytics vendor to deliver a commercially supported version of Spark, and has participated actively in the open source community to enhance Spark for the enterprise through its One Platform Initiative. “With Spark 2.0, organizations are better able to take advantage of streaming data, develop richer machine learning models, and deploy them in real time, enabling more workloads to go into production,” the company reports.

    • Cloudera Delivers Enterprise-Grade Real-Time Streaming and Machine Learning with Apache Spark 2.0 and Drives Community Innovation with Apache Kudu 1.0
    • Vendors Pile on Big Data News at Strata

      Cloudera, Pentaho and Alation are among vendors making Big Data announcements at this week’s Strata event.

      Vendors big and small are making news at this week’s Strata + Hadoop event as they try to expand their portion of the Big Data market.

      Cloudera highlighted a trio of Apache Software Foundation (ASF) projects to which it contributes. Among them is Spark 2.0, which benefits from a new Dataset API that offers the promise of better usability and performance as well as new machine learning libraries.

    • New alliances focus on open-source, data science empowerment

      How can data science make a true market impact? Partnerships, particularly amongst open source communities. As IBM solidifies its enterprise strategies around data demands, two new partnerships emerge: one with Continuum Analytics, Inc., advancing open-source analytics for the enterprise; and another with Galvanize, initiating a Data Science for Executives program.

      Continuum Analytics, the creator and driving force behind Anaconda — a leading open data science platform powered by Python — has allied with IBM to advance open-source analytics for the enterprise. Data scientists and data engineers in open-source communities can now embrace Python and R to develop analytic and machine learning models in the Spark environment through its integration with IBM’s DataWorks Project.

      The new agreement between IBM and Galvanize, which provides a dynamic learning community for technology, will offer an assessment, analysis and training element for Galvanize’s Data Science for Executives program. This program empowers corporations to better understand, use and maximize the value of their data. The program will support IBM’s DataFirst Method, a methodology that IBM says provides the strategy, expertise and game plan to help ensure enterprise customers’ succeed on their journey to become a data-driven business.

    • Apache Spot: open source big data analytics for cyber
  • Oracle/Java/LibreOffice

    • TDF Releases Fresh Update to LibreOffice 5.2

      The Document Foundation today announced the availability of LibreOffice 5.2.2, the second update to the “fresh” 5.2 family. “LibreOffice 5.2.2, targeted at technology enthusiasts, early adopters and power users, provides a number of fixes over the major release announced in August.” These fixes include the usual number of import/export/filter fixes as well as a lot of interface adjustments and a few crashes.

      One of the more interesting import bugs fixed had first been reported 4 1/2 years ago. In version 3.5.0 when importing RTF files with several tables the formatting isn’t retained in all cases. The original reporter said this included column widths and placement. Comments updated the report throughout several versions on various systems. The bug sat for another year before being bumped and eight months later a patch was committed. After further input and more adjustments, Miklos Vajna committed patches for several versions including today’s 5.2.2.

  • Pseudo-Open Source (Openwashing)

  • BSD

    • OpenBSD 6.0 Limited Edition CD set (signed by developers)

      Five OpenBSD 6.0 CD-ROM copies were signed by 40 developers during the g2k16 Hackathon in Cambridge, UK.

      Those copies are being auctioned sequentially on ebay.

      All proceeds will be donated to the OpenBSD Foundation to support and further the development of free software based on the OpenBSD operating system.

  • FSF/FSFE/GNU/SFLC

    • Licensing resource series: Free GNU/Linux distributions & GNU Bucks

      When Richard Stallman set out to create the GNU Project, the goal was to create a fully free operating system. Over 33 years later, it is now possible for users to have a computer that runs only free software. But even if all the software is available, putting it all together yourself, or finding a distribution that comes with only free software, would be quite the task. That is why we provide a list of Free GNU/Linux distributions.

      Each distro on the list is commited to only distributing free software. With many to choose from, you can find a distro that meets your needs while respecting your freedom.

      But with so much software making up an entire operating system, how is it possible to make sure that nothing nasty sneaks into the distro? That’s where you, and GNU Bucks come in.

    • Friday Working together for Free Software Directory IRC meetup: September 30th
    • August and September 2016: photos from Pittsburgh and Fresno
    • Libre Learn Lab: a summit on freely licensed resources for education

      Libre Learn Lab is a two-day summit for people who create, use and implement freely licensed resources for K-12 education, bringing together educators, policy experts, software developers, hardware hackers, and activists to share best practices and address the challenges of widespread adoption of these resources in education. The 2nd biennial conference is Saturday, October 8th, and Sunday, October 9th, at the MIT Tang Center.

      The keynote addresses will be delivered by the FSF’s own Richard M. Stallman, former Chief Open Education Advisor Andrew Marcinek and founder of HacKIDemia Stefania Druga. At the event, there will be a special tribute to Dr. Seymour Papert (the father of educational computing) by Dr. Cynthia Solomon.

  • Programming/Development

    • Machine Learning with Python

      I first heard the term “machine learning” a few years ago, and to be honest, I basically ignored it that time. I knew that it was a powerful technique, and I knew that it was in vogue, but I didn’t know what it really was— what problems it was designed to solve, how it solved them and how it related to the other sorts of issues I was working on in my professional (consulting) life and in my graduate-school research.

      But in the past few years, machine learning has become a topic that most will avoid at their professional peril. Despite the scary-sounding name, the ideas behind machine learning aren’t that difficult to understand. Moreover, a great deal of open-source software makes it possible for anyone to use machine learning in their own work or research. I don’t think it’s an overstatement to say that machine learning already is having a huge impact on the computer industry and on our day-to-day lives.

Leftovers

  • Salesforce tries to block Microsoft’s LinkedIn acquisition

    Microsoft made a splash earlier this year when it announced the largest acquisition in its history, signing an agreement to buy LinkedIn for $26.2 billion. But now, Salesforce is trying to convince the European Union to block the deal.

    Salesforce Chief Legal Officer Burke Norton will argue to the EU’s competition authority that Microsoft’s control of LinkedIn’s dataset following an acquisition would be anticompetitive. EU competition chief Margarethe Vestager said in January that her agency would be looking directly at whether a company’s use of data is bad for competition, and these complaints seem aimed squarely at those comments.

    “Microsoft’s proposed acquisition of LinkedIn threatens the future of innovation and competition,” Norton said in a statement on Thursday. “By gaining ownership of LinkedIn’s unique dataset of over 450 million professionals in more than 200 countries, Microsoft will be able to deny competitors access to that data, and in doing so obtain an unfair competitive advantage.”

  • The Rise of the Helpful Operational Bots: ChatOps

    While some of the concepts surrounding ChatOps has been around for a long time, it is fair to say that the idea only really began to get traction within technical communities when Jesse Newland gave a talk on ChatOps at Github during PuppetConf 2012. Since 2012 we have seen a growth in interest in the new use of bots within operations.

  • Facebook Video Metrics Crossed The Line From Merely Dubious To Just Plain Wrong

    What happened here is actually pretty subtle, so bear with me. Facebook distinguishes “plays” from “views” — with the former being every single play of the video, including those auto-plays that you scroll straight past and never even look at, and the latter being only people who actually watched the video for three seconds or longer. Of course, there are still a million ways in which this metric is itself broken (I’ve certainly let plenty of videos play for more than three seconds or even all the way through while reading a post above or below them) but the distinction is a good one. All of the more detailed stats are based on either plays or views (mostly views) and are clearly labeled, but the one metric at issue was the “Average Duration of Video Viewed.” This metric could be fairly calculated as either the total amount of time from all plays divided by the total number of plays, or the same thing based only on time and number of views — but instead, it was erroneously being calculated as total play time divided by total number of views. In other words, all the second-or-two autoplays from idle newsfeed scrollers were being totalled up, and that time was being distributed among the smaller number of people who stayed on the video for more than three seconds as part of their average duration, leading to across-the-board inflation of that figure.

  • Journalist Tom Henderson on Cloud Vendor Lock-In

    This video is not technically about free or open source software, but it’s 100 percent about the danger of falling victim to proprietary vendors and their habit of making it hard to leave their sweet embrace once they get their paws on you. The Network World column by Tom Henderson that generated this interview is titled, The Many Dimensions of Cloud Value, and is subtitled, “Put your snorkels on: The marketing for cloud services is getting deep.” So is the marketing for many other proprietary something-as-a-something offerings ranging from operating systems to (obviously) cloud platforms.

  • Science

    • Why Deep Learning Is Suddenly Changing Your Life

      Over the past four years, readers have doubtlessly noticed quantum leaps in the quality of a wide range of everyday technologies.

      Most obviously, the speech-recognition functions on our smartphones work much better than they used to. When we use a voice command to call our spouses, we reach them now. We aren’t connected to Amtrak or an angry ex.

  • Health/Nutrition

    • Bayer Makes Deal With GMO Giant Monsanto

      That preemption bill was similar to other anti-local democracy measures peddled by the American Legislative Exchange Council (ALEC).

      From fracking bans to minimum wage and GMO labeling, ALEC and its politicians have successfully driven preemption efforts with its “model” legislation throughout different parts of the country at the behest of giant corporations.

      An Oregonian who leads a group with ties to Monsanto claimed he authored the bill, but as Lisa Arkin of the Pesticide Action Network North America noted both the Oregon bill and the ALEC bill share the same name and have the same core operative language and effect: “A local government may not enact or enforce a . . . measure, including but not limited to an ordinance, regulation, control area, or quarantine, to inhibit or prevent the production or use of agricultural seed, flower seed . . . or vegetable seed or products of agricultural seed, flower seed . . . or vegetable seed.”

      After the Oregon bill was introduced in 2013, it was taken to ALEC’s 40th anniversary meeting in Chicago, as the “Preemption of Local Agricultural Laws Act,” which is known as the “Monsanto Protection Act,” by its foes.

    • More Than 9 in 10 People Breathe Bad Air, W.H.O. Study Says

      The World Health Organization said Tuesday that 92 percent of people breathe what it classifies as unhealthy air, in another sign that atmospheric pollution is a significant threat to global public health.

      A new report, the W.H.O.’s most comprehensive analysis so far of outdoor air quality worldwide, also said about three million deaths a year — mostly from cardiovascular, pulmonary and other noncommunicable diseases — were linked to outdoor air pollution. Nearly two-thirds of those deaths are in Southeast Asia and the Western Pacific region, compared with 333,000 in Europe and the Americas, the report said.

      “When you look out through the windows in your house or apartment, you don’t see the tiny little particles that are suspended in the air, so the usual perception is that the air is clean,” Rajasekhar Balasubramanian, an air quality expert at the National University of Singapore who was not involved in the study, said in a telephone interview on Tuesday.

      “But the W.H.O. report is a clear indication that even in the absence of air pollution episodes, the concentrations of particles suspended in the air do exceed what’s considered to be acceptable from a health viewpoint,” he said.

      In previous studies, the W.H.O. estimated that more than eight in 10 people in urban areas that monitored air pollution were breathing unhealthy air and that about seven million deaths a year were linked to indoor and outdoor pollution.

  • Security

    • Linaro organisation, with ARM, aims for end-end open source IoT code

      With the objective of producing reference software for more secure connected products, ranging from sensors and connected controllers to smart devices and gateways, for the industrial and consumer markets, Linaro has announced LITE: Collaborative Software Engineering for the Internet of Things (IoT).

      Linaro and the LITE members will work to reduce fragmentation in operating systems, middleware and cloud connectivity solutions, and will deliver open source device reference platforms to enable faster time to market, improved security and lower maintenance costs for connected products. Industry interoperability of diverse, connected and secure IoT devices is a critical need to deliver on the promise of the IoT market, the organisation says. “Today, product vendors are faced with a proliferation of choices for IoT device operating systems, security infrastructure, identification, communication, device management and cloud interfaces.”

    • An open source approach to securing The Internet of Things
    • Addressing the IoT Security Problem

      Last week’s DDOS takedown of security guru Brian Krebs’ website made history on several levels. For one, it was the largest such reported attack ever, with unwanted traffic to the site hitting levels of 620 Gbps, more than double the previous record set back in 2013, and signalling that the terabyte threshold will certainly be crossed soon. It also relied primarily on compromised Internet of Things devices.

    • Linaro beams LITE at Internet of Things devices

      Linaro launched a “Linaro IoT and Embedded” (LITE) group, to develop end-to-end open source reference software for IoT devices and applications.

      Linaro, which is owned by ARM and major ARM licensees, and which develops open source software for ARM devices, launched a Linaro IoT and Embedded (LITE) Segment Group at this week’s Linaro Connect event in Las Vegas. The objective of the LITE initiative is to produce “end to end open source reference software for more secure connected products, ranging from sensors and connected controllers to smart devices and gateways, for the industrial and consumer markets,” says Linaro.

    • Don’t Trust Consumer Routers

      Another example of why you shouldn’t trust consumer routers. d-link

      It isn’t just this specific d-link router. We’ve seen the same issues over and over and over with pretty much every non-enterprise vendor.

      Plus we don’t want our devices used by crackers to DDoS Brian Krebs anymore, right?

      We are Linux people. We CAN do this ourselves.

    • D-Link DWR-932 router is chock-full of security holes

      Security researcher Pierre Kim has unearthed a bucketload of vulnerabilities affecting the LTE router/portable wireless hotspot D-Link DWR-932. Among these are backdoor accounts, weak default PINs, and hardcoded passwords.

    • The Cost of Cyberattacks Is Less than You Might Think

      What’s being left out of these costs are the externalities. Yes, the costs to a company of a cyberattack are low to them, but there are often substantial additional costs borne by other people. The way to look at this is not to conclude that cybersecurity isn’t really a problem, but instead that there is a significant market failure that governments need to address.

    • NHS trusts are still using unsupported Windows XP PCs

      AT LEAST 42 National Health Service (NHS) trusts in the UK still run Microsoft’s now-defunct Windows XP operating system.

      Motherboard filed Freedom of Information requests with more than 70 NHS hospital trusts asking how many Windows XP machines they use. 48 replied within the allotted time, and a whopping 42 of them admitted that they still use the operating system that reached end-of-life status in April 2014.

      Some of the culprits include East Sussex Healthcare, which has 413 Windows XP machines, Sheffield’s Children’s hospital with 1,290, and Guy’s and St Thomas’ NHS Trust in London with an insane 10,800 Windows XP-powered PCs.

      23 replied to Motherboard’s quizzing about whether they have an extended support agreement in place and, unsurprisingly, the majority said that they do not.

    • Friday’s security advisories
    • ICANN grinds forward on crucial DNS root zone signing key update

      The Internet Corporation for Assigned Names and Numbers is moving — carefully — to upgrade the DNS root zone key by which all domains can be authenticated under the DNS Security Extensions protocol.

      ICANN is the organization responsible for managing the Domain Name System, and DNS Security Extensions (DNSSEC) authenticates DNS responses, preventing man-in-the-middle attacks in which the attacker hijacks legitimate domain resolution requests and replaces them with fraudulent domain addresses.

      DNSSEC still relies on the original DNS root zone key generated in 2010. That 1024-bit RSA key is scheduled to be replaced with a 2048-bit RSA key next October. Although experts are split over the effectiveness of DNSSEC, the update of the current root zone key signing key (KSK) is long overdue.

    • Cybersecurity isn’t an IT problem, it’s a business problem

      The emergence of the CISO is a relatively recent phenomenon at many companies. Their success often relies upon educating the business from the ground up. In the process, companies become a lot better about how to handle security and certainly learn how not to handle it.

      As a CIO, knowing the pulse of security is critical. I oversee a monthly technology steering committee that all the executives attend. The CISO reports during this meeting on the state of the security program. He also does an excellent job of putting risk metrics out there, color coded by red, yellow, and green. This kind of color grading allows us to focus attention on where we are and what we’re doing about it.

  • Defence/Aggression

    • Congress May Rewrite Saudi 9/11 Law After Veto Override

      The two top Republicans in Congress said they’re prepared to rewrite legislation allowing victims of the Sept. 11 attacks to sue Saudi Arabia — less than 24 hours after Congress took the extraordinary step of overriding President Barack Obama’s veto of the measure to make it law.

      Both House Speaker Paul Ryan and Senate Majority Leader Mitch McConnell said that the measure could have unintended consequences — including the fact that it could leave U.S. soldiers open to retaliation by foreign governments.

      “I would like to think there’s a way we can fix so that our service members do not have legal problems overseas while still protecting the rights of the 9/11 victims,” Ryan told reporters Thursday, one day after his chamber voted 348-77 to override the veto.

      McConnell also said he was worried about unintended consequences of the measure, saying changes to the law might be needed.

      “It’s worth further discussing,” he told reporters Thursday. “It was certainly not something that was going to be fixed this week.”

    • Arab responses to 9/11 bill point to US interventions abroad

      Others support the bill, but point out that the U.S. is meanwhile backing a Saudi-led intervention in Yemen that has led to the deaths of thousands of civilians there.

      Two Arabic hashtags were trending on Twitter when the bill was passed, one referring directly to the Justice Against Sponsors of Terrorism Act, or JASTA, and the other simply titled: #TheAmericanTerrorism.

      Some Arabic Twitter users shared a photo montage that depicted U.S. military actions in Japan and Vietnam, as well as naked Iraqi prisoners in Abu Ghraib prison being humiliated by smiling U.S. troops. It read: “Japan, Vietnam, Iraq, Afghanistan can’t wait for JASTA to be implemented so they can, in turn, prosecute the U.S.”

      Another shared a 2005 Pittsburgh Post-Gazette editorial cartoon of a young boy on his father’s lap watching an image of the Hiroshima mushroom cloud and asking: “Which terrorist group did that?”

      One post shared more than 750 times included a clip with Arabic subtitles of stand-up American comedian Eddie Griffin talking about U.S. interventions in Iraq and Afghanistan, saying these wars are about “money, money, money.”

      The criticism, of course, is nothing new, says Eurasia Group’s Director for the Middle East and North Africa Ayham Kamel.

      “The Middle East, as a region where the U.S. has been dominant, has always been critical of U.S. policy,” he said.

    • Pakistan threatens to DESTROY India with nuclear bomb as atomic enemies edge to the brink of war

      PAKISTAN’S Defence Minister has threatened to “destroy” India – after India said on Thursday it had carried out “surgical strikes” on suspected militants preparing to infiltrate from Pakistan-ruled Kashmir.

      The strikes, which were a response to shots fired across the de facto border through the disputed Himalayan territory, could lead to a military escalation between the two nuclear-armed neighbours – risking a ceasefire agreed in 2003.

  • Transparency/Investigative Reporting

    • ‘We Believe in What We’re Doing’

      WikiLeaks is now 10 years old. SPIEGEL met with founder Julian Assange, 45, to discuss the whistleblower platform’s achievements and whether recent criticism leveled at the site is justified.

      SPIEGEL: Mr. Assange, 10 years after the founding of WikiLeaks, the whistleblower platform is again being criticized. WikiLeaks is said to have put millions of Turkish voters in danger. What is your response?

      Assange: A few days after the publication of internal emails from the Democratic National Committee, an entirely false story was put out that we had published the names, addresses and phone numbers of all female voters in Turkey. It is completely false. And it was and is simple to check. Power factions fight back with lies. That’s not surprising.

      SPIEGEL: Quite a few German journalists have long sympathized with WikiLeaks and also with Edward Snowden. But they aren’t impressed with the publishing of the DNC emails. Are you campaigning on behalf of Donald Trump?

      Assange: Our publication of the DNC leaks has showed that the Democratic National Committee had effectively rigged the primaries in the United States on behalf of Hillary Clinton against Bernie Sanders. That led to the resignation of leading members of the DNC, including its president Debbie Wasserman Schultz.

      SPIEGEL: People within the Clinton campaign have suggested that the DNC emails were given to you by the Russian secret service.

      Assange: There have been many attempts to distract from the power of our publications. Hillary Clinton is the favorite to win. As always, most media aligns with the presumptive winner even though their claimed societal virtue is to investigate those in power.

      SPIEGEL: The fact is, WikiLeaks is damaging Clinton and bolstering Trump.

      Assange: We’re not going to start censoring our publications because there is a US election. Our role is to publish. Clinton has been in government so we have much more to publish on Clinton. There is a lot of naivety. The US presidency will continue to represent the major power groups of the United States — big business and the military — regardless of who the talking head is.

      SPIEGEL: If someone submitted internal documents from the Trump campaign or the Republican Party, you would publish that as well?

      Assange: Yes, of course. That’s what we do.

    • CIA Took Three Years To Reject FOIA Request For Criteria For Rejecting FOIA Requests

      Curious about what criteria the CIA have for determining if they “can neither confirm nor deny” something? So did Jason Smathers, who back in 2010 filed one of MuckRock’s earliest requests for exactly that. Six years later, he still doesn’t know.

      Smathers first filed in October 2010 – to the agency’s credit, they only took a mere two months to get back to him.

    • Government Agencies Apparently Not Interested In Following Congressional Directives On Overclassification

      I’m not sure what this says about government transparency. Maybe it doesn’t say anything useful. Maybe it’s just the mixed signals we can expect from agencies only willing to make the most minimal transparency efforts. Or maybe it says something about the momentum of even slowly-moving large objects. A bureaucracy has a large turning radius and asking it to suddenly change its ways means you have to lower your expectations as to how “suddenly” should be defined. Whatever it says, it’s nothing good.

      Overclassification is a government-wide problem. Legislation has been passed to fix it. While the government expects the private sector to get right on it when laws are passed, it obviously cuts itself a lot more slack when faced with internal legislative redirection.

  • Environment/Energy/Wildlife/Nature

    • Climate justice meets racism: Standing Rock was decades in the making

      Attack dogs and waves of arrests by police in riot gear could look like isolated incidents of overreaction to the activism stemming from the Standing Rock reservation. But for the Lakota Sioux who live in these marginalized hillsides, the escalated militarization behind their battle against the Dakota Access pipeline is a situation decades in the making.

      North Dakota is not the whitest state in America, but it’s arguably the most segregated. More than 60 percent of its largest minority population, Native Americans, lives on or near reservations. Native men are incarcerated or unemployed at some of the highest rates in the country. Poverty levels for families of the Standing Rock tribe are five times that of residents living in the capital city, Bismarck. In Cannon Ball, the heart of the tribal community, there are rows of weathered government homes, but no grocery store. Tucked behind a lonely highway, this is where mostly white farmers and ranchers shuttle to and from homesteads once belonging to the Sioux.

    • Most people alive today set to witness dangerous global warming in their lifetime, scientists warn

      The world could hit two degrees Celsius of warming – the point at which many scientists believe climate change will become dangerous – as early as 2050, a group of leading experts has warned.

      In a report called The Truth About Climate Change, they said many people seemed to think of global warming as “abstract, distant and even controversial”.

      But the planet is now heating up “much faster” than anticipated, said Professor Sir Robert Watson, a former chair of the Intergovernmental Panel on Climate Change and one of the authors of the report.

      If their analysis is correct, it means the majority of people alive today will experience what it is like to live on a dangerously overheated planet.

    • 9 wonders of the world set to vanish forever: How many have you ticked off?

      This month, we learned that Spain was facing the prospect of becoming the first European Union member state to have a natural World Heritage Site make Unesco’s “danger list”. The Doñana coastal wetlands in Andalucía – home to the endangered Iberian lynx – is said to be under threat from a mining and dredging plan, as well as 1,000 illegal wells in the area.

      But it’s just one among a number of incredible sites the world over that, according to Unesco, could be lost forever. Here are just a few World Heritage Sites in Unesco’s danger zone that you might need to scrub off the bucket list.

    • To Reduce Haze and Save Indonesia’s Forests, Address the Root Cause of Fires

      Over the past few months we have seen heated debates over the problem of Indonesian forest fires and the associated haze in neighboring countries like Singapore. A new law in Singapore permits the prosecution of companies deemed to be responsible for causing such fires, and speculation about how the El Nino phenomenon might lead to particularly intense fires in the next month have drawn global attention to the issue.

      Three years ago, President Susilo Bambang Yudhoyono made a pledge to dedicate the remainder of his term in office to protect Indonesia’s environment and forests. Over the last three years he has done just that — with the historic moratorium on new logging concessions implemented in 2011, which has since been extended to May 2015. This policy has helped to protect more than 63 million hectares of primary forest and peat land, equivalent to an area larger than the landmass of Malaysia and the Philippines combined, and helped to lower Indonesia’s deforestation rate from 1.2 million hectares per year between 2003 and 2006, to between 450 and 600 thousand hectares per year since 2011. We also see the private sectors in the region stepping up their zero-deforestation commitments, including from the pulp and paper and palm oil industries.

    • Fires driving deforestation in Indonesia’s Leuser Ecosystem

      Indonesia’s Leuser Ecosystem lost 4,097 hectares of forest cover in the first six months of 2016, according to Forest, Nature and Environment of Aceh (HAkA), an NGO. At the same time, 187 fire hotspots were recorded in the nationally protected area during the period.

      “The hotspots overlay the forest cover loss in Aceh,” HAkA’s Agung Dwinurcahya said at a press conference in Jakarta. “For example, the high number of hotspots in Aceh Timur is the main contributor to deforestation in Aceh Timur.”

      Leuser, home to one of the Southeast Asian country’s last great swaths of intact rainforest, lies in Indonesia’s westernmost Aceh and North Sumatra provinces. It’s the only place in the world where orangutans, rhinos, elephants and tigers coexist in the wild.

    • Seven Popular Foods That Might Disappear Because of Climate Change

      Throughout history, different types of food have surged and dropped in popularity, and some foods that existed at one point just aren’t around anymore. But we’re not talking about foods that aren’t popular, quite the opposite in fact. Some of our favorite foods and drinks could be considered “endangered” because the places where they are grown are being severely impacted by climate change. If this isn’t proof that we need to do something about climate change, I don’t know what is. To start off, here are a few foods that are part of our everyday lives that might not be around for long.

  • Finance

    • In Wells Fargo Case, News Really Did Happen To An Editor

      Several years after I returned to New York from Oregon, I made a strange discovery. Bank accounts I was certain I had closed were inexplicably racking up service charges. It seemed bizarre, particularly because I had gone in person to a newly opened local branch of my West Coast bank to make sure the accounts were shut down.

      The failure to pay these charges (bills were sent to my old address and never caught up with me) resulted in penalties and a report to a credit agency. After an increasingly frustrating series of exchanges at the local branch, the bank agreed to wipe out the charges but said I would have to deal with the credit agencies on my own.

      It seemed outrageous, and as the editor in chief of an investigative news operation, I thought about asking Paul Kiel, ProPublica’s crack reporter on bank shenanigans, to take a look.

      But then I stopped myself.

      There’s an old saying in the journalism business for this sort of thinking: News is what happens to an editor.

      As with so many newsroom aphorisms, it’s meant to be proclaimed with an eye roll and a tone of deep sarcasm. Reporters view editor-generated stories as the bane of their existence, and not without reason. Random events and pet peeves are not often a great starting point for serious stories.

    • People born in the 1980s are HALF as wealthy in their thirties as people a decade older

      People born in early Eighties were around half as wealthy at age 30 as their counterparts who were born in the Seventies, analysis shows.

      The children of the “Baby Boomer” generation, currently in their early 30s, have an average net household wealth of £27,000 each a report by the Institute for Fiscal Studies, a think tank showed.

      By comparison the median wealth of those born in the 1970s had £53,000 on average by the same age. The figure takes into account housing, financial and private pension wealth.

    • Wealth of people in their 30s has ‘halved in a decade’

      People in their early 30s are half as wealthy as those now in their 40s were at the same age, a report finds.

      Today’s 30-something generation has missed out on house price increases and better pensions, according to research by the Institute for Fiscal Studies.

      Those born in the early 1980s have an average wealth of £27,000 each, against the £53,000 those born in the 1970s had by the same age, said the IFS.

      They will also find it harder to amass wealth in the future, it added.

      The think tank found that people born in the early 1980s were the first post-war group not to have higher incomes in early adulthood than those born in the preceding decade.

    • Children of Thatcher era have half the wealth of the previous generation

      The children of the Thatcher era have reached adulthood with half as much wealth as the previous generation, finds a major study published today.

      The report from the Institute of Fiscal Studies concludes people born in the early 1980s are the first post-war generation to suffer smaller incomes in early adulthood than those born 10 years before.

      A toxic mix of low interest rates and the calamitous crash of 2008 mean it is much harder to accumulate wealth, leaving them with meagre pensions and a lower rate of home ownership.

    • Basic Income — A concrete and financed proposal for Sweden

      I have now translated my proposal for basic income for Sweden, which I presented in Swedish some time ago.

      Although the proposal as such is strictly about Sweden and Swedish conditions, I am hoping that the reasoning and design principles I have applied may be of interest to basic income activists in other Nordic and European countries as well. In many ways, the welfare systems we have today are basically quite similar, and many of the problems we face are the same as well.

    • Portugal threatened with first treaty claim

      A Mexican company has threatened to bring a €42 million investment treaty claim against Portugal over a cancelled deal to privatise part of Lisbon’s public transport system.

      Grupo Autobuses de Oriente (ADO) announced last week that it had served a notice of dispute to the Portuguese government under the Mexico-Portugal bilateral investment treaty after negotiations proved “fruitless”.

      If the dispute reaches arbitration, it would be the first known investment treaty case that Portugal has faced – as well as a rare example of a Latin American multinational invoking a BIT to protect investments in a European state.

      The dispute relates to two “sub-concession agreements” that ADO, through its Spanish subsidiary Avanza, signed with Portugal’s then centre-right government under Prime Minister Pedro Passos Coelho in June 2015.

  • AstroTurf/Lobbying/Politics

    • Gary Johnson Is Not the Third-Party Candidate You’re Looking For

      With Hillary Clinton failing to provide a genuine voice for the 99% against Donald Trump’s bigoted fake-populism, a left-wing third-party candidate like Jill Stein can act as an important pole of attraction for a section of workers and youth sick and tired of the status quo. But Stein isn’t the only third-party challenger to Trump and Clinton. Gary Johnson, the former Republican governor of New Mexico, is running for president under the Libertarian Party. Johnson has been consistently outpolling Stein, and some polls even show Johnson beating Stein among former Bernie Sanders supporters.

      Given his polling results, Johnson may appear to be the best bet for building a viable challenge to the two-party system. And Johnson has a number of progressive positions on certain isolated issues, such as support for the legalization of marijuana and opposition to government surveillance. But, as socialists, we have to be clear that Gary Johnson, and libertarian politics in general, are a dead end for anyone trying to build a voice for the 99%.

    • Hacked Audio Reveals Hillary Clinton Sees Herself Occupying “Center-Left to Center-Right”

      In the hacked recording of a private conversation with campaign donors in February, Hillary Clinton distanced herself from progressive goals like “free college, free healthcare” and described her place on the political spectrum as spanning from the center-left to the center-right.

      Clinton has been inconsistent in the past about espousing political labels. She has at times touted herself as stalwart liberal. For instance, she said last July: “I take a backseat to no one when you look at my record in standing up and fighting for progressive values.” But a few months later, she told a group in Ohio: “You know, I get accused of being kind of moderate and center. I plead guilty.”

      The newly disclosed comments came in audio, apparently from hacked emails, that was revealed this week by the Washington Free Beacon, a conservative blog run by a Republican communications strategist. Clinton was speaking at a Virginia fundraiser hosted by Beatrice Welters, the former U.S. ambassador to Trinidad and Tobago, and her husband Anthony Welters, the executive chairman of an investment consulting firm founded by former Clinton aid Cheryl Mills.

      Clinton’s opponent at the time, Sen. Bernie Sanders, was pointing to successful programs in Norway and Sweden, which provide universal daycare, family leave, and government sponsored healthcare and college education, as policies that he would seek to adopt.

  • Censorship/Free Speech

    • Palestinians boycott Facebook over ‘censorship’

      Palestinian activists have recently launched a campaign to boycott Facebook after the popular social-media platform blocked several Palestinian accounts and deleted numerous posts – at Israel’s request – for alleged “incitement”.

      Earlier this week, campaigners – using the hashtag #FBCensorsPalestine – called on supporters to refrain from posting on Facebook between 8 p.m. and 10 p.m. (Jerusalem time) on Sept. 25.

      Hussam al-Zayegh, the campaign’s Gaza-based spokesman, told Anadolu Agency that the initiative had been launched in response to what he described as Facebook’s “pro-Israel bias”.

      According to al-Zayegh, the world’s most popular social-networking site is actively working to undermine Palestinian activists and journalists who rely on Facebook to help spread their message.

    • Palestinian Activists Are Angry About Alleged Facebook Censorship

      Palestinian activists are running an online campaign to hold Facebook accountable after the social media giant deleted a number of pro-Palestine posts and suspended several Palestinian journalists’ accounts.

      Quds News Network and other publications launched the hashtag #FBCensorsPalestine on Friday, when news emerged that seven Palestinian journalists associated with popular outlets in Israeli-occupied Palestinian territories had their accounts shut down for “violating community guidelines.”

      According to the seven journalists, four of whom work for Shehab News Agency and three of whom work for Quds, Facebook provided no further explanation of what standards were violated.

    • Donald Trump and the Return of Seditious Libel

      In 1733, New York printer John Peter Zenger began publishing the eighth newspaper in the American colonies, and the first willing to venture criticism of the government. The New-York Weekly Journal was the second paper in a city of 10,000 or so people, 1700 of them slaves.

      As we are reminded in Richard Kluger’s comprehensive new book, “Indelible Ink,” the first full-length account of Zenger’s travails, by 1735, Zenger (and the likely editor of his paper, James Alexander) had so offended Britain’s royal governor of New York and New Jersey, William Cosby, that Cosby brought suit against Zenger for seditious libel—the crime of criticizing the government. Under the law then in effect in Britain and its colonies, truth was not a defense to this charge. The leading legal treatise of the day explained that “since the greater appearance there is of truth in any malicious invective, so much the more provoking it is.” And: “The malicious prosecution of even truth itself cannot… be suffered to interrupt the tranquility of a well-ordered society.” This was deemed especially the case with true attacks on those in power, as they would have “a direct tendency to breed in the people a dislike of their governors and incline them to faction and sedition.”

