We have long been familiar with NetApplications’ web stats. Sorting out all the bias is tough. Today I tried a new tack. For the users who know they have choice, how many use GNU/Linux?
You don’t need an anti-virus program on Linux: I’ve said it before, but Don’t Surf in the Nude started because of an interest in internet security, so I can’t resist trying out anti-virus programs in Linux.
I noticed today that Comodo has produced a Linux anti-virus program with real-time scanning. Files are checked as they are accessed or created- for example as they are downloaded from the Internet.
I couldn’t resist trying it out. They’ve created the Windows AV experience on Linux, but like crime in multi-storey car parks, it’s wrong on so many levels.
If you see the immense success that Linux, Firefox, Android and other software have achieved over the years, it’s all thanks to the power of open source. What makes open-source software so great is that it is a result of selfless work of thousands of developers from around the world, who, in their free time, volunteer to create or help build their favorite applications.
For the past several months there has been work on vhost-blk, an in-kernel virito-blk device accelerator. This kernel-based accelerator can provide measurable speed-ups for disk/block device access by virtualized guest machines.
Unfortunately, the rules stipulate only legal United States residents over the age of 18 are eligible, and that current members who renew are excluded; this promotion is only available to new members.
These caveats are disappointing but ultimately moot; the reason to join is to directly support and promote the work of the Foundation which includes direct backing of Linus Torvalds himself. Individual membership is $USD 99 and student membership is $USD 25.
Whether you win the $75 gift card or not, the Linux.com store can hook you up with t-shirts, hats, mugs and accessories relating to your favourite free open source operating system.
With Linux 4 Tegra R16 now having an Ubuntu 12.04 LTS (hardfp) sample file-system and the R16 drivers supporting ARM hard floating-point as the preferred format over softfp, new Tegra 3 “Cardhu” tablet benchmarks were carried out to look at the performance between L4T R16 + Ubuntu 12.04 vs. L4T R15 + Ubuntu 11.04.
With Linux 4 Tegra R16 now having an Ubuntu 12.04 LTS (hardfp) sample file-system and the R16 drivers supporting ARM hard floating-point as the preferred format over softfp, new Tegra 3 “Cardhu” tablet benchmarks were carried out to look at the performance between L4T R16 + Ubuntu 12.04 vs. L4T R15 + Ubuntu 11.04.
With a number of commits made to the mainline Mesa repository recently that concern the LLVMpipe Gallium3D driver for pushing OpenGL onto the CPU, here are benchmarks of the very latest Mesa Gallium3D development code from and AMD FX-8350 Vishera Eight-Core CPU when using both LLVM 3.1 and LLVM 3.2 SVN.
Wayland 1.0.1 was just released ten days ago but Kristian ended up deciding to release Wayland/Weston 1.0.2 ahead of schedule. The reason for the early releases are due to important bug-fixes and “stable releases are cheap.” The original plan was to release v1.0.2 after the Weston Test Suite landed.
In an intervirew with Cheerful Ghost, star Linux developer Ryan “Icculus” Gordon said that Unity3D game engine and Steam coming to Linux are good foundations to an awesome 2013.
Ryan has brought numerous game projects and tools to Linux and he has also been working with Humble team. Below are some excerpts (full interview can be read from here):
On Nov. 29, 1972, a crude table-tennis arcade game in a garish orange cabinet was delivered to bars and pizza parlors around California, and a multi-billion-dollar industry was born. Here’s how that happened, direct from the freaks and geeks who invented a culture and paved the way for today’s tech moguls.
The open-source Alien Arena game is going to see a major update soon that will enhance its renderer and bring other improvements. Alien Arena 7.65 is this exciting game update that’s forthcoming.
With November coming to a close, here’s some statistics on the most popular content on Phoronix this month.
During this month, while I may be stepping down from publishing roles here in the near future, on Phoronix I published 206 news articles (an average of more than six Linux/hardware/open-source news items per day) and 22 full-length featured articles. This brings the tally to more than 7,300 news articles and over 2,200 featured articles/reviews since founding the site eight years ago.
While this week saw the release of the Doom 3 BFG source-code and word that a Sauerbraten update and a major Alien Arena advancement advancement are forthcoming, what’s the state of the impressive XReaL open-source game engine and the similar OpenWolf engine?
- Ryan believes that Valve coming to Linux is specifically because of the Windows Store found in Microsoft Windows 8. This is a large part of it as when I was first to report back in April on Gabe Newell’s distaste for Windows 8.
