EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

12.19.13

Links 19/12/2013: Recent Screenshots Galleries

Posted in News Roundup at 1:46 pm by Dr. Roy Schestowitz

12.18.13

New Examples of Censorship in West Europe, Facebook, Google, Saudi Arabia, China, Japan, and North America

Posted in News Roundup at 11:23 am by Dr. Roy Schestowitz

  • The UK Government Is Already Censoring The Global Internet

    Today, a special police unit can decide that a certain website needs to disappear from the Internet, and threaten its domain name registrar into revoking the address “until further notice”, without any legal basis whatsoever.

    The name of the unit is PIPCU (Police Intellectual Property Crime Unit) and it has just reported on the success of Operation Creative – a three month long campaign that resulted in 40 websites accused of copyright infringement shutting down, or at least moving to a new Web address.

  • Who decides what we can read?

    Speaking at the Internet Service Providers Association, Security Minister James Brokenshire said that an announcement on blocking extremist websites is ‘forthcoming.’

  • Will French Parliamentarians Consent to a Democratorship?

    Numerous reactions are now being voiced against the inclusion in the 2014-2019 Defense Bill of article 13 whose provisions enable a pervasive surveillance of online data and communications. Gilles Babinet, appointed in 2012 as French Digital Champion to Nellie Kroes, Vice-President of the European Commission responsible for the Digital Agenda for Europe, was quoted [fr] in the French newspaper Les Echos, “This law is the most serious attack on democracy since the special tribunals during the Algerian War” (our translation).

  • German Court Tells Wikimedia Foundation That It’s Liable For Things Users Write
  • Facebook Uses “Social Signals” and Profile Information to Stop Piracy

    Social networking giant Facebook has been granted a patent to use profile information to analyze whether shared files are “pirated” or not. The data is carefully analyzed using several social indicators including the interests of the poster and recipient, their geographical location, and their social relationship. According to Facebook the patent can help the company to “minimize legal liabilities,” but whether users will be happy remains to be seen.

  • Facebook Needs To Learn It Can’t Teach Tolerance By Acting As An Overzealous Censor

    Facebook is developing a speech impediment. The recent fracas over beheading videos was marked by severe bouts of waffling from the social media giant. On one hand, it seems to want to ease unfettered expression. On the other hand, it’s set itself up as the content police.

    These two aspects often collide with disastrous results. Beheadings are a go, but breast cancer groups can’t post photos of mastectomies. Recent partnerships with government agencies see Facebook willing to censor by proxy, even as it attempts to roll back its control in other areas. Giving 800+ million users access to a “report” button is well-intended, but the reality is more troubling. Something that’s simply unpopular can be clicked into oblivion in nearly no time whatsoever.

  • Condom to sex: Google’s weird list of banned words for Android 4.4 KitKat

    It seems that Google now wants you to make use of words in a more careful and responsible way, and thus, has drawn off many words, including a bunch of profane words, from its built-in dictionary for Android. With the rollout of Android 4.4 KitKat, Google has now stopped giving you predictive suggestions for a raft of words.

  • Saudi Arabia: Popular sci-fi novel banned

    Last Tuesday (26 Nov) representatives from the country’s Commission for the Promotion of Virtue and Prevention of Vice — the Haya’a — raided several bookshops selling the novel H W J N by Ibraheem Abbas and Yasser Bahjatt’s, demanding it’d be taken off the shelves. H W J N is a “fantasy, sci-fi and romance” novel about a genie who falls in love with a human, and is a best-seller in Saudi Arabia.

  • China’s rumor crackdown has ‘cleaned’ Internet, official says

    China’s campaign against online rumors, which critics say is crushing free speech, has been highly successful in “cleaning” the Internet, a top official of the country’s internet regulator said on Thursday.

  • Japan Reacts to Fukushima Crisis By Banning Journalism
  • Japan’s Dangerous Anachronism

    The government of Prime Minister Shinzo Abe this month rammed through Parliament a state secrecy law that signals a fundamental alteration of the Japanese understanding of democracy. The law is vaguely worded and very broad, and it will allow government to make secret anything that it finds politically inconvenient. Government officials who leak secrets can be jailed for up to 10 years, and journalists who obtain information in an “inappropriate” manner or even seek information that they do not know is classified can be jailed for up to five years. The law covers national security issues, and it includes espionage and terrorism.

