Posted in Bill Gates at 10:04 pm by Dr. Roy Schestowitz
Summary: Traditionally a progressive publication with guts, The Guardian has softened after receiving money from Bill Gates and it now provides a platform for the software patents lobby
“Patent lawyer argues for USA style software patents laws for Britain,” warns Satipera about this new article. “All the same old false claims, good only for patent lawyers,” he continues. What is the Gates Foundation-funded Guardian thinking when it resorts to publishing such unpopular opinions recently? Last week it published a piece from a lobbyist against open standards (or patent-encumbered ones) and not so long ago it also gave a platform to Microsoft Florian, whose agenda is similar. They let him write entire articles there. Where is the criticism of Gates’ patent monopolies? It seems to have vanished when Gates them some money to keep silent and self-censor. The Guardian became a ruling class guardian rather than watchdog press when it accepted the money [1, 2, 3] (it could decline politely, but it did not), which probably made it part of the corporate press. Will they also accept money from BP?
Posted in Site News at 9:34 pm by Dr. Roy Schestowitz
Summary: A note and a tip about going from audio to video with Free/libre software
TECHBYTES, our audiocast as we call it, currently comes in two methods of delivery. One is purely audio and another is video plus audio. But YouTube is a large platform and many shows put their material in there. Turning 50 shows into video can be a tedious task with a graphical user interface, whereas with command line tools this process can be automated. After some exploration we found a way to turn audio into a slideshow and then split the files for uploading the resultant Ogg files (given the known upload limits). To encode using a command line utility or set thereof, the following chain of commands gets issued:
where -ss 00:00:00 means it starts at 0 seconds, -endpos 00:10:10 defines an endpoint using the same type of time format, mf://*.jpg takes all the images in the current directory — images that are generated by duplication except for the first one. Files can be easily replicated (e.g. to serve as dummy sequence) with:
for file in *.jpg
do
`nice cp ${file} ${file}-dupe.jpg`
done
The remainder of the arguments specify the -audiofile, encoders, frames per seconds (fps), and an output file at the very end. To split videos into smaller chunks, we have tried many different tools but eventually used mencoder to simplify the pipeline (thanks to all those who helped in IRC). This whole command basically turns a simple sound file into smaller ogg files that also contain images with transitions between them. Since it is scriptable, we can now apply this to all past episodes. YouTube is moving to WebM quite soon and in any case, making it a mere option using Ogg format and free software utilities simply broadens our reach. █
Summary: Tim and Roy speak about some of the latest news items which pose danger to software freedom
TODAY’S show is unique as it is the first time we produce a Flash option for listening to the show. We talk about GNU/Linux in North Korea, HTC’s Microsoft tax on Linux, and the pressure for Steve Ballmer to step down (among many other topics). Update: the show notes are out.
Today’s closing track is “1977″ by Anita Tijoux. The track comes from the usual source. All tracks are from SXSW 2010 (get the torrents legally here). In previous shows we played many good tracks such as April Smith’s “Colors”. There was also “Edge of My Seat” by Amber Rubarth, “Have This Drink” by Black Mike and Kemistry, “Joyful Noise” by Breakestra, “Sei La” by Erika Machado, “El Camino” by No te va gustar, “Future Eyes” by Ear Pwr, “Tokki no Rassha ” by Dolly, “Quanto Tempo” by Doces Cariocas, “Cos I said so” by Fangs, “Iguana” by SambaDa, “We Should Give” by Amity, “Blackout City” by Anamanaguchi, and “She’s Got You” by Cosmo Jarvis. We thank those artists for choosing to spread their good work. We have many more in the pipeline for future shows. We hope you will join us for future shows and consider subscribing to the show via the RSS feed. You can also visit our archives for past shows. If you have an Identi.ca account, consider subscribing to TechBytes in order to keep up to date. █
As far as the operating system, all of the home-grown computers will run Red Star, North Korea’s own Linux distro. Hardware-wise, though, the report is vague: the educational machines have no USB ports, while the business machine have two, and both netbooks have a battery that last two and a half hours.
Awesomium windowless web framework and engine has been ported to Linux. Awesomium can be used for web page capture, site scrapping, in-app advertising, in-app browsing, web automation, rendering custom in-game web browser and creating HTML UIs for 3D games.
“Measuring market share of open source software is extremely difficult,” Chris Travers, a Slashdot blogger who works on the LedgerSMB project, told LinuxInsider.