- Also good for Linux gaming have been Humble Bundle, Unity game engine on Linux, and Kickstarter seeing lots of Linux-friendly work.
We’re really happy to announce that we’ll soon be opening IndieCity up to Linux systems, so we’re on the look-out for people with Linux games and applications who’d like to be a part of the launch line-up. If you are such a person, or you want to point us in the direction of someone who is you can email us at Enquiries@IndieCity.com.
Ouya, one of the most popular Kickstarter project, has stuck to its deadlines. The team has posted an update on the official blog that the units will start shipping on scheduled date December 28th. These units are for those developers who backed the project on Kickstarter.
Martin Gräßlin, the well known KWin developer, has written a new blog post explaining why if you’re wanting to play Valve’s Source Engine games or the other new native Linux games you should be using KDE Plasma.
Recently there has been a lot of buzz about non-composited fallback modes in various Desktop Shells and of course I have been asked several times about the fallback modes in KDE Plasma workspaces and whether they would be removed, too. Now instead of answering the same question again and again I decided to write a blog post to discuss the situation in more detail.
I took some time this evening to relax in a quiet, empty house by plonking away at the Plasma Active Alarms app UI. I’m still not 100% satisfied yet, but it’s getting a lot closer.
Last post was about a new QML component available in Plasma workspace 4.10 with an important design pattern that comes with it: Lazy loading everywhere when possible.
Next couple of posts will be about other new and old components and the UX concept behind them.
Owen Taylor has written a new blog post about avoiding jitter in composited frame display. Owen — along with help from Kristian Høgsberg — made improvements to the algorithm for compositor frame timing as used by GNOME’s Mutter compositing window manager and also Wayland’s Weston.
The basic algorithm up to this point was when receiving damage, a redraw should be scheduled immediately. If a redraw is scheduled and the system is still waiting for the previous swap to complete, a redraw should be done when the swap completes. This algorithm though doesn’t work out ideally when showing content that runs at a fixed frame-rate that is less than the display’s frame-rate, such as displaying video content at 24/30 FPS on a 60Hz display.
Owen Taylor has written a new blog post about avoiding jitter in composited frame display. Owen — along with help from Kristian Høgsberg — made improvements to the algorithm for compositor frame timing as used by GNOME’s Mutter compositing window manager and also Wayland’s Weston.
The basic algorithm up to this point was when receiving damage, a redraw should be scheduled immediately. If a redraw is scheduled and the system is still waiting for the previous swap to complete, a redraw should be done when the swap completes. This algorithm though doesn’t work out ideally when showing content that runs at a fixed frame-rate that is less than the display’s frame-rate, such as displaying video content at 24/30 FPS on a 60Hz display.
What do you think of the GNOME desktop and the recent changes? You have a chance to share your opinions on the GNOME free software project by participating in the 2012 GNOME User Survey.
Well, well, well… what do you know, after all the fuss about the GNOME Fallback mode being removed from the upcoming GNOME 3.8 desktop environment, it looks like the GNOME developers decided to implement a similar mode for all you GNOME 2 nostalgics out there.
GNOME Disks (aka gnome-disk-utility) hasn’t bumped to version 3.7 but it has an impressive development and all credits go to David Zeuthen (on the left) who is also senior maintainer at udisks.
Already there are many new features like multiple-selections, the re-designed RAID creation and others, though it is still far from completed.
On December 1, Pierre Schmitz proudly informed Arch Linux users that the usual monthly release install medium, Arch Linux 2012.12.01, is now available for download.
Today the OS4 team is pleased to announce the much anticipated update of OpenDesktop 13 with OS4 OpenDesktop 13.1 . With this release we bring new features and bug fixes to OpenDesktop. OS4 OpenDesktop 13.1 still continues to revolutionize the linux user experience with an excellent interface, easy to use applications and comes with new options to enhance your OS4 user experience. Superior Functionality with some great new options.
Patrick Verner announced a couple of hours ago, November 30, the immediate availability for download of the Parted Magic 2012_11_30 Linux operating system for partitioning tasks.
Canonical is pushing Ubuntu in so many different directions. On the desktop, it has introduced Unity; on the server, it’s pursuing state-of-the-art ARM and cloud platforms; and it’s even trying to get Ubuntu on to mobile phones and televisions.
Trying to keep track of how all this is going, how it all fits together and what’s coming next is a full-time job… which is why we spoke to Jane Silber, Canonical CEO, whose job it is to keep track of everything.
I have been using Ubuntu since 2006 and I always felt that it is one of the easiest to use distro, especially for new Linux users. That was in the past. Nowadays, when people ask me for recommendation, I would certainly recommend Linux Mint over Ubuntu, and here are the reasons.
I do realize Xfce is not for everyone, and I used to be one of those people. And I still think the environment is a little rough round the edges. But there are no cardinal issues, nothing that cannot be resolved in about 10 hours of quick coding. And that would truly make this release outstanding to the max. Xubuntu Quetzal is a damn fine version. It cannot get the highest mark, because it needs to work on those little quirks, but 9.8/10 is an extremely good achievement. Honestly, do try this one, you will not be disappointed.
As a research operating system, Plan 9 has a bunch of really weird, but useful features. For one, everything about a computer running Plan 9 is distributed; the memory can be running on one machine, the processor on another, and the display can run on yet another machine. This modularity gives Plan 9 the honorable title of, ‘more Unix than Unix’.
Mumbai-based Wishtel today said it will launch computing devices, tablet PC and net books, starting at $50 later this month.
The company has developed a Linux–based platform PrithV, which will be used for the tablet and net book PCs, it said in a statement.
“Our objective as a technology and manufacturing company is to create affordable range of products that can contribute to society by extending education for free and without boundaries,” Wishtel CEO Milind Shah said in a statement.
NEW DELHI: Mumbai-based Wishtel said it will launch computing devices, tablets and netbooks, starting at $50 later this month. The company has developed a Linux-based platform PrithV, which will be used for the tablets and netbooks, PCs, it said in a statement.
PetStore.com revealed a new look with enhanced features and search technology last week when the online pet supply store relaunched its website on the open source Magento platform. The 13-year-old e-commerce company had previously run its online retail operations using an in-house website technology environment.
Open Source software has been at the heart of modern financial institutions and capital markets for several years. The Open Source model for developing software is now also taking root in the Financial Services sector thanks in part to the OpenMAMA collaborative effort run under the auspices of the Linux Foundation.
OpenMAMA is an effort to build an open source implementation of the MAMA (Middleware Agnostic Messaging API) that financial services companies use for passing data across messaging applications. OpenMAMA was first announced in 2011. The OpenMAMA project includes big names in the financial services sector such as Bank of America, Merrill Lynch, J.P. Morgan and NYSE Technologies, among others.
All the way back in 2008, Mozilla brought Private Mode (aka Porn Mode) to Firefox 3.1. Over the last four years, not a whole lot has changed in Firefox’s implementation of private mode, but that might change with Firefox 20 in 2013.
Currently when a user enters Private Mode, a new browser window spins up in Firefox (it works the same for Google Chrome’s Incognito mode). The problem with Firefox is that the Private Browsing mode can only operate with the one Private window – that is users cannot concurrently have a regular Firefox window and a Private Browsing Firefox Window open at the same time.
Mozilla engineering manager Josh Aas has announced on his blog that the organisation is joining the Internet Society (ISOC) as a Silver member. Aas points out that Mozilla has already been involved in several Internet Engineering Task Force (IETF) working groups and that supporting ISOC is a logical next step. ISOC provides organisational and administrative backing to the IETF and other entities that are involved in the stewardship of the global network. It has 55,000 members in 90 chapters around the world and over 130 organisation members.
Every technological advance is greeted as some point during its life cycle (usually as it approaches ubiquity) by the disgruntled arguments of people who prefer older things or methods. Never has this been more prevalent than in the digital era. People diss mp3s for their sonic limitations, which is fine, but then they go a step further, claiming the “real” way to listen to music involves using other, older technology. There’s an emphasis on the physicality of the product, as if it were somehow more “real” simply because you can leave greasy fingerprints on it, thus lowering its resale value.
popular announcements when no one’s listening—like, you know, the days leading up to Thanksgiving. That’s when the Obama administration sneaked a tasty dish to the genetically modified seed/pesticide industry.
This treat involves the unceremonious end of the Department of Justice’s antitrust investigation into possible anticompetitive practices in the US seed market, which it had begun in January 2010. It’s not hard to see why DOJ would take a look. For the the crops that cover the bulk of US farmland like corn, soy, and cotton, the seed trade is essentially dominated by five companies: Monsanto, DuPont, Syngenta, Bayer, and Dow. And a single company, Monsanto, supplies nearly all genetically modified traits now so commonly used in those crops, which it licenses to its rivals for sale in their own seeds.
Back in September, we posted a leaked version of a draft for a cybersecurity executive order that the White House had been passing around, mainly to try to force Congress into passing a cybersecurity law. With the last ditch attempt by Senator Harry Reid to move that process forward failing, it took exactly a week for the White House to revise its draft exec order, and start passing it around on November 21st. And, today, that new draft leaked as well. You can see the full draft here or embedded below.
It’s basically more of the same. It insists that there’s a problem without providing any real evidence of that. Much of the order focuses on increasing information sharing among and between different government agencies. As expected, it’s designed to encourage private companies, who are “owners and operators of critical infrastructure” to “participate, on a voluntary basis, in the Enhanced Cybersecurity initiative.” This is part of what had people so concerned about the various bill proposals: whether or not companies would get broadly defined as “owners and operators of critical infrastructure” and then be forced or pressured into sharing private information, all in the name of “cybersecurity!”
At Cybercom, a component of Strategic Command, he is responsible for planning, coordinating and conducting operations and defense of the Defense Department’s computer networks.
The man was Aldrich Ames, the CIA mole who had been spying for the KGB for six years. Grimes didn’t know it then, but she came to suspect Ames as the investigation went on. When the group was scrutinizing lists of people for who might be the mole, their choices in an informal straw poll were weighted by points. Of everyone on their list, Ames got the highest score as the most likely candidate. Eventually, the FBI opened a full investigation, Ames was arrested in 1994, pleaded guilty and is now serving a life term in prison. His motivation appears to have been simple greed.
The Syrian regime was the only government in the world to lay new landmines this year, campaigners said Thursday as they issued an annual report on the use and effect of the devastating weapons.
Mark Hiznay, the editor of the report for the International Campaign to Ban Landmines (ICBL), said the finding is a significant change from last year, when four governments laid mines, and represents the lowest number since the Ottawa Mine Ban Treaty was signed in 1997.
Question: Why is it OK for the U.S. to not only have a drone program, but also to use it, often times illegally, to bomb the crap out of folks (suspected terrorists as well as civilians) in Central Asia, but it’s not at all cool for China to develop the same technology?
It is difficult for journalists to verify the casualties from drone strikes since the government forbids foreign journalists from travelling to the area without a military escort and the Taliban often seal off the sites of strikes.
Bradley Manning, the U.S. Army private accused of leaking hundreds of thousands of classified documents to the whistleblowing website WikiLeaks, may testify today at a pretrial proceeding for the first time since he was arrested in May 2010. Manning could face life in prison if convicted of the most serious of 22 counts against him. His trial is expected to begin in February.
Michael Ratner of the Center for Constitutional Rights is an FDL contributor and also Julian Assange’s lawyer. He was in court for Bradley Manning’s testimony this week, and appears on The Real Network News with Paul Jay today to discuss it.
We’ve called him a “seed-spilling sex creep,” a “pale nerd king,” and “a real-life The Matrix extra,” so we figured it was about time to talk to Wikileaks founder and megalomaniacal Bond villain Julian Assange. In order to promote his new book, Cypherpunks: Freedom and the Future of the Internet, Assange agreed to a phone interview on the condition that we speak only about the book. I agreed, which was a lie.
PFC Bradley Manning choked back tears during a second day of testimony at a hearing before his military trial as he claimed he didn’t tell his family about the conditions of his confinement at the Marine brig at Quantico, Va., because he did not want them to worry.
He also expressed concern that doing so could lead to an end to visiting privileges for his family.
That story — itself considered of such little importance by AP that it didn’t even by-line the piece (perhaps the agency didn’t send a reporter either, but simply picked up snippets from other sources) — reduced the entire motion, and the long, intricate, systematic government attack on Manning’s psyche, to a matter of petty petulance on Manning’s part, a whiner’s attempt to weasel out of what’s coming to him.
During a televised interview Thursday, CNN host Erin Burnett—one of the network’s star establishment bootlickers—tried to get Julian Assange to incriminate Bradley Manning, the accused WikiLeaks source whose detention conditions were investigated in court this week.
During a televised interview Thursday, CNN host Erin Burnett—one of the network’s star establishment bootlickers—tried to get Julian Assange to incriminate Bradley Manning, the accused WikiLeaks source whose detention conditions were investigated in court this week.
Burnett moved quickly from an opening discussion of Assange’s new book, Cypherpunks, to the subject of his relationship to Manning. For allegedly passing cables to WikiLeaks, Manning “could end up spending the rest of his life in jail,” Burnett said. “Do you feel any guilt about that since the information the U.S. government says he stole was published by you?” she asked Assange.
“The case [that was heard this week] is not about whether Bradley Manning allegedly stole cables or not,” Assange said. “The case is about the abuse of Bradley Manning” during his 2-year-long detainment, a portion of which United Nations investigator Juan Mendez described in March after a 14-month investigation as “cruel” and “inhuman.”
“Why was he treated that way?” Assange asked. “Well, his lawyer argues, and many others who have followed the case argues [sic] it was ordered to coerce him into a confession that would bring down me or bring down WikiLeaks… That’s the case that’s ongoing now. And that case is a reflection of the decay in the rule of law.”
“Since 2010, Western governments have tried to portray WikiLeaks as a terrorist organisation, enabling a disproportionate response from both political figures and private institutions,” he wrote in the Huffington Post.
“It is the case that WikiLeaks’ publications can and have changed the world, but that change has clearly been for the better,” he said, citing some of the once secret State Department cables that his site disclosed.
A newly released study finds that ice sheets in Greenland and Antarctica are disappearing three times faster than they were two decades ago, the latest evidence supporting the existence of global warming.
The study was published in the journal Science and is considered an extremely accurate portrayal of ice melts in these polar regions. According to the paper’s authors, the rapid polar ice melting has caused an increase in sea level that may become problematic to low coastal regions.
Regulators are worried about the explosive growth of shadow banking, and they should be. Shadow banks were at the heart of the last financial crisis and they’ll be at the heart of the next financial crisis as well. There’s no doubt about it. It’s simply impossible to maintain a system where unregulated, non-bank financial institutions are able to create their own money (credit) without oversight or supervision. The money they create–via off-balance sheets operations, securitization, repo or other unmonitored mega-leveraging activities–feeds into the economy, creates artificial demand, lowers unemployment, and fuels growth. But when the cycle slams into reverse (and debts are no longer serviced on time), then thinly-capitalised shadow banks begin to default one-by-one, creating a daisy-chain of counterparty bankruptcies that push stocks into a nosedive while the economy slips into a long-term slump.
An Austrian operator of Tor servers—that were used to anonymously route huge amounts of traffic over the Internet—has been charged with distributing child pornography. This comes after police detected illegal images traversing one of the nodes he maintains.
Obviously, there are reasons to investigate possible child porn distribution, but it still seems ridiculous that law enforcement still seems skeptical of tor exit nodes and assumes that they must be used for nefarious intent. This isn’t the first time of course. Last year, here in the US, ICE seized a tor exit node as well. While it eventually returned the equipment, it warned the guy that “this could happen again.” And, of course, just this week, we wrote about a German case where a court actually held someone responsible for the transmission of encrypted traffic on a tor-like system.
I had really thought that we’d reached the point where lawyers working for large, well-known companies recognize just how incredibly stupid it is to file lawsuits against websites that criticize them. Sure, a decade ago or so, it was common for big companies to go after so called “sucks sites” or “complaints sites,” often alleging trademark infringement. But, at some point, many of them realized that (a) trademark complaints were a dead end since there was no confusion and (b) that these lawsuits only drew a lot more attention to the sites in question. Apparently, however, there are still some throwback lawyers working for United Continental, and they’ve decided to go after a popular passenger complaints site that goes by the creative domain Untied.com.
The UK government must legislate to establish a new press “self-regulation” body — independent of both publishers and politicians but overseen by media regulator Ofcom — because newspapers have “wreaked havoc” in the lives of innocents, says the nine-month inquiry report in to the culture, practice and ethics of the business.
Lord Justice Leveson, who has been hearing issues including the “hacking” of mobile phones for news stories, said the existing Press Complaints Commission (PCC), comprised of newspaper editors, is “not actually a regulator at all”. And he has rejected news publishers’ alternative suggestion of binding themselves to ethical standards by commercial contracts.
Late on Wednesday, just as Americans were taking off for the Thanksgiving holiday, Facebook announced its intention to change the feedback process for the policies which govern use of its service.
For the last few years, as I’d mentioned in Wired a few months ago, Facebook held sham elections where people could ostensibly vote on its policy changes. Despite lots of responses (the most recent Site Governance vote got far more people participating than signed the secession petitions on the White House website), Facebook never promoted these policy change discussions to users, and the public has never made a substantive impact on site governance.
Syria lost two major links with the outside world on Thursday as the largest commercial airport in the capital canceled flights because of fighting nearby and Internet access disappeared across the country, perhaps signaling an impending escalation by the government against the uprising, opponents of the Syrian government said.
An unprecedented debate over how the global Internet is governed is set to dominate a meeting of officials in Dubai next week, with many countries pushing to give a United Nations body broad regulatory powers even as the United States and others contend such a move could mean the end of the open Internet.
Still, the thing that strikes me about this — and which isn’t mentioned in the filing at all — is that Fifty Shades, itself, actually came out of a “pornographic adaptation” of the Twilight series. In fact, while those behind Fifty Shades have sought to erase this history, it does seem like a relevant point. Fifty Shades was pornographic Twilight “fan fiction,” which was later rewritten to scrub it of references to Twilight. While Fifty Shades’ author, EL James, her agent and publisher all like to claim that the Twilight fan fic James wrote and the eventual Fifty Shades book are really different works, someone compared the two using a plagiarism checker and found them to be 89% similar.
Almost half of the UK’s internet users aged twelve and over cannot say with confidence whether or not the sources of online content they use are legal or not, according to new research by OfCom. The study is the latest in an ongoing series of reports by the government’s media regulator attempting to identify trends in online copyright infringement before the ‘graduated response’ system for tackling online piracy set out in the Digital Economy Act is enacted.
Of the 5099 people surveyed between May and July this year, 47% weren’t able to distinguish with certainty between legal and illegal services, while only 16% actually admitted to accessing unlicensed content, and only 8% said they relied on illegal sources of music.
Malt points out that there are several legal services, most of which are inexpensive, including ad-funded streaming services which give listeners access to thousands of tracks for free. (“Inexpensive” is, of course, relative. Ofcom’s study shows that music retailers and streaming services would convert a majority of casual infringers by cutting prices 50-70%. resulting in 2-3x the number of purchases.)
A new copyright bill pending approval by the German Parliament would require search engines and other commercial actors to pay a license for using headlines or short snippets from their articles. The publishers essentially want a piece of the revenue generated by the inclusion of their news items in search results. The publishers argue that German copyright laws are insufficient and don’t allow them to use the copyright laws in a systematic manner against the widespread re-use of that information.
The saga of Cindy Garcia and her attempt to get The Innocence Of Muslims trailer off of YouTube continues. If you’ll recall, Garcia is one of the actresses who performed in the controversial almost-film “Innocence of Muslims”, which sparked protests throughout the Arab world. Since the protests and media blitz began (as opposed to since the flim’s trailer was released), Garcia has been trying to get the YouTube video taken down by throwing the proverbial legal kitchen sink at proverbial legal kitchen-everyone, including claims that she was duped by the flimmakers and that she owned a copyright on her portion of her performance. Buttressing her argument was her claim that she never signed any kind of release for the film.
Summary: A contributor’s take and set of thoughts about Microsoft’s latest anti-competitive tactic
Did you know, Microsoft Press (A Division of Microsoft Corporation) has published a Windows 8 book as PDF, titled “Inside Out Windows 8”. The ultimate, in-depth reference Hundreds of timesaving solutions Supremely organized, packed with expert advice Companion eBook (744 pages 34.2 MB)
However, the one and only section (page 25) on UEFI “Secure Boot” doesn’t mention how it functions, works or operates, how to access it or any interoperability. No mention on how to even disable Secure Boot at all.
Such as the undocumented steps below;
1. Boot machine while pressing F10
2. Find Secure Boot in the menu tree, ignore warnings
3. Disable Secure Boot feature
4. Enable legacy boot options
5. Enable specific legacy devices, such as USB devices
6. Save and reboot while holding down F9
(No mention in Chapter 27!)
I want to point out there is NO such thing as “Windows Hardware” because Microsoft does NOT manufacture Lenovo, Sony, Toshiba, Acer, Asus, MSI, VIA, HP, Dell, Celvo, Sager, etc…
This is Microsoft extending its own brand (software) upon firmware, claiming it’s their platform. Why do the manufactures accept this theft of their hardware product?
Regarding how UEFI Secure Boot has the side effect of preventing interoperability against competitors and open society by preventing unauthorized firmware, operating systems, or UEFI drivers from running at boot time unless they bear a cryptographic signature by Microsoft, the manufacturer or an UEFI signing key vendor ($99 for an UEFI signing key) for any software that modifies the bootloader that enforces the UEFI secure boot protocol.
Basically, the bootloader is the place where the PC hardware reads instructions to boot up an operating system or program. Windows installs those instructions in the bootloader, just as another operating system like Linux. By making the process proprietary without full documentation, competitors are at a huge disadvantage.
Microsoft has basically inserted themselves as the UEFI gatekeeper for installing not just their software, but any software that modifies the bootloader on a potentially huge number of devices globally around the world.
The main issue with the UEFI secure protocol is that it excludes out ALL other operating systems, for the right of sharing (educational), giving (philanthropy), renting, loaning, and borrowing on other W8 PC system/s hardware to run boxed copies of Windows or Linux on Windows logo hardware, and also impossible to install new versions of Windows or Linux unless your OEM provided a new UEFI digitally signed key. A system that ships with only OEM and Microsoft keys will not boot a generic copy of Linux.
Not to mention, Windows 8 PC owners won’t be able to replace their OS with another like Windows 7, unless they obtain a digitally signed Secure Boot version for their system.
One of the few shortcomings in the UEFI model (and it is a deliberate omission because of the complexity of running a certification system) is that there’s no designated root of trust in the current version 2.3.1. for a centralized vendor-neutral signing authority to provide UEFI keys.
The Windows 8 PC you buy in 2013 will be permanently locked into Windows 8 if Microsoft gets away with their plan. Windows 8 certification does not require that the user be able to disable UEFI secure boot, and hardware vendors have reported already that on some hardware will not have this option available.
Of course, Windows 8 certification does not require that the PC system come with any keys other than Microsoft’s. A system that ships with UEFI secure boot enabled and only includes Microsoft’s signing keys will only securely boot Microsoft operating systems.
Think how this gives great power to Microsoft, for every manufacturer that wants to sell hardware for the Windows 8 PC, needs a UEFI digital signed key, from Microsoft!
Disabling UEFI Secure Boot is NOT offered on ARM systems like Windows 8 RT (Tablets).
The PC user using x64 or x86 systems is not guaranteed the ability to install extra signing keys in order to securely boot the operating system of their choice. The PC user is not guaranteed that their system will include the signing keys that would be required for them to swap their graphics card from another vendor, or replace their network card and still be able to netboot, or install a newer SATA controller and have it recognize their hard drive in the firmware. Of course, UEFI doesn’t provide the means to generate your own UEFI keys either. Just where does that leave the PC user?
The truth is that UEFI using the Secure Boot Protocol v2.3.1 makes it more difficult to run anything other than Windows 8. UEFI secure boot is a valuable and worthwhile feature that Microsoft is misusing to gain tighter control over the market.
As it stands now Microsoft is saying OEMs don’t have to do it. They just have to do it if they want to sell PCs with Windows on them.
André Rebentisch from FFII, among other FFII members, supports this motion. As a recap, “[t]he European Parliament is about to vote for a regulation on the unitary patent, during its plenary session, on December 11th, 2012.” We wrote about this at the end of November. █
Summary: Biased court gives Microsoft power over Android and Apple manages to ban some Android devices in Europe
The Microsoft vs. Motorola case (over Android and FRAND) is in many ways Google’s way of defending Android from Microsoft patent tax, but the trial is stacked by Microsoft boosters [1, 2, 3] and local participants are from Microsoft’s back yard. The verdict, thus, is pro-Microsoft to the extreme:
The Seattle federal judge who recently oversaw a two-week trial between Microsoft and Motorola over standards-based patents handed down a key order today, finding that Motorola won’t be able to use its patents to get an injunction against Microsoft.
That means that while Motorola might be able to use its patents to win some money from Microsoft, it won’t be able to get the ultimate reward of a successful patent suit: the ability to kick an opponent’s product off the market.
The judge in Microsoft’s home court in Seattle, the Hon. James Robart, has handed the company a huge win against Motorola regarding injunctions on RAND patents. What a surprise. Not. This is in Microsoft v. Motorola, and the judge is the one who blocked the injunction a German court ordered against Microsoft for infringing Motorola’s RAND patents. Now the Seattle judge has ruled [PDF] that Motorola can’t get an injunction for any RAND patents it owns either in the US or in Germany or in fact worldwide, even though this case was about only two patents.
How about choosing a neutral setting for this trial?
These cartels are called “aggregators” in the corporate press now that Google is complaining openly, not just playing along. Some of these cartels, such as RPX, are already playing a secret role. Then, consider what Sony did last week.
Speaking of real aggregators, ones that respect fair use, the corporate press has this to say:?
Google’s imprint on daily life is hard to ignore in Europe, where it reportedly has 93 percent of the Internet search market, more than in the United States. Yet when it comes to its lobbying of lawmakers, Google prefers a low profile.
That all changed this week when Google fired a rare public broadside against a proposal that would force it and other online aggregators of news content to pay German newspaper and magazine publishers to display snippets of news in Web searches.
Apple Inc. won a Dutch sales ban on some of Samsung Electronics Co.’s older Galaxy tablets and smartphones after a Netherlands court ruled in a patent lawsuit.
Apple has become a patents company despite not innovating, merely integrating. The same goes for Microsoft. █
____ * Android skills, as noted in daily links we posted, are sought within Nokia, but it is too early to speculate much.
Posted in America, Patents at 6:40 am by Dr. Roy Schestowitz
Summary: The absurdity of software patents, the patent wars, and the coming era of patenting or privatising life’s code
ACTIVIST against software patents — a real one, not a “moderate” one — is having a go again. PolR from Groklaw has released the second part or his “Software Is Mathematics” argument, citing Stallman from the recent conference which was stacked by so-called ‘moderates’ (controlled opposition which does not seek to abolish software patents). To quote the opening part:
I argued in part 1 of this series that computations are manipulations of symbols with meanings. In this article, I hope to further explain this notion using the social science of semiotics. Its object is the study of signs, the entities which are used to represent meaning.
This article elaborates on what Richard Stallman said in the recent Santa Clara Law conference Solutions to the Software Patent Problem.
According to this report Richard Stallman described patents on software as patents on thought, which amount to patents on the use of the human brain to reason and to solve problems by the application of reasoning. This article uses semiotics to show that Stallman’s point is more than rhetoric. It is a provably correct statement of fact.
One portal covers the “biggest fighters of the patent wars”, but it misses Microsoft’s war behind closed doors and focuses on Apple (visible patent wars) instead. To quote:
The fight between proprietary software and free software is not new. Wherever there is technology and more importantly wherever there is competition; issue like patent infringements are bound to come up. Generally, infringement wars happen when more than one organizations bring out similar kind of products.
The idea of software patent is significant as far as it promotes the originality as well as innovation. But, to some extent, software patents are road blockers for novelty. Somewhere they can harm the creativity and an aspiration to create something naive.
It is found; numerous biggies in the industry are waging wars against each other over patents. Let’s explore some significant legal battles fought (or being fought), which are grabbing lime light in the smartphone industry these days…
The problem there is, Apple is all over the place and patent blackmail gets little or no coverage. One is the equivalent of going to war and another is occupation after threat of going to war against weaker countries/groups. We will deal with Microsoft’s tactics in a separate post because it merits a longer discussion.
It is worth noting that monopolies on genetics and parts of the human body are soon to be legitimised by SCOTUS [1, 2, 3] after the USPTO already granted them. The corporate press says:
The Supreme Court announced Friday it will decide whether companies can patent human genes, a decision that could reshape medical research in the United States and the fight against diseases like breast and ovarian cancer.
There is a lot of nonsense in this article because it focuses on benefits to corporations. To people, there are no benefits, only harm. It also harms competition, which is inherently anti-capitalist in the sense that it doesn’t let classical ‘free market’ capitalism do its thing. Here is the SCOTUS Blog page and a good rebuttal to it all:
But, of course, it was just the first step in a long process. Myriad took the case to the appeals court for the federal circuit (CAFC), the notoriously patent friendly appeals court. The only surprise here was that the US Justice Department actually said it agreed that genes shouldn’t be patentable (showing a potential disagreement within the administration, as the US Patent Office was not happy). End result? CAFC decided genes are patentable because they’re “separate” from your DNA.
Summary: Abusive monopolist and leaker of personal information Microsoft hopes that the public will move off Google and over to Microsoft for ‘privacy’
My favourite search engine, Scroogle, was shut down some months ago, leaving me to use StartPage. Microsoft now misuses the word “scroogle” in attempting to daemonise Google. Here is how IDG puts it and here is a decent response to Microsoft’s hypocritical smear:
Microsoft often attack its competitors through smear campaign whether it’s OpenOffice or Google. The Windows 8 maker is desperate to show how bad their competitors are through every channel possible. Right now Microsoft’s arch rival is Google.
The company ran the Gmail man campaign trying to tell users that Google looks at your mails (as if Microsoft doesn’t look inside Hotmail). There is no Gmail ‘man’ reading your emails, it’s all automated. The fact is Microsoft also scans your emails.
And now Microsoft tries to tell us about privacy concerns in Google search. Never mind if Microsoft spies on Windows and Skype users, eh? All that in addition to search and E-mail spying…