  • Japan’s New ‘Fukushima Fascism’

    Fukushima continues to spew out radiation. The quantities seem to be rising, as do the impacts.

    The site has been infiltrated by organized crime. There are horrifying signs of ecological disaster in the Pacific and human health impacts in the U.S.

  • Chris Hedges: Journalism is Being Pushed To the Fringes of Society
  • Canadian Cyberbullying Bill Expands Scope, Targets Open WiFi Over Terrorism, Child Porn Fears

    The drawn-out process in which a bill becomes a law lends itself to harmful things, like mission creep and bloating. Canada’s new cyberbullying legislation, problematic in its “purest” form, is now becoming even worse as legislators have begun hanging language aimed at other issues (child porn, terrorism, cable theft [?]) on the bill’s framework.

    As was noted earlier, language aimed at punishing revenge porn had already been attached to the bill. But the urge to target as much as possible with a broadly written bill is too much for Canada’s politicians to resist. Michael Geist notes that Bob Dechert (Secretary to the Minister of Justice) took a moment during the debate to speculate about the “dangers” of “stolen” cable.

  • The Government’s Secret Plan to Shut Off Cellphones and the Internet, Explained

    This month, the United States District Court for the District of Columbia ruled that the Department of Homeland Security must make its plan to shut off the Internet and cellphone communications available to the American public. You, of course, may now be thinking: What plan?! Though President Barack Obama swiftly disapproved of ousted Egyptian President Hosni Mubarak turning off the Internet in his country (to quell widespread civil disobedience) in 2011, the US government has the authority to do the same sort of thing, under a plan that was devised during the George W. Bush administration. Many details of the government’s controversial “kill switch” authority have been classified, such as the conditions under which it can be implemented and how the switch can be used. But thanks to a Freedom of Information Act lawsuit filed by the Electronic Privacy Information Center (EPIC), DHS has to reveal those details by December 12 — or mount an appeal. (The smart betting is on an appeal, since DHS has fought to release this information so far.)

Links 18/12/2013: KDE News

Posted in News Roundup at 10:23 am by Dr. Roy Schestowitz

Links 18/12/2013: GNOME Desktop News

Posted in News Roundup at 10:20 am by Dr. Roy Schestowitz

12.16.13

Links 16/12/2013: Applications and Instructionals

Posted in News Roundup at 5:15 pm by Dr. Roy Schestowitz

Links 16/12/2013: Valve, Steam, SteamOS, and Other News About Games

Posted in News Roundup at 5:11 pm by Dr. Roy Schestowitz

NSA Roundup: Latest News in a Nutshell

Posted in News Roundup at 5:06 pm by Dr. Roy Schestowitz

Summary: December news about the NSA and its international partners

Tracking Devices (Also Known as Mobile Phones)

Embassies

  • NSA spies on Italians from roof of US Embassy in Rome, magazine reports

    The U.S. National Security Agency has been spying on Italian communications from installations on the roof of the U.S. Embassy in Rome and the country’s consulate in Milan and even mounted an operation to capture information from inside the Italian embassy in Washington, D.C., the Italian weekly magazine L’Espresso claimed Friday.

Obama

Canada

Drugs

  • The inept mind-control experiment that led to 20 years of CIA funding
  • If the NSA Could Hack Into Human Brains, Should It?

    Technology has changed the surveillance state in ways that the American public doesn’t yet understand, according to Joel F. Brenner, a former senior counsel at the NSA.

    “During the Cold War our enemies were few and we knew who they were. The technologies used by Soviet military and intelligence agencies were invented by those agencies,” he writes. “Today our adversaries are less awesomely powerful than the Soviet Union, but they are many and often hidden. That means we must find them before we can listen to them. Equally important, virtually every government on Earth, including our own, has abandoned the practice of relying on government-developed technologies. Instead they rely on commercial off-the-shelf, or COTS, technologies. They do it because no government can compete with the head-spinning advances emerging from the private sector, and no government can afford to try.”