    • Thoughtless and dangerous EU approach to free speech online

      There is a lot of ambiguity when it comes to the EU cooperation with Facebook, Twitter, Youtube/Google and Microsoft to censor the Internet – the Joint Referral Platform.

      On the one hand, it has been marketed as a tool to stop »radicalization« that could lead young people to religiously motivated violence, e.g. terrorism or joining the Islamic State in the Middle East.

      On the other hand, in documents and speeches the EU is totally focused on this project to stem »illegal online hate speech«, e.g. when it comes to racism and Islamophobia.

      On that account, what is deemed to be »illegal« adds to the confusion. Incitement to violence is clearly and reasonably within this definition. But when it comes to the broader definition of hate speech, laws vary between EU member states.

    • Chinese Communism’s Anniversary Shines Light On Censorship — In America

      Due to SAPPRFT restrictions, all American movie scripts are vulnerable to “requested” changes or self-censorship based on the Communist Party’s wishes.

    • Popular YouTuber Experiments With WebTorrent to Beat Censorship

      A popular YouTuber is experimenting with torrent-based technology in order to take control of his content and avoid third-party censorship. Bluedrake says that the potential for freedom when using WebTorrent “blows his mind” and has already carried out tests to get the project underway.

    • Banned Book Week brings awareness to censorship, individual choices

      Banned Books Week is from Sept. 25 to Oct. 1.

      This year will be the 34th anniversary of Banned Books week. The last week of September) will be when words will attempt to overthrow unnecessary censorship.

      After all, in the words of Laurie Anderson “censorship is the child of fear and the father of ignorance.”

      The heat-wave surrounding censorship of books sent the media in a frenzy in the 1980s, urging society to fight against authority, ensuring that there would be a change in social behavior and moral values.

    • Orwell 2016: Censorship in the age of social media

      If George Orwell is watching from above, he must be impressed. In his novel 1984, what was meant as a cautionary tale against government control and intellectual obscurantism, seems to have come to pass without our full knowledge.

      Where have our media taken us?

      To be brutally honest, I would say down the yellow brick road and around the tree a few times over already. As our world has become more and more dependent on media, we have opened ourselves up to the bite of censorship, control and the ever-evolving deity which is ‘social trend’.

      In other words, our need to be “connected” has pretty much left us dependent on information technology.

    • Singapore court sends teen blogger back to jail for criticising religion
    • Singapore rebel teen jailed for anti-religion posts
    • Singapore Teen Gets 6 Weeks in Jail for ‘Intending to Wound’ God’s Feelings
    • Teen blogger jailed in Singapore for insulting Muslims, Christians
  • Privacy/Surveillance

    • The “Pardon Snowden” Case Just Got Stronger

      Yesterday, the Department of Justice Inspector General (DoJ IG) issued a long overdue Congressionally-mandated report on FBI compliance with the PATRIOT Act’s Section 215 “business records” provision between 2012 and 2014. It is the first such report issued that covers the initial period of Edward Snowden’s revelations about widespread domestic mass surveillance by the federal government. Since his indictment for leaking the information to the press, Snowden’s lawyers have argued that he should not be prosecuted under the WW I-era Espionage Act because his revelations served the public interest.

    • Intel Community To Institute Actual Whistleblower Award For ‘Speaking Truth To Power’

      The Intelligence Community is looking to reward whistleblowers for “speaking truth to power.” No, seriously. Steven Aftergood of Secrecy News has posted a recent Intel Community announcement [PDF] that looks to fold a whistleblower honor into the community’s existing awards program.

      This is part of the intel community’s cautious foray into the harsh sunlight of transparency — itself a response to a presidential directive that our nation’s spies head outside for a bit and expose themselves a bit.

      The award may as well be called the “Snowden.” But the wording makes it explicit Snowden himself will never be eligible to receive the honorific fruits of his whistleblowing.

    • How Bulk Interception Works

      Mobile digital devices are ever more ubiquitous, generating new forms of data in quantities that continue to grow exponentially. Moreover, the costs of storing data have decreased drastically, and continue to do so every year. Most importantly, the technical means of combining datasets and analyzing this vast trove of data have advanced so rapidly that what were previously considered meaningless or incoherent types and amounts of data can now produce incredibly revelatory analyses. Metadata is structured in such a way that computers can search through it for patterns faster and more effectively and learn more about us than similar searches through the actual content of our communications.

    • The secret smartphone war over the struggle for control of the user

      There’s a war going on behind closed doors for control of your smartphone. It’s between the phone makers and the operators, but it’s not over privacy or data or cost – it’s over you.

      The battles are raging over who owns the consumer and your phone: is it the buyer or the manufacturer? And is the smartphone a device you purchase, or a service you pay for monthly?

      The boom years for the industry, when a smartphone was a user’s first, are long gone in developed nations with most smartphones now sold to people who already have one. In the US and UK market penetration has hit roughly 85%. This means the growth a phone maker needs each year can only come at the expense of a competitor. And that has changed how the manufacturers see the market.

      Marina Koytcheva, director of forecasting at CCS Insight says: “After years of analysts and commentators talking about mobile phone market peaking within the visible horizon, it has now reached that point.”

      The research firm expects total mobile phone sales to decline by 1.3% this year over last, with smartphones accounting for almost three-quarters of the market and up only 4.1% globally.

  • Civil Rights/Policing

    • Cops Dodge 4th Amendment By Phoning In ‘Anonymous’ Tips; Watch Their Drug Bust Vanish After They’re Exposed

      The two horses called in tips twice, resulting in searches of two residences. Despite costing them a nice drug bust and successful prosecution, both the DA (Shane Scanlon) and the Chief of Police (Carl Graziano) are defending not only the faux tipsters’ actions, but their work as law enforcement officers as well.

    • NYPD sent undercover officers to Black Lives Matter protest, records reveal

      Legal papers filed by the New York police department reveal that the department sent its own undercover officers to protests led by Black Lives Matter after the death of Eric Garner. The NYPD documents also show that it collected multimedia records about the protests.

      The NYPD disclosed its undercover operations in response to a group of New York attorneys requesting records under the state freedom of information law. The department has thus far declined to provide the records requested. But its descriptions in August court filings of the records it is refusing to release provide new details about its monitoring of protests at Grand Central Station:

      The first set contains “multimedia records” relating to the petitioners’ request for “pictures, videos, audio recordings, data, and metadata” collected or received by the NYPD at the Grand Central Station protests, which Black Lives Matter groups are still leading, according to the NYPD response.

      The second “consists entirely of communications between and among NYPD undercover officers and their handlers”, pertaining to the protests. According to a 22 August NYPD Memorandum of Law, these undercover communications “consist primarily of immediate impressions concerning ongoing events”.

    • FBI, DOJ And Their Forensic Scientists State They’ll Continue Using Discredited Junk Science To Put People Behind Bars

      For dozens of years, criminal prosecutions have relied on junk science. Forensic science, properly applied, can actually provide matches that identify suspects. But it’s not properly applied. In the hands of the DOJ, forensic evidence examination is a closed loop. Outside scientists have been granted access to the DOJ’s DNA work, but everything else — from fingerprints to hair samples — has been locked away in the government’s database.

      Still, the DOJ insists its science is solid, something it bases on confirmation bias. The matches determined in its forensic labs are “scientifically certain” because the DOJ’s expert witnesses have said so in court. Not only are outside scientists locked out of examining evidence and forensic processes, but defense lawyers are as well.

      The DOJ has finally decided to dial back its “scientific certainty” a bit by issuing guidance instructing its experts to not make this claim in court. This follows years of bogus matches being presented as sure things by forensic experts in court, leading to an unknown number of false convictions. This step back is a step forward for an agency that is mostly unwilling to admit to any mistakes or wrongdoing.

    • Video released shows officers shooting 6-year-old

      A Louisiana judge released body cam video Wednesday showing officers firing multiple rounds into a car, unknowingly striking and killing a 6-year-old boy.
      The incident, which happened in September 2015, resulted in the indictments of two marshals on second degree murder and second degree attempted murder charges.

      The marshals began pursuing the car after they witnessed an argument between a man and his girlfriend in front of a local bar, a source told CNN. Officers moved to detain the man, identified as Christopher Few, who took off in his car.
      The pursuit ended in gunfire on a dead-end street in Marksville, Louisiana.

    • Massachusetts Detective who Threatened to Murder Teens and Plant Drugs Won’t Be Fired or Charged

      A Springfield, Massachusetts narcotics detective has been placed on leave for 60 days, but not fired, after videos surfaced showing him threatening to murder two teenagers and plant drugs on them — videos which have cast doubt on the detective’s numerous drug cases.

      Detective Gregg A. Bigda was caught on video on February 26 at the Palmer Police Department, where he interrogated two teenagers, who along with a third teen were suspected of stealing an undercover police car outside a pizza shop, when he made the threats, according to a report on MassLive.com.

    • New Jersey Woman Forced into Mental Facility for Video Recording Courthouse

      It was a beautiful day in Freehold, New Jersey, so Jen Coombs decided to do First Amendment audits at the Monmouth County jail and courthouse to see how well officials there would respect her right to record in public.

      The New Jersey woman who runs a Facebook page called Time to Stand – New Jersey ended up forced into a mental facility against her will for four days. Not that it kept her from doing another First Amendment audit on the same courthouse upon her release.

      It all started on September 15, 2016 when Coombs made her way around the public areas of the facility and was approached within minutes by two jail employees who seemed determined to snatch the camera out of her hand before even asking her what she was doing.

      It wasn’t just her camera they were after. Coombs was immediately placed in handcuffs and her car keys were taken. Police then used her keys to find her parked car.

      Officials did not stop at just running her tags to get her information though. They used the keys to open her car and rummage around inside in an apparent search for something, anything, to charge her with.

    • Christian boy, 16, facing DEATH PENALTY for offending Muslims in Facebook post

      The boy has been arrested and charged with blasphemy after a photo of the Kaaba in Mecca, one of the holiest sites in Islam, appeared on his profile.

      A Muslim man told police the image, which was part of an alleged derogatory post against Islam on the boy’s profile, was insulting and sacrilegious.

      The black cube-shape is built around an ancient stone at the centre of Islam’s most sacred mosque Al-Masjid al-Haram in Mecca, Saudi Arabia.

      Locals reportedly claimed the image showed the Kaaba with a pig’s head on top.

    • Is It Still An Anonymous Tip If It’s Me?

      In Lackawanna County, Pennsylvania, two police officers found a way to get around one of those annoying loopholes that prevent them from locking up people who are guilty, guilty, GUILTY!!! The loophole is known to the rest of us as “The Fourth Amendment,” which states (among other things) “that no warrant shall issue except upon probable cause.”

      Detective Harold Zech and Lawrence Spathelf didn’t have probable cause to search the homes of Albert McCullough and Dakeem Booker, so they made their own. They phoned in “anonymous” tips to McCullough’s and Booker’s parole officers, who searched their and found some heroin.

    • New Guantánamo intelligence upends old ‘worst of the worst’ assumptions

      The “Dirty 30” probably weren’t all Osama bin Laden bodyguards after all. The “Karachi 6” weren’t a cell of bombers plotting attacks in Pakistan for al-Qaida. An Afghan man captured 14 years ago as a suspected chemical weapons maker was confused for somebody else.

      An ongoing review shows the U.S. intelligence community has been debunking long-held myths about some of the “worst of the worst” at Guantánamo, some of them still held today. The retreat emerges in a series of unclassified prisoner profiles released by the Pentagon in recent years, snapshots of much larger dossiers the public cannot see, prepared for the Periodic Review Board examining the Pentagon’s “forever prisoner” population.

    • DEA’s Army of 18,000 Informants Pocketed $237 Million Over Five Years

      It’s no secret that the Drug Enforcement Administration relies heavily on an army of confidential sources — men and women compelled, coerced, or enticed to share information with law enforcement, sometimes to alleviate their own legal troubles, sometimes for cash.

      Precisely how those relationships play out, however, is often shrouded in secrecy.

      A recently published audit by the Department of Justice has now offered a startling glimpse behind the scenes of those operations, revealing a world in which hundreds of millions of dollars have been doled out to thousands of informants over the last five years. Those informants include package delivery personnel, bus company employees, and Transportation Security Administration agents moonlighting as drug war spies — all operating with abysmal oversight and scant evidence of return on investment.

    • Military-Style Raid Ends Native Prayer Against Dakota Pipeline

      Up to 21 people were arrested during a peaceful prayer service.

      North Dakota police with military-style equipment surrounded Native Americans gathered in prayer against the construction of the Dakota Access pipeline on Wednesday, disrupting their plan to cross sacred and treaty-protected land in protest of a project they fear will destroy their livelihood.

    • U.S. Court Of Appeals Upholds Ruling That New Hampshire’s Silly Ballot Selfie Ban Violated The First Amendment

      You may recall that roughly a year ago, a federal judge struck down a New Hampshire law that made “ballot selfies” illegal. The state had essentially updated its laws revolving around limiting the ability to sell votes or influence the public through depicting who a person voted for to include criminalizing anyone that took a picture of their completed ballot and shared it on social media. The state had said that allowing that sort of thing encouraged voter corruption, with the idea that ballot selfies would be used as a form of proof that a bought vote had been completed, or might otherwise be used to influence other members of the public as to how to vote. It was a strange theory, given how unlikely it would be for a corrupted voter to post evidence of his or her corruption on Facebook, not to mention that stating that a person essentially couldn’t engage in a form of political speech via a picture was flatly unconstitutional. The federal judge agreed.

    • Border Patrol Agent Caught Watching Porn On The Job Blames The Internet Filter For Not Stopping Him

      We talk about porn filters occasionally here at Techdirt. Usually those discussions revolve around how useless and easily circumvented those filters are, even as the more clueless in government insist that we need more of this non-filtering filtering. This is not one of those stories. Instead, it is the story of one of the most tone-deaf individuals with a penchant for excuse-making I’ve ever come across.

      We start with Gizmodo, a website that used to be owned by Gawker Media until a rich guy decided to show America exactly what a rich guy with a lot of money could do and had Gawker shut down, presumably then diving into a pile of gold coins and rubbing hundred dollar bills on his nipples. Gizmodo recently filed an FOIA request to get at documents involving the misuse of computer equipment with the Department of Homeland Security. The site was hoping to see if there were any cases of overreach and abuse of technology by the department. Instead, it uncovered four cases of people watching porn, including one really special case involving a border patrol agent that simply would not stop looking at porn while on the job.

  • Internet Policy/Net Neutrality

    • Ridiculously Stupid: 4 State Attorneys General File Totally Bogus Lawsuit Against Internet Transition

      Okay, this is really dumb. What is it about state attorneys general making totally bullshit claims? It seems to happen with fairly consistent frequency. The latest is that four state AGs (from Arizona, Texas, Oklahoma and Nevada) have filed a lawsuit to stop the IANA transition. If you don’t recall, we’ve written about this a bunch. A bunch of people are up in arms over something they don’t seem to understand. The IANA transition is a good thing. It’s not the US government handing over the internet to Russia and China as you may have heard. It’s the Commerce Department severing an almost entirely symbolic link between it and a very specific internet governance capability concerning top level domains. And it’s important to complete the transition because other countries (including Russia and China) keep pointing to this symbolic link as a reason for why they should have more say in internet governance. Getting rid of the link keeps the internet functioning as it has for decades — and takes away a weapon from Russia and China. More importantly, going back on the transition now actually gives even more ammo to Russia and China, allowing them to point to unilateral actions by the US gov’t to block a process that everyone had agreed upon earlier.

      Anyway, to the actual lawsuit. It’s dumb. It’s really dumb. If you live in Arizona, Texas, Oklahoma or Nevada, you should be embarrassed for your Attorneys General. Elect better ones next time, please. First of all, they have no standing whatsoever to file this lawsuit. The IANA/top level domain system is not those states. They have no claim here other than “HEY LOOK! POLITICAL FOOTBALL THAT WE CAN GRANDSTAND OVER!” That does not give them standing. The best they can come up with for claiming standing is… uh… “hey, we have some websites.” No, really.

    • Judge Says No Way To Attorneys General Looking To Block IANA Transition

      Well, this isn’t much of a surprise, but following the ridiculous last minute attempt to block the IANA transition by four state attorneys general (who have absolutely no standing or argument), a judge has flatly denied their request for an injunction meaning that the transition is a go for midnight tonight, barring any really last minute unforeseen methods to block it (or a desperate leapfrog to an appeals court).

      Having spent part of the morning responding to clueless conspiracy theorists on my earlier post, I’m sure you’re going to hear the standard ridiculous lizard people warnings about how this is enabling “the UN” or “leftists” and “globalists” to “takeover” the internet and how it will allow China to build the “Great Firewall” into the core functioning of the internet. None of that is even remotely true. What happens tonight at midnight is… nothing, basically. ICANN, which has managed the IANA function through its multistakeholder process for almost two decades… will continue to do so. Nothing changes. The only “change” is that the US Commerce Dept. no longer has to issue a contract to ICANN for the IANA functions. And that’s it.

    • Net Neutrality: BEREC on the Right Path, Let’s Keep the Pressure on

      Net Neutrality is one of central challenge in the application of fundamental rights in the digital space. Too often it has been only considered as a technical or commercial issue, but it has serious impact on the real exercise of right to freedom of speech, right to information and on how the society build and think of itself; but also has important impacts on industrial and commercial issues. La Quadrature du Net has followed this issue since its start in the European debate circa 2009 by trying to defend a definition and wording in EU law of a strict Net Neutrality, protecting users and guaranteeing opportunities of development in a sane digital environment. As the BEREC guidelines for the Telecom Regulation adopted in October 2015 have been published, it is time to come back on the few years of campaign and to present the next fights and challenges for fundamental rights.

      La Quadrature du Net has defended, since 2009 and the first announces of EU works on Net Neutrality, an approach based on the defence of fundamental rights: to secure Net Neutrality, it is to defend the access of all to the Internet network, it is to allow to receive and send information with the same condition for all, it is to guarantee technical condition to a free and fair exercise of freedom of speech and information.

      It was not self-evident: as soon as the subject was within the speeches of Telecom operators and big digital companies, everything was made to consider Net Neutrality only from the perspective of financing Internet traffic and not as a major issue for the balance of the network that determines the quality of access and circulation of the information and services for the users as a whole.

    • A Massive Cable Industry Disinformation Effort Just Crushed The FCC’s Plan For Cable Box Competition

      Back in February the FCC proposed a new plan to bring competition to the cable box. Under the plan, cable providers would need to provide their programming to third party hardware vendors without the need for a CableCARD. The goal? Bring some competition to bear on a stagnant, captive market, resulting in cheaper, more open, and higher quality cable boxes. But because the plan would demolish $21 billion in rental fees while eroding sector control, the cable industry launched one of the most unprecedented lobbying and disinformation efforts I’ve ever seen in 16 years of covering the sector.

      Politicians loyal to the cable industry wrote letters lambasting the FCC for “jeopardizing the incredible evolution of video distribution services,” falsely comparing the idea to Popcorn Time. A flood of editorials magically began appearing in newspapers country wide claiming the FCC’s plan would boost piracy, hurt consumer privacy, and even “steal the future.” The cable sector even trotted out Jesse Jackson, who claimed in a horribly misleading op-ed that increased cable box competition was akin to the “snarling dogs, water hoses and church bombings” of America’s racist history. Seriously.

  • DRM

    • Racing Game Developers Sacrifice Playability On The Altar Of Anti-Piracy, Deliver Laggy Mess To Paying Customers

      So much for the advantages of PC gaming. Build a rig to your specifications and company reps tell you to use bog-standard settings to keep from being tripped up by anti-piracy and anti-hacking asset checks. If gamers wanted a one-size-fits-all gaming experience, they’d have settled for the console version. And there’s no guarantee that will work. The problem has been linked to on-the-fly decryption of game assets, which isn’t going to be solved in all cases by using default video settings.

      There’s a fix on the way but it’s tough to see how the developers are going to get around built-in asset checks that run through Windows EFS. There’s no easy “switch” to turn that off. While I understand developers are concerned about software piracy and cheaters/hackers ruining the online experience of honest players, there’s simply nothing to be gained by irritating those who’ve spent perfectly functional money on deliberately-broken software.

  • Intellectual Monopolies

    • Time To Talk Digital Issues At WTO With Focus On Developing Countries, Forum Hears

      Now is the time for those who want to bring new voices to the digital trade and general trade debate involving the World Trade Organization, says an adviser to a leading security think tank in Switzerland.

      “If the objective is for trade policy to effectively bring in non-traditional voices this is a perfect time for that to take place,” Nick Ashton-Hart, a consultant and associate fellow for the Geneva Centre for Security Policy said at the WTO’s 27-29 September Public Forum yesterday.

    • Uber hires former Google licensing executive in what could be a familiar pre-IPO play

      In a major move in the licensing community, former Google patent executive Kurt Brasch has moved to Uber as senior manager, patents. He joins an IP team led by fellow former Google employee Michael Meehan who jumped ship in February of this year.

      Brasch left Google earlier in the summer as the search giant let go of most of the legacy licensing team that it had picked up through its 2012 acquisition of Motorola Mobility.

      At Google he played a role in the Patent Purchase Promotion and its recent industry-wide successor IP3; helped launch the Patent Starter Program designed to encourage start-ups to join the License on Transfer Network; and led the team behind the 2014 cross licence with Cisco. That series of successes last year led this blog to name him as one of the IP personalities of 2015.

    • Gurry Speaks On Allegations For First Time As WIPO Members Discuss Actions

      Heading into next week’s annual UN World Intellectual Property Organization General Assemblies, WIPO member states are considering a report from the United Nations investigations office regarding allegations of wrongdoing made involving WIPO Director General Francis Gurry. And for first time since the allegations arose, Gurry has offered his defence. Spoiler alert: he neither confirmed nor denied it but raised questions about the legality of sharing the report with member states.

    • Trademarks

      • Supremes to rule on feds’ trademark censorship

        The U.S. Supreme Court has agreed to review the case alleging improper government censorship of a trademark for a band named The Slants, a precedent that also likely will impact significantly the current fight over the Washington NFL team’s name, the Redskins.

        According to the Rutherford Institute, which filed a friend-of-the-court brief in support of the band’s name, the censorship “openly discriminates against speech on the basis of content and viewpoint, violating the most fundamental constitutional guarantees to freedom of expression under the First Amendment.”

        The Asian-American dance rock band sued after the federal government, through its U.S. Patent and Trademark Office, censored them.

      • Can you trademark an offensive name or not? US Supreme Court to decide

        The Supreme Court on Thursday said it would decide, once and for all, whether federal intellectual property regulators can refuse to issue trademarks with disparaging or inappropriate names.

        At the center of the issue is a section of trademark law that actually forbids the US Patent and Trademark Office (USPTO) from approving a trademark if it “consists of or comprises immoral, deceptive, or scandalous matter; or matter which may disparage or falsely suggest a connection with persons, living or dead, institutions, beliefs, or national symbols, or bring them into contempt, or disrepute.”

09.29.16

Links 29/9/2016: Russia Moving to FOSS, New Nmap and PostgreSQL Releases

Posted in News Roundup at 8:53 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Microsoft is no longer Russia’s first choice of technology provider

    Moscow plans to open the replacement cycle by swapping Exchange and Outlook for email systems developed by New Cloud Technologies and distributed by by state-run carrier Rostelecom PJSC, Bloomberg reports. The software will be eventually deployed to as many as 600,000 computers.

    The city is also considering dropping Windows and Office, but state officials are still looking into alternatives, says Moscow’s head of information technology Artem Yermolaev.

    Putin has been pushing for technological independence after American corporations were forced to sever ties with major Russian institutions following the annexation of Crimea back in 2014.

    To actively encourage the adoption of local solutions, Putin’s internet czar German Klimenko has plans to raise taxes on Western tech companies operating within Russia.

  • Moscow Drops Microsoft on Putin’s Call for Self-Sufficiency

    Moscow city will replace Microsoft Corp. programs with domestic software on thousands of computers in answer to President Vladimir Putin’s call for Russia’s authorities to reduce dependence on foreign technology amid tensions with the U.S. and Europe.

    The city will initially replace Microsoft’s Exchange Server and Outlook on 6,000 computers with an e-mail system installed by state-run carrier Rostelecom PJSC, Artem Yermolaev, head of information technology for Moscow, told reporters Tuesday. Moscow may expand deployment of the new software, developed by Russia’s New Cloud Technologies, to as many as 600,000 computers and servers, and may also consider replacing Windows and Office, Yermolaev said.

  • Why Microsoft is getting the cold shoulder from Moscow

    Since the German city of Munich decided to ditch Microsoft Windows and Office, a growing number of European agencies have followed suit – from France’s national police force to the Italian military.

    The latest authority to turn its back on Microsoft is reportedly Moscow City Hall, which is transferring employee email from Microsoft Exchange Server and Outlook to the Russian-built MyOffice Mail.

    About 6,000 Moscow state employees will be switched over, including teachers, doctors and civil servants. If the move is a success, the city will consider shifting 600,000 PCs and servers away from Microsoft, and may also replace Windows and Office, according to Bloomberg.

  • Moscow will replace Microsoft’s products with local offerings

    Microsoft might lose a whole city of customers in Russia. According to Bloomberg, Moscow will begin replacing Redmond’s products with homegrown software as a result of Vladimir Putin’s urging to stop depending on foreign tech. Artem Yermolaev, the city’s head of information technology, told reporters that Moscow will begin by dropping Microsoft’s Exchange Service and by replacing Outlook on 6,000 computers with state-run carrier Rostelecom PJSC’s email system. Authorities are looking to deploy the email software to as many as 600,000 computers in the future. They might even replace Windows and the Office suite entirely, though there seems to be no solid plan for that at the moment.

  • Desktop

    • Alphabet’s Plans to Create Android PCs Should Make Microsoft a Little Nervous

      Four years after Microsoft (MSFT) first tried to give the world unified PC/mobile operating systems via the dual fiascoes known as Windows 8 and Windows RT, Alphabet’s (GOOGL) Google appears set to take its own stab at the concept. And there are reasons to think the company will see a measure of success.

      Citing “two independent and reliable sources,” Android Police reports Google plans to launch a notebook in the third quarter of 2017 that will likely be the first new device to showcase Andromeda, a version of Android that will integrate many features associated with Google’s Chrome OS PC operating system.

      The notebook will reportedly be called the Pixel 3, and carry a $788 price. Its feature set reportedly include a 12.3-inch display, an Intel (INTC) processor, a glass trackpad, a tablet mode and stylus support.

    • 4 of the Best Linux Distros for Windows Users

      For the past year Microsoft has offered free upgrades to their latest operating system, Windows 10. This was mainly due to the fact that Windows 8 and 8.1 were poorly received, especially when compared to Windows 7. Unfortunately the free upgrade period has passed, so if you want to give Windows 10 a try, you’ll have to dig into your wallet to do it. If your faith in the tech giant has waned over the years, you’re not alone. The latest versions of Windows have all been heavily criticized, proving that they have been a far cry from the world dominance of Windows XP.

      If you’re one of the many people turned off by the latest iterations of Windows, the jump to Linux might look very appealing. Unfortunately, a new OS often comes with a steep learning curve. Windows, with the exception of the fumble that was 8, has more or less looked and behaved the same for years. Having to re-learn everything can be a daunting task, one that could pressure you into staying with Windows forever.

      However, you do have options. There are many different distributions of Linux out there, with some aiming to replicate the look and feel of Windows. The goal of this is to make transitioning relatively painless. With Linux boasting improved hardware support, long term stability and a wider range of software applications, there is no better time to try it out!

    • Microsoft Applications and Services chief Qi Lu leaves the company [Ed: Microsoft exodus)

      Lu has been heading up the Applications and Services Group — the unit that has encompassed the Office applications team and the Bing search team.

      In an email to employees on September 29, CEO Satya Nadella announced Lu was leaving so as to recover from “health conditions caused by a prior injury.” (A couple of other reports, including the Wall Street Journal’s, say Lu’s injury was related to a biking accident.)

      Lu will continue to act as a “personal advisor” to Nadella and Microsoft Founder Bill Gates after his recovery, but he won’t be returning in his former role, Nadella said in his mail.

  • Server

    • Linux servers deliver greater performance and efficiency ‘than available on any x86-based server’
    • What are configuration management tools?

      For most people, computers don’t stay the same. Software is added, removed, and updated. Configurations are changed. Think about the changes you’ve made to your computer since the first time you booted it up. Now imagine making those changes to 10, 100, or 1,000 more computers. Configuration management tools are what make implemententing and enforcing these changes possible.

    • 5 new OpenStack tutorials and guides
    • Ericsson: The Journey to a DevOps Future in SDN

      There are big transformations going on in the world today that are driving rapid changes to the business of networks, said Santiago Rodriguez, VP of Engineering and head of the product development unit SDN & Policy Control at Ericsson, in his keynote Tuesday at OpenDaylight Summit.

      “Society is transforming, the way we do business is transforming, and accordingly the way we build our networks is transforming,” Rodriguez said.

      The three pillars of this network transformation include: 5G, virtualization and open source.

    • OpenDaylight sets product quality label, metrics for SDN solutions

      Initial OpenDaylight-based products expected to receive the “Powered by OpenDaylight” mark are offerings from Brocade, Ericsson, HPE, Inocybe and Serro.

    • Telstra Sees Quadrupled Data Capacity by 2020

      The latter service led Telstra to re-think its fiber deployment strategy, choosing to use pre-provisioned fiber connections to data centers in advance of customer demand, because the company knew that demand was coming, Blackall said. The strategy worked well with Telstra’s acquisition of Pacnet, which had already deployed SDN capabilities to connect its 27 points of presence around Asia.

    • The Tiny Internet Project, Part I

      As LJ readers well know, Linux drives many of the technologies we use every day, from smart TVs to Web servers. Linux is everywhere—except most homes and classrooms.

      That’s a problem if we want to help breed the next generation of engineers and computer scientists. In fact, if teenagers (or any other group of curious individuals) want to learn about Linux, they often must rely on a geeky friend or parent willing to show them the way.

      This three-part series seeks to change that by offering a way for anyone to learn about Linux by building what is essentially a tiny, self-contained Internet. Using old equipment and free software, you’ll build a private network (with your own domain name), build Web sites, set up an e-mail server, install and use a database, and set up a Linux distro mirror.

      Read more

  • Kernel Space

    • Graphics Stack

    • Benchmarks

      • Ubuntu 16.10 Doesn’t Change Much With Performance, Clear Linux Still Leads In Most Tests

        Given yesterday’s Ubuntu 16.10 final beta release ahead of the official “Yakkety Yak” debut in two weeks, I decided to run some benchmarks of Ubuntu 16.10 compared to Ubuntu 16.04.1 LTS on the same system plus also throwing in the Intel Clear Linux distribution given it tends to be one of the most performant.

        For those that haven’t yet tried out Ubuntu 16.10 nor followed its development, GCC 6.2 is now the default compiler in place of GCC 5.4 from Ubuntu 16.04 LTS. Mesa 12.0.3 provides the stock graphics drivers and Linux 4.8 is the stock kernel.

      • DDR4 Memory Speed Tests With The Core i7 6800K On Ubuntu Linux

        A few days ago I posted my first Core i7 6800K benchmarks under Ubuntu Linux compared to various other CPUs. Out of requests from some premium members, here are some straight-forward memory clocking tests of the i7-6800K on Ubuntu 16.04 LTS with the Linux 4.8 kernel. Tests were done from dual-channel DDR4 up through quad-channel DDR4 at DDR4-3000MHz.

  • Applications

  • Desktop Environments/WMs

    • GNOME Desktop/GTK

      • GNOME Calendar Pencils In Great New Features

        GNOME Calendar is one of the few decent desktop calendaring apps available on Linux — and it’s going to get better.

      • The future of GNOME Calendar

        Today, the Calendar Team had the first meeting in history. Isaque, Lapo, Renata, Vamsi and I attended it, and the meeting was extremely productive! In fact, we were able to sketch out the general direction that GNOME Calendar will head towards.

  • Distributions

    • Endless OS 3: Linux for the Net Less

      In the West, we take the Internet for granted. Oh, we may grumble about a slow connection, but that’s a first-world problem. For many, however, the Internet is a “maybe” thing. For those users, Endless’s Endless OS 3, may be just what they need.

    • New Releases

      • Qubes OS 3.2 has been released!

        I’m happy to announce that today we’re releasing Qubes OS 3.2!

        This is an incremental improvement over the 3.1 version that we released earlier this year. A lot of work went into making this release more polished, more stable and easier to use than our previous releases.

        One major feature that we’ve improved upon in this release is our integrated management infrastructure, which was introduced in Qubes 3.1. Whereas before it was only possible to manage whole VMs, it is now possible to manage the insides of VMs as well.

      • Security-Oriented Qubes OS 3.2 Improves the Integrated Management Infrastructure

        Today, September 29, 2016, Joanna Rutkowska announced the general availability of the second point release of the Qubes OS 3 stable series of the security-oriented and open-source Linux-based computer operating system.

        Qubes OS 3.2 is a maintenance release, which means that it mostly adds general fixes and improvements to various of the distribution’s core components and functionalities, including the integrated management infrastructure that was introduced as part of the previous update, Qubes 3.1, allowing users to also manage the “insides” of a virtual machine.