“The basic problem is that one can use sales data as a close proxy for market share when one is selling a tangible and restricted resource, but for something like Linux, actual product sales probably account for a very small portion of installed systems,” Travers explained. “In the end, it is reasonably impossible to estimate market share in this area with any accuracy. I don’t think anyone has a solid idea of what the actual Linux desktop market share is.”
While we have already delivered a number of benchmarks from the Linux 2.6.39 kernel, surprisingly we have not yet published any new file-system benchmarks from this latest stable Linux kernel release. Fortunately, that has changed today with a fresh round of Btrfs, EXT4, and XFS file-system benchmarks on the Linux 2.6.39 kernel and compared to the preceding 2.6.38 and 2.6.37 kernel releases.
Jim Zemlin, executive director of the Linux Foundation, and Linux User’s 100th issue special guest editor chats about the 20th anniversary of Linux, the future of embedded Linux devices, and the current state of the kernel among other things…
Frogatto & Friends is an old-school 2D platformer game, starring a certain quixotic frog. The world is viewed as a cross-section seen from the side, and your character walks and jumps between solid platforms whilst fighting monsters. It’s a big adventure with all the classic fun – you fight monsters, collect coins, talk to people, and buy new stuff.
Just a day after the KDE camp pushed out KDE SC 4.7 Beta 1, the GNOME camp has come to the desktop with their stable 3.0.2 release. The GNOME 3.0.2 release, like is usual for GNOME point releases, just brings bug-fixes and translation updates.
With the release of version 3.6, the Tiny Core crew have added a GUI method for hard disk installation. As I have, on previous occasions, banged on about this omission, I thought I’d take a look.
In the past, I’ve had a love/hate relationship TinyCore Linux distribution. On the one hand, it sports some amazing technology. It’s a lightweight distribution based on a custom core. By default, it gives you a basic desktop with a dock along the bottom and enough GUI tools to begin adding applications and making other customizations. See our overview of Tiny Core circa 3.3 for more details.
[...]
On the whole, I think that Tiny Core has now reached the stage where an experienced computer user with little or no Linux experience, could be trained to deploy it. I always thought that Tiny Core had the potential to fill a useful niche, and the addition of a GUI installer now makes it accessible to a broader range of users.
Whenever an anti-Unity discussion happened on the web, users had only one statement “Let’s see what Fedora 15 packs in”! Finally it is here. We had always convinced people to learn to use Unity. Though we are not reluctant towards publishing stories featuring Fedora and other competant distros. (Not a disclaimer! No way! )Now onto some Fedora love. Yesterday, the Fedora community announced their release of new version named Deadlock.
A long time Mandriva user, I was distro-hopping for the past 6 months. I tried openSUSE 11.3, 11.4 and Fedora 14 – all in their KDE avatars. I couldn’t wait to try Fedora 15, which was released this week. I downloaded the KDE Live CD and copied it onto a USB stick using Unetbootin (I hate booting from a CD/DVD since it is terribly slow). Fedora booted up in less than a minute on my 4-year-old laptop and presented me a clean, pretty and solid desktop. After playing around a while, I decided on replacing openSUSE 11.4 KDE with Fedora 15 KDE.
We are pleased to announce the release of Bodhi Linux 1.1.0. This is the first of our quarterly scheduled update releases to keep the software on the Bodhi live CD current.
This will undoubtedly echo many user opinions, but they will fall on deaf ears just as those leveled against early KDE 4. Determined developers with a vision trump public dissent and soon most dissent disappears. [...] they will have to bite the bullet and upgrade at some point.
Many have called sub-$100 Android smartphones Google’s doomsday weapon. Some have also noticed that the onslaught of inexpensive Android devices is killing competition as we speak, resulting in the Android/iOS duopoly. One can buy inexpensive Android phones today the vast majority being white-label Chinese knock-offs. There are a few exceptions, like the affordable Android handsets Huawei’s been shipping to the UK and US.
The Motorola Droid X2 went on sale today in Verizon Wireless stores for $200 plus contract. Although the Android 2.2 smartphone adds an improved 4.3-inch qHD display and a dual-core Nvidia Tegra 2 to the original Droid X design, that’s not enough to cut it considering today’s high-end, 4G competition, especially when the performance boost appears to be surprisingly negligible, says this review.
Following Firefox 5 Beta, Mozilla has followed up and filled all other developer channels as well. For the first time, Mozilla is now offering a full and coherent range of nightly builds, developer versions, a beta and a final release. Mozilla plans to release the second public beta this Friday.
Word Press has announced the availability of the Beta 2 for testing purpose. The Beta 2 is not recommended for the production use but it will help developers to prepare their plug-ins for the upcoming release.
In this article, I’ll talk about my tryst with WordPress in developing a Progressive Contemporary Issues’ website. These lines are based on personal experiences, and whatever humor, terrific or pathetic, is not aimed at harm or defamation.
Business intelligence (BI) is one of those buzzphrases that sound super-cool, but are often misunderstood. What is business intelligence and should you care? Do you need to drop a giant bucket of money on BI?
The Federal Reserve Bank of New York is investigating whether Goldman Sachs’ (GS.N) mortgage servicing arm did not conduct proper reviews before denying borrowers the option to lower their payments under a government loan modification programme.
In its quarterly filing with the SEC earlier this month, Goldman said regulators had sought information on the foreclosure and servicing protocols and activities of its mortgage servicing unit Litton Loan Servicing.
The Federal Reserve Bank of New York has begun an investigation into the mortgage-servicing arm of Goldman Sachs, looking at whether it systematically rejected borrowers’ efforts to lower their loan payments through government programs.
The inquiry by the New York Fed arose from a letter sent by an anonymous employee, who accused the Goldman unit, Litton Loan, of denying loans without properly reviewing applications.
The deadline for the implementation of a European privacy law on cookies passed with a whimper at midnight last night, after just two Member States issued a full notification to Brussels.
Meanwhile, 19 of the 27-bloc countries that make up the European Union ignored the 25 May deadline on implementing the full, or indeed partial, set of measures laid out in the revised legislation for the e-Privacy Directive.
Shaw has announced new broadband plans that offer far more data, faster speeds, and better pricing than comparable plans at competitors such as Rogers, Bell, and Telus. Shaw says the plans will be rolled out over the coming months and offer far bigger caps (including some unlimited plans). While the company says the move is linked to a shift away from analog channels, it seems more likely that Shaw is the first of the large ISPs to respond to mounting public and political pressure over the uncompetitive pricing in the Canadian broadband market. Consumer regulation from the CRTC is not likely in the short term, but government officials have made it clear that they are concerned with the current competitive environment.
Yesterday’s post highlighted the recent Access Copyright decision to refuse pay-per-use transactional digital licences (late in the day I received a note that AC appears to have had a change of heart). As I noted in the conclusion, the copyright collective faces an increasingly problematic balance sheet. According to its 2010 annual report, it spent more on itself in the form of administrative costs (including legal fees and board compensation) that it actually dispensed to Canadian authors. Admittedly, these numbers are not easy to find. Indeed, for an organization devoted to collecting licensing revenue and distributing it collective members, the annual report is incredibly vague in providing clear numbers about precisely what gets distributed to Canadian authors.
We’ve written about this publicly before, but the information has been scattered around between different essays, FAQ entries, and license commentaries. This article collects all that information into a single source, to make it easier for people to follow and refer back to.
The FSFE’s intention is to write a paper which shows how widely deployed the applications are, thereby making them as attractive as possible to UK public sector procurers and suppliers.
The experiment, which spanned more than a decade, suggests that the electron differs from being perfectly round by less than 1E-27 cm. This means that if the electron were magnified to the size of the solar system, it would still appear spherical to within the width of a human hair.
Given that no one actually knows what the statute covers, you would think that Congress would have a hearing on what the law should punish and whether Congress wants to punish the routine computer use of millions of Americans. Instead, the House Judiciary Committee is having a hearing tomorrow on cybersecurity, in which I believe one of the issues covered will be proposed legislation backed by the White House to raise penalties under Section 1030 and add a new aggravated offense statute
Microsoft Corp.’s revenue in China this year will only be about 5% of what it gets in the U.S., even though personal-computer sales in the two countries are almost equal, Chief Executive Steve Ballmer told employees
the problem with the nothing-to-hide argument is the underlying assumption that privacy is about hiding bad things. By accepting this assumption, we concede far too much ground and invite an unproductive discussion … Even if you have nothing to hide, the government can cause you a lot of harm. … [intentionally or] inadvertently, due to errors or carelessness.
Those looking for dramatic examples of harm can study the US Cointel program and imagine a young Martin Luther King Jr had been trolled into submission or ruined instead of going on to lead a civil rights movement. Who wants to pay for this invasion?
I may be one of very few people in this room who actually makes his living personally by creating what these gentlemen are pleased to call “intellectual property.” I don’t regard my expression as a form of property… [try] incentivizing creativity by people who create things, and not large institutions who prey on them and have for years.
his conference is one of the most scary I’ve ever seen. It’s finishing up, and the panel, including Eric Schmidt, are summing up all the findings. Schmidt has just pointed out to the panel that copyright is not an absolute right that authors hold, that the law doesn’t say that, that there are fair use rights in the US, for example, and something similar in other countries. The look of surprise on the face of the other panelists was palpable. Go Eric!
Resumen: El impuesto sobre «lucha contra el ‘Techrights Linux de Microsoft es llamar la atención mucho más este viernes
“BOICOT NOVELL” se trató de evitar los impuestos de Microsoft sobre GNU/Linux. Más gente está comenzando a despertarnos y darse cuenta que nuestra causa estuvo en lo correcto todo el tiempo, como varias distribuciones de GNU/Linux que pagarón a Microsoft por este “privilegio” simplemente se extinguieron (el precio de Xandros fue de $ 50 por las patentes de Microsoft[http://techrights.org/2009/06/15/xandros-patent-protection-sale/]). Nuestro objetivo fué garantizar que las personas/empresas no se conviertan en dependientes de las distribuciones que pagaban impuestos a Microsoft, ya que sólo serviría al objetivo de Microsoft de hacer de GNU/Linux de su fuente de ingresos propios. SuSE, TurboLinux, y Linspire también formaron parte de este problema y todas aquellas empresas que pasaron al inodoro de la historia. Hay más empresas tal[http://techrights.org/company-blacklist/], sino que venden hardware, no puramente software.
Todo el mundo parece haber “descubierto” que “HTC sólo paga $ 5 por Microsoft Android Phone[http://www.businessinsider.com/htc-pays-microsoft-5-per-android-phone-2011-5]” y ya hay mucha cobertura al respecto[http://www.reghardware.com/2011/05/27/ms_royalty_deal_htc_android/]. Citando The Register:
Compra un teléfono inteligente HTC y $ 5 de lo que usted pagó va a Microsoft – incluso si usted acaba de comprar un dispositivo Android.
Así lo afirma el analista de Citi Walter Pritchard en una nota enviada hoy a los inversores, según Business Insider.
Microsoft anunció el acuerdo de pago de regalías – el resultado de un acuerdo legal – el año pasado, pero la cantidad que el gigante del software recibió no se hizo público. MS ha alegado Android infringe su propiedad intelectual, y tiene otros fabricantes de smartphones en su mira.
Pritchard estima Microsoft está llevando a cabo otros fabricantes de teléfonos Android de una regalía de $ 7,50 hasta 12,50 por dispositivo. HTC pagó relativamente poco al resolver las reclamaciones de Microsoft fuera de los tribunales.
[...]
Microsoft no puede ser demasiado fuerte. No puede darse el lujo de molestar demasiado a los fabricantes que también están vendiendo teléfonos basados en su sistema operativo Windows Phone – lo podrían dejar de hacer, en un arranque de genio. O pueden llegar a recibir menos regalías por un mayor compromiso con WinPho – algo que Microsoft necesita mucho más que incluso unos pocos cientos de millones de dólares en pagos de regalías.
Saumsung, LG, Kyocera Mita y también pagan a Microsoft por Android. Es posible que haya más empresas como ellas, aunque no tan prominentes. Frente a un precio[http://thenextweb.com/microsoft/2011/05/27/htc-pays-microsoft-5-for-each-android-phone-it-sells/], la gente se sorprenda al respecto a pesar de que nuestro sitio ha puesto de relieve esta cuestión desde 2007, cuando Samsung firmó el primer acuerdo de estos y con el fin de disuadir a acuerdos similares se llamó a un boicot. La conclusión es, tenemos un problema aquí, pero no es un problema nuevo. Incluso encontramos una propagandista anti-Linux había escrito: “Esto es sólo un fraude. A mi me gusta teléfonos HTC con su interfaz Sense, pero tengo un Galaxy S II en orden y no voy a comprar un teléfono HTC otra vez mientras que cedan a los chantajes de Microsoft. ”
Según otra noticia de hoy[http://thenextweb.com/mobile/2011/05/27/android-developers-could-be-next-target-for-patent-firm-lodsys/], Lodsys quiere ir después tras los desarrolladores de Android[http://www.readwriteweb.com/archives/patent_holding_firm_lodsys_goes_after_android_developer_for_use_of_in_app_payments.php]. “La compañía explotadora de Patentes Lodsys causó revuelo hace poco, cuando exigió el dinero de los desarrolladores de IOS utilizando los pagos en aplicación”, dice este informe, “sobre lo que ella posee una patente. Ahora parece que los desarrolladores de Android podría estar en la línea de un correo electrónico de la empresa exigiendo lo mismo.
“La Comunidad Android ha detectado un desarrollador que está afirmando haber recibido una solicitud de pago en relación con la integración de pagos en aplicación en una aplicación para Android. De ser cierto, podría suscitar otro nido de avispas de la ira en la comunidad de desarrolladores. ”
“Saumsung, LG, Kyocera Mita y también pagan a Microsoft por Android.”Esto no es realmente nuevas noticias[http://groups.google.com/group/android-discuss/browse_thread/thread/cc9e7843da5c34b6/6a9241ce21c75568?pli=1] y se aludió a ello antes. Apple, a diferencia de Google, es un agresor de patentes, por lo que no es la misma situación de Android y hypeOS de Apple. Curiosamente, Nokia aliado de Microsoft también está dando un mal rato a Apple[http://www.bloomberg.com/news/2011-05-26/nokia-wins-partial-review-of-itc-patent-case-against-apple-1-.html]. ¿Cuánto tiempo antes de que Microsoft utilize a Nokia para demandar a los distribuidores Android también? Nokia ha dado pistas al respecto. la estrategia de Microsoft es agravar Linux desde todas las direcciones posibles[http://techrights.org/2009/03/09/timeline-microsoft-patents/]. Es un abierto chantaje [1[http://techrights.org/2007/06/08/shuttleworth-on-racketeering/], 2[http://techrights.org/2009/07/17/racketeering-melco-microsoft/], 3[http://techrights.org/2009/12/29/microsoft-extortion-software-patents/], 4[http://techrights.org/2009/07/24/red-hat-on-microsoft-two-face/], 5[http://techrights.org/2009/09/08/staples-employees-anti-linux/], 6[http://techrights.org/2009/07/01/patent-racketeering-myhrvold/], 7[http://techrights.org/2008/02/22/open-for-patents/]], por lo que los reguladores deben intervenir inmediatamente. █
“Eso es extorsión y deberíamos llamarlo por lo que es. Decir, como lo hizo Ballmer, de que hay un balancede responsabilidad no divulgada , eso es sólo extorsión y debemos negarnos a dejarse arrastrar a ese juego.”
Resumen: Tradicionalmente, una publicación progresista con coraje, The Guardian se ha suavizado después de recibir el dinero de Bill Gates, y ahora ofrece una plataforma para el lobby de las patentes de software.
“Un abogado de patentes argumenta a favor de las las leyes de patentes de software al estilo EE.UU. en Gran Bretaña”, advierte Satipera acerca de este nuevo artículo[http://www.guardian.co.uk/law/blog/2011/may/27/apps-development-uk-intellectual-property-patents-law]. “De todos modos son las mismas viejas reclamaciones falsas, buenas sólo para los abogados de patentes”, continúa. ¿Qué piensa el financiado por la Fundación Gates[http://techrights.org/wiki/index.php/Gates_Foundation_Critique] -The Guardián- cuando recurre a la publicación de tales opiniones impopulares recientemente? La semana pasada se publicó un artículo de un grupo de presión en contra de los estándares abiertos[http://techrights.org/2011/05/24/lawrence-kogan-for-swpats-in-std/] (o de las patente-agravados) y no hace mucho tiempo que también le dio una plataforma a Microsoft Florian, cuya agenda es similar -la misma diriamos-. Se le permitió escribir artículos enteros allí. ¿Dónde está la crítica a los monopolios de Patentes de Gates? Parece haber desaparecido cuando Gates les dió algo de dinero para guardar silencio y auto-censurarse. The Guardian se convirtió en un guardián de la clase dominante en lugar de prensa de vigilancia cuando aceptó el dinero [1[http://techrights.org/2010/09/21/purchasing-main-events-for-pr/], 2[http://techrights.org/2010/10/01/self-promotional-and-outright-lobbying/], 3[http://techrights.org/2010/10/01/self-promotional-and-outright-lobbying/]] (que podría haberlo rechazado con cortesía, pero no lo hizo), lo que probablemente lo hizo parte de la prensa corporativa. ¿Acepta también dinero de BP?
Comentario Importante de Mr.NeedSunlight:
Inquietante, pero esto funciona para silenciar a los medios de comunicación de esa manera. PBS y NPR en los EE.UU. han sido mínimos en temas de tecnología desde que aceptaron ser “financiados” por la Fundación Gates. █
Resumen: Una débil admisión de Stuxnet ayuda a mostrar que el uso de Windows no garantiza el respeto a la seguridad nacional de otras naciones que los Estados Unidos.
“Veterano Oficial Superior de Defensa atrapado en cobertura de la participación los EE.UU. en Stuxnet” es el tipo de informe que estamos siempre esperando. Además, de exponer no sólo la penosa participación del gobierno en lo que respecta a la tecnología sino que también refuerza el peligro muy real de Windows y por relación todo el software propietario de Microsoft. Wired ha cubierto este informe especial[http://www.wired.com/threatlevel/2011/05/defense-department-stuxnet/]:
En “CodeWars: La Amenaza Cyber de los Estados Unidos”, la corresponsal de Melissa Lee pide a Lynn directa: “¿Los EE.UU. participan en modo alguno en el desarrollo de Stuxnet?”
La respuesta de Lynn es lo suficiente larga para que un espectador no atento puede ser que note que no responde a la pregunta.
“Los desafíos de Stuxnet, como ya lo he dicho, demuestra la dificultad de atribuir cualquier, cualquier atribución y es algo que todavía estamos viendo, es difícil entrar en cualquier tipo de comentario al respecto hasta que hayamos terminado nuestro examen, “Lynn responde.
“Pero señor, yo no le he preguntando si usted piensa que otro país estaba involucrado”, presional Lee. “Le estoy preguntando si los EE.UU. estuvo involucrado. Si el Departamento de Defensa estaba involucrado. ”
“Y esto no es algo que vamos a ser capaces de responder en este momento”, dice Lynn finalmente.
Para mayores antecedentes, véase también:
1. Langner Ralph dice malware de Windows Posiblemente Diseñado para descarrilar programa nuclear de Irán[http://techrights.org/2010/09/22/political-purposes-for-windows-worms/]
2. Los virus de Windows pueden tener una motivación política a veces[http://techrights.org/2010/07/27/siemens-in-iran/]
3. ¿Quién necesita Windows Puertas traseras cuando es tan inseguro?[http://techrights.org/2010/09/24/stuxnet-iran-theory/]
4. La inseguridad de Windows se convierte en una cuestión política[http://techrights.org/2010/09/28/wiretapping-and-windows-security/]
5. Windows, Stuxnet y lapidación pública[http://techrights.org/2010/10/02/iran-arrests-and-stuxnet/]
6. Stuxnet crece más allá de las infecciones Siemens-Windows[http://techrights.org/2010/08/09/stuxnet-siemens-and-zeus/]
7. BP ha abandonado ya Windows?[http://techrights.org/2010/07/25/platform-for-bp-alerting/]
8. Informes: Apple para la carga de (Seguridad) Actualizaciones[http://techrights.org/2010/07/26/charging-for-ios-updates/]
9. Los virus de Windows pueden tener una motivación política a veces[http://techrights.org/2010/07/27/siemens-in-iran/]
10. Nueva falla en Windows Facilita Más ataques DDoS[http://techrights.org/2010/07/27/shoddy-microsoft-windows/]
11. Siemens es malo para la industria, debido en parte a Microsoft[http://techrights.org/2010/07/21/crackers-crack-siemens/]
12. Problemas de seguridad de Microsoft en la prensa británica Vista, 7 y Vista no es una panacea[http://techrights.org/2010/08/16/all-versions-of-windows-affected/]
13. Negligencia de Microsoft en parches (las peores Entre todas las empresas) es la culpable de Stuxnet[http://techrights.org/2010/09/15/stuxnet-cause/]
14. Software de Microsoft: una prueba de Darwin para la incompetencia[http://techrights.org/2010/09/16/overspending-with-microsoft/]
15. Septiembre malo para la seguridad de Microsoft, Symantec rumores de Compra[http://techrights.org/2010/09/21/windows-botnets-thrive/]
16. Según Microsoft, Crédito por falta de seguridad[http://techrights.org/2010/09/28/credit-for-messing-up/]
17. Muchos Servidores Windows son Abandonados; Minnesota va en la dirección opuesta por Dar Microsoft Sus datos[http://techrights.org/2010/09/30/minnesota-deal-after-failures/]
18. Usuarios de Windows Aún bajo el ataque de Stuxnet, Halo, y Zeus[http://techrights.org/2010/10/05/stuxnet-and-nuclear-programs/]
19. La propaganda de seguridad de Microsoft: villanos se convierten en héroes[http://techrights.org/2010/10/18/microsoft-spin-security-analysis/]
20. Problemas de seguridad en IOS y Windows[http://techrights.org/2010/11/12/ios-and-windows-security-problems/]
21. Ojo de Seguridad: La propaganda de la BBC, rootkits, y Stuxnet en las instalaciones nucleares de Irán[http://techrights.org/2010/11/18/security-deja-vu/]
22. Ojo de Seguridad: ClamAV dice que Windows es un virus, Microsoft Compromisos Mac OS X, y Stuxnet se vuelve loco[http://techrights.org/2010/11/23/news-about-clamwin-and-more/]
23. Vulnerabilidad del Windows Nucleo en el núcleo de Acción de Gracias, la inseguridad usados para la vigilancia de nuevo[http://techrights.org/2010/11/27/tracking-web-trails-pretext/]
24. Cablegate revela el acceso del gobierno requirente de datos de Microsoft, Kill Switches[http://techrights.org/2010/12/13/cablegate-black-screens-of-death/]
25. El uso de Microsoft Windows Asesina[http://techrights.org/2011/01/06/dependence-on-software-master/]
26. Irán muestra el lado negativo de usar software propietario[http://techrights.org/2011/01/16/downside-of-windows/]
27. Blanqueo defectos inherentes Windows[http://techrights.org/2011/02/14/flaws-in-one-platform/]
28. Por motivos políticos Software Privativo[http://techrights.org/2011/02/16/political-suicide-by-windows/]
29. Cuando Windows Mata[http://techrights.org/2011/02/15/emergency-virus-downtime/]
Recuerde que la NSA (Agencia de Seguridad Nacional), que también proporcionó estadísticas Web favorables a Microsoft hace unos meses, recomendando Vista 7 [1[http://techrights.org/2011/05/20/more-fud-about-android/], 2[http://techrights.org/2011/05/14/linux-phobia-fest/], 3[http://techrights.org/2011/05/12/back-door-friendly-windows/]], en secreto, porque las puertas traseras son “libres”, como en forma gratuita, con todas las ediciones. Los vendidos de la NSA probablemente le recomendarán Vista 8[http://techrights.org/wiki/index.php/Vista_8_Reality_Log], así. Por desgracia para Microsoft y la NSA, Windows está perdiendo su punto de apoyo. Cringely escribe sobre como cae su uso[http://www.cringely.com/2011/05/steve-ballmers-nightmare/] en “La Pesadilla de Steve Ballmer”:
Ballmer confirmó en enero que la próxima versión de Windows tiene una versión para ser usada con procesadores ARM, que están instalados principalmente en los teléfonos inteligentes y computadoras de tableta. Se refuerza esta idea, más recientemente, por decirlo explícitamente Windows 8 es ejecutado en todas las plataformas de hardware de Microsoft es compatible actualmente con los teléfonos, llamando a la próxima versión de “Microsoft Windows la más riesgoso todavía.”
Ballmer está en lo correcto: Windows 8 la hacer o rompe para Microsoft.
Imagine un mundo donde todo el mundo utilice programas con código fuente que pueda ser auditados. Sin duda, haría que Microsoft y algunos de los engaños de la NSA imposible de ser mencionados por no decir mucho.
En las noticias de hoy nos encontramos con que “Corea del Norte [va] a tener su propio ordenador portátil[http://asia.cnet.com/crave/north-korea-to-have-its-own-laptops-62208860.htm]” y “sus ordenadores portátiles podrían estar ejecutando “Estrella Roja”, un sistema operativo basado en Linux desarrollado por los Nor-Coreanos. █