Antivirus

Analysis/Overview

  • Looking back at NSA revelations since the Snowden leaks
  • Investigating the 9/11 Attacks. The NSA’s “Lone Wolf Terrorists” Justification for Mass Spying Is Nonsense

    But we want to focus on another angle: the unspoken assumption by the NSA that we need mass surveillance because “lone wolf” terrorists don’t leave as many red flags as governments, so the NSA has to spy on everyone to find the needle in the haystack.

    But this is nonsense. The 9/11 hijackers were not lone wolves.

  • Read This If You Want To Understand Just How Far The NSA Has Gone, And The Political Mess Behind It
  • The NSA is out of control and must be stopped

    The National Security Agency is breaking trust in democracy by breaking trust in the internet. Every day, the NSA records the lives of millions of Americans and countless foreigners, collecting staggering amounts of information about who they know, where they’ve been, and what they’ve done. Its surveillance programs have been kept secret from the public they allegedly serve and protect. The agency operates the most sophisticated, effective, and secretive surveillance apparatus in history.

  • Reform corporate surveillance

    The FSF issued the following statement in response to the recent open letter on government surveillance published by AOL, Apple, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo.

  • Spying has its limits
  • We cannot afford to be indifferent to internet spying

    We’ve seen less than 1% of the NSA documents Edward Snowden took with him from his employer, Booz Allen. The whistleblower had been employed to consolidate training documents used to brief NSA agents and contractors on the full range of NSA programmes and sources, which gave him access to the intimate (and sometimes boastful) details of the NSA’s capabilities.

    The disclosures will keep coming, and they will be worse. The journalists handling the Snowden trove have taken extraordinary care to redact them in order to preserve the legitimate law-enforcement capabilities of western spy agencies, and there are certainly programmes of even grander sweep and more sensitive details that will take more time-consuming verification and caution before they can be disclosed.

  • Six months after NSA story broke, Snowden looks even more patriotic

    Six months ago this week, the Guardian and Washington Post published the first stories based on leaks from Edward Snowden. Since then, in what has become a steady drumbeat of revelations about the about the US National Security Agency other nations’ spy agencies, we’ve learned how utterly hostile our governments have become to our most fundamental rights in the post 9/11 world – but we’ve also seen the first genuine push-back by some of the people who have the power to make a near-term difference.

  • State surveillance of personal data: what is the society we wish to protect?

    What in principle would justify the scope of the surveillance revealed by the Snowden leak? Would it be enough, for example, if it could be shown that a specific potential act of terrorism had been prevented by, and could only have been prevented by, the full breadth and depth of what we now have learned is the playing field of the security services?

  • The year the NSA hacked the world: A 2013 PRISM timeline (Part I)

    On 20 May 2013, a diminutive and bespectacled computer specialist employed as a contractor by the American National Security Agency (NSA) boarded a plane to Hong Kong. He’d taken a leave of absence from work on the pretext of receiving treatment for his newly-diagnosed epilepsy, and bought a last-minute plane ticket at the airport, with no advance booking.

  • State of Deception

    Wyden told me, “The answer was obviously misleading, false.” Feinstein said, “I was startled by the answer.” In Washington, Snowden’s subsequent leaks created the most intense debate about the tradeoffs between national security and individual liberty since the attacks of September 11th. The debate will likely continue. According to Feinstein, Snowden took “millions of pages” of documents. Only a small fraction have become public. Under directions that the White House issued in June, Clapper declassified hundreds of pages of additional N.S.A. documents about the domestic-surveillance programs, and these have only begun to be examined by the press. They present a portrait of an intelligence agency that has struggled but often failed to comply with court-imposed rules established to monitor its most sensitive activities. The N.S.A. is generally authorized to collect any foreign intelligence it wants—including conversations from the cell phone of Germany’s Chancellor, Angela Merkel—but domestic surveillance is governed by strict laws.

  • Snowden Leaks Notwithstanding, It’s Business as Usual at the NSA Museum
  • Edward Snowden, the NSA, and the Never-Ending End of Privacy
  • Orwellian Obama

    Apologists for National Security Agency (NSA) espionage argue “national security!” But leaked NSA files show Washington spying to gain an advantage in economic negotiations and to keep a close eye not so much on terrorists as on political opponents and rivals.

  • NSA Whistleblower

    When the U.S. government figured that out, prosecutors came down hard, indicting him on multiple national security charges, including espionage, which, if convicted, could have earned him as much as 35 years in prison.

    But Thomas Drake stood his ground. The U.S. government’s case collapsed on the eve of his trial.

    In the process, he inspired Edward Snowden to follow his conscience, even if it meant breaking the law.

    Today, Thomas Drake is quick to point out that over-reaching government surveillance isn’t a U.S. problem alone. That countries such as Canada … with its Communications Security Establishment Canada (CSEC), is following Washington’s lead.

    Mr. Snowden’s leaks have revealed that Canada allowed the U.S. to conduct widespread surveillance in Canada during the G8 and G20 summits in 2010 … spying that was closely coordinated with CSEC. And there are allegations that CSEC conducted industrial espionage in Brazil by targeting the country’s Ministry of Mines and Energy last year.

Petitions/Actions

Sympathy

Sweden

  • It’s Becoming Clear That The NSA’s Nightmare Has Just Begun

    Second, on Thursday Swedish television reported that Sweden’s signals intelligence agency, the FRA, has been a key partner for the United States in spying on Russia and its leadership. A previous report said that Sweden is also a key partner of the GCHQ.

  • Swedes Shame the NSA With Gingerbread Data Center Spy Movie

    It’s probably the single most enjoyable comment on the year’s NSA spying scandal. And it’s certainly the strangest.

  • The UK government is working in a Snowden-free bubble

    Anyone who took the time to read the UK government’s latest update on its cybersecurity strategy could be forgiven for thinking that a man called Edward Snowden never existed.

    Most people who are even slightly plugged in to the world around them would agree, however, that we live in decidedly more interesting times for internet security and privacy than the document would have us believe. Not a day seems to have gone by since the summer without a new revelation of activities by the NSA or GCHQ that have gone just a little further than what most people find acceptable.

  • Who is behind the “people’s Intelligence apparatus”? On the Swedish collaboration with US spying

    I believe that there are some alternative answers to Sundberg’s quest, and that those are found 1) partly in main political parties of the Swedish establishment, and 2) partly in the economic-military establishment; 3) also the assisting role played by the Swedish state-owned media and MSM monopolies is paramount.

  • The Snowden Documents and Sweden with English subtitles

    After six months reporters Fredrik Laurin, Sven Bergman and Joachim Dyfvermark made contact with Glenn Greenwald who holds the documents that Edward Snowden leaked from American signal intelligence organization NSA. They made this report.

  • Sweden aids NSA-led hacking ops: report

Hungary

Bitcoin

Change

  • IETF Group Proposes Making Tor Anonymity an Internet Standard

    There continue to be many people around the globe who want to be able to use the web and messaging systems anonymously, despite the fact that some people want to end Internet anonymity altogether. Typically, the anonymous crowd turns to common tools that can keep their tracks private, and one of the most common tools of all is Tor, an open source tool used all around the world.

  • Edward Snowden to give evidence to EU parliament, says MEP

    British Conservatives oppose video appearance by NSA whistleblower, which Green MEP says could happen this year

  • EU parliament votes to invite Snowden to testify over NSA spying

    The European Parliament has voted to formally invite former NSA contractor and whistleblower Edward Snowden to provide official court testimony on NSA spying, in the face of overwhelming concern from conservative MEPs.

    European conservatives seemed reluctant to pay full attention to the possibility of the hearing on Wednesday. The European People’s Party (EPP), which is a conglomerate of center-right parties, had displayed a great deal of concern over the possibility of inviting Snowden for a hearing, suggesting that he could potentially throw the transatlantic trade agreement with the US into disarra

  • Who is monitoring the covert operations of the world’s spy agencies?

    Mission drift: our intelligence agencies are in danger of straying from their core purpose.

Australia

  • More whistleblowers emerge in Australia’s Timor spying scandal

    The Australian government’s moves to suppress further exposures of its surveillance operations suffered a blow yesterday when it was revealed that three more whistleblowers have given statements to the East Timorese government about the illegal installation of bugging devices in the walls of Dili’s cabinet offices. The bugging involved Australian Secret Intelligence Service (ASIS) agents posing as aid workers helping renovate Timorese government buildings.

  • Australian police to roll out ‘NSA-type’ surveillance tech by next year

    The Deep Packet Inspection technology is expected to go for a trial in February followed by a complete roll out in April

France

Legality

  • Op-Ed: Enough debate — Is NSA spying constitutional or not?

    Privacy is not negotiable. What I am sending and who I am sending it to is not the government’s business unless they have evidence that I am doing something illegal. The debate is over. The government’s lies have been exposed and the people have found that they do not like what it is doing. We’ve talked long enough. Now we need action.

Misc.

Virtual Worlds

Awards and Recognition

  • Pell Center names NSA spying program as 2013 Story of the Year

    The Pell Center for International Relations and Public Policy at Salve Regina University has named the unfolding saga of digital spying by the National Security Agency (NSA) as the 2013 “Story of the Year.”

  • Edward Snowden voted Guardian person of the year 2013
  • Shooting the Messenger

    There is a deeply misguided attempt to sacrifice Julian Assange, WikiLeaks, Chelsea Manning and Jeremy Hammond on the altar of the security and surveillance state to justify the leaks made by Edward Snowden. It is argued that Snowden, in exposing the National Security Agency’s global spying operation, judiciously and carefully leaked his information through the media, whereas WikiLeaks, Assange, Manning and Hammond provided troves of raw material to the public with no editing and little redaction and assessment. Thus, Snowden is somehow legitimate while WikiLeaks, Assange, Manning and Hammond are not.

    “I have never understood it,” said Michael Ratner, who is the U.S. lawyer for WikiLeaks and Assange and who I spoke with Saturday in New York City. “Why is Snowden looked at by some as the white hat while Manning, Hammond, WikiLeaks and Julian Assange as black hats? One explanation is that much of the mainstream media has tried to pin a dumping charge on the latter group, as if somehow giving the public and journalists open access to the raw documents is irresponsible and not journalism. It sounds to me like the so-called Fourth Estate protecting its jobs and ‘legitimacy.’ There is a need for both. All of us should see the raw documents. We also need journalists to write about them. Raw documents open to the world give journalists in other countries the chance to examine them in their own context and write from their perspectives. We are still seeing many stories based on the WikiLeaks documents. We should not have it any other way. Perhaps another factor may be that Snowden’s revelations concern the surveillance of us. The WikiLeaks/Assange/Manning disclosures tell us more about our war crimes against others. And many Americans do not seem to care about that.”

  • Hacktivists on Trial

    Prosecutors are warping the law to throw activist hackers like Aaron Swartz behind bars for years.

Branding

  • New US spy satellite features world-devouring octopus

    President Obama is out to put the public’s mind at ease about new revelations on intelligence-gathering, but the Office for the Director of National Intelligence can’t quite seem to get with the program of calming everyone down.

    Over the weekend, the ODNI was pumping up the launch of a new surveillance satellite launched by the National Reconnaissance Office. The satellite was launched late Thursday night, and ODNI’s Twitter feed posted photos and video of the launch over the following days.

Arizona

Cookies

Nigeria

Recruitment

  • NSA wooing students to work for US intelligence
  • The NSA Is Recruiting Teens

    The National Security Agency is hiring its spies early and recruiting teens as young as 15 for internships.

    Students who answer ads seeking aspiring journalists have the chance to work as paid interns for the NSA in Fort Meade, Md.

    The agency currently employs 500 young interns on staff, and according to an NSA spokeswoman in Newser, up to 95% of interns who want to stay on with the agency after their internships are able to do so.

Journalism

China/Distractions/Deflections

UK

Android/Gmail

New Zealand

IBM

Reform

Amnesty Claims/CBS

Very Recent

12.13.13

Links 13/12/2013: Linux (Kernel) News

Posted in News Roundup at 9:15 am by Dr. Roy Schestowitz

Spanning over one week, grouped and clustered for convenience

KVM/QEMU/Xen

‘Linux Experience’

  • openSUSE 13.1 vs Ubuntu 13.10: a friendly match

    I often hear the argument that Android is not Linux or Chrome OS is not Linux. Technically that’s not true. Linux is just the kernel and both these operating systems user Linux so they are Linux-based operating systems.

    What people are actually trying to say is they don’t get the same ‘Linux experience’ when they use these operating systems. What’s that Linux experience?

Kernel Version 3.12

  • Linux Kernel News
  • Linux Kernel 3.12.3 Is Now Available for Download
  • Linux Kernel 3.12.2 Is Now Available for Download

    Greg Kroah-Hartman has just announced a few minutes ago, November 29, that the second maintenance release of the Linux kernel 3.12 is now available for download.

  • Linux Kernel 3.12.4 Is Now Available for Download

    Greg Kroah-Hartman has just announced a few minutes ago, December 8, that the fourth maintenance release of the Linux kernel 3.12 is now available for download.

  • Linux 3.13-rc3

    .. I’m still on a Friday release schedule, although I hope that
    changes soon – the reason I didn’t drag this one out to Sunday is that
    it’s already big enough, and I’ll wait until things start calming
    down.

    Which they really should, at this point. Hint hint. I’ll start
    shouting at people for sending me stuff that isn’t appropriate as
    we’re starting to get later into the release candidates.

    That said, it’s not like rc3 is somehow unmanageably large or that
    anything particularly scary has happened. I’d have *liked* for it to
    be smaller, but I always do.. And nothing particularly nasty stands
    out here.

    The bulk here is drivers (net, scsi, sound, crypto..) and ARM DT
    stuff, but there’s the usual randon stuff too, with arch updates
    (pa-risc, more ARM, x86) and some filesystem and networking updates.

Kernel Version 3.13

Jailhouse

Linux Foundation

Training

  • Outreach Program for Women Seeks New Linux Kernel Interns

    The interns who worked with The Linux Foundation as part of the FOSS Outreach Program for Women this summer come from diverse backgrounds and levels of experience, but they now have at least one thing in common (besides their gender). They can all add “Linux kernel hacker” to their resume.

  • A Summer Spent on the LLVM Clang Static Analyzer for the Linux Kernel
  • Training college students to contribute to the Linux kernel

    Following my recent post on the initiatives now in place to rebalance the demographics of the Linux Kernel community, I would like to share a set of specific training activities to get beginners, specifically college students, involved in the kernel.

    These were created by an enthusiastic group at Red Hat, including Matthew Whitehead and Priti Kumar, and unfolded on campus at Rensselaer Polytechnic Institute, Rensselaer Center for Open Source (RCOS), and State University of New York at Albany.

Graphics Stack

  • Radeon Gallium3D MSAA Mesa 10.1 Git Benchmarks
  • NVIDIA’s PTX Back-End For GCC Has Been Published

    As part of the work to bring OpenACC 2.0 and NVIDIA GPU support to GCC, a large set of patches were published this morning for adding NVIDIA’s PTX back-end to the Free Software Foundation’s compiler.

  • AMD APU vs. Radeon GPU Open-Source Comparison

    Earlier this month I ran some benchmarks showing that with the very latest open-source AMD Linux graphics driver code, the AMD APU Gallium3D performance can be ~80%+ the speed of Catalyst, the notorious Linux binary graphics driver. For end-users curious what the AMD A10-6800K “Richland” APU performance is comparable to when it comes to discrete Radeon graphics cards with the R600 Gallium3D driver, here’s some weekend comparison benchmarks.

  • MSM DRM Will Support New Hardware In Linux 3.14

    An early patch-set has been sent out by Rob Clark as he prepares the “MSM” DRM driver changes for the Linux 3.14 kernel. This open-source DRM graphics driver will support at least two new boards in the next kernel development cycle.

  • NVIDIA Helping Nouveau With Video Decoding

    While it isn’t in the form of any complete documentation, a NVIDIA engineer has begun answering questions by the open-source Nouveau driver developers about video decoding with their H.264 engine.

  • New Wayland Live CD Has A Lot Of Features

    The oddly-named Wayland Live CD environment for checking out the next-generation Linux display stack has been updated. The Wayland Live CD ships with many enabled tool-kits, the latest Wayland code, Orbital and Hawaii support, KDE Frameworks Wayland programs, and other new native Wayland applications.

  • DRI3 Support Comes For X.Org GLAMOR

    As the first X.Org graphics driver past the open-source Intel driver to have mainline support for Direct Rendering Infrastructure 3 is GLAMOR.

  • Quad-Monitor AMD/NVIDIA Linux Gaming: What You Need To Know
  • How to start contributing to Mesa3D
  • Crystal HD Decodes New Linux Support Improvements

    A couple years ago Broadcom released the Crystal HD as a standalone hardware video decoder chip. While there’s been an open-source Linux driver for the Crystal HD, we haven’t heard much about it in recent months, but that changed this morning.

  • AMD APU On Linux: Gallium3D Can Be 80%+ As Fast As Catalyst

    After running earlier this week a 21-way graphics card comparison with Intel, AMD, and NVIDIA GPUs, there were requests by some Phoronix readers to see some new APU performance numbers. For ending out November, here’s new Catalyst vs. Gallium3D driver benchmarks on Ubuntu Linux for the AMD A10-6800K with its Radeon HD 8670D graphics. The results with the latest Linux kernel and Mesa are very positive towards the open-source AMD driver where in some tests the performance can nearly match Catalyst! For at least one Source Engine game, the open-source driver can now even run significantly faster than the binary driver.

  • Mesa 10.0 Release Brings OpenGL 3.3

    The 10.0 release was expected a few days back, but now it’s finally happened via Intel’s Ian Romanick with this brief announcement.

  • zRAM Is Still Hoping For A Promotion

    While zRAM has been part of the Linux kernel’s staging area for a while now and this RAM-based compressed block device is used by Chrome OS and Android, it’s struggling to get promoted to the main area of the kernel.

  • Intel’s GL Windows Driver Pushes Further Ahead Of Linux

    Intel’s Windows OpenGL driver continues to make progress in a more steadfast manner than the open-source Intel Linux graphics driver. The latest achievement for the Intel Windows driver is OpenGL 4.2 compliance for Haswell.

  • Another Game Studio Backs AMD’s Mantle API

    There’s another game studio now backing AMD’s Mantle graphics rendering API that aims to be faster and easier to implement for games than OpenGL. However, we’re still waiting for AMD Mantle on Linux.

  • AMD “RadeonSI” Team Fortress 2 Is Now 75% Faster

    The RadeonSI Gallium3D driver for AMD HD 7000 series GPUs and newer is now 75% faster for the Source Engine Team Fortress 2 game thanks to a new patch-set by Marek.

  • Ultra HD 4K Linux Graphics Card Testing

    If you’ve been eyeing a purchase of a 4K “Ultra HD” TV this holiday season and will be connecting it to a Linux system, here’s the information that you need to know for getting started and some performance benchmarks to set the expectations for what you can expect. This article has a number of AMD Radeon and NVIDIA GeForce benchmarks when running various Linux OpenGL workloads at a resolution of 3840 x 2160.

  • XDG-Shell Patches Get Moving For Wayland

    After a lot of mailing list discussions amongst developers that have a stake in Wayland and early patches sent out, the latest xdg-shell patches were formally distributed today on the developers’ mailing list. The xdg-shell is a new protocol living outside of the core Wayland protocol.

Benchmarks

Btrfs

  • Btrfs hands-on: Exploring the error recovery features of the new Linux file system

    This is my final post in this series about the btrfs filesystem. The first in the series covered btrfs basics, the second was resizing, multiple volumes and devices, the third was RAID and Redundancy,and the fourth and most recent was subvolumes and snapshots.

    I think (and hope) that all of those together give a reasonable overview of what the btrfs filesystem is, what you can do with it, and how you can do some of those things. In this post I will wrap up a couple of loose ends – error recovery, and integration with other standard Linux utilities – and try to give a recap of the series as a whole. For complete and authoritative information, please refer to the Btrfs Wiki at kernel.org.

  • Btrfs hands on: My first experiments with a new Linux file system

    Btrfs is a new file system for Linux, one that is still very much in development. Although I wouldn’t exactly describe it as “experimental” any more, it is, as stated in the Wiki at kernel.org, “a fast-moving target”.

    It has also been said publicly that the basic format and structure of the filesystem should now be stable; it would only be changed in the future if some overriding reason or need is found.

    The point of all this should be clear — it is still very early days, and it is not recommended to use btrfs in critical systems of any kind.

    I leave it to the reader to decide how critical their systems are; for my own purposes, I will be using btrfs on several systems that I use as testbeds, some of which I carry with me and use for normal work on a daily basis, so it will get a “real” test, but I will not be using it on the primary systems that my partner and I use for home/work/business activities.

Misc.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts