Bonum Certa Men Certa

Links 10/10/2016: GNOME 3.24 With ownCloud Integration, Bodhi Linux 4.0.0 Beta

Links xx/10/2016: Links for the day



GNOME bluefish

Contents





GNU/Linux



Free Software/Open Source



  • On the State of Open Source
    I was just a teenager when I got involved in the open source community. I remember talking with an old bearded guy once about how this new organization, GNU, is going to change everything. Over the years, I mucked around with a number of different OSS tools and operating systems, got excited when symmetric multiprocessing came to BSD, screwed around with Linux boot and root disks, and had become both engaged and enthralled with the new community that had developed around Unix over the years. That same spirit was simultaneously shared outside of the Unix world, too. Apple user groups met frequently to share new programs we were working on with our ][c’s, and later our ][gs’s and Macs, exchange new shareware (which we actually paid for, because the authors deserved it), and to buy stacks of floppies of the latest fonts or system disks. We often demoed our new inventions, shared and exchanged the source code to our BBS systems, games, or anything else we were working on, and made the agendas of our user groups community efforts to teach and understand the awful protocols, APIs, and compilers we had at the time. This was my first experience with open source. Maybe it was not yours, although I hope yours was just as positive.


  • OpenType 1.8 and style attributes
    In last week's look at the new revision of the OpenType font format, we focused primarily on the new variations font feature, which makes it possible to encode multiple design "masters" into a single font binary. This enables the renderer to generate a new font instance at runtime based on interpolating the masters in a particular permutation of their features (weight, width, slant, etc). Such new functionality will, at least in some cases, mean that application software will have to be reworked in order to present the available font variations to the end user in a meaningful fashion.

    But there is another change inherent in the new feature that may not be as obvious at first glance. Variations fonts redefine the relationships between individual font files and font "families." There is a mechanism defined in the new standard to bridge the gap between the old world and the new, called the Style Attributes (STAT) table. For it to work in a meaningful fashion, though, it must be implemented by traditional, non-variations fonts as well—which may not be an easy sell.

    There is no formal definition of a font family, but in general usage the term refers to a set of fonts that share core design principles and, in most cases, use a single name and come from the same designer or design team. The Ubuntu Font Family, for example, includes upright and italic fonts in four weights at the standard width, one weight of upright-only condensed width, and two weights (in upright and italic) of a monospaced variant.


  • An open source font system for everyone
    A big challenge in sharing digital information around the world is “tofu”—the blank boxes that appear when a computer or website isn’t able to display text: ⯐. Tofu can create confusion, a breakdown in communication, and a poor user experience.

    Five years ago we set out to address this problem via the Noto—aka “No more tofu”—font project. Today, Google’s open-source Noto font family provides a beautiful and consistent digital type for every symbol in the Unicode standard, covering more than 800 languages and 110,000 characters.


  • Students Hacked a Chip to Give Your Smartphone a Sense of Touch
    Project Soli, which debuted at Google I/O in 2015, is a tiny chip that uses radar to detect discreet hand and finger motions. It was designed as a unique way to interact with mobile devices, but students at the University of St. Andrews found a way to use the simple chip to give electronics an actual sense of touch.

    The chip, developed by Google’s Advanced Technologies And Projects group, or ATAP, uses the same kind of radar as airports use to track arriving and departing planes. As radio waves bounce back to the Project Soli chip from your hand, the unique signals detected can be used to decipher even the tiniest of motions.


  • Caged Heat: Using Open Source in a Windows Workplace


    I work primarily with Windows but let me say that I, like many of you, have no choice in the matter. We don’t live in a world where the company tells us, “Well, here’s Microsoft Office and everything we do is on a web app. Have fun!” My goodness, that would be a relative paradise for many people. You could potentially go hog wild and use the applications you want.

    Still, a lot of us work with very clunky tools sometimes set on a gray-haired version of Java and birthed from Windows installers. It’s a sad reality that a lot of highly-specialized practice software applications, many of which attach to MICROSOFT databases, will only run on Windows because the developer is selling these apps for profit and not for fun. They also happen to know that 95% of the market is drenched in……Windows.


  • European Open Source Jobs Surge
    According to a recent report, European open source jobs may be more sought after and more rewarded than anywhere else in the world. These findings were a key feature in the results of The 2016 Open Source Jobs Report which was released by Dice, a career site for technology and engineering professionals in association with The Linux Foundation, the nonprofit advancing professional open source management for mass collaboration.


  • Multivendor & MANO Will Dominate NFV Discussions
    NFV management and network orchestration (MANO) is sure to be a hot topic at next week’s SDN & OpenFlow World Congress at The Hague, Netherlands. For many, MANO has been considered to be a roadblock to not only deploying network functions virtualization (NFV), but also to making NFV agile and efficient.


  • ETSI open source MANO work launches Release One stack
    ETSI continues to move on its open source MANO work in support of telecom NFV plans, releasing the latest OSM stack focused on VNF, SDN controller support

    The European Telecommunications Standards Institute’s Open Source MANO initiative continued to feed software into the management and orchestration community with the launch of its OSM Release One stack.



  • Open Source Forking Demystified: Threats and Benefits
    Two researchers, Gregorio Robles and Jesus M. Gonzalez-Barahona, from Universidad Rey Juan Carlos in Spain, had embarked on a study of forks. Their paper titled “A Comprehensive Study of Software Forks: Dates, Reasons and Outcomes,” studied the sustainability of software projects in an open environment of sharing software. Key questions answered were—how many forks were in actual existence, was forking frequency increasing and understanding the root-causes for forking. Also, the researchers looked into the outcomes of forking—a point that may be of specific interest to CIOs. But first, let us understand what a fork truly means.


  • Rethink Robotics Leads in Research and Education with Open Source SDK
    Rethink Robotics today unveiled its high performance Sawyer robot for the global research and education markets. Built on the open source Robot Operating System (ROS) and equipped with a software development kit (SDK), Sawyer will help leading educators and researchers innovate in fields including machine learning, human-robot interaction, mechatronics and grasping, machine vision and manufacturing skills.


  • Open source in the enterprise: It's about culture, not technology, says Github
    Collaboration platform provider gives its top tips on 'inner source', the idea of adopting open source software development principles within the enterprise


  • Transparency and Independence Drive Open-Source Adoption
    Open-source software is now not only acceptable; in many companies, it is required. In the past, enterprises looked at open source projects as if they were science experiments, lacking the support and “single throat to choke” in case of an escalation. But the tide has turned. It is now common to have one or more companies offering support on open source projects, enabling enterprises to not only get the same level of service formerly reserved for proprietary commercial software, but to also benefit from the vibrant communities surrounding open source projects.

    What are the benefits of community for the enterprise? Independence and transparency.



  • Tech Insider: Open source business models
    This week we’ll step back and revisit a few fundamentals of competition and cooperation and how this results in the open source ecosystem.


  • The power of open source is customer freedom
    The open source community is a diverse and fractious collection of individuals and organizations. In its infancy, in many ways it could be compared to the hippie movements of the '60s: a lot of passion, a lot of fun, a lot of weirdness, and not a lot of organization. Over the last decade or so, it has evolved into a respected software development force that relies on the support of its members.

    As it's grown and diversified over the last decade, it has gotten more mainstream in the sense that there are now many different players that are making quite a bit of money based on open source principles. It has more prestige and a lot more respectability. As they say, money changes everything.

    That's what I was thinking as I read Max Schireson's article, "The money in open source software," on TechCrunch: how much things in the open source community have changed, and how much they have stayed the same. The article is a breakdown of how to plan for a profitable company based on open source software. It provides a lot of common-sense points: Have and stick to a business plan, pick a licensing model that makes sense, and maintain customer satisfaction. None of these are particularly earth-shattering ideas.


  • Events



    • Slides from Linuxcon Europe 2016


    • LinuxCon Europe 2016 - Veni, Vidi, Vici


      There we are. It feels like a dream. It happened too fast, and I did not get to absorb the full aroma of the conference. But never mind. There will always be another opportunity, and LinuxCon will be there next year, waiting, beckoning. Despite a somewhat less than perfect circumstances, I am quite happy. I enjoyed my session, if I'm allowed to say that, and I think I served my audience well, and their feedback was good and open. There is nothing that would have made it better except a little more time to network, talk to people, pilfer some more free shirts and electronics, and actually see the city.

      Anyhow, I hope you find these little field reports entertaining. And maybe we will meet somewhere next year, and you will come over and say, oh so you are that crazy guy, why are you not wearing a fedora huh? Indeed. 2017, so let the countdown begin. The Final Countdown. By a band called Europe. What can be more appropriate? OMG. See you next autumn.




  • Web Browsers



    • Mozilla



      • Get Better Firefox Look on Linux With These Extensions
        Firefox is one of the most used web browsers on the Web. According to Clicky, it holds around 20% of the global market share. Firefox is also installed by default in almost all Linux distributions. So it’s very likely to see Linux users using it all the time, although many other alternatives are available like Chromium and Epiphany.

        Since the web browser’s window is all what many of us see the whole day, you may want to customize its appearance. We are not talking about “personas” or those simple backgrounds that you put to colorize a small part of the browser’s window. We are talking about changing the theme totally. Firefox does this using “Complete Themes“.


      • Firefox sandbox on Linux tightened
        As just announced on mozilla.dev.platform, we landed a set of changes in today's Nightly that tightens our sandboxing on Linux. The content process, which is the part of Firefox that renders webpages and executes any JavaScript on them, had been previously restricted in the amount of system calls that it could access. As of today, it no longer has write access to the filesystem, barring an exception for shared memory and /tmp. We plan to also remove the latter, eventually.


      • Mozilla is working on Form Autofill for Firefox
        Mozilla is currently working on bringing form autofill functionality to its Firefox web browser.

        Firefox remembers form data by default that you enter on sites, but the browser does not ship with options to create profiles that you may use on any form you encounter while using the browser.






  • SaaS/Back End



  • Databases



    • RethinkDB database shuts down as its business falters


    • Company Behind RethinkDB Is Shutting Down, Database to Remain Open Source


    • BigchainDB Moves On From End Of RethinkDB


    • RethinkDB is shutting down
      I just installed RethinkDB 2.3.5 on a new laptop and took a few minutes to slow down and play with the product. I’m very proud of what we built alongside our community – RethinkDB’s technology more often feels like magic, and I hope it will continue to play an important role in advancing the state of the art in database technology.

      We’re working with members of our community to develop a continuity plan for RethinkDB and Horizon. Both projects will continue to be available, distributed under open source licenses. We hope to continue our open development process with a larger community of contributors.

      We’d like your help to ensure RethinkDB’s future as an open-source project! We don’t have all of the details figured out, but we wanted to be as open as possible during this process. If you’re interested in contributing, please join us in the #open-rethinkdb channel of our public Slack group. You can expect to see development slow down in the meantime, but everything will continue to be available on rethinkdb.com and horizon.io. We will post updates on our blog and Twitter as we continue working things out.




  • Oracle/Java/LibreOffice



  • Pseudo-Open Source (Openwashing)



  • FSF/FSFE/GNU/SFLC



    • An Emacs Update
      It’s been a while I have not written about Emacs and more particularly my personal use case for Emacs. I started using Emacs because I was looking for a text editor capable of handling formats such as HTML and CSS; then I found out Emacs had quite convenient IRC clients and I could even use a bit of Org mode for project management. That was in 2013 and early 2014. As I was impressed by the seemingly infinite power of Emacs, I started using Org-mode more and more on a daily basis (something I still do today); and I started learning (e)lisp both in order to understand Emacs a bit more in-depth and because I wanted to start to learn a programming language.

      Remember: I’m no software developer. When I’m not maintaining or creating websites for friends, I’m not doing much else in the way of “coding”. My Emacs usage remains however a daily experience that I would like to share here.


    • Report: Bash Skills Pay Off the Most (Wait, Bash?)
      It's not surprising that a new skills survey rounds up the usual list of suspects for the most popular programming language, naming JavaScript, Python, Java, et al.

      What is surprising is the list of skills that pay off the most in terms of developer salaries: Bash, Perl and Scala. Bash topped the list at about $100,000.

      Bash?

      I read a lot of these surveys, and the Bash scripting language rarely makes a strong appearance. But it leads the list of respondents' stated median salaries by programming language in a new report from Packt Ltd. titled "Skill Up 2016" (free download upon providing registration info) which garnered more than 11,500 responses.

      "We've now seen what languages are the most popular," the report says, "but what languages are the most lucrative in 2016? Our data shows that languages favored by more experienced developers command the highest salaries; it pays to be a Perl Monk or a Bash Scripter. Scala developers also manage to command high salaries, while the more ubiquitous JavaScript and Python hover around the middle, as they are likely favored by both highly-paid and more junior alike. If you're still working with Visual Basic or PHP, you might want to consider an upgrade."




  • Public Services/Government



    • Russia may require use of open source software
      The Russian government is reportedly drafting a Bill that would require government agencies to prefer the use of open source software, as part of efforts to reduce its reliance on US vendors Oracle, Microsoft and IBM.

      Russia’s Lower House of parliament is working on legislation that would further prohibit the use of foreign software, Bloomberg reported.




  • Openness/Sharing/Collaboration



  • Standards/Consortia



    • The anatomy of a Vulkan driver
      Jason Ekstrand gave a presentation at the 2016 X.Org Developers Conference (XDC) on a driver that he and others wrote for the new Vulkan 3D graphics API on Intel graphics hardware. Vulkan is significantly different from OpenGL, which led the developers to making some design decisions that departed from those made for OpenGL drivers.






Leftovers



  • Hardware



    • Smallest. Transistor. Ever.
      For more than a decade, engineers have been eyeing the finish line in the race to shrink the size of components in integrated circuits. They knew that the laws of physics had set a 5-nanometer threshold on the size of transistor gates among conventional semiconductors, about one-quarter the size of high-end 20-nanometer-gate transistors now on the market.




  • Security



    • Cybersecurity: Complexity is Our Biggest Vulnerability
      Confucius once said, “Life is really simple, but we insist on making it complicated.” For those of us in cybersecurity professions, we can easily relate to this philosophy. Cybersecurity has become exceedingly complicated in recent years, and the complexity might now be our biggest vulnerability.

      IT is evolving rapidly, but IT security is often left playing catch up in order to adapt to the changes in how businesses approach and deploy computing, applications, networks, databases, and devices. Many organizations rely on best practices such as defense in depth, secure development lifecycle, penetration testing, separation of duties, etc. However, these tactics do not allow cybersecurity to move at business speed, and they contribute to the lag in IT security.



    • Open source software is best for IoT security
      Art Swift, president of the prpl Foundation, pointed to high profile IoT hacking attacks saying that “regardless of whether these hacks were malicious or simply done in the name of research, the fact is that it is possible today to hack into just about any connected device.”

      Swift says that hackers can reverse engineer, exploit a weak implementation, modify or re-flash the firmware, and then move laterally across the system.




  • Defence/Aggression



    • Syria no-fly zone would mean 'killing a lot of Syrians' warned Clinton in leaked speech
      The US former Secretary of State made the admission in a Wall Street speech in 2013.

      In the latest dump of classified emails, Mrs Clinton noted the problems with imposing a no-fly zone over Syria.

      She said: "To have a no-fly zone you have to take out all of the air defenses, many of which are located in populated areas.


    • How WWIII Can Start In The Last Place You Expect (And Soon)
      Hey America! Just checking in with another update on how a recent presidential election is going to doom us all! I'm not talking about the election that's happening in this country right now. I will at some point, but it's an election that happened thousands of miles away which deserves the bulk of our attention today. I'm speaking, of course, about the this year's presidential election in the Philippines, where a legitimately crazy person named Rodrigo Duterte took control of the highest office of in a country of more than 100 million people. He's said and done a lot of insane things since then, but if you're only keeping track of the highlights, you probably have no idea just how insane things might get.




  • Environment/Energy/Wildlife/Nature



    • Hillary Clinton Expresses Support For Fracking In Wikileaks Document
      During the fight for the Democratic presidential nomination, Hillary Clinton cast herself as a skeptic of hydraulic fracturing -- the controversial process to extract natural gas. But newly released documents purporting to show excerpts of her paid speeches show that Clinton proudly touted her support for fracking, which environmental groups say can pollute groundwater and undermine the fight against climate change. The excerpts also show Clinton saying that some environmental organizations trying to restrict her work to promote fracking were front groups for Russian oligarchs.

      The transparency group Wikileaks published the document as part of what it says is a tranche of emails from John Podesta, Clinton’s campaign chairman. Podesta has refused to say whether the excerpts are authentic but has not denied their authenticity, either.




  • AstroTurf/Lobbying/Politics



    • EXCLUSIVE: New Email Leak Reveals Clinton Campaign’s Cozy Press Relationship
      Internal strategy documents and emails among Clinton staffers shed light on friendly and highly useful relationships between the campaign and various members of the U.S. media, as well as the campaign’s strategies for manipulating those relationships.

      The emails were provided to The Intercept by the source identifying himself as Guccifer 2.0, who was reportedly responsible for prior significant hacks, including one that targeted the Democratic National Committee and resulted in the resignations of its top four officials. On Friday, Obama administration officials claimed that Russia’s “senior-most officials” were responsible for that hack and others, although they provided no evidence for that assertion.

      As these internal documents demonstrate, a central component of the Clinton campaign strategy is ensuring that journalists they believe favorable to Clinton are tasked to report the stories which the campaign wants circulated.

      At times, Clinton’s campaign staff not only internally drafted the stories they wanted published but even specified what should be quoted “on background” and what should be described as “on the record.”


    • Two-Faced Hillary: Clinton Says She Has 'Both a Public and a Private Position' on Wall Street: WikiLeaks Release
      Hillary Clinton told top banking executives that she has “both a public and a private position” on Wall Street reform and is reliant on wealthy donors to fund her campaign, leaked excerpts of the former first lady’s speeches seem to show, fueling claims of hypocrisy on the part of Mrs. Clinton at a crucial moment in the presidential campaign.




  • Censorship/Free Speech



    • Youtube took down MEP's videos about torture debate
      Marietje Schaake (previously) is a Dutch Member of the European Parliament who has a fantastic track-record for getting it right on issues related to technology, free speech, human rights, and privacy; she is the author of a report on export controls for spying technology used to identify dissidents to torture.

      She uploaded the videos from the debate about these tools to Youtube, only to receive a notice from Youtube informing her that a video had been removed had been reviewed and found to be in violation of Youtube's standards, resulting a takedown for the video and a "strike" against Schaake's Youtube account -- enough of these strikes and she'll permanently lose access to the service.

      The video that Youtube removed "included footage of European Trade Commissioner Cecila Malmstrom, who gave her opinion about the new law."


    • When YouTube took down my video
      YouTube is now one of the most used platforms for videos online. It has over a billion users, and reaches more 18-49 year-olds than any cable network in the U.S. It has become a portal for sharing information and ideas, which is vital for any democratic society.


    • Russia Mulls Downloading Fines if Site Blocking Fails
      Faced with the possibility that website blocking may not achieve its goals, Russia is now considering fresh opportunities for decreasing online file-sharing. Sources familiar with negotiations say that authorities are mulling a system of fines which would target individual downloaders.


    • Internet Bill: Censorship or internet regulation?


      The Films and Publications Amendment Bill that was deliberated by the Portfolio Committee on Communications in Parliament last week has caused an uproar as people debate whether it is strictly an internet regulation or the government’s attempt at stifling and censoring freedom of speech.

      Also known as the Internet Bill, the proposed law aims to regulate the online distribution of digital films and digital games, among others, but it has come under attack from media organisations such as Multichoice, organisations such as the Right2Know campaign, and opposition parties such as the DA.




  • Privacy/Surveillance



    • The Fog of Cyber War


      A version of this post originally appeared in the Cyber Saturday edition of Data Sheet, Fortune’s daily tech newsletter.

      Last week produced a spate of cyber-security news, including revelations about Yahoo (again) and lousy counter intelligence at the NSA (again). But if there is a common thread, it’s that first reports often are false or incomplete and the story is not what it seems.

      Take the brouhaha over Yahoo using software to feed emails to the NSA. The news led to hyper-ventilating among privacy types and predictable high-horse behaviorf rom rival tech giants like Google and Microsoft. But as my colleague Robert Hackett explained, a lot of this fulminating took place before anyone really knew the facts — which are still emerging in dribs and drabs.

      Meanwhile, journalists (me included) breathlessly reported another security lapse at Edward Snowden’s old stomping groups, Booz Allen, which led the FBI to arrest a contractor for stealing secrets. But now it turns out the guy was probably just a kook and a hoarder. It’s still not a good situation but it sure doesn’t look like the stuff of a John LeCarre novel.

      Part of the trouble, from a media perspective, is that a lot of the incidents we learn about are delivered by anonymous sources and wrapped in national security laws. This makes it hard to verify information — easy to jump to conclusions.

      So call it the fog of cyber war. In an era where everyone is amped up about cyber attacks, a lot of first impressions are tinged with paranoia and misinformation or are just flat out wrong. I don’t know what to do about this except to say that, as with other dramatic events like mass shootings, it’s best to take first reports with a giant grain of salt.
    • Facebook Crowned Privacy Villain Of 2016 By European Privacy Rights Group
      A European civil society group defending rights and freedoms in the digital environment awarded Facebook the Belgian Big Brother Awards 2016 yesterday.

      The awards are based on a concept created by European Digital Rights initiative (EDRi) member Privacy International, and are negative prizes for “the worst privacy abuser.” The goal of those awards is to draw attention to violations of privacy, they said in a press release.

      The Belgian award was “unanimously granted to Facebook by the professional jury,” and the public confirmed Facebook’s title as the “ultimate privacy villain of the year.”


    • Yahoo May Have Exposed Rogers Customer Emails to US Spies
      On Friday, Motherboard reported that beleaguered US company Yahoo allowed someone—possibly a US intelligence agency such as the NSA or FBI—to install a backdoor on its servers, likely for scanning purposes, that afforded unfettered access to Yahoo’s systems, including users’ personal emails.

      “This backdoor was installed in a way that endangered all of Yahoo users,” a source familiar with the incident told Motherboard.

      This should concern Canadians, because Rogers, one of the largest telecom companies in the country, totally outsources its email systems to Yahoo. Emails sent from Rogers accounts are sent to Yahoo’s US servers for storage and processing, and Yahoo scans Rogers emails for spam, malware, and child pornography.

      This isn’t the first time that Rogers’ ties to Yahoo have compromised Canadians: The Toronto Star previously reported that Rogers customer data was included in the massive hack in September.


    • U.S. pressed to disclose secret court's order on Yahoo email search




  • Civil Rights/Policing

    • Iranian judges sentence writer to jail for story about stoning to death
      Iranian judges have ordered a young female writer and activist to serve a six-year jail term for writing an unpublished fictional story about stoning to death in her country.

      Golrokh Ebrahimi Iraee received a phone call on Tuesday from judicial officials ordering her to Evin prison in Tehran, where her husband, Arash Sadeghi, a prominent student activist, is serving a 19-year sentence.

      Ebrahimi Iraee told Voice of America’s Persian network this week that she had been sentenced to five years in prison for insulting Islamic sanctities and one extra year for spreading propaganda against the ruling system.

      “They haven’t issued a written summons [as required by the law],” she said in a Skype interview. “They called me using the telephone of one of my friends, Navid Kamran; they had gone to his shop to arrest him and they called me from there to summon me.”


    • Leaflet 'handed out at east London mosque' tells Muslims to kill all who insult the prophet
      Police today launched a hate crime probe after literature saying those who insult Islam “must be killed” was allegedly handed out at a London mosque.

      A Standard investigation has uncovered claims that the booklet, which says “any Muslim should kill” those who insult the Prophet Mohammed, was distributed at a gathering in Walthamstow.

      It points to a classical manual of Islamic law to justify killings without waiting for court judgments and says apostates “deserve to be assassinated”.

      The booklet discusses the case of Mumtaz Qadri, a fanatic who murdered a governor in Pakistan in 2011 because of his support for liberal reforms to the country’s strict Islamic laws.


    • Final hearing for Christian woman facing execution for blasphemy in Pakistan
      A Christian woman who has been facing execution in Pakistan for six years after being accused of blasphemy has been granted her final appeal.

      Pakistan’s supreme court will hear the case of Asia Bibi, a mother-of-five from the rural village of Ittan Wali in Punjab, eastern Pakistan, who was convicted of blasphemy in 2010 after allegedly insulting the Prophet Muhamed during a row with other women over water.

      All of Ms Bibi’s appeals in the lower courts failed before the supreme court temporarily suspended her execution in July 2015 ahead of a fresh hearing now scheduled to be heard on 13 October.

      If her final appeal fails, Ms Bibi will be the first woman to be executed under the country’s controversial blasphemy laws.


    • Mormon Rebel Went to WikiLeaks for Help
      When Kate Kelly, founder of the Mormon feminist group Ordain Women, was accused of apostasy, she couldn’t readily access the Church Handbook of Instructions, Volume 1, for the definition. So Kelly and Nadine Hansen, a lawyer representing her in her hearings, had to turn elsewhere.

      "The only way that women can access that volume is by accessing it online at WikiLeaks,” Kelly told The Daily Beast.




  • Intellectual Monopolies



    • Gurry investigation dropped by WIPO member states; transparency and accountability are the losers
      The news that WIPO member states have endorsed a decision taken by the organisation’s Coordination Committee to drop any further investigation of the allegations of serious misconduct levelled against the organisation’s Director-General Francis Gurry is no surprise; a few days ago this blog predicted it would happen. However, for anyone who believes that the IP system is best served by transparency and accountability, the fact this outcome was so predictable does not make it any less depressing.

      Ever since the then WIPO deputy Director-General James Pooley first accused Gurry of being involved in taking WIPO staff members’ DNA and in interfering to alter the outcome of a procurement process in his April 2014 Report of Misconduct, IAM has taken no position on the claims. We don’t know if they were true; but we do know that they should have been investigated quickly, thoroughly, independently and with full protection for witnesses.


    • WIPO Workshop: African States Are Themselves To Blame, Should Compile, Publicize IP Statistics
      Each year, the World Intellectual Property Organization Economic and Statistics Division sends out questionnaires, which intellectual property offices worldwide are expected to complete and return.

      But because the survey is voluntary, many African countries, including some Africa Regional Intellectual Property Organisation (ARIPO) member states, do not respond to the questionnaires.


    • EU, US negotiators officially drop aim of concluding TTIP in 2016






Recent Techrights' Posts

[Video] Time to Acknowledge Debian Has a Real Problem and This Problem Needs to be Solved
it would make sense to try to resolve conflicts and issues, not exacerbate these
Daniel Pocock elected on ANZAC Day and anniversary of Easter Rising (FSFE Fellowship)
Reprinted with permission from Daniel Pocock
Ulrike Uhlig & Debian, the $200,000 woman who quit
Reprinted with permission from disguised.work
Girlfriends, Sex, Prostitution & Debian at DebConf22, Prizren, Kosovo
Reprinted with permission from disguised.work
 
[Video] Debian's Newfound Love of Censorship Has Become a Threat to the Entire Internet
SPI/Debian might end up with rotten tomatoes in the face
Joerg (Ganneff) Jaspert, Dalbergschule Fulda & Debian Death threats
Reprinted with permission from disguised.work
Amber Heard, Junior Female Developers & Debian Embezzlement
Reprinted with permission from disguised.work
[Video] IBM's Poor Results Reinforce the Idea of Mass Layoffs on the Way (Just Like at Microsoft)
it seems likely Red Hat layoffs are in the making
IRC Proceedings: Wednesday, April 24, 2024
IRC logs for Wednesday, April 24, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Links 24/04/2024: Layoffs and Shutdowns at Microsoft, Apple Sales in China Have Collapsed
Links for the day
Sexism processing travel reimbursement
Reprinted with permission from disguised.work
Microsoft is Shutting Down Offices and Studios (Microsoft Layoffs Every Month This Year, Media Barely Mentions These)
Microsoft shutting down more offices (there have been layoffs every month this year)
Balkan women & Debian sexism, WeBoob leaks
Reprinted with permission from disguised.work
Martina Ferrari & Debian, DebConf room list: who sleeps with who?
Reprinted with permission from Daniel Pocock
Links 24/04/2024: Advances in TikTok Ban, Microsoft Lacks Security Incentives (It Profits From Breaches)
Links for the day
Gemini Links 24/04/2024: People Returning to Gemlogs, Stateless Workstations
Links for the day
Meike Reichle & Debian Dating
Reprinted with permission from disguised.work
Europe Won't be Safe From Russia Until the Last Windows PC is Turned Off (or Switched to BSDs and GNU/Linux)
Lives are at stake
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, April 23, 2024
IRC logs for Tuesday, April 23, 2024
[Meme] EPO: Breaking the Law as a Business Model
Total disregard for the EPO to sell more monopolies in Europe (to companies that are seldom European and in need of monopoly)
The EPO's Central Staff Committee (CSC) on New Ways of Working (NWoW) and “Bringing Teams Together” (BTT)
The latest publication from the Central Staff Committee (CSC)
Volunteers wanted: Unknown Suspects team
Reprinted with permission from Daniel Pocock
Debian trademark: where does the value come from?
Reprinted with permission from Daniel Pocock
Detecting suspicious transactions in the Wikimedia grants process
Reprinted with permission from Daniel Pocock
Links 23/04/2024: US Doubles Down on Patent Obviousness, North Korea Practices Nuclear Conflict
Links for the day
Stardust Nightclub Tragedy, Unlawful killing, Censorship & Debian Scapegoating
Reprinted with permission from Daniel Pocock
Gunnar Wolf & Debian Modern Slavery punishments
Reprinted with permission from Daniel Pocock
On DebConf and Debian 'Bedroom Nepotism' (Connected to Canonical, Red Hat, and Google)
Why the public must know suppressed facts (which women themselves are voicing concerns about; some men muzzle them to save face)
Several Years After Vista 11 Came Out Few People in Africa Use It, Its Relative Share Declines (People Delete It and Move to BSD/GNU/Linux?)
These trends are worth discussing
Canonical, Ubuntu & Debian DebConf19 Diversity Girls email
Reprinted with permission from disguised.work
Links 23/04/2024: Escalations Around Poland, Microsoft Shares Dumped
Links for the day
Gemini Links 23/04/2024: Offline PSP Media Player and OpenBSD on ThinkPad
Links for the day
Amaya Rodrigo Sastre, Holger Levsen & Debian DebConf6 fight
Reprinted with permission from disguised.work
DebConf8: who slept with who? Rooming list leaked
Reprinted with permission from disguised.work
Bruce Perens & Debian: swiping the Open Source trademark
Reprinted with permission from disguised.work
Ean Schuessler & Debian SPI OSI trademark disputes
Reprinted with permission from disguised.work
Windows in Sudan: From 99.15% to 2.12%
With conflict in Sudan, plus the occasional escalation/s, buying a laptop with Vista 11 isn't a high priority
Anatomy of a Cancel Mob Campaign
how they go about
[Meme] The 'Cancel Culture' and Its 'Hit List'
organisers are being contacted by the 'cancel mob'
Richard Stallman's Next Public Talk is on Friday, 17:30 in Córdoba (Spain), FSF Cannot Mention It
Any attempt to marginalise founders isn't unprecedented as a strategy
IRC Proceedings: Monday, April 22, 2024
IRC logs for Monday, April 22, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Don't trust me. Trust the voters.
Reprinted with permission from Daniel Pocock
Chris Lamb & Debian demanded Ubuntu censor my blog
Reprinted with permission from disguised.work
Ean Schuessler, Branden Robinson & Debian SPI accounting crisis
Reprinted with permission from disguised.work
William Lee Irwin III, Michael Schultheiss & Debian, Oracle, Russian kernel scandal
Reprinted with permission from disguised.work