      • Alpine Linux 3.4.4 Is Out, Ships with Linux Kernel 4.4.22 LTS, OpenSSL Patches

        Today, September 28, 2016, Alpine Linux creator and lead developer Natanael Cop has the pleasure of announcing the release of the fourth maintenance update to the latest stable Alpine Linux 3.4 server-oriented operating system series.

        Alpine Linux 3.4.4 is out as the most advanced version, powered by the recently released, long-term supported Linux 4.4.22 kernel and bringing up-to-date components to make your Alpine Linux-based server(s) more stable and reliable than ever. Most of the core components have been updated, but the most important one is OpenSSL 1.0.2j, which received the latest security fixes, just like in the rest of the GNU/Linux distros.

    • Red Hat Family

      • Software Company Red Hat banks on India to hit $ 5 billion turnover in 5 years

        Red Hat, the open-source software company, said its India business was growing at more than double the rate of the overall company and would be an important contributor to its target of reaching $5 billion in the next five years.

        Red Hat has over $2 billion in annual revenue currently and grew over 21% in constant currency last year. Open-source software is freely available, so Red Hat’s business model depends on customers paying for the support and service it offers and not on license fees, making the company’s offerings typically cheaper than proprietary software. “India is one of our fastest growing markets. Red Hat does really when there is net new infrastructure to be set up. And the rapid pace of development that India is seeing sets really well with our offerings,” James Whitehurst, CEO of Red Hat, told ET.

      • Red Hat claims headway in Asia, bets big on container and hybrid cloud

        While the smallest in terms of revenue contribution, Asia is Red Hat’s fastest growing region and is likely to continue its upwards trajectory as emerging markets roll out new infrastructure.

        Developing nations in the region were embarking on many net new infrastructure projects, rather than replacement for existing technology, and open source would be involved in a large share of such projects. The decisions on which technology to deploy would rarely be between proprietary or open source, but rather on which open source vendor to go with or to do so internally, said Red Hat President and CEO Jim Whitehurst.

      • Finance

      • Fedora

        • Node.js 6.x LTS coming to EPEL 7

          Node.js® is a JavaScript runtime built on Chrome’s V8 JavaScript engine. It uses an event-driven, non-blocking I/O model that makes it lightweight and efficient. Its package ecosystem, npm, is the largest ecosystem of open source libraries in the world. You can read more about Node.js at the project website.

        • Switched to HTTPS

          Perhaps you already noticed it, I have switched all the sites for a secured browsing using HTTPS.

          So, new addresses are:

          https://blog.remirepo.net/ for this Blog (with an automatic and permanent redirection)
          https://forum.remirepo.net/ for the Forum (with an automatic and permanent redirection)
          https://rpms.remirepo.net/ for the Repository, but classical address stay available.

        • Fedora Hubs: Getting started

          Fedora Hubs provides a consistent contributor experience across all Fedora teams and will serve as an “intranet” page for the Fedora Project. There are many different projects in Fedora with different processes and workflows. Hubs will serve as a single place for contributors to learn about and contribute to them in a standardized format. Hubs will also be a social network for Fedora contributors. It is designed as one place to go to keep up with everything and everybody across the project in ways that aren’t currently possible.

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu’s Shuttleworth Explains Why Not All Containers are the Same

            Mark Shuttleworth, the founder of Ubuntu Linux, was an early backer of OpenStack as well as containers. This week, Shuttleworth’s company Canonical announced new commercial support for Kubernetes, which is a widely deployed container orchestration and management engine.

            In an interview with Datamation Shuttleworth emphasized that it’s important to understand the different use cases for containers and what the different types of container systems are all about.

          • Ubuntu Linux 16.10 ‘Yakkety Yak’ Beta 2 open source OS now available for download
          • Canonical Jumps On The Container Management Bandwagon With A Commercial Kubernetes Offering
          • ​Ubuntu’s new take on Kubernetes
          • When two tribes go to war: Docker Swarm on the left, easier-to-install Kubernetes on the right
          • Canonical Launches Commercial Support for Kubernetes
          • Canonical Releases Snapcraft 2.18 Tool for Creating Snaps in Ubuntu 16.04 LTS

            Canonical, through Sergio Schvezov, announced the release of yet another maintenance update to the Snapcraft open-source utility that helps application developers package their apps as Snaps.

          • Ubuntu Budgie Remix 16.10 Beta 2 Officially Released with Budgie Desktop 10.2.7

            Softpedia was informed today, September 29, 2016, by David Mohammed from the budgie-remix project about the availability of the second and last Beta release of the upcoming Ubuntu Budgie Remix 16.10 operating system.

            Coming hot on the heels of yesterday’s Ubuntu 16.10 (Yakkety Yak) Final Beta release, Ubuntu Budgie Remix 16.10 Beta 2 is based on most of the GNU/Linux and Open Source technologies used in Ubuntu 16.10, such as systemd 231 and Linux kernel 4.8, but it’s built around the latest version of the beautiful Budgie desktop environment created by the Solus Project.

          • Budgie-Remix Makes Progress With Ubuntu 16.10 Base, Beta 2 Released

            Budgie-Remix, the unofficial Ubuntu spin making use of the Budgie Desktop, has released its 16.10 Beta 2 milestone following this week’s Yakkety Yak Beta 2 release.

            Budgie-Remix is re-based to the latest Ubuntu 16.10 Yakkety package changes. In addition, a number of the Budgie-0Remix packages have been working their way into Debian proper and thus are available to Ubuntu 16.10 users via the official channels. Now available this way is the budgie-desktop package, Moka icon theme, Faba icon theme, and the Arc theme. The Ubuntu repository has also pulled in the Budgie artwork and wallpaper packages too.

          • Yakkety Yak Final Beta Released
          • Canonical Launches Commercial Support for Kubernetes

            Canonical, the lead commercial vendor behind the open-source Ubuntu Linux operating system, is getting into the Kubernetes market. Canonical now offers a freely available implementation of Kubernetes as well as commercial-support options.

            “I have no doubt that Kubernetes will be one of the major container co-ordination systems,” Mark Shuttleworth, founder of Ubuntu, told ServerWatch.

          • [How To] Build an Ubuntu Controlled Sous-Vide Cooker

            I’ll be honest with you from the off: I had zero idea what sous-vide cooking was before I started writing this post. Wikipedia dutifully informs me that’s Sous-Vide is a style of cooking that involves a vacuum, bags, and steam.

          • Flavours and Variants

            • Ubuntu Studio 16.10 to Offer an Up-to-Date Multimedia Oriented Linux Distro

              We reported earlier today, September 28, 2016, on the availability of the Final Beta (Beta 2) development milestone of the upcoming Ubuntu 16.10 (Yakkety Yak) operating system and its official derivatives.

              We’ve already talked here about what’s new in the Beta 2 of Ubuntu MATE 16.10, Lubuntu 16.10, and Kubuntu 16.10, and now we would like to tell you a little bit about Ubuntu Studio 16.10, which promises to offer users an up-to-date multimedia oriented Linux-based operating system.

              That’s right, it looks like today’s Ubuntu Studio 16.10 (Yakkety Yak) Beta 2 snapshot comes with all the latest software releases and a bunch of new apps that you might need for audio, video, or graphics processing jobs. But first, we need to tell you that Ubuntu Studio 16.10 is powered by a low-latency Linux 4.8 kernel.

            • Ubuntu GNOME 16.10 Beta 2 Released with Many Apps from the GNOME 3.22 Stack

              As part of yesterday’s Ubuntu 16.10 (Yakkety Yak) Final Beta launch, some of the opt-in flavors received their Beta 2 release, including Ubuntu GNOME 16.10, about which we would like to tell you all about in this article.

            • Linux Mint’s XApps to Get Screen Blanking, Sublime-like Search Bar Lands for Xed

              We already know that work on Linux Mint 18.1, the next major release of the popular Ubuntu-based operating system loved by many users, already begun, and Clement Lefebvre shares with us today some of the improvements coming to XApps.

            • Mintbox Mini Pro

              MintBox Mini Pro

              The new model is called “Mintbox Mini Pro”, it’s just as small as the original Mintbox Mini but with much better specifications.

            • Mintbox Mini Pro Linux Mini PC Launches For $395

              This week a new version of the popular Mintbox Mini Linux PC has been launched for $395 in the form of the Mintbox Mini Pro which is now equipped with 120 GB of SSD mSATA together with 64-bit AMD A10-Micro6700T system-on-a-chip with Radeon R6 graphics and features 8GB of DDR3L.

              The latest Mintbox Mini Pro is shipped preloaded with the awesome Linux Mint 18 operating system and includes a microSD card slot a serial port, and a micro SIM card reader.
              The new Mintbox Mini Pro is the same size as the original and measures 4.3 x 3.3 x 0.9 inches in size and weighs in at around 255g. The Linux mini PC incorporates a fanless design and features an all-metal case made of aluminium and zinc.

  • Devices/Embedded

    • Expandable, outdoor IoT gateway runs Android on i.MX6

      VIA’s “Artigo A830” IoT gateway runs Android on an i.MX6 DualLite SoC and offers HDMI, GbE, microSD, numerous serial and USB ports, plus -20 to 60° operation.

      As the name suggests, the VIA Technologies Artigo A830 Streetwise IoT Platform is designed for outdoor Internet of Things gateway applications. These are said to include smart lockers, vending machines, information kiosks, and signage devices that run “intensive multimedia shopping, entertainment, and navigation applications.” The outdoors focus is supported with an extended -20 to 60°C operating range, as well as surge and ESD protection for surviving challenges such as a nearby lightning strike.

    • Raspberry Pi Announces PIXEL Desktop Environment

      Today the Raspberry Pi Foundation formally announced the Raspberry Pi PIXEL, their own desktop that will be used in future Raspbian spins.

      PIXEL is short for Pi Improved Xwindows Environment, Lightweight desktop. PIXEL is derived from the LXDE desktop environment but with both appearance and fundamental changes, including some new applications.

    • Raspberry Pi Foundation Unveils New LXDE-Based Desktop for Raspbian Called PIXEL

      Today, September 28, 2016, Raspberry Pi Foundation’s Simon Long proudly unveiled a new desktop environment for the Debian-based Raspbian GNU/Linux operating system for Raspberry Pi devices.

      Until today, Raspbian shiped with the well-known and lightweight LXDE desktop environment, which looks pretty much the same as on any other Linux-based distribution out there that is built around LXDE (Lightweight X11 Desktop Environment). But Simon Long, a UX engineer working for Raspberry Pi Foundation was hired to make it better, transform it into something that’s more appealing to users.

    • MintBox Mini updated with faster AMD SoC and 8GB RAM

      CompuLab’s Linux Mint flavored MintBox Mini Pro mini-PC updates the Mini with an AMD A10 Micro-6700T, plus BT 4.0, mini-PCIe, and twice the RAM and storage.

      The CompuLab built, $395 MintBox Mini Pro, which ships with the Linux Mint 18 Cinnamon distribution, updates the $295 MintBox Mini with a lot more performance and features in the same compact 108 x 83 x 24mm footprint. That’s considerably smaller than earlier collaborations between CompuLab and the Linux Mint project, such as the circa-2013 MintBox 2.

    • Phones

      • Android

        • ​Google beats back Oracle again in Java Android case

          To recap, Oracle claimed the 37 Java application programming interface (API) packages Google used to develop Android are covered by copyright. Of course, that’s not really the issue. True, the the US Federal Circuit Court of Appeals foolishly ruled that APIs could be copyrighted. But the US District Court for the Northern District of California ruled in May 2016 that Google’s use of the Java APIs were not subject to copyright licensing fees. Instead, Android’s use of the APIs was covered by “fair use.”

        • Google’s Open Source Fuchsia OS: The Mystery Linux Distro

          Few things are more tantalizing than a good mystery, and Google is making waves for an open source-centric mystery that may end up having profound implications. It all started in August when an extensive and unusual code repository for a new operating system called Fuchsia was discovered online, and now the growing source code set is on GitHub.

          Thus far, Google officials have been mostly mum on the aim of this operating system, although they have made a few things clear in chat forums. Two developers listed on Fuchsia’s GitHub page — Christopher Anderson and Brian Swetland — are known for their work with embedded systems. The Verge, among other sites, has made a few logical deductions about the possible embedded systems focus for Fuchsia: “Looking into Fuchsia’s code points gives us a few clues. For example, the OS is built on Magenta, a “medium-sized microkernel” that is itself based on a project called LittleKernel, which is designed to be used in embedded systems,” the site reports.

          The GitHub postings that confirm that Fuchsia is based on Magenta are particularly notable because Magenta has had applications in the embedded systems space. Here are some direct quotes: “Magenta is a new kernel that powers the Fuchsia OS. Magenta is composed of a microkernel as well as a small set of userspace services, drivers, and libraries necessary for the system to boot, talk to hardware, load userspace processes and run them, etc. Fuchsia builds a much larger OS on top of this foundation.”

        • As Blackberry pulls out of handset business it has some big patent strategy calls to make
        • Luna Launcher turns your Android phone into a kid-friendly device

          On the fence about whether your child is old enough for their own smartphone? A new app called Luna Launcher can help you warm to the idea, by offering a simple way to limit access to select apps and actions, including who they can call or text – a list you can restrict to family members, for example. Of course, because of the way it needs to interact with your phone’s operating system in order to restrict access, Luna Launcher is only available on Android.

        • Google delays launch of Android Wear 2.0 to next year

          Google’s next-generation smartwatch platform, Android Wear 2.0, will not be seeing the light of day this year. The company announced today that it is delaying the launch of the update, which was originally scheduled for this fall, to sometime in early 2017.

          Instead of launching the final version this fall, Google is extending the developer preview program for Android Wear 2.0, and today it’s releasing the third preview of the platform for developers. The company says that it is using the extra time to fine tune the software via feedback from developers, and it will have another preview build released before the end of the year. Today’s version adds a number of new features, most notable of which is the Play Store for smartwatches.

        • Moto Z series and G4 Plus getting Android 7.0 Nougat update in Q4
        • Android Wear watches aren’t connecting to the iPhone 7
        • Many Android Wear watches aren’t working with the iPhone 7
        • Google Maps gains new voice commands on Android
        • OnePlus 3 Android 7.0 Nougat update is in the works
        • Huawei will introduce its next flagship on November 3
        • This is Google Cloud and G Suite
        • Exchange email down for Android and iOS users

          Microsoft Exchange mobile users on Android and iOS users have been unable to access emails on their phones due to a planned shift away from its Exchange Active Sync (EAS) protocol.

          The issue first appeared yesterday and is still affecting users.

          One customer got in touch to say: “Exchange Mobile device access seems to be up the Swanny for iOS and Android users.” They quipped: “Fortunately neither of the Windows Mobile users are affected.”

        • Latest Fitbit Blaze firmware update finally makes the tracker worth buying

          The Fitbit Blaze is a deceptive little fitness tracker. It may look like a smartwatch on the surface, but dive a little deeper and you’ll find it’s actually missing most of the smartwatch-y features we’ve come to expect from fitness tracker/smartwatch hybrids. When we reviewed the Blaze a few months ago, the lack of third-party notification support and poor selection of watch faces were some of our biggest gripes with this tracker. Thankfully Fitbit has finally heard our cries and released a new update that fixes these issues.

        • Android Wear watches aren’t connecting to the iPhone 7

          One of Android Wear’s biggest strengths is it that the platform is designed to be cross compatible with Android and iOS. However, a number of consumers are reporting that they can’t connected a range of Android Wear smartwatches up to the new iPhone 7 or iPhone 7 Plus.

        • Multiple Android Wear smartwatches are not pairing with the iPhone 7
        • Google Allo rockets past 5 million downloads
        • BlackBerry to stop developing its own hardware, will rely on manufacturing partners instead
        • How to copy music to your Android phone
        • Spaces v1.7 adds capability to save posted images [APK Download]
        • Firefox Aurora arrives on the Play Store in “unreleased” state
        • Mercedes and Kia add new Android Auto models

          Buying a new car comes with myriad of considerations. Is it fuel efficient? Is it safe? Will it play nicely with my phone? People sometimes neglect the last one, but you’re going to be carrying the phone literally every time you get in the car, so why not make sure? Mercedes and Kia seem to get that. They’ve added support for Android Auto to a ton of new cars today.

        • Sony Xperia X Compact review: Small Android is still good, but not much better

          Sony’s Xperia X Compact is basically the newest version of the Z5 Compact that hit the US earlier this year. But just because it’s a newer version of the (comparatively) tiny handset doesn’t mean it’s an upgrade in every way. Sony is pushing the camera sensors in the X Compact and the flagship-level XZ, as well as new features like five-axis image stabilization and HDR photo mode. Sony knows cameras, so we know the shooter in the X Compact will at least be competent. However, it has to be good enough to encourage photography buffs to shell out $499 for this unlocked handset while delivering solid performance across the board as well.

        • How I Use Android: Android Central Editor Emeritus Phil Nickinson

          In the meantime, I was able to convince Phil to step out of his metaphorical kitchen for a few minutes to chat about how he uses Android in his day-to-day life. This is a man who has seen and used practically every Android device over the past several years, after all — and a fair number of apps and customization tools, to boot.

          So what devices does someone with so much knowledge carry around in his own trousers, and how does he make the most of what they have to offer?

          Enough with the suspense already. In his own words, this is how Phil Nickinson uses Android.

        • Best Android Phones Under 5.7 Inches

          There’s no question that Samsung hit a home run with its Galaxy S7 line. We already think the smaller GS7 is the best phone under 5.2 inches, and the larger, curved-screen Galaxy S7 edge is our pick for the best phone under 5.7 inches. Why? It takes everything we love about the smaller phone and makes it bigger — but not too much.

Free Software/Open Source

  • But is it safe? Uncork a bottle of vintage open-source FUD

    Most of the open source questioners come from larger organisations. Banks very rarely pop up here, and governments have long been hip to using open source. Both have ancient, proprietary systems in place here and there that are finally crumbling to dust and need replacing fast. Their concerns are more oft around risk management and picking the right projects.

    It’s usually organisations whose business is dealing with actual three dimensional objects that ask about open source. Manufacturing, industrials, oil and gas, mining, and others who have typically looked at IT as, at best, a helper for their business rather than a core product enabler.

    These industries are witnessing the lighting fast injection of software into their products – that whole “Internet of Things” jag we keep hearing about. Companies here are being forced to look at both using open source in their products and shipping open source as part of their business.

    The technical and pricing requirements for IoT scale software is a perfect fit for open source, especially that pricing bit. On the other end – peddling open source themselves – companies that are looking to build and sell software-driven “platforms” are finding that partners and developers are not so keen to join closed source ecosystems.

    These two pulls create some weird clunking in the heads of management at these companies who aren’t used to working with a sandles and rainbow frame of mind. They have a scepticism born of their inexperience with open source. Let’s address some of their trepidation.

  • Real business innovation begins with open practices

    To business leaders, “open source” often sounds too altruistic—and altruism is in short supply on the average balance sheet. But using and contributing to open source makes hard-nosed business sense, particularly as a way of increasing innovation.

    Today’s firms all face increased competition and dynamic markets. Yesterday’s big bang can easily become today’s cautionary tale. Strategically, the only viable response to this disruption is constantly striving to serve customers better through sustained and continuous innovation. But delivering innovation is hard; the key is to embrace open and collaborative innovation across organizational walls—open innovation.

    Open source communities’ values and practices generate open innovation, and working in open source is a practical, pragmatic way of delivering innovation. To avoid the all-too-real risk of buzzword bingo we can consider two definitions of “innovation”:

    creating value (that serves customer needs) to sell for a profit; or
    reducing what a firm pays for services.

  • Minijail: Running Untrusted Programs Safely by Jorge Lucangeli Obes, Google
  • Minijail: Google’s Tool To Safely Run Untrusted Programs

    Google’s Minijail sandboxing tool could be used by developers and sysadmins to run untrusted programs safely for debugging and security checks, according to Google Software Engineer Jorge Lucangeli Obes, who spoke last month at the Linux Security Summit. Obes is the platform security lead for Brillo, Google’s Android-based operating system for Internet-connected devices.

    Minijail was designed for sandboxing on Chrome OS and Android, to handle “anything that the Linux kernels grew.” Obes shared that Google teams use it on the server side, for build farms, for fuzzing, and pretty much everywhere.

    Since “essentially one bug separates you and any random attacker,” Google wanted to create a reliable means to swiftly identify problems with privileges and exploits in app development and easily enable developers to “do the right thing.”

    The tool is designed to assist admins who struggle with deciding what permissions their software actually needs, and developers who are vexed with trying to second guess which environment the software is going to run in. In both cases, sandboxing and privilege dropping tends to be a hit or miss affair.

    Even when developers use the privilege dropping mechanisms provided by the Linux kernel, sometimes things go awry due to numerous pitfalls along that path. One common example Obes cited was trying to ride a switch user function that will drop-root and then forgetting to check the result of the situation relief, or setuid function, afterwards.

  • Intel and Cloudera Give Apache an Open Source Data/Security Tool

    For the past year, we’ve taken note of the many Big Data projects that the Apache Software Foundation has been elevating to Top-Level Status. The organization incubates more than 350 open source projects and initiatives, and has squarely turned its focus to Big Data and developer-focused tools in recent months. As Apache moves Big Data projects to Top-Level Status, they gain valuable community support.

    Recently, the foundation announced that Apache Kudu has graduated from the Apache Incubator to become a Top-Level Project (TLP). Kudu is an open source columnar storage engine built for the Apache Hadoop ecosystem designed to enable flexible, high-performance analytic pipelines. And, Apache Twill has graduated as well. Twill is an abstraction over Apache Hadoop YARN that reduces the complexity of developing distributed Hadoop applications, allowing developers to focus more on their application logic. In another Apache-related Big Data move, Cloudera and Intel have announced that they’ve contributed a new open-source project to the Apache Software Foundation targeted at using Big Data analytics and machine learning for cybersecurity.

  • Twitter Open Sources Stream Processing Engine Heron

    Twitter announced the open sourcing of Heron, a stream-processing engine that is a successor to Apache Storm. Heron is backwards compatible with Apache Storm, which eases its adoption amongst developers. Heron has replaced Apache Storm as the stream data processing engine inside Twitter due to its scalability, debug-ability, ability to work in a shared cluster infrastructure and better performance. A comprehensive list of features is listed in the documentation.

  • Events

    • PyCon 2016

      I come from a place where everyone worships competitive coding and thus cpp, so the experience of attending my first pycon was much awaited for me.

      This year’s PyCon India happened in Delhi and i along with a couple of my friends reached on 23rd September, the first day. We were a bit late but it was all right because, we didn’t miss anything.

    • What do you have to say? Share it at LibrePlanet 2017
    • LibrePlanet returns March 25-26, 2017, call for proposals for annual free software conference now open

      LibrePlanet is an annual conference for free software enthusiasts. The conference brings together software developers, policy experts, activists and computer users to learn skills, share accomplishments and face challenges to software freedom. Newcomers are always welcome, and LibrePlanet 2017 will feature programming for all ages and experience levels.

      This year, the theme of LibrePlanet is “The Roots of Freedom.” This encompasses the historical “roots” of the free software movement — the Four Freedoms, the GNU General Public License and copyleft, and a focus on strong security and privacy protections — and the concept of roots as a strong foundation from which the movement grows.

      “LibrePlanet is an impactful, exciting free software conference. Attendance has grown each year, yet the community-minded atmosphere has grown even stronger,” said John Sullivan, executive director of the FSF.

    • The Linux Foundation Announces Session Lineup for MesosCon Asia

      The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the schedule for MesosCon Asia, taking place November 18-19 in Hangzhou, China.

    • Tencent: Transforming Networks with SDN

      “SDN can really transform the way we do networks,” said Tom Bie, VP of Technology & Operation of Data Center, Networking and Server, Tencent, during his Wednesday keynote address at the Open Daylight Summit. The China telecom giant should know about the issues of massive scale networks: they have more than 200 million users for QQ instant messaging, 300 million users of their payment service, and more than 800 million users of their VChat service. Bie noted that Tencent also operates one of the largest gaming networks in the world, along with video services, audio services, online literature services, news portals, and a range other digital content services.

    • The Second Wave of Platforms, an Interview with Cloud Foundry’s Sam Ramji

      In today’s world of platforms, services are increasingly connected. In the past, PaaS offerings were pretty much isolated. It’s that new connected infrastructure that is driving the growth of Cloud Foundry, the open source, service-oriented platform technology.

      Sam Ramji is CEO of Cloud Foundry, which is holding its European event in Frankfurt this week. At the conference, we spoke with Ramji to discuss, among other topics:

  • Web Browsers

    • Mozilla

      • This Week In Servo 79

        In the last week, we landed 96 PRs in the Servo organization’s repositories.

        Promise support has arrived in Servo, thanks to hard work by jdm, dati91, and mmatyas! This does not fully implement microtasks, but unblocks the uses of Promises in many places (e.g., the WebBluetooth test suite).

        Emilio rewrote the bindings generation code for rust-bindgen, dramatically improving the flow of the code and output generated when producing Rust bindings for C and C++ code.

        The TPAC WebBluetooth standards meeting talked a bit about the great progress by the team at the University of Szeged in the context of Servo.

      • Servo Web Engine Now Supports Promises, Continues Churning Along

        It’s been nearly two months since last writing about Mozilla’s Servo web layout engine (in early August, back when WebRender2 landed) but development has kept up and they continue enabling more features for this next-generation alternative to Gecko.

        The latest is that Servo now supports JavaScript promises. If you are unfamiliar with the promise support, see this guide.

        The latest Servo code has improvements around its Rust binding generator for C and C++ code plus other changes.

      • Announcing Rust 1.12

        The Rust team is happy to announce the latest version of Rust, 1.12. Rust is a systems programming language with the slogan “fast, reliable, productive: pick three.”

        As always, you can install Rust 1.12 from the appropriate page on our website, and check out the detailed release notes for 1.12 on GitHub. 1361 patches were landed in this release.

      • Rust 1.12 Programming Language Released

        Rust 1.12 has been released as the newest version of this popular programming language with a focus on “fast, reliable, productive: pick three.”

  • SaaS/Back End

  • Databases

    • Riak TS for time series analysis at scale

      Until recently, doing time series analysis at scale was expensive and almost exclusively the domain of large enterprises. What made time series a hard and expensive problem to tackle? Until the advent of the NoSQL database, scaling up to meet increasing velocity and volumes of data generally meant scaling hardware vertically by adding CPUs, memory, or additional hard drives. When combined with database licensing models that charged per processor core, the cost of scaling was simply out of reach for most.

      Fortunately, the open source community is democratising large scale data analysis rapidly, and I am lucky enough to work at a company making contributions in this space. In my talk at All Things Open this year, I’ll introduce Riak TS, a key-value database optimized to store and retrieve time series data for massive data sets, and demonstrate how to use it in conjunction with three other open source tools—Python, Pandas, and Jupyter—to build a completely open source time series analysis platform. And it doesn’t take all that long.

    • PostgreSQL 9.6 released

      PostgreSQL 9.6, the latest version of the world’s leading open source database, was released today by the PostgreSQL Global Development Group. This release will allow users to both scale up and scale out high performance database workloads. New features include parallel query, synchronous replication improvements, phrase search, and improvements to performance and usability, as well as many more features.

    • PostgreSQL 9.6 Officially Released With Parallel Query Support
  • Oracle/Java/LibreOffice

    • LibreOffice Office Suite Celebrates 6 Years of Activity with LibreOffice 5.2.2

      Today, September 29, 2016, Italo Vignoli from The Document Foundation informs Softpedia via an email announcement about the general availability of the first point release of the LibreOffice 5.2 open-source and cross-platform office suite.

      On September 28, the LibreOffice project celebrated its 6th anniversary, and what better way to celebrate than to push a new update of the popular open source and cross-platform office suite used by millions of computer users worldwide. Therefore, we would like to inform our readers about the general availability of LibreOffice 5.2.2, which comes just three weeks after the release of LibreOffice 5.2.1.

      “Just one day after the project 6th anniversary, The Document Foundation (TDF) announces the availability of LibreOffice 5.2.2, the second minor release of the LibreOffice 5.2 family,” says Italo Vignoli. “LibreOffice 5.2.2, targeted at technology enthusiasts, early adopters and power users, provides a number of fixes over the major release announced in August.”

    • LibreOffice at 6, New Souped up Mint Mini

      September 28 was the official birthday for LibreOffice and Italo Vignoli looked back at some of the milestones for the project. Elsewhere, the Ubuntu family got new betas and Clement Lefebvre announced a new Mintbox Mini. Jack M. Germain reviewed Panther OS and Ryan Lynch recommended four distributions for Windows users.

      Happy Birthday LibreOffice! It was officially six years ago September 28 that The Document Foundation and LibreOffice were announced. The project consisted of former OpenOffice.org developers and volunteered who feared the worst after its sale to Oracle. Since that time, LibreOffice has grown and matured into an award winning Open Source office suite. Group photos taken at the LibreOffice conference at Brno were also shared including one of the attendees who were there on day one, as Bjoern Michaelsen explained. Although they were the seed, the project has grown to hundreds of contributors from all over the world. Italio Vignoli said the project attracted new developers every month for 72 straight months. He also said tomorrow begins the LibreOffice 5.3 developmental cycle, which is planned for release in January 2017.

    • Merging Communities
    • Happy 6th Birthday, LibreOffice
    • LibreOffice 5.2.2 Now Available to Download
  • Pseudo-Open Source (Openwashing)

  • BSD

    • FreeBSD 11.0-RELEASE Needs To Be Respun Due To Security Issues

      The delayed FreeBSD 11.0 release just suffered another last-minute set-back. While “FreeBSD 11.0-RELEASE images” were distributed to FTP mirrors and the official announcement expected today, these images need to be re-spun to contain some security fixes and thus pushing back the official release.

      Glen Barber noted today on the mailing list, “Although the FreeBSD 11.0-RELEASE has not yet been officially announced, many have found images on the Project FTP mirrors. However, please be aware the final 11.0-RELEASE will be rebuilt and republished on the Project mirrors as a result of a few last-minute security fixes we feel are imperative to include in the final release.”

    • FreeBSD 11.0 Operating System Lands October 5 Due to Last-Minute Security Issues

      A few minutes ago, Glen Barber informed the FreeBSD community that they should not hurry and install the ISO images of the FreeBSD 11.0 operating system made available a few days ago on the official FTP mirrors.

      These images aren’t safe to use and contain various security vulnerabilities that need to be fixed before the FreeBSD Project will officially unveil the final release of the FreeBSD 11.0 operating system in the coming days. According to the release schedule, FreeBSD 11.0 should hit the streets later today, September 29, 2016.

      However, until then the FreeBSD development team is hard at work patching those nasty security issues and rebuilding the final ISO images, which will be made available on the respective FTP mirrors later today as FreeBSD 11.0-RELEASE-p1. If you’re already running FreeBSD 11.0-RELEASE, you will soon be provided with instructions to safely update your system

    • OpenBSD Founder Calling For LLVM To Face A Cataclysm Over Its Re-Licensing

      For over one year there’s been talk of LLVM pursuing a mass relicensing from its University of Illinois/NCSA Open Source License, which is similar to the three-clause BSD license, to the Apache 2.0 license with explicit mention of GPLv2 compatibility. As mentioned in that aforelinked article, this re-licensing is moving ahead.

  • FSF/FSFE/GNU/SFLC

    • Free Software Directory meeting recap for September 23rd, 2016
    • Don’t be a stranger to GIMP, be GIMP…

      I can try and do more coding, more code reviewing, revive designing discussions… that’s cool, yet never enough. GIMP needs more people, developers, designers, community people, writers for the website or the documentation, tutorial makers… everyone is welcome in my grand scheme!

      Many of my actions lately have been towards gathering more people, so when I heard about the GNOME newcomers initiative during GUADEC, I thought that could be a good fit. Thus a few days ago, I had GIMP added in the list of newcomer-friendly GNOME projects, with me as the newcomers mentor. I’ll catch this occasion to remind you all the ways you can contribute to GIMP, and not necessarily as a developer.

  • Public Services/Government

    • EC approves Slovenia courts data exchange solution

      First CEF AS4-compliant b2b solution developed as open source by a public administration

      The European Commission has tested and approved Laurentius, an eDelivery court documents and case exchange solution compliant with the AS4 profile of the OASIS ebMS standard. In September, Laurentius passed all tests by the EC’s Connecting Europe Facility (CEF) for its so-called “e-SENS AS4 conformant solutions”.

  • Programming/Development

    • SDL 2.0.5 Is Readying For Release: Relative Mouse Mode For Wayland/Mir, Audio Capture

      SDL 2.0 point releases have ranged from being a few months apart to as much as two years apart. Fortunately, SDL 2.0.5 is now being put together for release just nine months after SDL 2.0.4.

      With the Mercurial repository, Sam Lantinga bumped the version in preparation for the SDL 2.0.5 release. The SDL 2.0.5 release hasn’t officially happened yet, but it should be here soon.

  • Standards/Consortia

    • Open standards default at Slovenia supreme court

      The use of open ICT standards is an IT requirement at Slovenia’s Supreme Court, responsible for the IT support of the entire court system in the country. The Supreme Court’s IT department has a strong preference for the development of modular, reusable software solutions. This strategy provides agility and flexibility, says Bojan Muršec, director of IT.

      The focus on open standards frees up the IT department to concentrate on the business, Muršec says. The IT department takes the modular approach serious: the first reusable module ever developed by the court – a court documents dispatch and delivery system – is re-used by all IT systems across the courts. “Making everything reusable prevents creation of silos in the organisation”, the IT director says.

      A positive side effect of the IT strategy is that the court uses mostly open source software solutions. This in turn helps to keep IT costs down, says the IT director, who estimates that the court saves EUR 400 to 500 thousand per year on licence fees: “The cost of proprietary licences always goes up.”

    • Why there is no CSS4 – explaining CSS Levels

      We had CSS1, and CSS2. We even had CSS2.1 and we then moved onto CSS3 – or did we? This post is a quick explanation of how CSS is versioned today.

      CSS versions 1 and 2 were monolithic specifications. All of CSS was included in one massive document. Selectors, positioning, colour – it was all in there.

      The problem with monolithic specifications is that in order to finish the spec, every component part also has to be finished. As CSS has grown in complexity, and new features are added, it doesn’t make sense to draw a line at which all work is stopped on all parts of CSS in order to declare that CSS version finished. Therefore, after CSS2.1 all the things that had been part of the 2.1 specification were broken down into modules. As the new CSS modules included all that had gone before plus any new features, they all came into being at Level 3. Hence CSS3, and people like me who understood CSS as a single specification referred to the group of Level 3 modules as “CSS3”.

Leftovers

  • Science

    • 6 Ways Driverless Cars Are Going To Kill Lots Of People

      You’ve probably read a few articles about driverless cars over the past couple of years. The technology is coming along quickly, with fleets of test cars already on the roads in some states. It seems like soon we’ll achieve the American dream of stuffing our faces and texting all we want while still managing to avoid public transportation.

      But the reality is quite different. We’re diving into this technology a little too quickly and ignoring all the warning signs about how we are going to screw up on the way to Driverless Car Utopia.

  • Health/Nutrition

    • Reporter who quit on air to fight for cannabis legalization could face prison

      Charlo Greene did not plan to curse on live television, but on 22 September 2014, the words came pouring out.

      Then a reporter for KTVA, a station in Alaska, Greene ended her segment on marijuana by revealing that she was a proponent of legalization – and was the owner of the Alaska Cannabis Club, the subject of her news report.

      “Fuck it, I quit,” she said, before abruptly walking off camera. The 26-year-old’s stunt shocked her colleagues and made her a viral sensation overnight.

    • Marijuana Arrests Are At a 20-Year Low

      Marijuana-related arrests are the lowest they’ve been in 20 years, but someone’s still getting busted for weed a little more than once every minute.

      According to new statistics released by the FBI on Monday, there were 574,641 arrests in 2015 for marijuana possession, which is the lowest it’s been since 1996. Between 2011 and 2014, possession arrests hovered above 600,000. And since possession arrests peaked at 800,000 in 2007, that’s a 25 percent decrease.

      As pot gets increasingly normalized, with 10 states considering medical or adult use marijuana legalization in this year’s election, law enforcement may be less likely to see it as a threat. The divide between federal and state laws is also becoming an increasingly absurd policy to enforce. Even Hillary Clinton mentioned in Monday’s debate that the prevalent prison sentences for nonviolent crimes, like marijuana possession, are unnecessary.

      The drop in weed possession arrests likely results from from adult use policies in places like Colorado, where all marijuana-related arrests have plummeted in recent years, Paul Armentano, deputy director of the National Organization for the Reform of Marijuana Laws, told Motherboard. “The recent decline in arrests in New York City, as well as in other major metropolitan areas that have imposed decriminalization ordinances in recent years, is also likely playing a role in this nationwide decline.”

    • House passes waterways bill with Flint aid

      The House easily passed a major waterways bill on Wednesday that included a bipartisan compromise to address the drinking-water crisis in Flint, Mich.

      A late-night deal on Flint aid helped resolve Democratic opposition to a stop-gap spending bill that lacked emergency funding for the city, paving the way for Senate passage of a continuing resolution earlier in the day and ending the threat of a government shutdown.

      In a 399-25 vote, House lawmakers approved the Water Resources and Development Act (WRDA), which authorizes dozens of water-related infrastructure projects around the country.

      Lawmakers adopted numerous amendments during floor debate, including one from Reps. Dan Kildee (D-Mich.) and John Moolenaar (R-Mich.) that would authorize up to $170 million for Flint.

      “We decided we don’t want to create brinksmanship. That doesn’t do anybody any good,” House Speaker Paul Ryan (R-Wis.) said Wednesday at the Economic Club of Washington, D.C.

    • Farming mega-mergers threaten food security, say campaigners

      When an Indian farmer plants his cotton crop, there’s at least a 75% chance the seeds have been been bought from a company owned by Monsanto. If a Latin American farmer sprays insecticide on her genetically engineered soya beans, the chemical is more than likely to have been provided by German chemical and drugs company Bayer or by US firm Dupont.

      And when African farmers add chemicals to their maize fields or plant it’s odds-on that they have come from Swiss company Syngenta.

      Until recently, six or seven global agri-food businesses competed with each other for a share of the world market for seeds and chemicals. But if EU and US regulators allow a series of mega-mergers to take place, within months just three companies will be left in control of nearly 60% of the world’s seeds, nearly 70% of the chemicals and pesticides needed to grow food and nearly all of the world’s GM crop genetic traits.

    • Should Kratom Be Banned? Here’s What the Experts Say

      While lots of people reading this are patiently waiting for marijuana legalization to finally reach their state — most likely passing the time by smoking marijuana — lots of others are about to see Prohibition show up at their door for the first time. They are the “kratom” users. That’s a plant-based painkiller which some people describe as “herbal heroin.” It was, up until now, completely legal. I first used it back in 2009 — not because I was in pain, but because I wanted to get high without failing a drug test (like many painkillers, you can also take it for fun). Then, a couple of years ago, I introduced kratom to someone who does live with chronic pain — Cracked contributor Marina Reimann.

  • Security

    • security things in Linux v4.5
    • Time to Kill Security Questions—or Answer Them With Lies

      The notion of using robust, random passwords has become all but mainstream—by now anyone with an inkling of security sense knows that “password1” and “1234567” aren’t doing them any favors. But even as password security improves, there’s something even more problematic that underlies them: security questions.

      Last week Yahoo revealed that it had been massively hacked, with at least 500 million of its users’ data compromised by state sponsored intruders. And included in the company’s list of breached data weren’t just the usual hashed passwords and email addresses, but the security questions and answers that victims had chosen as a backup means of resetting their passwords—supposedly secret information like your favorite place to vacation or the street you grew up on. Yahoo’s data debacle highlights how those innocuous-seeming questions remain a weak link in our online authentication systems. Ask the security community about security questions, and they’ll tell you that they should be abolished—and that until they are, you should never answer them honestly.

      From their dangerous guessability to the difficulty of changing them after a major breach like Yahoo’s, security questions have proven to be deeply inadequate as contingency mechanisms for passwords. They’re meant to be a reliable last-ditch recovery feature: Even if you forget a complicated password, the thinking goes, you won’t forget your mother’s maiden name or the city you were born in. But by relying on factual data that was never meant to be kept secret in the first place—web and social media searches can often reveal where someone grew up or what the make of their first car was—the approach puts accounts at risk. And since your first pet’s name never changes, your answers to security questions can be instantly compromised across many digital services if they are revealed through digital snooping or a data breach.

    • LibreSSL and the latest OpenSSL security advisory

      Just a quick note that LibreSSL is not impacted by either of the issues mentioned in the latest OpenSSL security advisory – both of the issues exist in code that was added to OpenSSL in the last release, which is not present in LibreSSL.

    • Record-breaking DDoS reportedly delivered by >145k hacked cameras

      Last week, security news site KrebsOnSecurity went dark for more than 24 hours following what was believed to be a record 620 gigabit-per-second denial of service attack brought on by an ensemble of routers, security cameras, or other so-called Internet of Things devices. Now, there’s word of a similar attack on a French Web host that peaked at a staggering 1.1 terabits per second, more than 60 percent bigger.

      The attacks were first reported on September 19 by Octave Klaba, the founder and CTO of OVH. The first one reached 1.1 Tbps while a follow-on was 901 Gbps. Then, last Friday, he reported more attacks that were in the same almost incomprehensible range. He said the distributed denial-of-service (DDoS) attacks were delivered through a collection of hacked Internet-connected cameras and digital video recorders. With each one having the ability to bombard targets with 1 Mbps to 30 Mbps, he estimated the botnet had a capacity of 1.5 Tbps.

      On Monday, Klaba reported that more than 6,800 new cameras had joined the botnet and said further that over the previous 48 hours the hosting service was subjected to dozens of attacks, some ranging from 100 Gbps to 800 Gbps. On Wednesday, he said more than 15,000 new devices had participated in attacks over the past 48 hours.

    • Security updates for Thursday
    • How 1.5 Million Connected Cameras Were Hijacked to Make an Unprecedented Botnet

      Last week, hackers forced a well-known security journalist to take down his site after hitting him for more than two days with an unprecedented flood of traffic.

      That cyberattack was powered by something the internet had never seen before: an army made of more than one million hacked Internet of Things devices.

      The hackers, whose identity is still unknown at this point, used not one, but two networks—commonly referred to as “botnets” in hacking lingo—made of around 980,000 and 500,000 hacked devices, mostly internet-connected cameras, according to Level 3 Communications, one of the world’s largest internet backbone providers. The attackers used all those cameras and other unsecured online devices to connect to the journalists’ website, pummeling the site with requests in an attempt to make it collapse.

    • NHS Hospitals Are Running Thousands of Computers on Unsupported Windows XP

      Hospitals across England are running thousands of out-of-date Windows XP machines, potentially putting patient data and other sensitive information at risk.

      Motherboard has found that at least 42 National Health Service (NHS) trusts in England are still using the Windows XP operating system, with many of them confirming that they no longer receive security updates for the software. Legal experts say that the NHS hospitals may be in breach of data protection regulations.

      “If hospitals are knowingly using insecure XP machines and devices to hold and otherwise process patient data they may well be in serious contravention of their obligations,” Jon Baines, Chair of the National Association of Data Protection and Freedom of Information Officers (NADPO), wrote in an email.

      In April 2014, Microsoft officially ended support for Windows XP, meaning that the company would no longer release security patches for the aging operating system. Any vulnerabilities discovered after that date would therefore be left for hackers to exploit. Governments and businesses could pay Microsoft for a custom extended support deal; the Crown Commercial Service, which is sponsored by the Cabinet Office, spent £5.5 million ($9 million) to continue receiving updates for the public sector, including for the NHS. That agreement ended in April 2015 and was not renewed.

    • Linux.Mirai Trojan causing mayhem with DDoS attacks

      A Trojan named Linux.Mirai has been found to be carrying out DDoS attacks.

      The malicious program first appeared in May 2016, detected by Doctor Web after being added to its virus database under the name Linux.DDoS.87. The Trojan can work with with the SPARC, ARM, MIPS, SH-4, M68K architectures and Intel x86 computers.

  • Defence/Aggression

    • Does Free College Threaten Our All-Volunteer Military?

      Does free college threaten our all-volunteer military? That is what writer Benjamin Luxenberg, on military blog War on the Rocks says. But the real question goes deeper than Luxenberg’s practical query, striking deep into who we are as a nation.

      Unlike nearly every other developed country, which offer free or low cost higher education (Korea’s flagship Seoul National University runs about $12,000 a year, around the same as Oxford), in America you need money to go to college. You need the bucks for tuition and books, and for most students, you need the bucks to not work full-time for a couple of years. Typical of America’s top end schools, Harvard charges $63,000 for tuition, room, board and fees. That’s more than a quarter of a million dollars for a degree. Even a state school wants $40,000 a year.

    • White House Is Profoundly Wrong About the Most Embarrassing Thing Senate Has Done

      The White House reacted harshly to the Senate’s overwhelming vote on Wednesday to override President Obama’s veto of a bill that would enable the family members of 9/11 victims to sue the Kingdom of Saudi Arabia in U.S. Courts.

      Press Secretary Josh Earnest called it “the single most embarrassing thing the United States Senate has done possibly since 1983.”

      As it happens, the White House’s principled opposition to the bill was based on its worry that it would open the door to lawsuits from foreigners accusing the U.S. government of crimes, possibly including the killing of hundreds of thousands of people in Iraq and Afghanistan, torture, deaths of innocent people with drones, and global mass surveillance.

      That makes Earnest’s comment the single most hyperbolic thing he’s said since — well — ever.

    • ‘Peace With Justice Is Still a Long Way Away’ – CounterSpin interview with Mario Murillo on Colombian accords

      The peace deal signed between the government of Colombian President Juan Manuel Santos and the FARC, the largest and oldest insurgency in Latin America, is historic. More than 50 years of fighting have killed more than 220,000 Colombians, overwhelmingly poor civilians. These years have seen executions, disappearances, detentions, torture. The violence has forced some 7 million people from their homes, the largest number of internally displaced people in the world.

    • Forget Blairite Propaganda. Sierra Leone was not Blair’s “Good War”.

      This was my speech to the World Beyond War conference at American University, Washington DC on 24 September.

    • Is Your Nation The Exceptional One?

      Nations such as this just don’t have what it takes to be Exceptional. They may have a few nice traditions that mark them out from other nations, and may even be very nice people. But Exceptional? Get out of here!

    • Can Russia Learn From Brazil’s Fate?

      Everyone should read Engdahl’s article. He reports that part of the attack on Rousseff stemmed from Brazil’s economic problems deliberately created by US credit rating agencies as part of Washington’s attack to down grade Brazilian debt, which set off an attack on the Brazilian currency, the cruziero.

      Brazil’s financial openness made Brazil an easy target to attack. One might hope that Vladimir Putin would take note of the cost of “economic openness.” Putin is a careful and thoughtful leader of Russia, but he is not an economist. He has confidence in neoliberal Elvira Nabiulina, Washington’s choice to head the Russian central bank. Nabiulina is unfamiliar with Modern Monetary Theory, and her commitment to “economic openness” leaves the Russian economy as exposed as Brazil’s to Washington destabilization. Nabiuina believes that the assault on the ruble is due to impersonal “global market forces,” not to Washington’s financial clout.

    • British Parliament Confirms Libya War Was Based On Lies … Turned Nation Into a “Shit Show” … Spread Terrorism

      The UK Parliament just confirmed what the alternative media has been saying for years.

      Specifically, a new report from the bipartisan House of Commons Foreign Affairs Committee – based on interviews with all of the key British decision-makers, review of documents, and on-the-ground investigations in Africa – found that the Libyan war was based on lies, that it destroyed the country, and that it spread terrorism far and wide.

    • Trump Promises No First Nuclear Strike, Sort of; New Bill Would Make it Illegal

      Donald Trump tried to ease fears about his finger being on the nuclear button during Monday night’s presidential debate, declaring that “I would certainly not do first strike.” He added: “Once the nuclear alternative happens, it’s over.”

      But moments later, the Republican presidential nominee seemed to backpedal, claiming that he “can’t take anything off the table.”

      Two members of Congress don’t want Trump to have the option.

      Responding to the majority of Americans who say they would not trust Trump with the nuclear arsenal, Sen. Edward Markey, D-Mass, and Rep. Ted Lieu, D-Calif., introduced legislation Tuesday that would bar the president from conducting a nuclear strike unless Congress had issued a formal declaration of war.

    • Clinton’s Faulty New Scheme to ‘Fight’ ISIS

      Even as Hillary Clinton pushes a new scheme for defeating ISIS, the reality is that contradictory U.S. policies in the Mideast that she helped formulate are fueling the growth of jihadi extremism, writes Daniel Lazare.

    • Congress overrides Obama’s veto of 9/11 bill

      Families of those killed in the terror attacks on 9/11 are now legally allowed to sue Saudi Arabia, after Congress voted Wednesday to override President Barack Obama’s veto of the legislation, the first override of his presidency.

      The votes by the House and Senate were overwhelming. Members of both parties broke into applause on the House floor after the vote.

      The Senate approved the override on a 97-1 vote, with Senate Minority Leader Harry Reid the lone Senator voting to sustain the president’s veto. Hours later, the vote in the House was 348-77, with one Democratic member voting “present.”

      White House spokesman Josh Earnest said aboard Air Force One before the House had voted that the Senate’s override is the “single most embarrassing thing the Senate has done since 1983,” referring to the last time the Senate overrode a veto by such a large margin.

    • Barack Obama brands Congress decision on Saudi 9/11 lawsuits bill ‘a mistake’

      Barack Obama says Congress is making a “mistake” and setting “a dangerous precedent” by passing a bill that would allow families of 9/11 victims to sue the Saudi government for damages.

      Both the Senate and the House of Representatives voted by an overwhelming majority to override the President’s veto of the Justice Against Sponsors of Terrorism Act (JASTA).

      The votes on Wednesday afternoon were the first time in the whole of Mr Obama’s presidency that he has been overruled by Congress.

      And speaking on CNN in the wake of the decision, Mr Obama warned that it left the US exposed to lawsuits from people around the world who have been affected by American foreign policy.

    • 9/11 bill veto override angers Saudi Arabia, Gulf nations: We “will stand by Saudi Arabia in every way possible”

      Saudi Arabia’s lobbying and warnings to Congress were not enough to blunt the passing of legislation allowing families of Sept. 11 victims to sue the kingdom for the attacks.

      The oil-rich country, which has a long but often troubled relationship with Washington, maintains an arsenal of diplomatic and commercial tools it could respond with.

      They include curtailing official contacts, pulling billions of dollars from the U.S. economy, and persuading its close allies in the six-member Gulf Cooperation Council it dominates to scale back counterterrorism cooperation, investments and U.S. access to important regional air bases.

    • Sudanese government ‘killing hundreds of civilians with chemical weapons attacks’ in Darfur – Amnesty

      The Sudanese government has been accused of launching chemical weapon attacks on its own civilians, killing hundreds of people including scores of children, in what would be a dramatic escalation of the Darfur conflict.

      Amnesty International says it has compiled the first credible body of evidence to suggest the forces of President Omar al-Bashir bombed swathes of the crisis-hit Jebel Marra region with chemical agents.

      The charity has released before-and-after satellite images, photographs of horrific burn wounds on children and evidence from more than 200 interviews, and called for a United Nations investigation.

      Chemical weapons attacks on the African continent in the post-war era have been extremely rare, and even the accusation that it has carried them out could represent a major setback for Sudan’s improving relations with the international community.

      But it also serves to highlight the ongoing armed conflict in Darfur that, since the peak of the violence and international attention in 2003, has continued to rage more or less unnoticed.

  • Environment/Energy/Wildlife/Nature

    • Palm oil company with links to Tory donors accused of failing to prevent ‘thousands of acres’ of rainforest being destroyed

      A palm oil company with links to Tory party donors and friends of David Cameron has been accused of failing to prevent massive fires devastating the rainforest.

      The firm, called Astra Agro Lestari, is a subsidiary of multi-billion dollar conglomerate Jardine Matheson, which owns major retail outlets, a string of luxury hotels and construction firms – as well as selling second-hand cars – mostly in Asia.

      Jardines is largely controlled by the well-connected Keswick family, descendants of its founders as an opium trader in 19th century China.

      David Cameron’s father Ian was a friend of the Keswicks and worked as a stockbroker to the family. In the 1980s, the future Prime Minister briefly worked at the company’s office in Hong Kong.

    • Trump’s Campaign Is Trying to Cover Up His Lies About Climate Change

      In a delicious turn of events at this week’s presidential debate, Donald Trump received his comeuppance over a four-year-old tweet in which he denounced climate change.

      On stage, his opponent, Hillary Clinton, referenced the tweet from 2012, and remarked that “Donald Trump thinks that climate change is a hoax perpetrated by the Chinese.” His reply? An easily fact-checked lie. “I did not. I do not say that,” he scrambled to say, like a child who’s been caught with his hand in the cookie jar.

    • Finnish firm creates roofing with integrated solar cells

      A Finnish sheet metal manufacturer has teamed up with MiaSolé, an American company that manufactures thin-film photovoltaic products. The film is integrated into the roofing material at Virte’s Turku factory.

      CEO Jaakko Virtanen is excited about integrated solar electricity systems.

      “I’ve dreamed of building materials that would themselves generate electricity, from roofs, windows and wall. Now that’s becoming a reality,” he tells Yle.

    • Earth is locked into 5 degrees Celsius of global warming? Not so fast.

      On Tuesday, a new climate study sent media outlets into a frenzy. News articles declared that Earth was “locked into” 5 Celsius degrees of warming – an exceptionally dire forecast, since most climate scientists warn that a boost of just 2 degrees C. would be catastrophic.

      But fortunately for coral reefs and coastal communities, scientists now say that prediction was wrong.

      It was Gavin Schmidt, director of NASA’s Goddard Institute for Space Studies, who led the charge. Dr. Schmidt was perhaps the most vocal of a group of prominent dissenters, all of whom insist that the actual committed warming estimate hovers around 0.5-1 degrees C. That number, while still significant in terms of global effects, is a far cry from the initial findings. So what caused the discrepancy: bad science or bad science journalism?

  • Finance

    • Passengers in Uber’s self-driving cars waived right to sue for injury or death

      Anyone requesting an Uber ride in a 12-sq mile area in the center of Pittsburgh might now be randomly allocated a self-driving Ford Fusion rather than a human-operated vehicle.

      But passengers riding in Uber’s computer-controlled cars today might be surprised at just how experimental the technology is. According to documents obtained by the Guardian under public records laws, until as recently as June anyone not employed by Uber riding in one of its autonomous vehicles (AVs) had to sign a legal document waiving the company of any liability for their injury or death.

      One senior Pittsburgh police officer signed a waiver on 23 June: “I acknowledge that some or all of the AVs in which I ride are in a development phase, are experimental in nature, and that riding in an AV may involve the potential for death, serious injury, and/or property loss.”

      The document was required by Uber’s Advanced Technologies Center (ATC), a research hub that in early 2015 hired dozens of robotics experts from nearby Carnegie Mellon University. Since then the ATC has been working furiously to catch up with the likes of Google and Tesla in self-driving technology – a task Uber CEO Travis Kalanick has described as “basically existential for us”.

    • The Questions That Should Be Being Asked About Trump’s Tax Returns

      A lot has been said about Trump’s refusal to make his tax returns public. But despite the volume of commentary, it’s not clear the right questions even are being asked.

      Trump claims he can’t release his returns because he’s under audit. At some level, that’s a legitimate concern. It would hardly be fair if thousands of tax professionals who oppose Trump politically helped the IRS by publishing their own analyses of the returns. Ultimately, however, it’s a phony excuse.

      But rather than challenge the logic behind Trump’s refusal to release returns, a series of questions should be asked:

      First, what tax years are under audit? Does it go back beyond 2012? If not, can the 2011 return be released? After all, the statute of limitations on the audit of that year has passed, so there’s no exposure to Trump by releasing that return. If not 2011, how about 2010?

      Second, why haven’t the audit notices been released? An audit notice is a short, generic letter from the IRS stating that a taxpayer’s return has been selected for examination. There’s nothing so sensitive in such a generic notice that it could not be made public. At this point, Trump has not even offered up this most basic evidence that he is really even under audit. Why hasn’t proof been demanded?

    • Brexit – who has the power to change UK law?

      Another way of seeing the inconsistency of the Government argument is this. If the Crown has the power to leave the EU without Act of Parliament, then it has always had it. The Referendum Act contains no provision that alters the constitutional position – it provided for a referendum on EU membership, defining the question to be asked, but without specifying what was to be done with the result. For that reason it is often referred to as “advisory”. Therefore, if the Government has the power to take the UK out of the EU today, then it equally had the power one year ago. But I do not think anyone would have seriously argued before the Referendum that the Government could take the UK out of the EU under prerogative power without any Parliamentary approval.

    • Britain’s backdoor to EU influence

      The U.K. has launched a behind-the-scenes diplomatic effort to influence EU affairs during the Brexit process by offering to lend officials to two small countries that will hold the bloc’s presidency next year.

      Britain gave up its six-month slot in the rotating presidency calendar, which had been scheduled for the second half of 2017, after other countries felt it would be inappropriate to have the U.K. setting the political agenda for a union it had voted to leave. But soon after the June referendum, London began hedging its bets by trying to position officials in Malta and Estonia, which will take their turns in the presidency next year.

  • AstroTurf/Lobbying/Politics

    • Donald Trump’s Roger Rabbit Moment

      As usual, what may have been most important is what went unsaid. The phrase “income inequality” came up only once, and that was from moderator Lester Holt. There was little mention of education or health care; some talk of energy policy but almost nothing on global warming other than Clinton’s reference to Trump claim that climate change is a hoax perpetrated by the Chinese (last night he denied ever saying it, but he has).

      And absolutely no mention of the ruinous influence of money in politics, which in retrospect made it a bit jarring that when Bill and Chelsea Clinton entered the debate auditorium they sat next to Vernon Jordan, a close family friend and adviser, certainly, but also senior counsel at Akin Gump, the biggest and most profitable lobbyist in Washington, prime peddlers of influence and privilege on Capitol Hill.

    • NYT Makes Bill Clinton’s Sex Life the Lead Story–Without Mentioning Trump’s

      Now we know how candidates can get a piece of information featured in the lead story of the New York Times: They just need to declare that they aren’t going to talk about it during a national debate.

      Thus Donald Trump’s cryptic last-minute debate comment—”I was going to say something…extremely rough to Hillary, to her family, and I said to myself, ‘I can’t do it. I just can’t do it. It’s inappropriate. It’s not nice’”—was unfolded into a piece in the top right corner of the Times‘ front-page (9/27/16), arguably the most valuable journalistic real estate in the United States, about Bill Clinton’s extramarital affairs.

    • Lester Holt Asks Zero Questions About Poverty, Abortion, Climate Change

      Presidential debates do as much to illustrate corporate media priorities as they do to showcase the candidates. They provide a snapshot into what the media, in this case represented by NBC’s Lester Holt, prioritizes as issues worthy of discussion.

      A week before the debate, Comcast-owned NBC announced the topics, and one could already tell we weren’t going to be in for a substantive evening: “Achieving prosperity,” “America’s direction” and “securing America.” This generic approach lead to a generic debate that focused mostly on horserace disputes and vague, open-ended questions about taxes and jobs.

      Holt didn’t ask any questions about the following topics: poverty, abortion, climate change, immigration, healthcare, student debt, privacy, LGBTQ rights or drug policy. (NBC reported before the debate that abortion and immigration were two of the policy issues that voters were most interested in, as indicated by Google searches, along with the economy and police shootings.)

      What was discussed: jobs, Trump’s tax returns, who did or didn’t support the Iraq War, raising taxes on the rich, race (framed mostly in a way that pandered to Trump’s theme of a country in disarray), Russian cyberattacks, ISIS, Obama’s birth certificate, Clinton’s physical appearance and whether the candidates would accept the election results.

    • Blow-by-Blow Analysis of the Decisive Moment of the Debate – through the eyes of a former debate coach

      I wasn’t planning to do a second blog about ‘the debate’ but two days after it, as we start to await the first polling to show its impact, I feel the need to write one more blog. I do believe this debate decided the election. I think many will come back to look at that Monday night as the time when Trump folded, and some will also see the brilliance of how Hillary skewered Trump and trapped him to make that debate far worse for Trump than it might have been. So, with the very rare opportunity for me to write a debate review on this blog, why not do something more serious about the blow-by-blow. How did it go? Lets get into the weeds. How did Hillary demolish Trump. I am using the full recording of the debate via Real Clear Politics which had the ABC network feed.

      Trump needed to remain Presidential throughout the first debate, he’d then get something near a tie. Hillary had to clearly win the debate, a tie was not good enough, she was expected to be the superior debater and had to now deliver.

    • Stein trolls Johnson on world leaders gaffe, also fails to name world leaders

      May, Stédile, and Corbyn, however, aren’t technically world leaders, as none holds a top position in their country’s government. May is a member of the Canadian House of Commons. Stédile is an economist and member of Brazil’s Landless Rural Workers Movement, which he helped found. Corbyn is the leader of the Labour Party in Britain.

      Johnson, sitting with Libertarian vice presidential nominee Bill Weld, was asked by MSNBC’s Chris Matthews to “name one foreign leader that you respect and look up to.” Johnson couldn’t name any.

    • Sunday Paper Q&A: Jill Stein

      You may not realize it, but there are actually two women running for president this year. In addition to Hillary Clinton, the first female major-party candidate, voters also have the choice to elect Jill Stein, who represents the Green Party.

      Stein is a practicing physician and an environmental health advocate. While her low polling numbers prevented her from participating in the first debate, Stein remains committed to her campaign. She exclusively sat down with us for this week’s Sunday Paper Q&A to explain why she’s motivated to stay in the race.

    • Endorsement: Libertarian Gary Johnson for president

      Today this newspaper does something it has never done in its 143-year history: endorse someone other than the Republican candidate in a presidential contest.

      Since its founding in 1873, The Detroit News has backed a Republican every time it has made a presidential endorsement (three times we have sat on the sidelines — twice during the Franklin Roosevelt elections and in the 2004 Bush/Kerry contest).

      We abandon that long and estimable tradition this year for one reason: Donald J. Trump.

      The 2016 nominee offered by the Republican Party rubs hard against the editorial board’s values as conservatives and Americans. Donald Trump is unprincipled, unstable and quite possibly dangerous. He can not be president.

    • Gary Johnson tries to get past ‘brain freeze’ with Detroit newspaper’s endorsement

      But Johnson’s self-described “Aleppo moment” on Wednesday night’s MSNBC town hall proved irresistible for critics and rivals. Jill Stein, the Green Party candidate who has fallen even further back in polls than Johnson, took the opportunity on Thursday to name the foreign leaders she admired — if anyone was curious. (No one she mentioned is currently serving as the head of government in any country.)

    • Politico Tries to Play Gotcha with Jill Stein’s Comments on Gary Johnson’s ‘World Leader’ Gotcha

      Last night on MSNBC, Chris Matthews asked Gary Johnson to name three foreign leaders that he admired. Rather than rejecting the question for its implicitly pro-government bias and as a silly thing to ask someone running for president, Johnson tried to answer by listing former Mexican president Vicente Fox and blanked on the name, saying it was another “Aleppo moment.” (Maybe soon they’ll be calling them Gary Johnson moments)

      Within minutes, social media was ablaze with users who probably couldn’t name a world leader (except maybe for Justin Trudeau, who’s become something of a favorite of social media progressives) claiming that Johnson couldn’t name a foreign leader at all, when the question was about leaders you respected.

      [...]

      Responding to my comment based on Twitter, Stein suggested that Politico was “just trying to play gotcha to distract from their favored candidate’s awful foreign policy record.” It’s hard to disagree with that assessment.

  • Censorship/Free Speech

    • Singapore jails teen blogger Amos Yee for anti-religion posts
    • Amos Yee gets 6 weeks’ jail for wounding religious feeling
    • Amos Yee gets 6 weeks’ jail for wounding religious feelings
    • Amos Yee pleads guilty to 3 charges
    • Jordan Imposes Media Blackout on Christian Writer’s Assassination as Protests Erupt

      Jordanian authorities imposed a blackout on the country’s press and social media Monday, preventing any coverage of the murder of the Christian writer shot dead outside an Amman court as protesters called for the government’s resignation.

      The censorship order by the Jordanian judiciary came after the murder of Nahed Hatter as he arrived at the city’s Palace of Justice on Sunday, accused of sharing a satirical cartoon on Facebook and of breaching the country’s blasphemy laws.

    • Montreal Muslim school president was ‘devastated’ by feminist’s criticisms, slander trial hears

      Quebec’s long-running debate over secularism and the place of religious minorities moved into the courtroom Monday as a slander trial opened against an outspoken critic of Islamic fundamentalism.

      A crowd of supporters, including two who arrived from France, filled the room to hear the case against Djemila Benhabib, who is being sued by a private Muslim school after she likened its teaching to the instruction received in terrorist training camps in Pakistan and Afghanistan.

      Benhabib, who was born in Ukraine but spent much of her childhood in Algeria, was invited on to a Montreal radio show in 2012 after writing a blog post about the Muslim School of Montreal.

      Benhabib told 98.5 FM host Benoît Dutrizac that she was shocked by what she found on the school’s website.

      Koranic verses being taught to children were “extremely violent” and “misogynistic,” she told Dutrizac in a recording played in the court. She said the school offers students “an indoctrination worthy of a military camp in Afghanistan or Pakistan.” The school, she said, “is creating fundamentalist activists who in a few years will be demanding accommodations and all sorts of bizarre things … We are an extremely long way from citizenship, from the values that belong to our society.”

    • Migrants Are Racist to Blonde Women, Swedish Ethics Professor Says

      Professor of Ethics Ann Heberlein has argued that blonde people in Sweden are subjected to racist abuse and violence from “people with a non-European appearance”.

      Ms. Heberlein, who appears regularly on Swedish Radio’s “Thoughts for the Day” and “Philosophical Room”, says blonde and Swedish victims of this racism choose to stay silent because “anti-racist” left wingers say that as a “privileged” group, ethnic Swedes have no right to complain.

      The professor at Lund University describes the racist abuse hurled at white women in Sweden, with phrases like “Svenne (meaning ethnic Swede) whore” and “bloody racist whore” shouted at them by people with migrant backgrounds.

    • Singapore jails teenager for hurting God’s feelings

      Amos Yee, a 17-year-old blogger in Singapore, is to spend six weeks in jail for “wounding religious feelings.” It is his second such jail term: he spent a month in jail last year for criticizing Christianity.

    • Donald Trump Happily Repeating Lie About Google Autocomplete Suppressing Negative Hillary News

      While politics isn’t generally a topic we dive into around here, technology policy and issues certainly are. And, since presidential election cycles infect every conceivable topic like a wine stain spreading across your favorite couch, we’ve talked about the two mainstream candidates quite a bit recently. And I get the complaints from all sides against both candidates, but it’s become somewhat breathtaking to watch Donald Trump build a campaign in large part on nonsensical and easily debunked conspiracy theories, such as how the planned internet governance transition will cede control of the web to China and Russia, or that our current sitting President might be a secret communist Muslim clay-person, but maybe not.

      And, of course, there is the constant claim of victim-hood at the hands of that damned liberal establishment, which now apparently includes Google. Some background for you is in order. Over the summer, a really dumb video went viral after claiming to show that Google was manipulating autocomplete searches to keep any bad press out of the results for searches about Hillary Clinton. Compared with Bing, for instance, Google’s autocomplete failed to finish off a search for “Hillary Clinton cr” with “Hillary Clinton crimes”, instead completing as “Hillary Clinton Crimea.” While your drunk uncle lost his goddamned mind over a conspiracy surely proven, Google chimed in to note that it specifically designed its autocomplete feature to keep disparaging results from anyone’s name, not just Hill-Dog’s. This was easily shown by putting in “Donald Trump cr”, which likewise autocompleted as “Donald Trump Crimea.”

      And that really should have been the end of that. But, because Donald Trump’s campaign isn’t one to pass on a good chem-trails story, its candidate tried to deflect a general panning of his debate performance by repeating this already disproved accusation.

    • Censorship is Killing the Spirit of Social Media

      Take Twitter, for example. The online social networking service is often criticized for not protecting its users and allowing pretty much anything on its platform. Because it does allow anything on its platform and that’s part of why people love it so much.

      Twitter is also kind of like a filing cabinet that records and preserves our digital history for us. You can go to Twitter, search a hashtag and find photos, articles and all the opinions you could ever want to hear on a particular moment from (recent) history. That’s pretty cool, when you think about it. But what’s not cool is finding tweets that you never saw, tweets that seemingly disappeared even though the 140-characters were typed.

      Twitter has been caught removing tweets, hiding tweets and deleting trending hashtags. Such accusations have opened the doors to how such a prominent platform—which sources the news for over half the population-gets away with censorship before our very eyes.

      It was just a few months ago that Twitter was accused of censoring tweets under ‘#DNCLeak’ during the WikiLeaks e-mail debacle. In this particular scenario, conservative Twitter users accused the platform of removing the hashtag from the trending bar, despite it displaying an estimated 250,000 tweets about the leaked employee e-mails from the Democratic National Committee.

      On the other side of the political spectrum, of course, is the whole Milo Yiannopoulos situation, which involves permanent censorship in the form of banning. Another accusation comes from Trump supporters, which say the social platform concealed his tweets asking for campaign donations.

      But is this censorship? Or is it just the work of a flawed algorithm?

    • HRC concerned about censorship of publications

      The Human Rights Commission(HRC) has released a statement regarding Freedom of Expression in relation to Cayman’s Prohibited Publications Order.

      The statement has been released during World Banned Books Week which is held each year, the last week in September and is recognised by the American Libraries Association. During the week, attention is focused on freedom of expression in relation to reading and the issue of censorship. In the Cayman Islands censorship of reading materials is found in the Prohibited Publications Order (under the Penal Code) which first came into effect in the Cayman Islands in 1977.

    • Censorship: Facebook Deleted 100,000 ‘Hate Posts, Insults’ in Just One Month

      Facebook revealed that within the last month it deleted 100,000 posts by German users for containing “hate”, but Justice Minister Heiko Maas has blasted the figure as too low.

      At a conference in Berlin, Maas said that to be accountable, social networks must publish the number of posts contested by users. The Justice Minister’s remarks implied that complainants on social media are valid judges of what constitutes criminal speech, something usually only determined by a court.

    • BANNED TOGETHER: A CENSORSHIP CABARET Set for Banned Books Week in NYC
    • Wallace students read banned books aloud to draw attention to censorship
    • Distributed Censorship or Extortion? The IoT vs Brian Krebs
  • Privacy/Surveillance

    • UK Government Says Smart Meters Can Definitely Be Trusted Because GCHQ Designed Their Security

      The idea behind smart meters — that detailed information about how you consume electricity will allow you to use power more efficiently and thus cut your bills and your home’s carbon emissions — is a good one in theory. And yet smart meters are still not used very widely, even in countries like the UK, where the government has a strategy to install millions of them by 2020. Actually, the likely savings by users are small, but smart meters also promise to allow the electricity industry to lower salary costs by carrying out meter readings remotely, which is one reason why it is so keen on the idea. Another is because smart meters make it is easy to cut off someone’s supply if they don’t pay their bills.

      The slow uptake of smart meters seems in part to be due to public concerns about security. People are worried that their smart meter will spy on them, sending back information to electricity companies that might be intercepted and used for targeted burglary when they are away. Similarly, there are fears that if the smart meter control system were compromised, domestic electricity supplies might be at risk on a large scale.

      One of UK Parliament’s most important committees, the one monitoring science and technology, has just published a report into the UK smart meter roll-out, offering recommendations for ways to speed it up.

      [...]

      has reported, one of the worst features of the UK’s Investigatory Powers Bill that is currently wending it way through Parliament is that it creates a legal framework to allow GCHQ and the other intelligence agencies to hack into any kind of equipment in order to carry out surveillance. Of course, that’s really rather easy when you were the one who designed its security systems.

    • FBI’s Controversial Surveillance Program Declined After Snowden

      The FBI’s use of a controversial program that collected Americans’ phone records decreased significantly after Edward Snowden exposed it to the world in 2013, a new report has found.

      The program allows the FBI to get access to phone records—but not the content of phone calls—with permission from the Foreign Intelligence Surveillance Court. Between 2012 and 2014, that court approved 561 so-called “business records orders,” but that number dropped from a nine-year high of 212 in 2012 to 170 in 2014, a nearly 20 percent decrease, according to a review by the Justice Department’s inspector general.

      The number fell again in 2015 to 142 orders. Snowden’s revelations helped fuel a change in U.S. law that ended the government’s practice of collecting and storing the phone records. Now, the government must request the information from phone companies.

    • Canadian Bank Prohibits Giving Passwords to Police

      While waiting for ten minutes on “hold” to make an appointment with my local branch of Scotiabank, I had time read through the new “Digital Services Agreement. Most of the eighteen pages were unremarkable, but a couple of things stood out.

      When you click “Accept”, you are agreeing to not give your password to police if they ask!

    • WhatsApp refuses to delete user data in India after court ruling

      Changes to WhatsApp’s data sharing rules are causing more controversy this week. The company refuses to comply with a court order from India’s Delhi High Court, which requested that the company delete any and all data collected by users who opted out of the company’s new privacy policy before September 25th.

      Since WhatsApp announced that it would be sharing some user data, including phone numbers, with Facebook, the app has come in for some serious critisism for undermining consumer privacy in India. These changes were made under the guise of cutting down on spam and improving services, but a good portion of users remain unconvinced.

    • EU clamps down on sale of surveillance tech to despotic regimes

      The European Commission has set out new measures to stop European companies exporting surveillance gear to despotic regimes. The proposal would also partially relax the rules on exporting cryptography tools.

      The proposal to overhaul the EU’s export controls on dual-use products—powerful technologies such as crypto software or rocket engines that can be used for good or evil—was presented on Wednesday (PDF) and includes a new human rights dimension.

      “It’s not a revolution. It’s an evolution of our current structure,” a commission source told Ars. “The foundation that is already there, is fairly solid, but this new proposal is more efficient, and will reduce the cost of the control, both for authorities at national level and also for the industries that have to apply for licenses.”

      “This new human security dimension comes from a conviction that our export controls should also enable us to prevent the misuse of items that are used to violate human rights. The types of technologies we are talking about, surveillance, etc., do not fit clearly within the current military regulation,” the source continued.

    • Apple Logs Your iMessage Contacts — and May Share Them With Police

      Apple promises that your iMessage conversations are safe and out of reach from anyone other than you and your friends. But according to a document obtained by The Intercept, your blue-bubbled texts do leave behind a log of which phone numbers you are poised to contact and shares this (and other potentially sensitive metadata) with law enforcement when compelled by court order.

      Every time you type a number into your iPhone for a text conversation, the Messages app contacts Apple servers to determine whether to route a given message over the ubiquitous SMS system, represented in the app by those déclassé green text bubbles, or over Apple’s proprietary and more secure messaging network, represented by pleasant blue bubbles, according to the document. Apple records each query in which your phone calls home to see who’s in the iMessage system and who’s not.

      This log also includes the date and time when you entered a number, along with your IP address — which could, contrary to a 2013 Apple claim that “we do not store data related to customers’ location,” identify a customer’s location. Apple is compelled to turn over such information via court orders for systems known as “pen registers” or “trap and trace devices,” orders that are not particularly onerous to obtain, requiring only that government lawyers represent they are “likely” to obtain information whose “use is relevant to an ongoing criminal investigation.” Apple confirmed to The Intercept that it only retains these logs for a period of 30 days, though court orders of this kind can typically be extended in additional 30-day periods, meaning a series of monthlong log snapshots from Apple could be strung together by police to create a longer list of whose numbers someone has been entering.

      The Intercept received the document about Apple’s Messages logs as part of a larger cache originating from within the Florida Department of Law Enforcement’s Electronic Surveillance Support Team, a state police agency that facilitates police data collection using controversial tools like the Stingray, along with conventional techniques like pen registers. The document, titled “iMessage FAQ for Law Enforcement,” is designated for “Law Enforcement Sources” and “For Official Use Only,” though it’s unclear who wrote it or for what specific audience — metadata embedded in the PDF cites an author only named “mrrodriguez.” (The term “iMessages” refers to an old name for the Messages app still commonly used to refer to it.)

    • Terrorism Directive: European Parliament to Cowardly Surrender to Outrageous Security Call

      For a few months, the European Parliament has been discussing a directive aimed at updating the European legislation on combating terrorism. After a vote in the LIBE Committee, MEPs agreed to send the text directly to a trialogue discussion; this reduces opportunities for a democratic debate on an issue that bears strong consequences for fundamental rights.
      Today, Wednesday 28 September, the third trialogue between the European Parliament, the European Commission and the Council of the European Union is to take place. Faced with the deadlock organised by European institutions, La Quadrature du Net emphasises the dangers of this text.

    • Allo: Snowden Says New Google App Could Become Tool For Police Surveillance

      Google recently released a new messaging application called Allo that it calls “revolutionary,” but whistleblower Edward Snowden warns that the app could be used for government surveillance.

      Radio Sputnik’s Loud & Clear spoke with Professor Bryan Ford, leader of the Decentralized/Distributed Systems lab at the Swiss Federal Institute of Technology in Lausanne, about the app and its potential impact on personal privacy.

    • Why Edward Snowden (NSA Whistleblower) Just Warned People Not to Use Google’s New Chatting App

      According to Edward Snowden, if you want to avoid giving law enforcement the green light to check out all your communications, don’t use it.

      “What is #Allo? A Google app that records every message you ever send and makes it available to police upon request,” the whistleblower tweeted.

      Tech giant Google has been working hard to infiltrate the virtual chatting world, launching Spaces, Duo, and most recently, Allo, all in the past couple of months.

      On its site, Allo is described as “a smart messaging app that helps you say more and do more. Express yourself better with stickers, doodles, and HUGE emojis & text. Allo also brings you the Google Assistant, preview edition.”

  • Civil Rights/Policing

    • For Latinos, the Problem Isn’t Trump—It’s Trumpismo

      Anyone watching this year’s elections knows that Latinos are going to play a critical role. The Age of LatinX is upon us. Without a doubt, LatinXs will play a determinate role in these important elections. As the presidential candidate for the Green Party, I take seriously the urgently critical role of the Latino vote in the 2016 elections. That’s why our campaign continues the work of raising LatinX and other issues.

      In an election where some are depressed because they see no path other than one that winds between two obsolete but deadly choices, this is a race to the bottom between the “lesser evil” and the “greater evil,” Hillary Clinton and Donald Trump. Such a choice starkly reflects the problems Latinos and we all face, ones that reach far and beyond Donald Trump. Trump’s candidacy is a virulent symptom of a far more sinister problem infecting our entire political system, something every community, including Latinos, experiences in very particular ways, regardless of their political affiliation.

      Growing numbers of Latinos are among the millions who helped push the question—“How do I vote for Jill Stein?”—as a top Google search term for our campaign after Monday’s debate. LatinXs have heard our message and are acting on their desire for change. I am confident and see every day on the campaign trail that even more are preparing to join us in this election. Our presidential platform is packed with the policies and positions—student debt forgiveness, free college education, fair trade, not free trade, labor rights, racial justice and police reform, a Green New Deal, and others—that we all know are necessary, and that Latinos especially have good reason to be concerned with.

    • The Military Logic of Punishing Chelsea Manning’s Suicide Attempt

      Last week, imprisoned whistle-blower Chelsea Manning was sentenced to 14 days in solitary confinement as punishment for her suicide attempt in early July at the prison barracks at Fort Leavenworth. The Fort Leavenworth disciplinary panel could not explicitly punish Manning for attempted suicide. Completed suicide is not a disciplinary violation and, to be guilty of attempting a crime, it’s necessary for the act which is attempted to be one. They disciplined her instead under a charge known as “conduct which threatens,” stating that Manning’s attempt to die interfered with “orderly running, safety, good order and discipline, or security” of the facility. (She is also being disciplined for possessing an unauthorized book). The whistle-blower stated that she was driven to suicide over the prison’s then-failure to appropriately treat her gender dysphoria. Why Manning injuring herself is deemed a threat to the facility’s functioning says much about the nature of that place’s function, says much about the true function of prisons.

      Before 1823 in England, according to early common law, if a person committed suicide, they would be posthumously punished. The body would be buried at the crossroads of a highway, impaled by a stake, often with a stone laid over the face (to prevent resurrection as a ghost or vampire). The deceased’s property would be forfeited to the king. Suicide was criminal because sovereignty over life and death did not then reside with the individual but with God, and with his chosen earthly emissary, the king. And since suicide was deemed an ungodly, criminal act, so too was an attempt—at times punishable by hanging. There’s no contradiction here: To execute a person who has herself tried to die is still punishment, not wish fulfillment. It’s the punishment of removing every last shred individual sovereignty; it’s the state’s reminder of where sovereignty really resides. Current state punishment of attempted suicide, in its rare cases like Manning’s, serves the same purpose.

    • Does The FTC Get To Ignore Section 230 Of The CDA?

      The case involves weight loss products, including colon cleanses, vended by LeanSpa. To generate more sales, LeanSpa hired LeadClick to act as an affiliate marketing manager. LeadClick coordinated promotion of LeanSpa’s products with LeadClick’s network of affiliates. Some affiliates promoted the products using fake news sites, with articles styled to look like legitimate news articles and consumer comments/testimonials that were fake. Apparently, all of this added up to big business. LeanSpa paid LeadClick $35-$45 each time a consumer signed up for LeanSpa’s “free” trial (which was a negative billing option). LeadClick shared 80-90% of these sign-up fees with affiliates and kept the remainder for itself. In total, LeadClick billed LeanSpa $22M, of which LeanSpa paid only $12M. Still, LeanSpa turned into LeadClick’s top customer, constituting 85% of its eAdvertising division’s sales.

    • An Ongoing Lack Of Technical Prowess Is Resulting In Bad Laws, Bad Prosecutions, And Bad Judicial Decisions

      Everyone in government is talking cyber-this and cyber-that, even though a majority of those talking don’t have the technical background to back up their assertions. This leads to dangerous lawmaking. The CFAA, easily one of the most abused computer-related laws, came into being thanks to some skittish legislators who’d seen one too many 80′s hacker films. (“WarGames,” to be specific.)

      Faulty analogies have led to other erroneous legislative conclusions — like the comparison of email to snail mail — which has led to the government treating any unopened email as “abandoned” and accessible without a warrant.

      But the problem goes further than the legislative branch. The executive branch hasn’t been much better in its grasp of technical issues, and the current slate of presidential candidates guarantees this won’t change for at least another four years.

      The judicial branch has its own issues. On both sides of the bench, there’s very little technical knowledge. As more and more prosecutions become reliant on secretive, little-understood technical tools like cell tower spoofers, government-deployed malware, and electronic device searches, unaddressed problems will only multiply as tech deployment ramps up and infusions of fresh blood into the judicial system fail to keep pace.

    • Court Dumps Cops’ Complaint They Were Unfairly Treated After Shooting Two Unarmed Suspects 47 Times

      In 2012, Cleveland police officers engaged in perhaps the most one-sided “shootout” ever with two suspects at the tail end of an (unauthorized) police chase. By the time it was over, officers had fired 139 bullets into a vehicle they had trapped in a school parking lot. Twenty-three of those hit the driver. Twenty-four hit the passenger. Both vehicle occupants were killed.

      One officer — Michael Brelo — apparently thought he was starring in his own action film. He unloaded 49 rounds in just over 20 seconds while standing on the hood of the stopped vehicle. All told, more than 75 Cleveland PD vehicles joined the chase/shooting. At the end of a yearlong investigation, 63 officers were suspended for their participation. Six officers were charged.

      The genesis of the horrific debacle was nothing more than a car backfiring. One cop mistook this for a gunshot and all hell broke loose. No weapons were recovered from the vehicle.

      One of the stranger offshoots of the infamous shootings was a lawsuit filed by several Cleveland police officers who took part in the chase. In their view, they were punished more harshly than African American officers who also participated in the unauthorized pursuit.

    • Help Me Choose a Nominee for the Hugh Hefner First Amendment Award

      The Hugh M. Hefner First Amendment Awards were established in 1979 to honor individuals who have made significant contributions to protect the First Amendment rights of Americans. They are looking for nominees for this year’s awards, and I’d like to send them a name.

    • Agent who interrogated Abu Zubaydah: ‘Where we went wrong as a nation’

      “His case represents the A to Z of where we went wrong as a nation,” said former FBI agent Ali Soufan, who interrogated some of the most prized captives of the war on terror, and considered Abu Zubaydah “a high-ranking terrorist” at his capture. “In a way, it was the original sin that led to the institutionalization of the so-called Enhanced Interrogation Techniques.”

    • Police Brutality Is a Campaign Issue, So Departments Ignore It on Social Media

      There’s zero doubt that police forces across the nation are caught between the crosshairs of politics and systemic racism; their losses and crimes either championed or hurriedly swept beneath the rug on the campaign trail.

      Both Hillary Clinton and Donald Trump addressed race relations in the United States as a symptom of a larger criminal justice problem. Trump went as far as to call America’s legacy of police brutality a matter of “law and order,” mirroring the strategic oversimplification of racism that has contributed to the killings of 285 black and Hispanic people by police officers in 2016 alone.

      But despite desperate efforts by citizens to document the unlawful abuse of minorities by officers, police departments still wield considerable control over their images and public messages. Thanks to social media sites like Facebook and Twitter, police are attempting to humanize themselves online, whether or not they’re physically repairing their relationships with America’s communities.

    • Russian journalist arrested for ‘illegal’ voting after exposing fraud in Duma elections

      An award-winning journalist who exposed voting fraud during Russia’s parliamentary elections has himself been arrested for alleged fraud.

      Denis Korotkov, a correspondent for the independent news website Fontanka, was scheduled to appear in court in St Petersburg on Wednesday on charges of “illegally obtaining a ballot”.

      But campaigners say Mr Korotkov was working undercover to expose vote rigging in the Duma elections, which have provoked international concern, and is now being harassed for his work.

      Mr Korotkov documented how he posed as a voter on 18 September and was given a sticker by polling station officials, who then arranged for him to be transported around St Petersburg with others to cast multiple ballots for specified candidates.

    • Denmark reverses course on refugee ‘child brides’

      Specifically, the agency concluded that the separate living quarters would violate the UN’s Convention on the Rights of the Child and Article 8 of the European Convention on Human Rights, which guarantees the right to one’s “private and family life”.

      Josephine Fock, an MP for The Alternative who raised the issue with DIS, cheered the reversal.

      “It is completely outrageous. We are talking about people who have fled to Denmark who are being split from each other. Some of them have children together and investigating individual [asylum] cases takes an unbelievably long time,” Fock told Metroxpress.

      In January, the Integration Ministry obtained an overview of the Danish asylum system that revealed that there are currently 27 minors who have spouses or partners. According to an earlier report in Metroxpress, there are two married 14-year-old girls at Danish asylum centres. One is married to a 28-year-old man, while the other is pregnant and has a 24-year-old husband.

    • [Older] Woman who mocked burka goes into hiding after online trolls offer bounty for her murder

      In a controversial article, Lejla Colak said forcing women to wear the Islamic headscarf was like forcing them to strap a sex toy to their heads.

      Twisted online trolls have launched a sick hate campaign against the Bosnian reporter, offering a cash prize if anyone kills or rapes her.

      One social media user, reportedly a member of the Bosnian army, wrote: “Are there any volunteers to rape lovely Lejla? I will personally pay for it.”

    • When ‘Yelling Commands’ Is the Wrong Police Response

      The story out of El Cajon, Calif., a San Diego suburb, had an eerie familiarity: The police respond to a person exhibiting some kind of disturbing behavior, but the subject — perhaps lost in his own, altered world — does not comply with the usual commands, does not heed the standard warnings, acts in a way that seems to invite danger, and ends up dead.

      An officer in El Cajon fatally shot a man identified as Alfred Olango on Tuesday, after Mr. Olango’s sister called 911 for help because he was acting erratically. The police released a still frame from a bystander’s video showing Mr. Olango, 30, mirroring the shooting stance of the officer facing him — feet apart, hands clasped and pointed at the officer. But one man had a gun and the other, it turned out, did not.

      “I called for help; I didn’t call you guys to kill him,” the sister wailed on a Facebook video recorded by a bystander.

      Far too little is known about what happened in El Cajon to judge the officer’s conduct, law enforcement experts and advocates for mentally ill people say. But the police use of force — sometimes lethal — against those with diminished mental capacity is distressingly common. The experts and advocates say that while training and practices have improved in the last generation, officers in many agencies still receive little or no education in how to recognize and deal with people who may not behave rationally.

      Like other police uses of force, confrontations involving people with diminished mental capacity have increasingly been caught on video and turned into national news. In July, officers in Sacramento shot and killed a man who was walking and running in the street, gesticulating wildly, and who refused to obey orders to drop the knife he was holding or to lie down.

    • Stand in solidarity with imprisoned writers in Saudi Arabia

      English PEN is continuing to hold monthly vigils in support of imprisoned writers Raif Badawi, Waleed Abulkhair and Ashraf Fayadh. Please join us to show them they have not been forgotten.

      English PEN has been holding regular vigils outside the Saudi Embassy in London in support of imprisoned blogger Raif Badawi and his lawyer Waleed Abulkhair since January 2015 when Badawi was first flogged for his peaceful activism. While Badawi has not been flogged since, he is continuing to serve a ten-year prison sentence, while Abulkhair is serving 15 years in prison for his human rights activism.

      PEN is also continuing to call for the immediate release of Palestinian poet and artist Ashraf Fayadh. Originally sentenced to death, Fayadh is now serving 8 years in prison and, like Badawi, continues to have the threat of hundreds of lashes looming over him.

      Please join us on Friday 30 September from 9 – 10am for a peaceful vigil at the Saudi Arabian Embassy in London. Activists are asked to meet at the Curzon Street entrance to the Embassy. (note: the postal address of the Embassy is 30-32 Charles Street, Mayfair, London).

    • Teen boy in Saudi Arabia arrested for “unethical behaviour” after flirty chat with YouTube teen girl star

      Abu Sin (his name means “toothless”) and Christina Crockett jokingly declared their love for one another in a silly YouNow stream that has since been uploaded to YouTube. They struggled through language barriers and acted like goofy young people.

      Evidently, being a cute kid is a crime in Saudi Arabia, where the 19 year old internet goofball lives.

      A Saudi attorney told Okaz newspaper the videos violate the country’s interpretation of Sharia law and internet regulations. Abu Sin could face up to three years in prison.

    • Man hit by tram after mass brawl breaks out between migrants in Vienna

      At least 20 people were involved in the fight, believed to have been between a group of Chechen and Turkish migrants, in the Austrian capital of Vienna on Tuesday evening.

      Austrian media reported that the trouble started when a Chechen man approached a group of 15 Turkish men socialising in an internet cafe and told them to be quiet.

      A brawl ensued, spilling out of the cafe and into the streets of the city’s Favoriten district.

      There was reports that one man was armed with a knife.

      Vienna is also home to a large population of Chechen migrants.

    • Interview: John Kiriakou On Supporting Jeffrey Sterling So He Doesn’t Die In Prison

      Former CIA officer John Kiriakou, who served a prison sentence at a federal prison in Loretto, Pennsylvania, joined Shadowproof managing editor Kevin Gosztola to talk about the case of former CIA officer Jeffrey Sterling, which they have both followed closely.

      Kiriakou’s reporting describes how officials at the Englewood federal prison, where Sterling is confined, failed to give him proper medical treatment for heart attack symptoms. Gosztola recently exchanged letters with Sterling and published a report on how the Bureau of Prisons is failing him.

      During the interview, Kiriakou shares his experiences with prison medical care and how all too often those who need care are denied proper treatment. He talks about how the Bureau of Prisons thinks prisoners like Sterling are malingering, which means they are lying about and faking serious health problems. He also describes why it is so important for a person in this situation to have outside support.

      Sterling has demanded the prison give him access to an outside doctor so that he can have his severe heart problems addressed.

    • Inside the Chicago Police Department’s secret budget

      When the clerk called Willie Mae Swansey’s case in a crowded courtroom last February, the 72-year-old approached the judge slowly, supporting herself with a four-pronged cane. It had been a busy afternoon in the Daley Center’s civil forfeiture courtroom, with more than a dozen quick hearings and a pair of trials preceding her own. The crush of defense lawyers and hopeful claimants had thinned by the time Swansey stepped up to the bench. She steadied herself beside a prosecutor and stood with a stately straightening of her back.

      Swansey was here to reclaim her car. The Chicago Police Department had seized the 2001 Chrysler PT Cruiser two years prior, arresting the driver, Swansey’s son, and charging him with manufacturing or delivering 15 to 100 grams of heroin. The car had been impounded ever since. Swansey herself was never charged with a crime, and it was her name, not her son’s, on the title. All the same, the Cook County state’s attorney’s office had agreed with CPD that the vehicle, which the office valued at $1,400, was worth keeping for good.

      [...]

      “I’m a poor black woman,” Swansey says. “I don’t have no money for an attorney.” Instead, she continued to represent herself.

      At her next appearance in May, she informed the court that her son’s criminal case was over. He had pleaded guilty, and having been under house arrest for 745 days, he was credited with time served and put on probation, according to county records.

      So on June 30, Swansey’s trial date finally arrived, two years and four months after CPD took her car. She had brought her son with her to court to testify that he had taken her keys without her knowledge. But the judge she saw that day, Paul Karkula, didn’t want to hear from him, she says.

      Instead, Swansey recalls, “The judge said, ‘I can’t give you back your car, because it would be right back on the road with drugs.’ ” (Karkula declined to comment for this story.)

      The decision struck Swansey as racist and deeply unfair. Swansey says she watched as four other cases that day were called and resolved, including one involving a wheelchair-bound white woman with a case very similar to hers. This woman got her car back, Swansey says. She did not.

    • How I Taught A Jury About Trolls, Memes And 4Chan — And Helped Get A Troll Out Of Jail

      A few weeks ago, CNN had a story on how a jury failed to convict Peter Wexler, an unemployed IT worker, who had been arrested and spent nearly a year in jail (without bail) for writing some mean stuff on his blog. He was literally arrested for five blog posts (which came with 20 criminal charges, as they had multiple charges on each post) and was facing up to 15 years in jail for those posts. Ken “Popehat” White blogged briefly about it, noting that it was a huge First Amendment win in a case where the defense team included one of his partners, Caleb Mason (along with lawyer Marri Derby, who was appointed by the court to represent Wexler through the Criminal Justice Act). It’s also a case that involved… me. I was an expert witness in the case, brought in to explain to the jury the nature of internet discourse, including how trolls quite frequently say outrageous things to get attention, and how it’s (for better or worse) not that uncommon to see people post angry rants on the internet, or to talk about how certain people should die, or to photoshop famous people into weird scenarios.

      I’ve avoided writing about the case up until now, mostly because of my involvement. And since Wexler was found not guilty on some charges, while the other charges resulted in a hung jury (the jury foreperson said that they voted 8 to 4 to acquit on those other charges), there’s a chance there may be a second trial. So recognize that it’s a case that I may still have future involvement in — and where I’m choosing my words carefully (the prosecutors in the case tried to take some of my posts on Techdirt out of context to attack my credibility, and it’s possible that could happen again — though I will admit to some confusion over being asked, twice, on the stand if I consider myself “an advocate for internet freedom,” as if that were a bad thing).

  • Internet Policy/Net Neutrality

    • FCC Postpones Vote on Set-Top Box Reform in a Blow to Chairman Wheeler

      The Federal Communications Commission on Thursday postponed a vote on its highly-anticipated proposal to increase competition in the video “set-top box” market after the chairman of the agency failed to secure the necessary votes to approve the plan.

      The delay amounts to a humbling setback for FCC Chairman Tom Wheeler, who had made reforming the $20 billion set-top box market a centerpiece of his pro-consumer agenda. With 40 days to go before a presidential election that will determine the makeup of the FCC going forward, the fate of the reform measure is now in doubt.

      As recently as Thursday morning, the vote was still scheduled, but Wheeler was ultimately unable to come to an agreement with his fellow Democratic commissioner Jessica Rosenworcel, who had previously raised concerns about his plan, and who represents the key swing vote at the five-member agency.

      “Commissioner Rosenworcel came to Chairman Wheeler’s office with a bunch of edits on the order, and those edits were unacceptable to his office,” according to a person familiar with the matter. “And that led to an impasse. As of 8 a.m. this morning the vote was on, and then by 9 a.m. the vote was pulled.”

    • FTC won’t give up fight against AT&T unlimited data throttling
    • The FCC Wants To Know Why Journalists Had To Pay $200 For WiFi At Presidential Debate
  • DRM/Broadcast

    • Don’t Hide DRM in a Security Update

      Over 10,000 of you have joined EFF in calling on HP to make amends for its self-destructing printers in the past few days. Looks like we got the company’s attention: today, HP posted a response on its blog. Apparently recognizing that its customers are more likely to see an update that limits interoperability as a bug than as a feature, HP says that it will issue an optional firmware update rolling back the changes that it had made. We’re very glad to see HP making this step.

      But a number of questions remain.

      First, we’d like to know what HP’s plans are for informing users about the optional firmware update. Right now, the vast majority of people who use the affected printers likely do not know why their printers lost functionality, nor do they know that it’s possible to restore it. All of those customers should be able to use their printers free of artificial restrictions, not just the relatively few who have been closely following this story.

    • 46 California Cities Join Rush To Impose ‘Netflix Tax’

      Last year, Chicago proudly declared that the city would be expanding its 9% amusement tax (traditionally covering book stores, music stores, ball games and other brick and mortar entertainment) to online streaming services and cloud computing. While Chicago was hungrily pursuing the $12 million in additional revenue the expanded tax would provide, it ultimately faced a lawsuit questioning the legality of Chicago’s move. The ongoing lawsuit by the Liberty Justice Center claims Chicago violated city rules by not holding a full vote on the changes, and is violating the Internet Freedom Tax Act.

      Legal or not, Chicago’s push to impose a Netflix tax has opened the floodgates.

    • What Cord Cutting? Cable Sector Hiked TV Prices 40% In Last Five Years

      We’ve noted time and time again that the cable and broadcast industry could compete with cord cutting by lowering prices, it just chooses not to. Even with last quarter seeing the biggest quarterly defection by paying subscribers ever recorded, time and time again you’ll see sector sycophants proclaim that cord cutting either doesn’t exist, or has been violently over-hyped and isn’t worth taking seriously. In fact, most sector executives still believe that the shift away from traditional cable will magically end once Millennials start procreating (protip: it won’t).

      As such, they’ve continued to raise cable TV rates at an absurd rate in the belief that they can keep milking the legacy cable TV cash cow in perpetuity. And while broadcasters certainly take the lion’s share of the blame for raising the cost of programming, you’d be hard pressed to find a cable TV provider that isn’t making things worse by also saddling consumers with misleading fees for nothing and soaring cable box, modem, and other hardware rental costs.

      The end result is users paying 40% more for cable TV than they did just five years ago. In fact the average cable bill is now $103.10 per month, an increase of 4% in the past year. And while the cable sector is quick to proclaim that this just reflects the “increased value” of cable TV, the reality is that most cable ops are trimming back overall channels to try and offset the bloated, soaring cost of sports programming.

  • Intellectual Monopolies

    • UN Panel Report On Access To Medicines Seen As Holding Potential For Change

      Speakers at a side event to the United Nations General Assembly last week commended a new report on access to medicines prepared by a high-level panel hand-chosen by the UN secretary general as containing fresh ideas and the potential to bring change to a longstanding problem.

      The breakfast dialogue, entitled, The Role of Health Technology: Innovation & Access in the 2030 Agenda for Sustainable Development, was organised on 23 September by the UN Secretary General’s High-Level Panel on Access to Medicines, whose report was released last week (IPW, United Nations, 14 September 2016).

    • WIPO staff council legal rep demands immediate removal of Gurry after distribution of misconduct report [Ed: about time?]

      The legal counsel to the World Intellectual Property Organisation’s Staff Council has called for the immediate removal of Francis Gurry as the UN agency’s director general and the lifting of his diplomatic immunity so that he might face possible criminal investigation or civil proceedings over the findings of a report into alleged misconduct that was delivered to the Chair of the WIPO General Assemblies in February.

      The demand is contained in a letter sent to “All Ambassadors and Permanent Representatives to the United Nations and other International Organizations in Geneva” yesterday. IAM has obtained a copy of the letter and has verified that it is authentic.

      The letter was sent following the distribution earlier this week of a heavily redacted version of the findings of an investigation, carried out by the UN’s Office of Internal Oversight Services (OIOS), into a series of allegations originally levelled at Gurry by the former deputy director general of the organisation James Pooley back in April 2014. Although the OIOS submitted its findings in February it is only now that WIPO member states have been able to see a copy of the report – albeit one in which large chunks have been blacked out.

    • Signs Of Changing Trends In FTAs’ IP Chapters, Speakers Say At WTO

      On intellectual property, the EU has published factsheets and position papers on what they would like to see in the agreement, she said. One of the focuses of those documents is raising awareness on the benefits of IP, and “we regret that the focus is not also on the human right to access information,” she said.

    • Trademarks

      • Lee v. Tam: Supreme Court Takes on the Slants

        In the case, Simon Tam is seeking to register a mark on his band name “The Slants.” The USPTO refused after finding that the mark is disparaging toward individuals of Asian ancestry.

      • US Supreme Court to hear Slants case

        The US Supreme Court has granted cert in Lee v Tam, the case involving Asian-American band The Slants and the issue of offensive trade marks.

        The issue presented is: “Whether the disparagement provision of the Lanham Act, 15 USC 1052(a), which provides that no trademark shall be refused registration on account of its nature unless, inter alia, it ‘[c]onsists of . . . matter which may disparage . . . persons, living or dead, institutions, beliefs, or national symbols, or bring them into contempt, or disrepute’ is facially invalid under the Free Speech Clause of the First Amendment.”

    • Copyrights

      • YouTube Hires Music Executive as a Liaison to the Industry

        For the last year, the music industry has been waging a bitter war against YouTube, accusing the popular video site of paying too little in royalties. The conflict has often seemed tribal, with record companies and stars on one side, and Silicon Valley on the other.

        Now, YouTube has brought over a major player from the music side.

        Lyor Cohen, who got his start in the early days of hip-hop and went on to top executive positions at Def Jam and the Warner Music Group — earning a reputation as the most tenacious force in any deal — has joined YouTube as the service’s global head of music, YouTube announced on Wednesday.

        It is the latest effort by a tech company to fortify itself by hiring a music insider. Two years ago, Apple bought Beats, which was founded by Dr. Dre and the producer Jimmy Iovine; in June, Spotify hired Troy Carter, the former manager of Lady Gaga.

        In a statement, Robert Kyncl, YouTube’s chief business officer, suggested that Mr. Cohen’s role was, to some degree, to be a bridge to the music world.

      • Kim Dotcom’s Extradition Appeal Concludes, Will He Get a “Fair Go”?

        After more than four weeks the extradition appeal hearings of Kim Dotcom and his former Megaupload colleagues have concluded. In his closing arguments, Dotcom’s lawyer urged the court to carefully weigh the facts and give his client a “fair go,” which he says the District Court failed to do. However, even if the High Court sides with the defense, the case is still far from over.

      • Dotcom Petitions Appeals Court For Rehearing Over Seized Millions

        Last month, the 4th Circuit Court of Appeals rejected efforts by Kim Dotcom to regain control over millions of dollars in assets seized by the US Government. Yesterday, Dotcom’s legal team petitioned the Court for a rehearing and rehearing en banc on the issues of forfeiture of assets and fugitive disentitlement.

09.28.16

Links 28/9/2016: Alpine Linux 3.4.4, Endless OS 3.0

Posted in News Roundup at 7:47 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Open source is not to blame for a lack of industry standards

    Carol Wilson wrings her hands over the “boring” nature of open source standardization, declaring that “Open source processes can take the fun out of everything, particularly technology wars.” Putting aside for a minute the irony of expecting standards to ever be anything more than mind-numbingly dull, Wilson’s larger argument misses the point.

    The problem with open source standards aren’t that they’re boring; it’s that they’re largely the same as the proprietary standards that preceded them. In practice, this presents no problem at all.

  • Down the rabbit hole, part 2: To ensure security and privacy, open source is required

    If my goal is to secure all of my computing devices, I need access to the source code in order to do a complete and effective security appraisal of the software I am running.

    It really is that simple. The need for open source software, in this case, has nothing to do with any ethical implications of software freedom—nor do the benefits of open source to software developers enter into this discussion. But having access to the source code is an undeniable benefit in ensuring the security of a piece of software.

  • Linaro organisation, with ARM, aims for end-end open source IoT code
  • Linaro start open-source development for IoT on ARM Cortex-M
  • ARM open source group address IoT software confusion

    Linaro has worked with ARM, Canonical, Huawei, NXP, RDA, Red Hat, Spreadtrum, STMicroelectronics, Texas Instruments and ZTE on the new IoT software, as part of what it calls the Linaro IoT and Embedded (LITE) Segment Group.

    Group says it wants to address the design problems created by the proliferation of choices for IoT device operating systems, security infrastructure, identification, communication, device management and cloud interfaces.

    It hopes to be able to reduce fragmentation in operating systems, middleware and cloud connectivity software, through the creation of open source device reference platforms.

    Initial technical work will be focused on delivering an end to end, cross­vendor solution for secure IoT devices using the ARM Cortex-­M architecture.

  • Open Source Community Continues Fight Against Cybercrime with Apache Spot (incubating)
  • Apache Spot Aims to Fetch Open Network Insights

    The project formerly known as Open Network Insights moves to the Apache Software Foundation and gets a new name—Apache Spot. It now includes support for DNS and Proxy in addition to Netflow.

    The Open Network Insight (ONI) project, backed by Cloudera, Intel and others and focused on helping organizations use big data for security insights, became generally available earlier this year. The ONI project is now being donated to the Apache Software Foundation (ASF)—home to Hadoop and many big data efforts—and is now getting a new life as the Apache Spot project.

  • Meet Apache Spot, a new open source project for cybersecurity

    Hard on the heels of the discovery of the largest known data breach in history, Cloudera and Intel on Wednesday announced that they’ve donated a new open source project to the Apache Software Foundation with a focus on using big data analytics and machine learning for cybersecurity.

    Originally created by Intel and launched as the Open Network Insight (ONI) project in February, the effort is now called Apache Spot and has been accepted into the ASF Incubator.

    “The idea is, let’s create a common data model that any application developer can take advantage of to bring new analytic capabilities to bear on cybersecurity problems,” Mike Olson, Cloudera co-founder and chief strategy officer, told an audience at the Strata+Hadoop World show in New York. “This is a big deal, and could have a huge impact around the world.”

  • Meet Apache Spot, a new open-source project for cybersecurity
  • Strata + Hadoop World: Apache Spot looks to tackle cybersecurity
  • Cloudera Approves First Grant Applications for Precision Medicine Initiative
  • Cloudera Broadens its Collaboration with Thorn to Include Software and Services to Fight Child Sexual Exploitation
  • Open source storage hits the mainstream

    Open source storage has gained mainstream acceptance in high performance computing, analytics, object storage, cloud (OpenStack) and NAS use, but can it crack the enterprise?

  • Rogue Wave Improves Support for Open Source Software with IBM
  • Rogue Wave Software to improve open-source software support with IBM

    Rogue Wave Software announces it is working with IBM to help make open source software (OSS) support more available. This will help provide comprehensive, enterprise-grade technical support for OSS packages.

  • Vendors and Customers Gettin’ Open Sourcey With It

    Basically, “open source enablement” seems to be about teaching customers how to embrace open source principles, both in terms of internal processes as well as external communities and ecosystems. As I’ve worked with many engineering and product teams over the years, I’ve seen many open source initiatives fail to reach their potential because of ingrained cultural obstacles that usually manifest in the form of corporate inertia that blocks forward progress.

  • Digium Announces Asterisk 14 Open Source Communications Software

    Digium®, Inc., the Asterisk® Company, today at its annual AstriCon users and developers conference, announced Asterisk 14, the next major release of the world’s most popular open source communications platform. Asterisk 14 continues the track of previous major releases, such as Asterisk 12 and Asterisk 13, by offering developer- and administrator-focused features and capabilities to simplify the scaling and deployment of Asterisk within large, service-based ecosystems.

  • Announcing the open source release of MORI, from Chalkbeat

    In 2014, Chalkbeat developed and started using a WordPress plugin for tracking impact. We called it MORI — Measures of Our Reporting’s Influence. As we wrote then, MORI grew out of one of our key beliefs: Journalists can make a difference, but the ability to measure the difference we make can multiply our impact over time. If we can document how, why, when, and where we made a difference, we are more likely to repeat our success.

    The quantitative data we track in MORI lets us see the big picture of how our work affects the world, beyond raw readership analytics; the qualitative narrative we record helps us tell the story. Our editorial teams can put important impacts in the hands of our fundraising team and others to turn around and share with the broader education community.

  • ODL: Open Source Hastens Software Usability

    Open Daylight Summit — Open source is connecting users and developers more intimately, and that’s a good thing, OpenDaylight Executive Director Neela Jacques said here today.

    In kicking off the OpenDaylight Summit, Jacques said the ability of users and developers to work side-by-side is evolving, and helping drive the faster pace at which open source can bring solutions to the industry.

    “Users can sit next to the developers of the code they use, and the interaction doesn’t go one way,” he said. “The real difference is the way users interact with developers. This is why we are able to get production-grade solutions so much faster than you ever would in proprietary world.”

  • Web Browsers

    • Mozilla

      • Mozilla has “stopped all commercial development of Firefox OS”

        Remember when Mozilla said it was ceasing development of Firefox OS for smartphones, but that it wasn’t giving up on the browser-based operating system altogether? Yeah, now the organization has pretty much thrown in the towel.

        After shifting the focus from phones to smart TVs and other Internet of Things products for a while, Mozilla senior engineering program manager Julie McCracken says development of the operating system was “gradually wound down” and that as of the end of July Mozilla has “stopped all commercial development of Firefox OS.

      • Firefox’s Test Pilot Program Launches Three New Experimental Features

        Earlier this year we launched our first set of experiments for Test Pilot, a program designed to give you access to experimental Firefox features that are in the early stages of development. We’ve been delighted to see so many of you participating in the experiments and providing feedback, which ultimately, will help us determine which features end up in Firefox for all to enjoy.

        Since our launch, we’ve been hard at work on new innovations, and today we’re excited to announce the release of three new Test Pilot experiments. These features will help you share and manage screenshots; keep streaming video front and center; and protect your online privacy.

  • Pseudo-Open Source (Openwashing)

  • FSF/FSFE/GNU/SFLC

    • GNU Tools Cauldron 2016, ARMv8 multi-arch edition

      That is what my England trip for the GNU Tools Cauldron was, but that only seemed to add to the pleasure of meeting friends again. I flewin to Heathrow and started on an almost long train journey to Halifax,with two train changes from Reading. I forgot my phone on the trainbut the friendly station manager at Halifax helped track it down andgot it back to me. That was the first of the many times I forgotstuff in a variety of places during this trip. Like I discovered thatI forgot to carry a jacket or an umbrella. Or shorts. Or full lengthpants for that matter. Like I purchased an umbrella from Sainsbury’s but forgot to carry it out. I guess you got the drift of it.

  • Standards/Consortia

    • FAQ: What’s so special about 802.11ad Wi-Fi?

      Here are the broad strokes about 802.11ad, the wireless technology that’s just starting to hit the market.

    • 2.5 and 5 Gigabit Ethernet Now Official Standards

      In 2014, multiple groups started efforts to create new mid-tier Ethernet speeds with the NBASE-T Alliance starting in October 2014 and MGBASE-T Alliance getting started a few months later in December 2014. While those groups started out on different paths, the final 802.3bz standard represents a unified protocol that is interoperable across multiple vendors.

      The promise of 2.5 and 5 Gbps Ethernet is that they can work over existing Cat5 cabling, which to date has only been able to support 1 Gbps. Now with the 802.3bz standard, organizations do not need to rip and replace cabling to get Ethernet that is up to five times faster.

      “Now, the 1000BASE-T uplink from the wireless to wired network is no longer sufficient, and users are searching for ways to tap into higher data rates without having to overhaul the 70 billion meters of Cat5e / Cat6 wiring already sold,” David Chalupsky, board of directors of the Ethernet Alliance and Intel principal engineer, said in a statement. “IEEE 802.3bz is an elegant solution that not only addresses the demand for faster access to rapidly rising data volumes, but also capitalizes on previous infrastructure investments, thereby extending their life and maximizing value.”

Leftovers

  • Yahoo Mail is down for some across the UK and Europe

    POOR OLD Yahoo can’t catch a break after users reported that its webmail service appears to be down.

    Some here at the INQUIRER are unable to access Yahoo Mail, while others have flocked to Twitter to moan that it’s not currently accessible.

  • Science

    • Never forget a face? You might be a super recogniser

      Your recognition skills are supported by a complex network of brain regions that rapidly develop during infancy and childhood, finally peaking at the age of 30.

    • Google swallows 11,000 novels to improve AI’s conversation

      When the writer Rebecca Forster first heard how Google was using her work, it felt like she was trapped in a science fiction novel.

      “Is this any different than someone using one of my books to start a fire? I have no idea,” she says. “I have no idea what their objective is. Certainly it is not to bring me readers.”

      After a 25-year writing career, during which she has published 29 novels ranging from contemporary romance to police procedurals, the first instalment of her Josie Bates series, Hostile Witness, has found a new reader: Google’s artificial intelligence.

      “My imagination just didn’t go as far as it being used for something like this,” Forster says. “Perhaps that’s my failure.”

    • The Power Paradox: The Surprising Science of How We Gain and Lose Influence

      What causes us to mishandle the power paradox, Keltner argues, is our culture’s traditional understanding of power — a sort of time-capsule that no longer serves us. Predicated on force, ruthlessness, and strategic coercion, it was shaped by Niccolò Machiavelli’s sixteenth-century book The Prince — but it is as antiquated today as the geocentric model of the universe that dominated Machiavelli’s day. What governs the modern world, Keltner demonstrates through two decades of revelatory studies, is a different kind of power — softer, more relational, predicated on reputation rather than force, measured by one’s ability to affect the lives of others positively and shift the course of the world, however slightly, toward the common good.

    • How a Pythagoras Cup works

      His YouTube channel is packed with similarly excellent videos wherein lab assistant Neil is persuaded to execute unnerving experiments. (previously.)

  • Health/Nutrition

    • CDC whistleblower claims agency has been using wrong Zika test

      In the midst of the fight to control Zika, the top public health agency in the United States has been engaged in an intense internal debate about the best way to test whether someone has been infected with the mosquito-borne virus.

      At the center of the debate at the Centers for Disease Control and Prevention is one of the leading experts on Zika virus. Robert Lanciotti is chief of the CDC lab responsible for developing tests to diagnose viral diseases such as Zika that are transmitted by mosquitoes, ticks and fleas.

  • Security

    • Security advisories for Wednesday
    • Facebook, Uber, Slack, and Pandora Pros Praise Free Security Tools

      Proponents of open source software argue that by letting passionate developers get involved and tweak underlying code, the tools they create are stronger and more reliable. Plus, for companies looking to bolster their digital defenses, the software has the added benefit of being free.

    • LibreSSL 2.5
    • LibreSSL 2.5 Released With New Features, iOS Support

      LibreSSL 2.5.0 is available today as the newest version of this growing fork of OpenSSL led by the OpenBSD project.

      LibreSSL 2.5′s libtls implementation now supports ALPN and SNI while handling four cipher suite groups, there is tightened error handling in some areas, support for OCSP intermediate certificates, initial support for Apple’s iOS platform, and a variety of other fixes and functionality improvements.

    • A quick fix for stupid password reset questions

      It didn’t take 500 million hacked Yahoo accounts to make me hate, hate, hate password reset questions (otherwise known as knowledge-based authentication or KBA). It didn’t help when I heard that password reset questions and answers — which are often identical, required, and reused on other websites — were compromised in that massive hack, too.

      Is there any security person or respected security guidance that likes them? They are so last century. What is your mother’s maiden name? What is your favorite color? What was your first pet’s name?

    • French hosting provider hit by DDoS close to 1TBps

      A hosting provider in France has been hit by a distributed denial of service attack that went close to one terabyte per second.

      Concurrent attacks against OVH clocked in at 990GBps.

      The attack vector is said to be the same Internet-of-Things botnet of 152,464 devices that brought down the website of security expert Brian Krebs.

      OVH chief technology officer Octave Klaba tweeted that the network was capable of attacks up to 1.5TBps.

    • Latest IoT DDoS Attack Dwarfs Krebs Takedown At Nearly 1Tbps Driven By 150K Devices

      If you thought that the massive DDoS attack earlier this month on Brian Krebs’ security blog was record-breaking, take a look at what just happened to France-based hosting provider OVH. OVH was the victim of a wide-scale DDoS attack that was carried via network of over 152,000 IoT devices.

      According to OVH founder and CTO Octave Klaba, the DDoS attack reached nearly 1 Tbps at its peak. Of those IoT devices participating in the DDoS attack, they were primarily comprised of CCTV cameras and DVRs. Many of these types devices’ network settings are improperly configured, which leaves them ripe for the picking for hackers that would love to use them to carry our destructive attacks.

  • Defence/Aggression

    • Senate Votes to Override Obama Veto on 9/11 Victims Bill

      A sweeping bipartisan majority in the Senate on Wednesday rejected President Obama’s veto of legislation that would allow families of those killed in the Sept. 11, 2001, terrorist attacks to sue Saudi Arabia for any role in the plot, all but assuring that Mr. Obama would suffer the first override vote of his presidency.

      The vote was 97 to 1, with only Senator Harry Reid, Democrat of Nevada, siding with the president.

      With the House nearly certain to follow the Senate later on Wednesday, the 9/11 bill will become law in a remarkable yet complicated bipartisan rebuke. Still, the measure itself remains contentious, and even some of those who cast a vote against Mr. Obama conceded that they did not fully support it.

      Mr. Obama’s greatest allies on Capitol Hill, who have labored for nearly eight years to stop most bills he opposes from even crossing his desk, turned against him, joining Republicans in the remonstrance.

    • Orlando Terror Attack ‘Triggered’ by Pentagon Drone Strike

      The domestic terrorist behind the Orlando nightclub massacre was motivated by a Pentagon drone strike in Iraq a month before the shooting, according to police transcripts made public last week.

      Conversations between Omar Mateen and an Orlando police negotiator on June 12 were kept secret by FBI and local police until Friday. The secrecy contributed to misleading media accounts of the terrorist’s motives in the days after the killings.

      The transcripts were released by Orlando police Friday after a Florida court hearing held in response to a lawsuit filed by several news organizations.

      Mateen killed 49 people during the attack on the Pulse, a gay nightclub, and wounded 53 others. Police eventually stormed the club and killed Mateen in a shootout after talks aimed at convincing him to surrender failed.

    • Senate overwhelmingly votes to override Obama veto on 9/11 bill

      The Senate voted overwhelmingly on Wednesday to override President Obama’s veto of legislation allowing lawsuits against foreign sponsors of terrorism, setting up an almost certain and historic defeat for the White House on the bill.

      The House is expected to follow suit within hours, making it the first veto of Obama’s presidency that has been overturned by Congress.

      Obama vetoed the legislation Friday because he said the bill — known as the Justice Against Sponsors of Terrorism Act, or JASTA — would infringe on the president’s ability to conduct foreign policy. It was the 12th veto of his presidency.

    • After 9/11 Bill, Could Saudi Arabia Really Sell All Its U.S. Assets?

      It’s easier to make a $750 billion threat than carry it out.

      The Senate on Tuesday unanimously passed a bill that would allow families of 9/11 victims to sue Saudi Arabia for its alleged connection to the attacks, pushing the kingdom one step closer to having to follow through on its pledge to sell hundreds of billions of dollars of United States assets that could be frozen by the courts. Carrying out that divestment pledge will be a long, difficult, complicated and likely costly process.

      “The idea that they could just flip a switch and sell them all, it just doesn’t compute,” George Pearkes of Bespoke Investment Group, an independent research firm, told HuffPost. “It’s just too much. No one’s going to be able to take that risk off your book,” Pearkes said, using the industry term for a portfolio.

      “You’re going to lose money doing it because everyone knows you’re going to do it, and … it immediately has an impact on your currency and balance of payments,” he added, noting that the Saudi currency is pegged to the U.S. dollar and the kingdom continually receives dollars for its oil exports.

    • US Senate Overrides Obama’s Veto – Chaos Imminent

      The Saudis have promised to pull their assets out of USA, hundreds of $billions in treasury bills and many other investments. 2016 could undo the tidy recovery USA has made in Obama’s term. Even a gradual withdrawal could lower the value of the dollar, raise interest rates, ding the stock-market, possibly trigger a nuclear arms race in the region and raise the price of gold.

    • Armed Forces personnel suspected of IS ties comprise just 1pct of militants detected

      Armed Forces personnel suspected to be involved with Islamic State (IS) make up just one per cent of militants detected by authorities so far.

      Defence Minister Datuk Seri Hishammuddin Hussein said despite the low number, the Ministry takes the matter seriously and has ordered that comprehensive action be taken to curtail the terrorist group’s ideology from spreading to security personnel.

      He said the Armed Forces Religious Corps and Royal Intelligence Corps have been tasked to detect soldiers who show interest in extremist groups, and warn members of the security forces against terrorism.

      The initiative includes educating soldiers on the true meaning of Islam and jihad.

      Hishammuddin, who spoke to reporters after launching the 40th Pacific Armies Management Seminar at a hotel here earlier today, however, did not reveal the exact number of soldiers who have been detected to be influenced by IS.

  • Transparency/Investigative Reporting

    • Journalists must fork over $200 for Wi-Fi at presidential debate

      News organizations attending Monday evening’s presidential debate must pay $200 for a “Secure Wireless Internet Connection” at Hofstra University in New York state. The debate is set to begin at 9pm Eastern.

      While profiteering during a high-profile occasion such as this is not unheard of—$15 for a patch cable?—what’s worse is that event staff at Hofstra University are reportedly using a $2,000 device to actively scan for hotspots and other ad-hoc Wi-Fi networks.

    • FCC official: “Something’s not right” with Wi-Fi at Monday’s debate

      One of the members of the Federal Communications Commission, Jessica Rosenworcel, has asked the agency to investigate the Monday evening ban on journalists’ Wi-Fi personal hotspots at the presidential debate held at Hofstra University.

      As Ars reported on Monday evening, the host venue demanded that journalists pay $200 to access the event’s Wi-Fi and were told to shut down their own hotspots or leave the debate. At least one photo, taken by Kenneth Vogel of Politico, showed a handheld device that was being used to scan for and locate “rogue” Wi-Fi networks.

  • Environment/Energy/Wildlife/Nature

    • The world passes 400ppm carbon dioxide threshold. Permanently

      Because carbon pollution has been increasing since the start of the industrial revolution and has shown no signs of abating, it was more a question of “when” rather than “if” we would cross this threshold. The inevitability doesn’t make it any less significant, though.

      September is usually the month when carbon dioxide is at its lowest after a summer of plants growing and sucking it up in the northern hemisphere. As fall wears on, those plants lose their leaves, which in turn decompose, releasing the stored carbon dioxide back into the atmosphere. At Mauna Loa Observatory, the world’s marquee site for monitoring carbon dioxide, there are signs that the process has begun but levels have remained above 400 ppm.

      Since the industrial revolution, humans have been altering this process by adding more carbon dioxide to the atmosphere than plants can take up. That’s driven carbon dioxide levels higher and with it, global temperatures, along with a host of other climate change impacts.

  • Finance

    • BEANO: Brexit Existing As Name Only

      This speech follows the recent statement of the Chancellor of the Exchequer that EU funding will be guaranteed until 2020.

      Could it be that the United Kingdom is not heading for a Hard Brexit or a Soft Brexit, but a Brexit existing as a name only?

      Could there be a BEANO Brexit?

    • Greece asks for suspension of TTIP negotiations

      Temporary suspension of negotiations on the Transatlantic Partnership Trade and Investment (TTIP) asked the Minister of Economy, Development and Tourism, George Stathakis, the Council of Foreign Affairs Ministers for Trade, held today in Bratislava.

      The Minister stressed that in the negotiations on the TTIP «has not seen any progress in sensitive European issues” regarding reciprocity in the liberalization of public procurement, the shipping issues, farm products with a geographical indication, the protection of consumers against genetically modified products, and complex environmental protection issues.

      It acknowledged that the TTIP is a major political issue for the European Union and that this time there are a number of important issues pending. Closed the placement of saying “need a new framework for negotiations, a new start on a new basis and at the appropriate time.”

    • Saudi Arabia’s monarch cuts ministers’ pay by 20%

      Saudi Arabia cancelled bonus payments for state employees and cut ministers’ salaries by 20 per cent, steps that further spread the burden of shoring up public finances to a population accustomed to years of government largesse.

      The government also decided to suspend wage increases for the lunar year starting next month and curbed allowances for public-sector employees, according to royal decrees and a cabinet statement published by state media.

      The salaries of members of a legislative body that advises the monarchy were cut by 15 per cent.

  • AstroTurf/Lobbying/Politics

    • Clinton campaign in ‘panic mode’ over Florida black voters

      To kill Donald Trump’s chances of capturing the White House, Hillary Clinton needs to win Florida. And to do that, she needs a big minority turnout.

      But Democrats are beginning to worry that too many African-American voters are uninspired by Clinton’s candidacy, leading her campaign to hit the panic button this week and launch an all-out blitz to juice-up voter enthusiasm.

      Bill Clinton, once nicknamed the “first black president,” embarks on a North Florida bus tour Friday in an attempt to draw African-American crowds. At the same time, Clinton herself will host events in Broward and St. Lucie counties, which have black populations higher than the statewide average.

    • 5 Conspiracy Theories That PROVE This Election Is The Worst

      The 2016 presidential election is well on its way to cementing its place in history’s annals of crazy. But do you know who finds it even crazier? Crazy people! Conspiracy nutjobs and other tinfoil hat cases follow political news too, and just as is the case with everyone else, there are candidates they do and don’t like. As such, the dark, sticky underbelly of the internet is inundated with madcap election theories that are somehow even more far-fetched than the accusations the actual candidates have been throwing around.

    • Michael Moore to Clinton supporters: Trump ‘won’

      Documentary filmmaker Michael Moore is telling Democratic presidential nominee Hillary Clinton’s supporters to treat the first presidential debate of 2016 as a Donald Trump victory and to not get complacent.

      Moore took to Twitter Tuesday, arguing that Clinton had “too much preparation, too much class,” and he wished she had gone “full throttle” on Trump, the Republican presidential nominee.

    • FBI silent on pending Clinton perjury probe

      FBI Director James Comey on Wednesday refused to provide the House Judiciary Committee with any clue about whether the bureau will comply with a request to investigate Hillary Clinton for perjury.

      “You cannot tell us whether you are indeed investigating?” Chairman Bob Goodlatte (R-Va.) asked during a hearing on FBI oversight.

      Comey said he would not comment on a pending referral.

      “When do you expect you will be able to tell us?” Goodlatte asked.

      “I don’t know,” Comey said.

      Goodlatte, along with Oversight Committee Chairman Jason Chaffetz (R-Utah), in July issued a criminal referral to U.S. District Attorney Channing Phillips, asking him to investigate whether Clinton lied to Congress during her marathon 11-hour testimony before the Select Committee on Benghazi.

    • I sold Trump $100,000 worth of pianos. Then he stiffed me.

      At Monday night’s debate, Donald Trump was called out for stiffing the people who work for him. Trump has been accused of failing to pay hundreds of contractors. And so far, he hasn’t seemed very sorry. When asked about failing to pay someone by Hillary Clinton this week, Trump replied, “Maybe he didn’t do a good job and I was unsatisfied with his work.”

      I take that attack personally. I’m one of the many small business owners who’ve been used by Trump, exploited and forced to suffer a loss because of his corporation’s shady practices.

      My relationship with Trump began in 1989, when he asked me to supply several grand and upright pianos to his then-new Taj Mahal casino in Atlantic City. I’d been running a music store for more than 30 years at that point, selling instruments to local schools and residents. My business was very much a family affair (my grandsons still run the store). And I had a great relationship with my customers — no one had ever failed to pay.

    • Jill Stein EXCLUSIVE: The debate through the Green Party lens

      Despite the efforts to silence the competition for the two establishment parties by excluding us from the televised presidential debates, we were able to reach millions of voters with our message using the open Internet and a cutting edge social media campaign.

      The debates sponsored by the Commission on Presidential Debates (CPD), a front group created by the Democratic and Republican parties to fool the American public, are anti-democratic. The two parties should not have the power to decide that their opponents cannot debate. That is not what democracy looks like.

      When the CPD was founded by former chairs of the Democratic and Republican National Committees, both made it clear their goal was to keep challengers out of the debate. Republican Frank Fahrenkopf, who remains a co-chair, indicated at the news conference that the CPD was “not likely to look with favor on including third-party candidates in the debates.”

      The NY Times quoted Democrat Paul Kirk, who was more blunt: “As a party chairman, it’s my responsibility to strengthen the two-party system.” Kirk’s successor as co-chair is Michael McCurry, former press secretary for Bill Clinton. The arbitrary criteria set by the secretive CPD are not designed to exclude “non-viable candidates”, but rather to prevent any candidate outside the Democratic-Republican duopoly from becoming viable in the eyes of the public.

    • Bernie Sanders’s brother to fight David Cameron’s seat for Green party

      Larry Sanders, the older brother of Democrat politician Bernie Sanders, is hoping to emulate his sibling’s success by standing for the Green party in David Cameron’s Oxfordshire seat.

      Bernie Sanders gave Hillary Clinton an unexpectedly tough fight in the Democratic presidential primaries, riding a wave of idealism among a predominantly young voter base.

      Now his brother Larry, 82, a retired social worker and former Green party councillor, plans to attempt a similar feat for the Greens in the byelection for the rock-solid Conservative constituency of Witney.

      It will be a tall order. “It hasn’t always been the richest turf for the Green party,” a party spokesman said. To become MP for Witney, he would have to overturn Cameron’s 22,700-vote majority in a seat where the last Green candidate won just 5.1% of the vote.

    • The Great Debate That Never Was

      If the Green Party’s Jill Stein had been allowed in this week’s presidential debate, it would have transformed the discussion and altered the race. That’s why Democrats and Republicans kept it a duopoly-only affair. “The only circumstances in which either Trump or Clinton can muster a minimally compelling argument, is against each other.” Thanks to Democracy Now!, we got a glimpse at what a real debate might be like. Clinton and Trump would lose.

  • Censorship/Free Speech

  • Privacy/Surveillance

  • Civil Rights/Policing

    • AP: Across US, police officers abuse confidential databases

      No single agency tracks how often the abuse happens nationwide, and record-keeping inconsistencies make it impossible to know how many violations occur.

      But the AP, through records requests to state agencies and big-city police departments, found law enforcement officers and employees who misused databases were fired, suspended or resigned more than 325 times between 2013 and 2015. They received reprimands, counseling or lesser discipline in more than 250 instances, the review found.

      Unspecified discipline was imposed in more than 90 instances reviewed by AP. In many other cases, it wasn’t clear from the records if punishment was given at all. The number of violations was surely far higher since records provided were spotty at best, and many cases go unnoticed.

    • Justice Department Is Fighting Fired FBI Agent’s Use of Whistleblower Defense

      John Parkinson, an Iraq War veteran who led a special operations unit in FBI’s Sacramento field office, first filed whistleblower complaints almost a decade ago when he became concerned with his coworkers’ behavior. He identified a colleague as having “a career-long pattern of soliciting prostitutes,” who used an FBI’s surveillance plane to travel to Reno to pay for sex. He alleged another colleague had a porn habit, even viewing explicit material at work. At one point, Parkinson removed furniture from an FBI office to keep it from getting soiled by the colleague, according to court documents.

      After filing his complaint, Parkinson found himself the subject of what he says was a retaliatory investigation, and was eventually fired. He has been fighting that decision for the past four years through a Kafkaesque maze of courts and internal appeals.

      On Monday, his attorneys filed a brief to the U.S. Federal Circuit Court of Appeals arguing for his right to raise a whistleblower retaliation defense.

    • Letter From CIA Whistleblower Jeffrey Sterling Details Federal Prison’s Scandalous Treatment

      Dear Jeffrey,

      I have followed your case closely, and I have also read recent updates from John Kiriakou, whose case I also covered extensively. I published his prison letters from FCI Loretto. Thank you for taking the time to answer some questions I have about your current struggle to obtain proper medical treatment for your heart condition.

      As of September 26, what is your current condition? What symptoms do you continue to endure? How critical do you believe it is that FCI Englewood take your symptoms seriously and grant you access to proper medical treatment? In other words, what do you need FCI Englewood to do for you now?

      How has your condition changed over the past months, and how responsive are officers within FCI Loretto to your insistence or requests for medical treatment? When you complain about pain, how long does it take until you finally see a doctor or medical professional?

      I understand you are expected to exhaust the administrative process before going outside this system to force the prison to give you proper medical treatment. What do you think of this process?

      I also recognize you, and your wife, Holly, have attempted other actions to convince the prison to take care of your urgent medical needs. What have you tried and what effect do you believe these actions have had?

      John Kiriakou reported on August 28 that Warden Deborah Denham had reversed her decision and would put a request into the “Bureau of Prisons Regional Office in Denver” that you “be taken to an outside cardiologist for testing.” Did you get to see a cardiologist? Is that how you found out you had high levels of Troponin?

    • The Proper Channels For Whistleblowing Still Mostly A Good Way For Messengers To Get Shot

      Whistleblower protections offered by the federal government are great in theory. In practice, they’re a mess. This administration has prosecuted more whistleblowers than all previous administrations combined. The proper channels for reporting concerns are designed to deter complaints. Those that do use the proper channels are frequently exposed by those handling the complaints, leading to retaliatory actions that built-in protections don’t offer an adequate remedy for.

      Perhaps the ultimate insult is that the proper channels lead directly to two committees that have — for the most part — staunchly defended agencies like the NSA against criticism and any legislative attempts to scale back domestic surveillance programs. The House and Senate Intelligence Committees are the “proper channels,” whose offered protections can only be seen as the hollowest of promises, especially after the House Intelligence Committee’s lie-packed response to calls for Snowden’s pardon.

      What the federal government offers to whistleblowers is a damned if you do/don’t proposition. Bypass the proper channels and brace yourself for prosecution. Stay within the defined lanes and expect nothing to change — except maybe your security clearance, pay grade, or chances of advancement within the government.

  • Internet Policy/Net Neutrality

    • ISP Feebly Tries To Defend Usage Caps By Comparing Them To…Oreos

      Earlier this month, we noted how Netflix had complained to the FCC about broadband usage caps, quite-correctly noting they’re little more than price hikes on uncompetitive markets. Netflix also was quick to highlight how caps can be used anti-competitively against streaming video providers, something the FCC opened the door to when it decided to turn a blind eye to the practice of zero rating (or exempting your own or a paid partners’ content from counting against the cap). As such, Netflix urged the FCC to finally crack down on usage caps using its authority under Section 706 of the Telecom Act.

    • AT&T Sues Nashville To Keep Google Fiber At Bay

      We’ve been talking about how the latest front in the battle for better broadband competition is the boring old utility pole. As Susan Crawford highlighted last month, getting permission from an ISP that owns a city’s utility poles can be a slow, bureaucratic nightmare, since the incumbent ISP has every incentive to stall would-be competitors. As such, Google has been pushing for “one touch make ready” proposals that use an insured, third-party contractor agreed to by all ISPs to move any ISP’s gear during fiber installs (often a matter of inches).

      But again, because this would speed up Google Fiber’s time to market, incumbent ISPs like Comcast, AT&T, Frontier and Time Warner Cable have all been fighting these reform efforts. Excuses provided by the ISPs range from claims that such reform violates their Constitutional rights, to unsubstantiated claims that such a policy would result in massive new internet service outages. AT&T has taken things one step further, and has been suing cities like Louisville for passing such reform laws.

  • Intellectual Monopolies

    • 10 highlights from the MARQUES Annual Conference in Villaitana

      Indigenous rights, EU trade mark reforms, geographical indications, design rights and much more were discussed at the recent MARQUES Annual Conference.

    • Trademarks

    • Copyrights

      • BBC iPlayer: New TV licence rules come into force

        All viewers who use the iPlayer to watch any BBC programmes must now be covered by a TV licence after new rules came into force on Thursday.

        Previously, iPlayer users only needed a licence if they were using the service to watch live broadcasts.

        That meant it was legal to watch programmes after broadcast on catch-up without paying the annual £145.50 fee.

        But the TV licence requirements have now been extended to include catch-up, online premieres and online-only shows.

      • Cloudflare: We Can’t Shut Down Pirate Sites

        As one of the leading CDN and DDoS protection services, Cloudflare is used by millions of websites across the globe.

        This includes thousands of “pirate” sites, including The Pirate Bay, who rely on the U.S. based company to keep server loads down.

        Copyright holders are generally not happy that Cloudflare is doing business with these sites. While most stop at complaining, adult entertainment outfit ALS Scan took the matter to court.

Links 28/9/2016: New Red Hat Offices, Fedora 25 ‘Frozen’

Posted in News Roundup at 6:11 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Linux Users v Windows Users, Debian Mourns Another

    The Debian project today shared the news of the passing of a long time contributor on September 17. In other news, the Linux Journal offered a free digital copy of their September 2016 magazine. Bruce Byfield compared Linux users to Windows users and My Linux Rig spoke to elementary OS founder Daniel Foré about his “Linux Setup.”

  • Asian Penguins turn failed program into a Linux success

    The Community School of Excellence (CSE) Asian Penguins are the world’s first and only Linux user group based in a Hmong charter school. A failed Windows laptop program at the school was turned by the Asian Penguins into a Linux success.

    Stu Keroff is the technology coordinator at the Community School of Excellence, a middle school located in St. Paul, Minnesota. He is a licensed elementary education and middle school social studies teacher, and a long-time Linux enthusiast. Stu founded and advises the Asian Penguins.

  • Free Today: September Issue of Linux Journal (Retail value: $5.99)
  • Desktop

    • 7 Ways Linux Users Differ from Windows Users

      To casual users, one person at a keyboard looks much the same as any other. Watch for a while, however, and the differences start to emerge — and whether they are using Linux or Windows is the least of them.

      The fact is, Linux users are different from Windows users in attitude as much as their choice of operating system. Originating as a Unix-type operating system and in opposition to Windows, Linux has developed an expectation and a philosophy in direct opposition to those promoted by Windows. Although many new Linux users have come directly from Windows, average Linux users simply do not react in the same way as Windows users.

    • Microsoft paid me $650 to scrub Windows 10 from my grandpa’s PC, says man

      Microsoft has paid the relative of an Alzheimer’s patient for having to scrub his PC clean of Windows 10.

      Jesse Worley said he’d received a cheque for $650 from Microsoft – seen by The Register – which he told us he’d received after threatening the giant with court action over an unwanted Windows 10 upgrade.

      Tech consultant Worley sought payment from the vendor for the 10 hours it took to rebuild his grandfather’s custom-build PC, re-installing Windows 7 to resemble Windows XP, in order to banish Windows 10.

      However, Worley – inspired by the case of a Californian woman over the unauthorised upgrade of her PC to Windows 10 – told The Reg he wasn’t interested in the money.

      He’d wanted to Microsoft to acknowledge it had slipped up with its notorious Get Windows 10 (GWX) nagware notifications, which he branded “deliberately misleading”.

      “Had Microsoft not gone out of their way to be deceptive, my grandfather pretty clearly wouldn’t have been updated to Windows 10,” he said.

    • Why kid hackers should have a Linux computer

      Kids these days are quite amazing in how fast they learn how to use computers. And what better system for a young hacker than a Linux computer? A writer at Medium recently shared the story of how his young nephew got his very own Linux computer.

  • Server

    • ​Kubernetes 1.4: One DevOps tool to rule all the containers
    • Kubernetes 1.4 promises to make container orchestration easier, more powerful
    • Canonical Releases ‘Core’ Kubernetes Container Distribution
    • Canonical launches Kubernetes public beta distribution
    • Canonical steps up enterprise courtship with Kubernetes bundle
    • Kubernetes 1.4 makes container orchestration bigger — and simpler
    • Canonical Expands Enterprise Container Portfolio with Commercially Supported Distribution of Kubernetes
    • Strategies for Running Stateful Applications in Kubernetes: Volumes

      Mesosphere DC/OS emphasizes running transactional workloads alongside cloud-native applications. Robin Systems, one of the container management companies, is aiming to containerize Oracle and other enterprise databases. The Kubernetes container orchestration engine is gearing up to run stateful workloads through a new concept called Pet Sets, which is a pod of stateful containers. Pet Sets was introduced as an alpha feature in Kubernetes 1.3, released in July.

      Kubernetes abstracts the underlying infrastructure building blocks into compute, storage and networking. When developers and operations teams get started with Kubernetes, they typically get exposed to objects such as pods, labels, services, deployments and replica sets, which provide a mechanism to deal with compute and networking. When it comes to persistence in Kubernetes, users should get familiar with the concepts of volumes, persistent volumes, persistent volume claims (PVC) and the upcoming Pet Sets.

      This article will be a first in a series that discusses the strategies and use cases for each of the storage choices available in Kubernetes. In this chapter, we will take a closer look at volumes, that provide the easiest migration path to Kubernetes.

    • Docker Doubles Down on Microsoft Windows Server [Ed: recall “DockerCon 2015 Infiltrated by Microsoft”]

      Docker for Windows debuts alongside a new commercial support relationship with Microsoft.
      For the most part, the Docker container phenomenon has been about Linux, with the majority of all deployments on Linux servers. But that could soon be changing as Docker Inc. today is announcing the general availability of Docker Engine on Windows Server 2016, alongside a new commercial support and distribution agreement with Microsoft.

      Docker containers rely on the host operating system for certain isolation and process elements in order to run. On Linux, those elements have always been present as part of the operating system, but the same was not true for Windows, which has required several years of joint engineering effort between Docker Inc. and Microsoft.

    • Hadoop Sandboxes and Trials Spread Out

      We all know that there is a skills gap when it comes to Hadoop in the Big Data market. In fact, Gartner Inc.’s 2015 Hadoop Adoption Study, involving 284 Gartner Research Circle members, found that only 125 respondents who completed the whole survey had already invested in Hadoop or had plans to do so within the next two years. The study found that there are difficulties in implementing Hadoop, including hardship in finding skilled Hadoop professionals.

    • Use models to measure cloud performance

      When I was young, I made three plastic models. One was of a car—a ’57 Chevy. Another was of a plane—a Spitfire. And a third was of the Darth Vader TIE Fighter. I was so proud of them. Each one was just like the real thing. The wheels turned on the car, and the plane’s propeller moved when you blew on it. And of course, the TIE Fighter had Darth Vader inside.

      When I went to work on the internet, I had to measure things. As I discussed in my last post, Measure cloud performance like a customer, when you measure on the internet you need to measure in ways that are representative of your customers’ experiences. This affects how you measure in two ways. The first is the perspective you take when measuring, which I talked about last time. The second way is the techniques you use to perform those measurements. And those techniques are, in effect, how you make a model of what you want to know. Those childhood plastic models turn out to offer some solid guidance after all.

    • ODPi Adds Apache Hive to Runtime Specification 2.0

      Today, ODPi announced that the ODPi Runtime Specification 2.0 will add Apache Hive and Hadoop Compatible File System support (HCFS). These components join YARN, MapReduce and HDFS from ODPi Runtime Specification 1.0

      With the addition of Apache Hive to the Runtime specification, I thought it would be a good time to share why we added Apache Hive and how we are strategically expanding the Runtime specification.

    • Ubuntu’s OpenStack on IBM’s Big Iron

      If I were Red Hat I would be looking over my shoulder right now; it appears that Ubuntu might be gaining. In just a few years the Linux distribution has gone from being non-existent in the enterprise to being a powerhouse. This is especially true in the cloud, where it’s a dominant force on both sides of the aisle. Not only is it the most deployed operating system on public clouds, its version of OpenStack accounts for over half of OpenStack cloud deployments, used by the likes of Deutsche Telekom, Bloomberg and Time Warner Cable.

  • Kernel Space

  • Applications

    • Linux and Open Source Hardware for IoT

      Most of the new 21 open source software projects for IoT that we examined last week listed Linux hacker boards as their prime development platforms. This week, we’ll look at open source and developer-friendly Linux hardware for building Internet of Things devices, from simple microcontroller-based technology to Linux-based boards.

      In recent years, it’s become hard to find an embedded board that isn’t marketing with the IoT label. Yet, the overused term is best suited for boards with low prices, small footprints, low power consumption, and support for wireless communications and industrial interfaces. Camera support is useful for some IoT applications, but high-end multimedia is usually counterproductive to attributes like low cost and power consumption.

    • nginx

      Case in point: I’ve been using the Apache HTTP server for many years now. Indeed, you could say that I’ve been using Apache since before it was even called “Apache”—what started as the original NCSA HTTP server, and then the patched server that some enterprising open-source developers distributed, and finally the Apache Foundation-backed open-source colossus that everyone recognizes, and even relies on, today—doing much more than just producing HTTP servers.

      Apache’s genius was its modularity. You could, with minimal effort, configure Apache to use a custom configuration of modules. If you wanted to have a full-featured server with tons of debugging and diagnostics, you could do that. If you wanted to have high-level languages, such as Perl and Tcl, embedded inside your server for high-speed Web applications, you could do that. If you needed the ability to match, analyze and rewrite every part of an HTTP transaction, you could do that, with mod_rewrite. And of course, there were third-party modules as well.

    • Etcher Image Writer Is Now Better Than Ever

      Back in may we spotlighted Etcher, a stylish open-source USB image writer app for Windows, macOS and Linux.

      In the months since our feature the app has released a over 10 small beta updates, with Etcher 1.5 Beta being the most recent release at the time of writing.

    • Audacious 3.8 released

      Audacious 3.8 was released on September 21, 2016.

    • New Version of Audacious Music Player Released

      A new version of Audacious, a popular lightweight audio player, is now available for download.

      Audacious 3.8 introduces a small set of features, including the ability to run more than one instance of the app at the same time. Quite why… no idea.

      New audtool commands have been added, including stream recording toggles, and cue sheet support is said to be “more seamless”.

    • Rambox Puts All Your Favorite Messaging Services In One App

      Rambox is a free, open-source messaging and email app that groups all your favourite web apps into one easy-to-manage window.

      Sound familiar?

      We’ve highlighted apps like Rambox before, with Franz and the Gmail-specific Wmail being but two.

    • Stylish Markdown Editor ‘Typora’ Is Now Available for Ubuntu

      In the market for a desktop markdown editor for Linux? You may have helped but notice that you’re rather spoilt for choice. From Abricotine and Scratch to Simplenote, Springseed and Remarkable. Even Gedit can render markdown with the right plugin! With so much choice it can be difficult to know which app to pick.

    • YoutPlayer Floats Your Fave YouTube Videos on The Desktop [Ed: just an Electron app]

      Looking for a neat-o way to play YouTube playlists on your desktop, outside your browser? Take a looksie at Yout, an Electron app that lets you add and watch YouTube playlists on your desktop, floating window stylee. Yout is not the most user-friendly of apps.

    • Instructionals/Technical

    • Games

      • Avoid the pile-up in ‘Clustertruck’, a first-person platformer with day-1 Linux support, it’s great

        We have been steadily getting more 3D “beat the timer” games where you’re up against others times, which is great because they really can be fun. I do love getting competitive in certain games, especially with some of my Steam friends and friends in the wider community. Games like this recently have been something I’ve been repeatedly going back to for a break from life.

        Clustertruck is not only about beating the times of other people, but it’s also a “the floor is lava” game, so if you touch the floor you have to start again. The really funny thing is that the safe pads are moving trucks you have to keep up with. You can at least grab onto the back of a truck if you just about touch it, so it’s not always instant death.

      • Fusion 3, the next generation game engine and editor from Clickteam will support Linux

        The difference between their tools and others, is the event system. Instead of needing to program every single line, you can stack up events and link them together to create a game. It works quite well and I’m pretty excited to give Fusion 3 a go on Linux myself to see what random games I can create for fun.

      • SteamOS 2.93 Brewmaster Beta Adds New Security Fixes from Debian GNU/Linux 8.6

        Valve’s SteamOS 2 gaming operating system is still getting goodies, and it looks like a new Beta update has been pushed on September 26, 2016, to the brewmaster_beta channel for public beta testers.

        That’s right, SteamOS 2.93 Brewmaster Beta is here to replace the previous build announced earlier this month, SteamOS 2.91 Brewmaster Beta, and add the latest security fixes and updates from upstream. This means that SteamOS is now officially based on the recently released Debian GNU/Linux 8.6 “Jessie” operating system.

        “SteamOS brewmaster update 2.93 pushed to brewmaster_beta. Corrects a build issue where the last kernel updates were not actually included. Also updates from the Debian 8.6 release[www.debian.org] and the usual security fixes,” says John Vert, Valve engineer, in the release announcement.

      • There Are Around 2,000 Steam Linux Games Available
      • Steam now has above 2,500 Linux & SteamOS games available

        I’ve seen some posts on reddit and across the wider net about Steam hitting around 2,000 games for Linux. The truth is the number is actually quite a lot higher.

        People seem to be using SteamDB numbers which aren’t up to date. The problem here is that SteamDB is unofficial and a manual process for people to let them know a game works. So you need to own the game and manually tell them, which makes their numbers rather different to the reality.
        Note: SteamDB do truly excellent work, this isn’t a bash attempt, but to let people know how they work and how their list is different.

        The other problem is that the Steam Search when filtering only for Games and only for Linux is still incorrect. It actually lists games that are due soon, or due this month and haven’t released yet. It also still lists games that haven’t updated their release date that were supposed to release before today, but didn’t actually release yet.

      • ‘Farabel’, a turn based strategy game is officially coming to Linux after a days work

        The developers of Farabel [Official Site, Steam, itch] sent word that their game is now officially coming to Linux. They asked for testers and in a single day got the game working properly on Linux and it’s now official.

      • RADV Vulkan Driver Can Now Correctly Render Talos Principle
      • The Talos Principle now renders correctly in ‘radv’, the open source AMD Vulkan driver

        Good news for Vulkan and AMD GPU fans, as David Airlie has put up a new blog post letting us know that The Talos Principle now renders correctly in this new open source AMD Vulkan driver.

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

    • GNOME Desktop/GTK

      • GNOME 3.22 Supports Flatpak Cross-Linux Distribution Framework

        GNOME 3.22, the second major update this year to the GNOME desktop environment, debuted Sept. 21—and since then, has made its way into the repositories of Linux distributions, including Fedora and openSUSE. Much as was the case with the GNOME 3.20 update earlier this year, many of the changes in the latest iteration of the popular open-source desktop environment are incremental. Among the most significant capabilities in GNOME 3.22 is support for the Flatpak framework, which is designed to allow an application to be installed on various Linux distributions. The GNOME Builder integrated development environment (IDE) can now also be used by developers to build Flatpak-compatible applications. Flatpak is an alternative approach to Snappy, which provides similar capabilities and was originally developed by Ubuntu. The GNOME Files application continues to evolve and, in this release, adds new capabilities that enable users to open compressed files automatically. Files also enables users to compress files easily in common compression formats. Additionally, Files gained the ability to batch rename files and folders on a user’s system. Here’s a look at the key features of the GNOME 3.20 desktop update.

      • [GNOME Maps:] Planning a trip
  • Distributions

    • The Linux Setup – Daniel Foré, elementary OS

      Daniel is the founder of elementary OS, the distribution that’s famous for its own look. Daniel came to Linux through a love of customizing Windows XP, so it’s no surprise he also came to appreciate the flexibility of Linux. Interestingly, especially given the strong visual aesthetic of elementary, Daniel’s favorite app is the Scratch text editor!

    • New Releases

      • Solus Gets MATE 1.16 Desktop Environment and Linux Kernel 4.7.5, Up-to-Date Apps

        Joshua Strobl from the Solus Project published a new installation of the distribution’s weekly newsletter, This Week in Solus 36, to inform Solus users about the latest software updates and other important changes in the Linux OS.

      • Proxmox VE 4.3 released

        Proxmox Server Solutions GmbH today announced the general availability of Proxmox Virtual Environment 4.3. The hyper-converged open source server virtualization solution enables users to create and manage LXC containers and KVM virtual machines on the same host, and makes it easy to set up highly available clusters as well as to manage network and storage via an integrated web-based management interface.

        The new version of Proxmox VE 4.3 comes with a completely new comprehensive reference documentation. The new docu framework allows a global as well as contextual help function. Proxmox users can access and download the technical documentation via the central help-button (available in various formats like html, pdf and epub). A main asset of the new documentation is that it is always version specific to the current user’s software version. Opposed to the global help, the contextual help-button shows the user the documentation part he currently needs.

      • Proxmox VE 4.3 Officially Released with New Reference Documentation, Updated GUI

        Today, September 27, 2016, Proxmox Server Solutions GmbH proudly announced the immediate availability of the Proxmox VE (Virtual Environment) 4.3 open source, Linux-based hyper-converged server virtualization solution.

        The biggest new feature of the Proxmox VE 4.3 release appears to be a new reference documentation that users can download in various formats, including as EPUB, PDF or HTML, helping newcomers get started with Proxmox much faster. However, it looks like it is based on the Debian GNU/Linux 8.6 “Jessie” and Ubuntu 16.04 LTS (Xenial Xerus) operating systems, running LXC 2.0 and Linux kernel 4.4 LTS.

    • OpenSUSE/SUSE

    • Red Hat Family

      • How Red Hat is making money on the public cloud with a hybrid approach

        Red Hat hasn’t traditionally played much of a part in public clouds, a fact its CEO Jim Whitehurst underscored in Red Hat’s recent earnings call. Though the company is now dabbling in a true elastic/consumption-based delivery and pricing model via OpenShift, Red Hat remains a primarily on-premises business that only feints toward a true cloud model in terms of service delivery.

        Ironically, the hybrid cloud may be the trend that gets Red Hat fully planted in the public cloud.

      • Red Hat Software Adding Fort Point Offices

        The new location will include an immersive briefing center for visiting executives, the first East Coast location for the company’s innovation labs and a new engineering lab, which will augment Red Hat’s 175,000-square-foot engineering and product headquarters in Westford. The engineering lab will provide collaborative space to take advantage of Boston’s tech ecosystem, Raleigh, North Carolina-based Red Hat said in a statement.

      • Finance

      • Fedora

        • Fedora Join meetings to begin this week

          We’ve had the Fedora Join SIG around for a bit now, but we haven’t been very active. Recently we’ve seen an increase in community members willing to participate in the SIG, and in combination with the work that CommOps is doing to improve the “joining experience” for newbies, we thought that it’s a good time to gain some traction.

        • Fedora 25 Alpha and processing.

          Is simple to use. You can used with java also with python and android mode.
          Come with many examples and tutorials.
          Today I tested with Fedora 25 alpha.

        • Fedora 24 — The Best Distro for DevOps?

          If you have been to any DevOps-focused conferences — whether it’s OpenStack Summit or DockerCon — you will see a sea of MacBooks. Thanks to its UNIX base, availability of Terminal app and Homebrew, Apple hardware is extremely popular among DevOps professionals.

          What about Linux? Can it be used as a platform by developers, operations, and DevOps pros? Absolutely, says Major Hayden, Principal Architect at Rackspace, who used to be a Mac OS user and has switched to Fedora. Hayden used Mac OS for everything: software development and operations. Mac OS has all the bells and whistles that you need on a consumer operating system; it also allows software professionals to get the job done. But developers are not the target audience of Mac OS. They have to make compromises. “It seemed like I had to have one app that would do one little thing and this other app would do another little thing,” said Hayden.

        • Fedora 25 Goes Into Beta Freeze Today, New Features Need To Be Completed

          Today is a big day along the Fedora 25 schedule and stepping towards its official debut in November.

          The Fedora 25 Beta freeze is today ahead of the planned beta release on 11 October. Also very important is today’s the 100% code complete deadline for Fedora 25 changes.

        • Fedora 25 Beta Freeze
        • Fedora 25 Linux Beta Might Land on October 11, 2016, Beta Freeze Now in Effect

          Fedora Project’s Mohan Boddu announced on September 26, 2016, that the upcoming Fedora 25 Beta milestone, which is scheduled for release next month on the 11th, is now officially in freeze stage.

          Fedora 25 is the next major release of the Red Hat-sponsored computer operating system for power users and anyone else who wants a well-designed Linux-based OS. It has been in development since July 2016, and the Alpha snapshot has hit the streets on August 30, after being delayed by a week due to some nasty regressions and bugs that have been patched quickly.

          The next stop in the Fedora 25 Linux development cycle is the Beta, which, according to the official release schedule, is now in freeze state. The Beta Freeze stage means that developers won’t be allowed to add any other features to the upcoming Beta release, but only to fix blockers and other annoyances that might not offer users a quality product.

    • Debian Family

      • Debian Project mourns the loss of Kristoffer H. Rose

        Kristoffer was a Debian contributor from the very early days of the project, and the upstream author of several packages that are still in the Debian archive nowadays, such as the LaTeX package Xy-pic and FlexML. On his return to the project after several years’ absence, many of us had the pleasure of meeting Kristoffer during DebConf15 in Heidelberg.

      • Derivatives

        • Parsix GNU/Linux 8.5 “Atticus” to Reach End of Life on September 30, 2016

          The Parsix GNU/Linux developers announced that the end-of-life status is approaching fast for the Parsix GNU/Linux 8.5 “Atticus” operating system, urging users to upgrade to the latest release immediately.

          Dubbed Atticus and based on the Debian GNU/Linux 8.5 “Jessie” operating system, Parsix GNU/Linux 8.5 was unveiled seven months ago, on February 14, 2016. Running the long-term supported Linux 4.1.17 kernel injected with TuxOnIce 3.3 and BFS patches, it was built around the GNOME 3.18 desktop environment with the GNOME Shell 3.18.3 user interface.

          The end of life (EOL) will be officially reached on September 30, 2016, which means that users of the Parsix GNU/Linux 8.5 “Atticus” operating system will no longer receive security and software updates. Therefore, they are urged today to upgrade to the latest, most recent version of the Debian-based distribution, Parsix GNU/Linux 8.10 “Erik.”

        • Canonical/Ubuntu

          • Ubuntu 16.10 Final Beta Officially Released with Linux Kernel 4.8, Download Now

            Delayed six days, the Final Beta release of the upcoming Ubuntu 16.10 (Yakkety Yak) operating system launched today, September 28, 2016, as the final development snapshot in the series.

            Today’s Final Beta is in fact the first Beta pre-release version of Ubuntu 16.10, and the only development milestone that you’ll be able to test if you want to see what’s coming to the next major release of Ubuntu Linux. However, we can tell you that it is powered by Linux kernel 4.8, contains up-to-date applications, and still uses the Unity 7 UI.

            “The Ubuntu team is pleased to announce the final beta release of Ubuntu 16.10 Desktop, Server, and Cloud products. Codenamed “Yakkety Yak”, 16.10 continues Ubuntu’s proud tradition of integrating the latest and greatest open source technologies into a high-quality, easy-to-use Linux distribution. The team has been hard at work through this cycle, introducing new features and fixing bugs,” reads the announcement.

  • Devices/Embedded

Free Software/Open Source

  • GitHub open-sources internal load-balancing software

    GitHub will release as open source the GitHub Load Balancer (GLB), its internally developed load balancer.

    GLB was originally built to accommodate GitHub’s need to serve billions of HTTP, Git, and SSH connections daily. Now the company will release components of GLB via open source, and it will share design details.

  • GE, Bosch and open source could bring more IoT tools

    Partnerships that could shape the internet of things for years are being forged just as enterprises fit IoT into their long-term plans.

    A majority of organizations have included IoT as part of their strategic plans for the next two to three years, IDC said last week. No one vendor can meet the diverse IoT needs of all those users, so they’re joining forces and also trying to foster broader ecosystems. General Electric and Germany’s Bosch did both on Monday.

    The two companies, both big players in industrial IoT, said they will establish a core IoT software stack based on open-source software. They plan to integrate parts of GE’s Predix operating system with the Bosch IoT Suite in ways that will make complementary software services from each available on the other.

  • Industrial IoT leaders work towards interoperability and open source collaboration
  • GE and Bosch Sign Agreement for Interoperability and Open Source Collaboration
  • Free PPMP from Bosch makes Industry 4.0 open for all
  • Open source tools can help small businesses cut costs and save time

    Imagine if there was a global community of tech experts who were independently building and improving digital tools that you could use for free. Tools that could help you provide a service for, and communicate with, your customers.

    Well, there is. The open source community is made up of amateur and professional computer coders who work on publicly available computer code. Businesses can then take these lines of code from websites such as Github, to use in their software, products and services.

    Open source projects are helping small businesses all over the world to save time and money.

  • OPNFV Colorado platform bolsters open source NFV efforts

    The Linux Foundation’s Open Platform for NFV project claims its third platform release targets accelerating development of NFV apps and services

    The telecom market’s continued move towards integrating network functions virtualization received a boost as the Linux Foundation’s Open Platform for NFV project released its latest Colorado platform release, the third from the open source-based organization.

  • Open-source NFV Project delivers third platform release

    The OPNFV Project, an open source project that facilitates the development and evolution of Network Functions Virtualization (NFV) components across various open source ecosystems through integration, deployment, and testing today announced the availability of OPNFV Colorado, the project’s third platform release.

  • Inocybe Technologies Launches Community Version of their Open Networking Platform
  • Open Source Getting on My Nerves

    Open source people are generally not dirt dishers, however. Take Phil Robb of OpenDaylight , where he is senior technical director. Robb was on that MANO panel in Denver, and he spoke to me shortly afterward in an interview on ODL’s new Boron software release. I specifically asked him about the “messy MANO situation” right now.

    His response was frustratingly calm. “I would equate the MANO space with where the controller space was three years ago,” he says. “One of the great things about open source is that real code is going to be up, going to be used, stuff will work or it will fall over. But we’ll fail fast and move on.” (See Carriers Driving ODL’s Boron Release.)

    So having multiple versions in process isn’t a bad thing, Robb says, because it might be that one approach works better for a set of use cases than another. What the industry will come around to “sooner rather than later” is that one approach likely addresses the broadest set of use cases and will be more widely adopted, while others address niches and either are used alongside the major approach or incorporated into it.

  • GENIVI Alliance launches new open source vehicle simulator project
  • Choosing the right metrics for your project

    Last month we discussed setting goals for your community metrics program. These goals serve as a constant reminder of what you want to achieve in the program and should be used as metrics themselves when deciding exactly what you are going to measure.

    This month we’ll document a basic strategy for deciding what to measure, and give examples of specific community metrics we’ve used in practice. Using our knowledge of our community and the goals we previously came up with, we’ll make sure the metrics we choose are relevant.

  • An Open Source Shopping Cart Can Boost Your Online Commerce Efforts
  • Open Source Projects Must Work Together to Survive

    Open source software is in danger of being beaten at its own game by upstart services that are tightly integrated, less complex, and easier to use. That message was at the heart of the cautionary tale told by Stephen O’Grady in his keynote at this year’s ApacheCon North America in May.

    O’Grady, Principal Analyst & Cofounder of RedMonk, recalled his years as a systems integrator, pointing out that open source software took a big bite out of the enterprise software market when it became more accessible and easier to use.

  • Contributing to an Open Source Project

    If you’re interested gaining some tips and insights into how to contribute to open source, this video of a presentation given on September 19 at the JavaOne conference in San Francisco by Gunnar Wagenknecht, a software engineer at Salesforce, and Wayne Beaton, director at the Eclipse Foundation, might be useful to you.

  • Facebook Debuts Open Source Detection Tool for Windows

    Facebook debuted the open source tool in 2014 as cross-platform, but for the last two years it was only supported on Ubuntu, CentOS, and Mac OS X operating systems. Facebook isn’t the biggest Windows shop, but the company confirmed in March that because so many users were asking for it, it was building a version of the tool for Windows 10.

  • Events

    • Report for Software Freedom Day 2016 – China Academy Science

      This year I am asked to present SFD in China Academy Science by the company, so unlucky I am not proper to deliver a Fedora talk then. I bring some DVDs and stickers there, as well as a roll up poster. However there are people asking questions about Fedora so finally I still do some Q&A after the event.

      SFD in China Academy Science this year is hold in Huairou Campus, suburbs of Beijing. So with another Red Hatter, Shiyang, we took train there. Their campus is not easy to find and by the time we arrived at the event it’s 10 minutes before the start of the event.

      Talks started on 2:00 PM. After the hostess introduced the event, Shiyang is the first to talk. He introduces the basic usage of Git and Github. During the Q&A part of his talk, I found that in fact most students not paying much attention to distributions already. They are just users of Linux.

    • OpenDaylight Symposium 2016
    • Keynote: Join or Die! – Stephen O’Grady, Principal Analyst & Cofounder, RedMonk
  • Web Browsers

    • Mozilla

      • B2G OS and Gecko Annoucement from Ari Jaaksi & David Bryant

        In the spring and summer of 2016 the Connected Devices team dug deeper into opportunities for Firefox OS. They concluded that Firefox OS TV was a project to be run by our commercial partner and not a project to be led by Mozilla. Further, Firefox OS was determined to not be sufficiently useful for ongoing Connected Devices work to justify the effort to maintain it. This meant that development of the Firefox OS stack was no longer a part of Connected Devices, or Mozilla at all. Firefox OS 2.6 would be the last release from Mozilla. Today we are announcing the next phase in that evolution. While work at Mozilla on Firefox OS has ceased, we very much need to continue to evolve the underlying code that comprises Gecko, our web platform engine, as part of the ongoing development of Firefox. In order to evolve quickly and enable substantial new architectural changes in Gecko, Mozilla’s Platform Engineering organization needs to remove all B2G-related code from mozilla-central. This certainly has consequences for B2G OS. For the community to continue working on B2G OS they will have to maintain a code base that includes a full version of Gecko, so will need to fork Gecko and proceed with development on their own, separate branch.

      • Firefox 53 Will Drop Support for Windows XP and Windows Vista

        Software companies are one by one giving up on Windows XP support for their products, and now it appears that it’s Mozilla’s turn to switch the focus to newer versions of Windows.

        Firefox 53 will be the first version of the browser which will no longer support Windows XP and Windows Vista, so users who haven’t yet upgraded to Windows 7 or newer will have to either stick with Firefox 52 or move to a different browser.

      • Boot 2 Gecko Being Stripped From Mozilla’s Codebase

        At the end of 2015 Mozilla effectively put an end to Firefox OS / Boot 2 Gecko by concluding things weren’t working out for Mozilla Corp and their commercial partners to ship Firefox OS smartphones. All commercial development around it has since stopped and they are now preparing to strip B2G from the mozilla-central code-base.

        The news to report on now is that Ari Jaaksi and David Bryant have announced, “Today we are announcing the next phase in that evolution. While work at Mozilla on Firefox OS has ceased, we very much need to continue to evolve the underlying code that comprises Gecko, our web platform engine, as part of the ongoing development of Firefox. In order to evolve quickly and enable substantial new architectural changes in Gecko, Mozilla’s Platform Engineering organization needs to remove all B2G-related code from mozilla-central. This certainly has consequences for B2G OS. For the community to continue working on B2G OS they will have to maintain a code base that includes a full version of Gecko, so will need to fork Gecko and proceed with development on their own, separate branch.”

  • SaaS/Back End

  • CMS

    • Open source application portal adds new ITS applications for download

      The Open Source Application Development Portal (OSADP) web-based portal provides access to and supports the collaboration, development, and use of open-source ITS-related applications. The OSADP has added a number of new ITS-related applications that are available free to the public, including:

  • Public Services/Government

    • Wyoming’s open source enterprise code library a secret no more

      Wyoming’s 250-person Enterprise Technology Services (ETS) group knew it had a good thing in its Enterprise Extensible Code Library, but it chose to keep things under wraps outside of the state until last week when members of that team attended an annual confab for state government CIOs.

      It was at the National Association of State Chief Information Officers (NASCIO) convention in Orlando that the ETS code library project was honored with a Recognition Award for Enterprise IT Management Initiatives, and the inquiries from other states and organizations started streaming in.

  • Openness/Sharing/Collaboration

    • Inside the Drone Journalism Lab’s open source operations manual

      Across the world, journalists are increasingly using drone technology to augment their reporting at a fairly inexpensive price.

      In order to help journalists become more adept drone users, the University of Nebraska-Lincoln’s Drone Journalism Lab recently released a free operations manual online.

      The manual, produced by Matt Waite, founder of the Drone Journalism Lab, is open source and Creative Commons licensed.

    • Open Source Malaria’s First Paper

      Open Source Malaria (OSM) publishes its first paper today. The project was a real thrill, because of the contributors. I’d like to thank them.

      Skepticism about open source research is often based on assumptions: that people will be too busy or insufficiently motivated to participate, or that there will be a cacophony of garbage contributions if a project is open to anyone. I’m not sure where such assumptions come from – perhaps people look first for ways that things might fail. We can draw upon many experiences of the open source software movement that would suggest such assumptions are poor. We can draw on successful examples of open collaboration in other areas of science, such as the Human Genome Project and the projects it has spawned, as well as examples in mathematics and astrophysics. This OSM paper addresses open source as applied to drug discovery, i.e. experimental, wet lab science in an area where we normally expect to need secrecy, for patents. It is based on the experience of 4-5 years of work and describes the first series examined by OSM.

    • Open Access/Content

Leftovers

  • Video claiming drilling into iPhone 7 will reveal hidden headphone port goes viral

    A video claiming that users can add a headphone socket to the iPhone 7, which only has a Lightning port, by drilling into the bottom of their phone has been watched almost 10m times.

    The prank video shows a man drilling a 3.5mm hole into the bottom left edge of the iPhone 7 held in a vice. It points to the row of small holes on the left side that replaced the headphone socket present on the iPhone 6S and claims that drilling into the second hole on the left reveals a hidden socket.

    Once the hole has been drilled the video shows an iPhone 7 playing music, although the sound comes out of the speakers, not the white headphones now inserted in the DIY hole.

  • Tempers flare in Venice as angry protesters block cruise ships

    Hundreds of demonstrators have taken to the water in Venice to protest against visiting cruise ships, as relations between tourists and locals reach a new nadir.

    Flare-waving protestors used gondolas and small boats to prevent cruise ships, including a vessel belonging to Thomson, from passing through the lagoon on Sunday.

    During peak season some 30,000 cruise ship passengers disembark in Venice every day, which locals claim is ruining their city, both environmentally and culturally.

  • Disney Is Working With an Adviser on Potential Twitter Bid

    Walt Disney Co. is working with a financial adviser to evaluate a possible bid for Twitter Inc., according to people familiar with the matter.

    After receiving interest in discussing a deal, Twitter has started a process to evaluate a potential sale. Salesforce.com Inc. is also considering a bid and is working with Bank of America on the process, according to other people, who asked not to be named because the matter is private.

    Representatives for Twitter and Disney didn’t respond to requests for comment.

    Speculation that Twitter will be sold has been gathering steam in recent months, including last week’s news of Salesforce’s interest, given the social-media company’s slumping stock and difficulties in attracting new users and advertising revenue. Disney, the owner of ABC and ESPN, could obtain a new online outlet for entertainment, sports and news. Jack Dorsey, chief executive officer of Twitter, is on the board of Disney.

  • Science

    • Archaelogists discover 200-year-old underground pub in Manchester

      Archaelogists have discovered a 200-year-old underground pub during building work on a office building in central Manchester.

      Excavators discovered untouched bottles full of of brandy and crockery branded with the 18th-century landlord of the Astley Arms.

      Archaelogists were brought to the site of a future 13-storey skyscraper as part the planning process and found the remains of houses as well as the pub.

  • Security

    • Tuesday’s security updates
    • New Open Source Linux Ransomware Divides Infosec Community

      Following our investigation into this matter, and seeing the vitriol-filled reaction from some people in the infosec community, Zaitsev has told Softpedia that he decided to remove the project from GitHub, shortly after this article’s publication. The original, unedited article is below.

    • Fax machines’ custom Linux allows dial-up hack

      Party like it’s 1999, phreakers: a bug in Epson multifunction printer firmware creates a vector to networks that don’t have their own Internet connection.

      The exploit requirements are that an attacker can trick the victim into installing malicious firmware, and that the victim is using the device’s fax line.

      The firmware is custom Linux, giving the printers a familiar networking environment for bad actors looking to exploit the fax line as an attack vector. Once they’re in that ancient environment, it’s possible to then move onto the network to which the the printer’s connected.

      Yves-Noel Weweler, Ralf Spenneberg and Hendrik Schwartke of Open Source Training in Germany discovered the bug, which occurs because Epson WorkForce multifunction printers don’t demand signed firmware images.

    • Google just saved the journalist who was hit by a ‘record’ cyberattack

      Google just stepped in with its massive server infrastructure to run interference for journalist Brian Krebs.

      Last week, Krebs’ site, Krebs On Security, was hit by a massive distributed denial-of-service (DDoS) attack that took it offline, the likes of which was a “record” that was nearly double the traffic his host Akamai had previously seen in cyberattacks.

      Now just days later, Krebs is back online behind the protection of Google, which offers a little-known program called Project Shield to help protect independent journalists and activists’ websites from censorship. And in the case of Krebs, the DDoS attack was certainly that: The attempt to take his site down was in response to his recent reporting on a website called vDOS, a service allegedly created by two Israeli men that would carry out cyberattacks on behalf of paying customers.

    • Krebs DDoS aftermath: industry in shock at size, depth and complexity of attack

      “This attack didn’t stop, it came in wave after wave, hundreds of millions of packets per second,” says Josh Shaul, Akamai’s vice president of product management, when Techworld spoke to him.

      “This was different from anything we’ve ever seen before in our history of DDoS attacks. They hit our systems pretty hard.”

      Clearly still a bit stunned, Shaul describes the Krebs DDoS as unprecedented. Unlike previous large DDoS attacks such as the infamous one carried out on cyber-campaign group Spamhaus in 2013, this one did not use fancy amplification or reflection to muster its traffic. It was straight packet assault from the old school.

    • iOS 10 makes it easier to crack iPhone back-ups, says security firm

      INSECURITY FIRM Elcomsoft has measured the security of iOS 10 and found that the software is easier to hack than ever before.

      Elcomsoft is not doing Apple any favours here. The fruity firm has just launched the iPhone 7, which has as many problems as it has good things. Of course, there are no circumstances when vulnerable software is a good thing, but when you have just launched that version of the software, it is really bad timing.

      Don’t hate the player, though, as this is what Elcomsoft, and what Apple, are supposed to be doing right.

      “We discovered a major security flaw in the iOS 10 back-up protection mechanism. This security flaw allowed us to develop a new attack that is able to bypass certain security checks when enumerating passwords protecting local (iTunes) back-ups made by iOS 10 devices,” said Elcomsoft’s Oleg Afonin in a blog post.

    • After Tesla: why cybersecurity is central to the car industry’s future

      The news that a Tesla car was hacked from 12 miles away tells us that the explosive growth in automotive connectivity may be rapidly outpacing automotive security.

      This story is illustrative of two persistent problems afflicting many connected industries: the continuing proliferation of vulnerabilities in new software, and the misguided view that cybersecurity is separate from concept, design, engineering and production.

      This leads to a ‘fire brigade approach’ to cybersecurity where security is not baked in at the design stage for either hardware or software but added in after vulnerabilities are discovered by cybersecurity specialists once the product is already on the market.

    • Sloppy programming leads to OpenSSL woes
    • OpenSSL Fixes Critical Bug Introduced by Latest Update

      OpenSSL today released an emergency security update after a patch in its most recent update issued last week introduced a critical vulnerability in the cryptographic library.

    • The Internet Of Poorly Secured Things Is Fueling Unprecedented, Massive New DDoS Attacks

      Last week, an absolutely mammoth distributed denial of service (DDoS) attack brought down the website of security researcher Brian Krebs. His website, hosted by Akamai pro bono, was pulled offline after it was inundated with 620Gbps of malicious traffic, nearly double the size of the biggest attack Akamai (which tracks such things via their quarterly state of the internet report) has ever recorded. Krebs was ultimately able to get his website back online after Google stepped in to provide DDoS mitigation through its Project Shield service.

    • Trump Offers More Insight On His Cybersecurity Plans: 10-Year-Old Relatives Vs. 400-lb Bedroom Dwellers

      Look, anyone who refers to cybersecurity or cyberwarfare as “the cyber” is probably better off not discussing this. But Donald Trump, in last night’s debate, felt compelled to further prove why he’s in no position to be offering guidance on technological issues. And anyone who feels compelled to portray hackers as 400-lb bedroom dwellers probably shouldn’t be opening their mouth in public at all.

      With this mindset, discussions about what “the Google” and “the Facebook” are doing about trimming back ISIS’s social media presence can’t be far behind. Trump did note that ISIS is “beating us at our game” when it comes to utilizing social media. Fair enough.

    • New, stronger crypto standard lacks backward compatibility

      The Internet Engineering Task Force is on the verge of approving a new standard for encrypted internet traffic that will make the web a safer place to shop, bank and browse — but it could also break a lot of stuff for people who don’t update their browsers. Transport Layer Security, or TLS, is an encryption protocol that works with web browsers. It’s the math, and the shared standards, that underlie the green padlock users see — the symbol which gives users the confidence that they are connected to the right site and is private enough to share personal or financial data. TLS supersedes SSL, or Secure Sockets Layer — a protocol dating back to 1995 that has proven to be thoroughly broken. But the latest TLS version was finalized in 2008 and in recent years has been the subject of many high profile attacks and newly discovered bugs.

  • Defence/Aggression

    • Duterte ‘about to cross the Rubicon’ with US, wants alliances with Russia & China

      Philippines President Rodrigo Duterte has reiterated his intention to distance his country from the US, its former colonial master, saying he is about to pass “the point of no return” with the US.

      “I am about to cross the Rubicon between me and the US,” the controversial Pacific leader told reporters, without elaborating.

      Duterte reiterated that the Philippines would seek closer ties with Russia and China, the two nations that challenged American ambition for global leadership. But, he added, the ties with the US would not be broken completely, only driven to a point that would allow Manila to have an independent policy.

    • Carter: Afghanistan War Supplemental Request Coming in November

      Defense Secretary Ash Carter plans to present Congress with a request for a supplemental spending measure to fund US troops in Afghanistan come November, he said Monday.

      However, Carter would not give a sense of how large the monetary request may be, saying only that there is a “range” that the department’s budgetary experts are considering.

    • Jordanian writer on trial for ‘anti-Islam’ cartoon shot dead outside court

      A gunman on Sunday killed prominent Jordanian writer Nahed Hattar outside a court where he was facing charges for sharing a cartoon deemed offensive to Islam, state news agency Petra reported.

      Hattar was struck by three bullets before the assailant was arrested, said Petra. Witnesses told AFP that a man had opened fire in front of the court in Amman’s Abdali district.

      The 56-year-old Christian was arrested on August 13 after posting a cartoon mocking jihadists on his Facebook account.

      He was charged with inciting sectarian strife and insulting Islam before being released on bail in early September.

    • Writer Charged With Insulting Islam Is Killed as Extremism Boils Over in Jordan

      Some of the most extreme elements in Jordan made clear in recent weeks that Nahed Hattar should pay for a provocative cartoon he posted online depicting a bearded man in bed with two women ordering God to bring him cashews and wine.

      So when Mr. Hattar, 56, a prominent writer from a Christian family, showed up at a court on Sunday to face criminal charges of insulting Islam, at least one man with a gun decided a trial was not enough. As three bullets ripped through the writer in front of the courthouse, Jordan’s simmering tensions boiled over.

    • France: What Is Hidden Behind the “Burkini Ban”

      In Sisco, Corsica, on August 13, a group of Muslim men arrived on a beach in the company of women wearing “burkinis” (full-body bathing costumes). The Muslim men firmly asked the tourists on the beach to leave and posted signs saying “No Entry”. When a few teenagers resisted, the Muslim men responded with a harpoon and baseball bats. The police intervened — but it was just the beginning.

      In the following days, on beaches all over France, Muslim men showed up, accompanied by women in burkinis, and asking beachgoers to leave. Tourists packed up and fled. Several mayors of seaside resorts decided to ban the bathing costume, and the “burkini ban” scandal was born.

      Some politicians said that banning the burkini “stigmatized” Muslims and infringed on their “human rights” to wear whatever they liked. Other politicians, including Prime Minister Manuel Valls and former President Nicolas Sarkozy, called the burkini a “provocation”, and asked for a law to ban it. The Council of State, the highest legal institution, eventually declared that banning the burkini was against the law; the ban was lifted.

      What is important to explain is what lies behind the “burkini ban.”

      Thirty years ago, France was a country where Islam was present but where Islamic demands were virtually absent and Islamic veils were rare.

      Then, in September, 1989, in a northern suburb of Paris, three female students decided to attend high school with their heads covered by a scarf. When the dean refused, the parents, with the support of newly created Muslim associations, filed a complaint. The parents won.

    • One dead and three injured in Malmo shooting as bomb found outside primary school

      Witnesses reported hearing 20 gunshots fired in bursts of three during a football derby at around 7pm local time between Malmö FF and Helsingborgs IF on Sunday.

      One eyewitness claimed the shots were fired by people in an Audi which drove off at high speed.

      Police found shell casings at the scene in Censorgatan and say the suspects may have escaped by moped – four people were injured, including one who was shot in the head.

    • Liberals’ MP hit by hate messages
    • India Says Pakistan Believes Terror Will Bring Territory

      Pakistan continues to believe terrorist attacks will allow it to obtain territory it covets in Jammu and Kashmir, India’s foreign minister said Monday.

      In her speech before the U.N. General Assembly, Sushma Swaraj also rejected accusations made by Pakistan’s prime minister from the same podium last week that India violates human rights, calling them “baseless.”

      She said India has a man in custody “whose confession is a living proof of Pakistan’s complicity in cross-border terror. But when confronted with such evidence, Pakistan remains in denial.”

      “It persists in the belief that such attacks will enable it to obtain the territory it covets,” Swaraj said. “My firm advice to Pakistan is: abandon this dream. Let me state unequivocally that Jammu and Kashmir is an integral part of India and will always remain so.”

    • Pakistani journalist suing US for killing his son, brother in drone attack

      A Pakistani journalist has sued the United States government in Pakistani courts alleging that the Central Intelligence Agency (CIA) had killed his brother and a son in a drone strike in the tribal region of the country in 2009.

      According to Karim Khan, his brother and the son were innocent and had no terror links at all. His brother Asif Iqbal had Masters degree in Modern Languages and was a teacher at a local school. The 16-year-old son, Zahinullah, was a student of grade 10.

      In an interview with Al Jazeera, Khan vowed to pursue the case against the CIA and the US government. “We would show their tyrannous face to the whole world…that’s all. They cannot bring back my brother or my son…but I will fight against them as far as I can,” he said.

      Since 2004, the Central Intelligence Agency has conducted over 400 drone attacks in Pakistan, killing about 3,000 people. The London-based Bureau of Investigative Journalism claims that at least 966 civilians, including 207 children were also among those killed by the drones.

  • Environment/Energy/Wildlife/Nature

    • Evolution of global temperature over the past two million years

      Reconstructions of Earth’s past climate strongly influence our understanding of the dynamics and sensitivity of the climate system. Yet global temperature has been reconstructed for only a few isolated windows of time, and continuous reconstructions across glacial cycles remain elusive. Here I present a spatially weighted proxy reconstruction of global temperature over the past 2 million years estimated from a multi-proxy database of over 20,000 sea surface temperature point reconstructions. Global temperature gradually cooled until roughly 1.2 million years ago and cooling then stalled until the present. The cooling trend probably stalled before the beginning of the mid-Pleistocene transition3, and pre-dated the increase in the maximum size of ice sheets around 0.9 million years ago. Thus, global cooling may have been a pre-condition for, but probably is not the sole causal mechanism of, the shift to quasi-100,000-year glacial cycles at the mid-Pleistocene transition. Over the past 800,000 years, polar amplification (the amplification of temperature change at the poles relative to global temperature change) has been stable over time, and global temperature and atmospheric greenhouse gas concentrations have been closely coupled across glacial cycles. A comparison of the new temperature reconstruction with radiative forcing from greenhouse gases estimates an Earth system sensitivity of 9 degrees Celsius (range 7 to 13 degrees Celsius, 95 per cent credible interval) change in global average surface temperature per doubling of atmospheric carbon dioxide over millennium timescales. This result suggests that stabilization at today’s greenhouse gas levels may already commit Earth to an eventual total warming of 5 degrees Celsius (range 3 to 7 degrees Celsius, 95 per cent credible interval) over the next few millennia as ice sheets, vegetation and atmospheric dust continue to respond to global warming.

    • Singaporeans are choking on smoke floating over from Indonesia – here’s why this is happening

      Every year, forest fires from Indonesia choke a swathe of Southeast Asia with a smoky haze for weeks. This phenomenon harms the planet and angers neighbors. It is also a health hazard.

      So what is fueling this? The world’s desire for palm oil.

      The edible oil is used in cookies, noodles and other packaged foods as well as soaps, shampoos, lipsticks and many other consumer goods.

      Farmers in Indonesia, the world’s biggest supplier of the commodity, often illegally burn the world’s oldest rainforest or use fire to clear old oil palms on existing plantations, and the smoke from the flames drifts across Singapore and Malaysia.

  • Finance

    • Dingell seeks transparency in trade deal negotiations

      Automakers such as Ford Motor Co. and Fiat Chrysler oppose the deal, in part because it doesn’t go far enough in addressing currency manipulation by other nations. Michigan lawmakers have suggested the state has lost tens of thousands of jobs in part because of currency manipulation by China, Japan and other countries.

      The office of U.S. Trade Representative Michael Froman declined to comment on Dingell’s bill.

      Froman’s office has highlighted its transparency efforts regarding TPP, including the publication of detailed summaries of U.S. objectives in negotiating the agreement; the solicitation of public input on negotiating priorities; and the holding of public hearings to gather input on the negotiations.

    • TTIP: Negotiations ‘in the void’

      Negotiations on the Transatlantic Trade and Investment Partnership (TTIP) are forging ahead, despite opposition from a number of countries. And the American elections are almost certain to compromise the deal. EurActiv France reports.

      Despite attempts by citizens and several governments to derail TTIP, EU member states have confirmed their aim of finalising the free trade deal with Canada (CETA) and pushing ahead with talks with the United States, despite the approaching elections.

    • Ministers aim to wrap up services trade deal in early December

      Countries negotiating an international agreement on trade in services plan to meet in early December to try to finalize the deal, U.S. Ambassador to the World Trade Organization Michael Punke told reporters on Monday.

      The Trade in Services Agreement (TiSA), which would provide stronger international rules for sectors such as communications and banking, is being negotiated among 23 WTO members, including the 28-country European Union, that account for 70 percent of global services trade.

      “The TiSA ambassadors met today and agreed to a ministers’ meeting on Dec. 5 and 6 in Geneva to conclude TiSA,” Punke said, adding: “Establishing 21st century trade rules for services, for 70 percent of the globe’s services economy, is a big deal.”

  • AstroTurf/Lobbying/Politics

    • Asymmetry between the major parties fries the circuits of the mainstream press

      On the eve of the first debate between Donald Trump and Hillary Clinton, I thought I would write down some of the precepts and maxims I have used to understand press behavior during this long and startling campaign season. If I have done this right, you should be able to test the usefulness of my list in the final six weeks of the U.S. election. (And during coverage of the debates!)

      A word on how I came up with this list. I’ve been a close reader and critic of campaign coverage American-style since 1988. That’s eight “cycles,” as people in the industry say. After I started PressThink in 2003, I could write about the gatekeepers without their permission — hurray for blogging! — and so my pace increased during the 2004, 2008, and 2012 elections. This year I have done a little less at my blog (eight pieces since May 2015, plus one for the Washington Post) and put more into the real time conversation on Twitter, which includes most of the people doing campaign coverage, as well as the heaviest users of it.

    • Fact Check: Has Trump declared bankruptcy four or six times?

      Trump’s companies have filed for Chapter 11 bankruptcy protection, which means a company can remain in business while wiping away many of its debts. The bankruptcy court ultimately approves a corporate budget and a plan to repay remaining debts; often shareholders lose much of their equity.

      Trump’s Taj Mahal opened in April 1990 in Atlantic City, but six months later, “defaulted on interest payments to bondholders as his finances went into a tailspin,” The Washington Post’s Robert O’Harrow found. In July 1991, Trump’s Taj Mahal filed for bankruptcy. He could not keep up with debts on two other Atlantic City casinos, and those two properties declared bankruptcy in 1992. A fourth property, the Plaza Hotel in New York, declared bankruptcy in 1992 after amassing debt.

      PolitiFact uncovered two more bankruptcies filed after 1992, totaling six. Trump Hotels and Casinos Resorts filed for bankruptcy again in 2004, after accruing about $1.8 billion in debt. Trump Entertainment Resorts also declared bankruptcy in 2009, after being hit hard during the 2008 recession.

    • 24 Arrested Outside Hofstra University While Demanding An Open Presidential Debate

      Hundreds protested the exclusion of alternative ideas and candidates from the first presidential debate

    • Colin Kaepernick: ‘Embarrassing’ that Donald Trump, Hillary Clinton are candidates

      Colin Kaepernick watched “a little bit” of Monday’s presidential debate, and he didn’t come away impressed with either candidate.

      [...]

      “It was embarrassing to watch that these are our two candidates,” Kaepernick told reporters Tuesday. “Both are proven liars and it almost seems like they’re trying to debate who’s less racist.

      “And at this point … you have to pick the lesser of two evils. But in the end, it’s still evil.”

  • Censorship/Free Speech

  • Privacy/Surveillance

    • When cyber gets physical: why we need the NSA [Ed: This shallow article (must enable JS) conflates cyberdefence with mass surveillance (which is what NSA does)]
    • Kuwait lawyers fight world’s first mandatory DNA sampling law

      Lawyers in Kuwait have issued a legal challenge to the only law in the world forcing citizens and visitors to give samples of their DNA to the government.

      The Kuwait government has said that the law is needed to combat terrorism. DNA testing is reportedly due to begin within weeks.

      When the law was passed in July last year, Adel AbdulHadi of the Kuwaiti law firm Adel AbdulHadi & Partners and his colleagues began researching and drafting their challenge to it. Their principal argument is that the law violates privacy and human rights provisions in the country’s own constitution, as well as those enshrined in international treaties to which Kuwait is a signatory.

    • Local Lawyers Challenge New Kuwaiti Law Creating Mandatory DNA Database Of All Citizens And Visitors
    • Snowden movie ‘preposterous’, says former NSA deputy director

      The former deputy director of the National Security Agency has taken issue with Oliver Stone’s biopic of one-time NSA employee Edward Snowden.

      Speaking to National Public Radio, Chris Inglis, who retired in 2014 after 28 years at the agency, said the film’s narrative “was a gross mischaracterisation of what NSA’s purposes are. And a gross exaggeration of Edward Snowden’s own particular role in that. To the point where you could come away from looking at that movie, saying, ‘Why are 50,000 people at the NSA dead wrong? And one is absolutely correct?’”

      An NSA deputy director does feature in the film, played by Patrick Joseph Byrnes, and commissions Snowden to lead an important project in Hawaii.

    • Military pressing for broader surveillance mandate

      New legislation is being prepared at the Ministry of Defense for inclusion in a broader package of laws aimed at upgrading surveillance by security officials that would include the possibility of monitoring data carried by cables crossing the country.

      At present, Finland does not have a law providing the military with a mandate to carry out these kinds of intelligence operations. The new legislation in the works will include this, and spell out oversight of intelligence gathering and the division of duties among various officials and agencies.

      The Finnish military has a signals intelligence unit known as the Finnish Intelligence Research Establishment which organizationally falls under the Air Force.

      The head of Finnish military intelligence services, Major General Harri Ohra-aho told Yle that operations are not only concerned with information gathering about the military picture in the region, but also with assessing social developments.

      “We don’t count tanks, rather create a broad analysis of the situation in our vicinity. Technological advances are changing the security environment,” said Ohra-aho.

    • Swiss endorse new surveillance powers

      Swiss voters have given a strong approval to a law on new surveillance powers for the intelligence agencies.

      The new law would allow the authorities to tap phones, snoop on email and deploy hidden cameras and bugs.

      It would help Switzerland catch up with other countries, supporters say.

      Opponents have feared it could erode civil liberties and put Swiss neutrality at risk by requiring closer co-operation with foreign intelligence agencies.

      Some 65.5% of voters agreed to accept the proposal. It will allow the Federal Intelligence Service and other agencies to put suspects under electronic surveillance if authorised by a court, the defence ministry and the cabinet.

    • Microsoft goes AI crazy: Now Office 365 can track what you really get up to in meetings

      At its annual Ignite conference this week in Atlanta, GA, Microsoft is showing off new AI features across its core products for the enterprise. According to CEO Satya Nadella, this AI-everywhere strategy amounts to Microsoft “democratizing AI” for everyone to solve the world’s most pressing challenges.

      “To do this, we’re infusing intelligence into everything we deliver, from the agent to applications, services and infrastructure,” said Nadella.

  • Civil Rights/Policing

    • A New Intelligence Award for “Reporting Wrongdoing” [Ed: this is a trap]

      Professional integrity may be welcome everywhere, but “speaking truth to power” is rarely welcomed by “power.” Often it is not even acknowledged as “truth.” (Apparently, the IC envisions itself here as the domain of truth, and not of power. Or will those who challenge the IC leadership itself be eligible for the new award?) Meanwhile, “reporting wrongdoing” often seems to end badly for the reporter, as the frequency of whistleblower reprisal claims indicates.

    • House Intelligence Panel Gets Dozens of Whistleblower Complaints Every Year

      Critics of leakers have often argued that whistleblowers have legitimate channels through which they can report their grievances, but in the murky world of intelligence, it’s hard to know how many complaints are filed, and what, if anything, happens as a result. Now, the House Permanent Select Committee on Intelligence says it sees “dozens” of such complaints every year.

      The committee will not disclose details on individual cases, however.

      “We receive whistleblower-type complaints both through the [Intelligence Community inspector general] — which includes complaints filed through the Intelligence Community Whistleblower Protection Act — and via individuals who approach the committee directly,” said Jack Langer, communications director for Committee Chair Rep. Devin Nunes, R-Calif. Those complaints number in the “dozens” each year, he added.

      The legal process for whistleblowing has been at the center of renewed debate following public disclosures made by Edward Snowden in 2013. Snowden, who worked as an NSA contractor, insists he tried to raise complaints internally, but eventually gave up on the system, for fear of reprisal or dismissal.

    • Torture and False Testimony Leaves Mexico on a Journey to Nowhere

      For many in Mexico, the disappearance of 43 young students from the Ayotzinapa teaching college two years ago remains a painful emblem of a profound national failure—the failure of the state to protect its own people. Among other things, the case highlighted collusion among drug gangs, local politicians, and police, the failure of federal authorities to carry out a credible investigation, and—glaringly—the degree to which torture remains part of the standard operating procedure of criminal investigation.

      Take the case of Patricio Reyes Landa, an alleged member of the Guerrero Unidos criminal gang. Two years ago, Mexico’s attorney general called a press conference and showed a video in which Reyes Landa and three other suspects demonstrated how they supposedly threw the students’ ashes in a river, after incinerating their bodies at a garbage dump. Now, Reyes Landa and some 90 other suspects detained during the investigation say they were tortured into making false confessions about what they did or saw.

  • Internet Policy/Net Neutrality

    • Verizon Claims Nobody Wants Unlimited Data, Wouldn’t Be Profitable Anyway

      Back in 2011, Verizon and AT&T eliminated unlimited wireless data plans, instead pushing users toward share data allotments and overage fees as high as $15 per gigabyte. And while the companies did “grandfather” many of these unlimited users at the time, both companies have made at art form out of harassing or otherwise annoying these customers until they convert to costlier shared plans. And despite the fact that such overage-fee-based plans confuse the living hell out of most customers (who have no idea what a gigabyte is), both companies continue to insist that customers don’t actually want unlimited data.

  • DRM

    • EFF calls on HP to disable printer ink self-destruct sequence

      HP Inc. should apologize to customers and restore the ability of printers to use third-party ink cartridges, the Electronic Frontier Foundation (EFF) said in a letter to the company’s CEO yesterday.

      HP has been sabotaging OfficeJet printers with firmware that prevents use of non-HP ink cartridges and even HP cartridges that have been refilled, forcing customers to buy more expensive ink directly from HP. The self-destruct mechanism informs customers that their ink cartridges are “damaged” and must be replaced.

    • Demand that HP make amends for its self-destructing printers [SIGN AND SHARE!]

      I’ve written an open letter to HP CEO Dion Weisler on behalf of the Electronic Frontier Foundation, asking him to make amends for his company’s bizarre decision to hide a self-destruct sequence in a printer update that went off earlier this month, breaking them so that they would no longer use third-party ink cartridges.

      The letter points out that this is bad business — and it’s also bad for security. HP printers have previously been shown to be vulnerable to malware that spreads through sneaky codes in documents you print, that can steal your private data, raid your network, and become part of website-killing botnets.

      HP hid its self-destruct sequence in a software update, making future updates — like those that patch this kind of defect — suspect, and decreasing the likelihood that HP’s customers will install them.

      Worse still: HP can use Section 1201 of the DMCA to threaten security researchers who reveal similar defects, and to attack competitors who restore full functionality to your printer.

    • Capcom Releases DRM For Street Fighter 5, Promptly Rolls It Back When It Screws Legitimate Customers

      It should be quite clear by now that DRM is a fantastic way for video game makers to keep people from playing their games. Not pirates, though. No, those folks can play games with DRM just fine, because DRM doesn’t actually keep piracy from being a thing. No, I’m talking about legitimate buyers of games, who in example after example after example suddenly find that the games they bought are unplayable thanks to DRM tools that work about as well as the American political system. And yet DRM still exists for some reason, as game makers look for some kind of holy grail piece of software that will turn every past pirate into a future dollar sign.

      This search for the perfect DRM continues, as we have just the latest story of DRM gone wrong. This story of the Street Fighter V DRM, though, is a special kind of stupid because it was put in place via a software update release, meaning that a game that worked perfectly one day was bricked the next.

  • Intellectual Monopolies

    • Copyrights

      • Copyright Theft Is Grounds For Deportation, Board Says
      • Immigration Board Says You Can Be Deported For Copyright Infringement

        While we still wait to see if Kim Dotcom can be taken against his will from another country into the US for “copyright infringement” claims, apparently the DOJ has also decided that it can work the other way. The Justice Department’s Board of Immigration Appeals has said that people can be deported for copyright infringement. Apparently the law (the Immigration and Nationality Act) says that non-citizens can be deported if they commit crimes “involving moral turpitude” but had never weighed in on whether or not copyright infringement counted.

        [...]

        To be fair, this was a case of criminal copyright infringement, and not civil copyright infringement — and the board noted that because criminal copyright infringement requires the showing of “willfulness,” it suffices for the “moral turpitude” question. The person in question, Raul Zaragoza-Vaquero, had been arrested for selling 800 copied CDs to an RIAA investigator. He received 33 months in prison and had to pay $36,000… and was then told he had to leave the country.

      • EFF White Paper Hopes To Educate Cops On The Difference Between An IP Address And A Person

        Judges have pointed out to copyright trolls on multiple occasions that an IP address is not a person. Trolls still labor under this convenient misconception because they have little else in the way of “proof” of someone’s alleged infringement.

        Unfortunately, law enforcement agencies also seem to feel an IP address is a person — or at least a good indicator of where this person might be found. This assumption leads to blunders like ICE raiding a Tor exit node because it thought an IP address was some sort of unique identifier. After having IP addresses explained to it by the EFF, ICE returned the seized hard drives and promised to make the same mistake in the future.

        In another case, the Seattle PD raided a Tor exit node in search of a person downloading child porn. It didn’t find the target it was looking for, but went ahead and demanded passwords so it could search files and logs at the unfortunate citizen’s home before realizing it had the wrong person.

        The EFF is kind of sick of having to explain the difference between an IP address and a person to government entities. It has put together a white paper [PDF] that should be required reading anywhere government employees feel compelled to act on “evidence” as useless as IP addresses.

      • The EU’s Proposed Copyright Directive Is Likely To Be A Wonderful Gift — For US Internet Giants

        Even if the Copyright Directive manages to pass through the EU legislative system without any changes — which seems unlikely — Google would be in a strong position, because it already has the content ID technology in place that will allow it to comply. Although McNamee suggests that as a result Google would be “uniquely placed to license such software to European internet providers,” it’s more likely that it would keep it for its own exclusive use. However, the US company Audible Magic would doubtless be more than happy to license its widely-used content identification system as an alternative. And irrespective of whether it’s based on technology from Google or from Audible Magic, it’s hard to see how this outcome helps the European tech industry.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts