"Linux has won in the data center -- [it is] one of two in the data center. Think about that," Cormier said to an applauding crowd.
As the CEO of Docker, Ben Golub is at the forefront of the container revolution. In only two years, Docker has grown into a huge ecosystem that is starting to see widespread adoption across the enterprise market. The company has nearly quadrupled in size, and the statistics for applications are even more impressive.
Docker has announced the availability of its commercial solutions and the Docker Trusted Registry, which is software that lets organizations securely store their container images. The Docker Trusted Registry (DTR) is a registry for Docker container images that provides an on-premise option for storing and sharing Docker images. It offers "a highly-available registry server that provides LDAP and Active Directory integration with existing authentication systems," and "it also offers role-based access control (RBAC) and audit logs for authorization and compliance for authorization and compliance," according to the company.
The KVM (Kernel-based Virtual Machine) updates for Linux 4.2 are exciting for x86 Linux users.
The KVM x86 code in Linux 4.2 adds support for the System Management Mode, which is needed for supporting UEFI Secure Boot in guest VMs. As part of this comes KVM support for handling multiple address spaces.
The latest subsystem update worth commenting on for the Linux 4.2 merge window are the crypto(graphy) updates with this new kernel version.
Zefan Li had the great pleasure of announcing the immediate availability for download of a new maintenance release for the 3.4 kernel series, Linux kernel 3.4.108 LTS, a long-term support version that will receive updates for a few more years.
There's another step forward today in NVIDIA's open-source/Linux hardware support! NVIDIA will begin supplying hardware reference headers for the Nouveau DRM driver.
While NVIDIA right now is the primary choice for Linux gamers and those willing to use proprietary hardware drivers, the same cannot be said about those that are strict into using fully open-source code on their systems. The NVIDIA open-source support has lagged behind Intel and AMD on Linux with NVIDIA not officially supporting the community-based, mostly-reverse-engineered Nouveau driver. The only exception so far has been for the NVIDIA Tegra hardware where they actively have been working on the Tegra K1 (and newer) graphics driver support for the open-source driver.
Read more
openDCIM is an free and open source solution for Data Center Infrastructure Management. It is already used by a few organizations, and is quickly improving due to the efforts of its developers. The number one goal for openDCIM is to eliminate the excuse for anybody to ever track their data center inventory using a spreadsheet or word processing document again. We’ve all been there in the past, which is what drove us developers to create this project.
The new Humble Borderlands Bundle brings a lot of Linux titles, and it will be available for purchase for the next couple of weeks.
Sword Coast Legends is a new RPG developed by n-Space and published by Digital Extremes on Steam. The developer confirmed the fact that it would be available for the Linux and SteamOS platforms as well.
Galactic Civilizations III is a massive strategy game developed by Stardock Entertainment, and it was released on the Windows platform all the way back in May 2015. Now the developers are saying that there might be a chance to see the game on Linux, after Vulkan launches.
Cossacks 3 is a new real time strategy from GSC Game World that is scheduled to be released by the end of 2015, and it will have Linux and SteamOS support.
The underlying bones of Linux gaming just keep on getting stronger. Crytek’s CryEngine now supports Linux, and that means support for SteamOS, too.
This is just the latest big game engine to support Linux, following in the footsteps of Valve’s Source engine, Epic’s Unreal Engine 4, and Unity 5. It’s easier than ever for developers making games on top of these engines to add support for Linux and SteamO
Alexander Larsson has formally announced xdg-app today as the desktop app sandboxing system for GNOME environments.
At the show, the chip designer will point to the growing momentum around the hardware and software ecosystem for 64-bit ARM systems.
Richard Hughes announced today the Linux Vendor Firmware Service (LVFS) for hardware vendors to be able to upload their firmware files -- thus making them redistributable to fwupd users (such as with Fedora 23+) assuming they comply with the AppStream specification.
As some of you may know, I’ve spent the last couple of months talking with various Red Hat partners and other OpenHardware vendors that produce firmware updates. These include most of the laptop vendors that you know and love, along with a few more companies making very specialized hardware.
Samsung is partnering with Red Hat to build mobile apps for business users in a deal that recalls Apple's tie-up with IBM this time last year.
Denise Dumas and Katrinka McCallum are open source leaders at technology giant Red Hat. Denise steers the engineering team that builds Red Hat’s flagship product, Red Hat Enterprise Linux (RHEL). Katrinka heads up the team responsible for the operational backbone of engineering and business units at Red Hat.
The 2015 Red Hat Summit takes place this week in Boston, and with app performance and system optimization being a key concern in this new world of virtualized and container based systems, topping the list of desirable personalities to chat with is Jeremy Eder.
Eder, a principal software engineer at Red Hat, will deliver three sessions at the summit about topics such as virtualization, containerization, system optimization and the performance analysis and tuning of Red Hat Enterprise Linux (RHEL).
Red Hat is convinced that the future, and clouds, belong to containers. In today's release of its Platform-as-a-Service (PaaS) cloud, OpenShift Enterprise 3, Red Hat is basing it on Docker containers, Kubernetes orchestration and Red Hat Enterprise Linux (RHEL) 7.
Shippable, Inc. today announced that it has formed a new collaboration with Red Hat, Inc. to provide the only continuous integration/continuous delivery solution to run natively on Red Hat’s OpenShift Enterprise 3 platform. Coinciding with the announcement, Shippable also announced the release and beta availability of the product, Shippable CI/CD for Openshift Enterprise 3.
Testing updates this way can apply to any of the packages within Atomic Host. Since Atomic Host has a small footprint the package you want to test might not be included, but if it is then this is a great way to test things out.
Even though the recently released Aquaris E5 HD Ubuntu Edition has pretty good specs, I think it's safe to say that the Meizu MX4 Ubuntu Edition is the first high end Ubuntu phone. The device looks top notch and feels high quality - at 144 x 75.2 x 8.9 mm, the phone is robust and the ergonomics are quite good.
It's been a long journey for Canonical, but the company finally has its Ubuntu system in the wild and in the hands of users. In fact, you can get three Ubuntu phones right now and here they are.
Ford is trying to enter the world of autonomous vehicles, and the company is trying to play catchup with the rest of the crowd, and it looks like they are also using Ubuntu to make that happen.
It would appear that there's now a special, unofficial edition of the Ubuntu Linux operating system optimized for Chromebook and Chromebox computers that are powered by an Intel Haswell processor.
Plex Media Server, a software that makes it easy for everyone to play movies and TV shows on the computer, has been upgraded to version 0.9.12.4 and is available for download.
How many containers can you run on a server? At OpenStack Summit Canonical, Ubuntu's parent company, showed that it could run 536 Linux containers on an Intel server with mere 16GBs of RAM. That's great, but now how do you network them? Canonical thinks it has the answer: Fan Networking.
Sierra Wireless has introduced its next-generation of AirPrime WP Series of smart wireless modules for the development of connected products and applications for the Internet of Things. The WP Series provides an integrated device-to-cloud architecture enabling IoT developers to build a Linux-based product using a single module that sends valuable user and product data to the cloud.
InHand’s tiny “Fury-M6ââ¬Â³ COM/SBC hybrid adds wireless, eMMC, battery support, and more to Freescale’s new, dime-sized, i.MX6 Dual based SCM-i.MX6D module.
The InHand Fury-M6, announced this week at the Freescale Technical Forum (FTF), appears to be the first board-level product to incorporate Freescale’s new dime-sized SCM-i.MX6D module. The Fury-M6 targets portable medical diagnostics, autonomous vehicle/UAV control, portable cameras with image analysis, and industrial sensors with data analytics, says InHand.
The Android 5.1 Lollipop update for the well-received original Motorola Moto X and the Moto X 2014 started rolling out Monday. Only last week, Motorola's David Schuster updated his Google+ account to confirm the release of both the first- and second-generation Moto X models.
Sony on Monday announced the availability of Android M Developer Preview images for select Xperia devices in the company's Open Device programme, along with other tools. Users should note the builds are still in testing stages, and currently have key features missing.
When news first broke that Lenovo was buying Motorola, plenty of people worried the company might push its heavy-handed approach to Android onto Motorola's devices.
Well, surprise, surprise: Here we are, more than a year later -- and it appears the exact opposite is happening.
Motorola execs have repeated emphatically that the company has no plans to change its "stock-plus" approach to Android software. And now, Lenovo is the one taking a cue from Moto and rethinking the way it handles the operating system.
Two trains made of fiber, copper and code are on a collision course, as the widespread popularity of Android devices and the general move to IPv6 has put some businesses in a tough position, thanks to Android’s lack of support for a central component in the newer standard.
DHCPv6 is an outgrowth of the DHCP protocol used in the older IPv4 standard – it’s an acronym for “dynamic host configuration protocol,” and is a key building block of network management. Nevertheless, Google’s wildly popular Android devices – which accounted for 78% of all smartphones shipped worldwide in the first quarter of this year – don’t support DHCPv6 for address assignment.
The Samsung Galaxy Android 5.1.1 Lollipop update has pushed out to the Galaxy S6, Galaxy S6 Edge and now the Galaxy S5. And while it brings bug fixes and enhancements, it brings some problems of its own. Today, we take a look at a few things you need to know about Samsung Galaxy Android 5.1.1 problems.
Looking for a new Android Wear watch face? Well, you've come to the right place.
Thanks to Google's dedicated Google Play Store hub specifically for finding Android Wear watch faces, they are now easier than ever to find and download, with over 1,500 currently available to choose from.
So you’ve grown tired of Apple’s walled garden of apps and the iron grip it maintains over the iOS platform. Well, the freedom of Android welcomes you with open arms, but don’t forget to bring your data along for the ride!
Apple doesn’t make it particularly easy to move your data from iOS to Android—it’s more interested in moving people in the other direction. Still, with just a few tools and some patience, you can be up and running on Android without missing a beat.
Less than a couple of weeks after there were reports that BlackBerry is planning to launch an Android smartphone this fall, CEO John Chen has confirmed that the company would make such a move only if they can make the phone secure enough.
It's no secret that I'm a fan of Android. As a result, I use and test a lot of different Android phones. I plan to start actually reviewing more of them.
The use of open source software has become more and more commonplace as the technological world advances. It powers millions of devices many of which we depend on every single day. In fact this very web page you are reading this post on is powered by bits of open source code.
Software would be useless if there were not people there to use it and there are many different types of people who use open source software every day.
The OPNFV Project, a carrier-grade, integrated, open source platform for accelerating the introduction of new Network Functions Virtualization (NFV) products and services. We recently issued our first community-led software release, OPNFV Arno. This foundational release is intended for anyone exploring NFV deployments, developing Virtual Network Functions (VNF) applications, or interested in NFV performance and use case-based testing. With developers in mind, Arno provides an initial build of the NFV Infrastructure (NFVI) and Virtual Infrastructure Manager (VIM) components of the ETSI NFV architecture.
Facebook has begun opening up source code for its Nuclide IDE, which is designed to offer a unified experience for Web and native mobile development.
This week sees Red Hat host its 11th annual 'Summit' conference, exhibition, symposium, developer hackfest, analyst & press outreach session and all round communications to partners and customers smorgasbord.
The OpenStack platform is an open-source collaboration to develop a private cloud ecosystem, delivering IT services at web scale.
OpenStack is divided into a number of discrete projects, each with a code name with parallels to the purpose of the project itself.
Usually, the higher-ed industry has a reputation as being one of the slowest adopters of new technology. But when it comes to open source software (OSS), campus IT departments are ahead of other industry and consumer tech adoption curves, says Scott Wilson, service manager of OSS Watch at the University of Oxford.
“On the face of it, higher education has been relatively quick to realize the benefits, notes Wilson. “Over 50 percent of higher education institutions use open source, both on the server and on the desktop. And one of the great open source success stories in higher education is the Moodle Virtual Learning Environment (VLE).”
Simply put, Roundcube is the unsung work horse of web mail.
But a decade is an eternity in technology. When Roundcube started, mobile devices were large, clunky affairs used by the few. Today they are the most commonly used communication device. Roundcube Next is today’s answer to that radical change. Instead of once more embarking alone on that ten year journey, Roundcube Next is about building a strong, healthy and diverse Open Source community to achieve that task within 12 to 18 months.
Manchester Storm are to reform and make a return to ice hockey's Elite League next season.
The will replace Hull Stingrays in the league following their liquidation.
Iceland has long been one of the more right-leaning Nordic countries. In contrast to Denmark, Finland, Norway, and Sweden, which all have a long tradition of electing Social Democratic governments, Iceland's parliament has been dominated by right-of-center parties for all but four years since World War II. The only break in that streak came in 2009, when the left won for the first time ever—and elected the world's first openly gay head of state. The unusual result came about because the global financial meltdown hit Iceland with particular ferocity, but tradition seemingly reasserted itself four years later when the right-leaning Independence and Progressive parties regained power in a landslide.
British intelligence agency GCHQ is facing fresh calls to reveal the extent of its involvement in the US targeted killing programme after details of a fatal drone strike in Yemen were included in a top secret memo circulated to agency staff.
A leading barrister asked by the Guardian to review a number of classified GCHQ documents said they raised questions about British complicity in US strikes outside recognised war zones and demonstrated the need for the government to come clean about the UK’s role.
The documents, provided to the Guardian by NSA whistleblower Edward Snowden and reported in partnership with the New York Times, discuss how a joint US, UK and Australian programme codenamed Overhead supported the strike in Yemen in 2012.
The files also show GCHQ and Overhead developed their ability to track the location of individuals – essential for the targeted killing programme – in both Yemen and Pakistan. The legality of the US’s lethal operations in both countries has been questioned by international lawyers and human rights groups.
Corporate media are demonstrably reluctant to use the word “terrorist” with regards to Charleston shooting suspect Dylann Roof–even though the massacre would seem to meet the legal definition of terrorism, as violent crimes that “appear to be intended…to intimidate or coerce a civilian population.”
Generally, news outlets don’t explain why they aren’t calling Roof a terrorist suspect; they just rarely use the word. But the Washington Post‘s Philip Bump gave it a shot in a piece headlined “Why We Shouldn’t Call Dylann Roof a Terrorist” (6/19/15), and his rationale is worth taking a look at.
Yet there was at least one news item that ran the day after the shooting that was not afraid to refer to it as a terrorist attack: “US State Senator Killed by Terrorist With White Supremacist Sympathies, 8 Others Dead,” reads the headline of a news item that appeared on Sahara Reporters, a New York City-based news website that primarily covers government corruption in Africa, with a particular focus on Nigeria.
The Sahara Reporters piece uses the word “terrorist” six times to describe Roof and his alleged action, including in the headline, the subhead and a photo caption. The words “mental illness,” “troubled” and “loner” do not appear — in fact, no speculation whatsoever is made regarding Roof’s mental state or stability. Instead, South Carolina’s “known hate groups” are mentioned to provide context for Roof’s alleged actions, and Roof’s white supremacist activities and the historic allusions made by the patches on his jacket are front and center in the piece. And the massacre is clearly contextualized as occurring at “a time where the persecution of black ethnic minorities in the United States has been making world headlines.”
In theory, factchecking is one of the most important functions of journalism. In practice, systematic efforts by corporate media to “factcheck” political statements are often worse than useless.
Take PolitiFact, a project of the Tampa Bay Tribune, and its recent offering “Is Barack Obama Correct That Mass Killings Don’t Happen in Other Countries?”
In a landmark case that may set a very important precedent for other countries around the world, especially within Europe, the Dutch government has been ordered by the courts to cut greenhouse gas emissions by 25 percent.
The ruling came from a class-action lawsuit that was brought before the Dutch courts by Urgenda in 2012. The case, rather magnificently, was based on human rights laws. Specifically, Urgenda asked the courts to "declare that global warming of more than 2 degrees Celsius will lead to a violation of fundamental human rights worldwide," and that the Dutch government is "acting unlawfully by not contributing its proportional share to preventing a global warming of more than 2 degrees Celsius."
Four large bombs exploded underwater by the Royal Navy were to blame for a mass stranding which killed 19 pilot whales on the north coast of Scotland in 2011, government scientists have concluded.
A long-delayed report released on Wednesday by the Department for Environment Food and Rural Affairs says that the noise from the explosions could have damaged the hearing and navigational abilities of the whales, causing them to beach and die.
As the EU-U.S. Transatlantic Trade and Investment Partnership (TTIP) agreement vote was postponed in the European Parliament on June 10th, the European Union is on the precipice of a major decision. Lurking in the background is another key decision about the EU-Canada Comprehensive Economic and Trade Agreement (CETA).
While the threat of TPP draws ever closer, there are other trade agreements on the horizon that will prove equally malicious to user freedom. Today is the day we must fight back.
The single-minded groups are popping up on all manner of issues, including to lobby on rules regulating commercial drones that weigh less than 55 pounds, to rewrite the nation’s patent laws and to engage in the big legislative fight over the Export-Import Bank.
Coalitions offer lobbyists a big advantage by allowing firms to collect combined fees from a number of corporations and interest groups that may not otherwise engage on an issue. For instance, a company may not consider an issue pressing enough on which to spend hundreds of thousands of dollars, but the idea of spending a few thousand dollars — that’s then combined with similarly smaller fees from other coalition members — is more enticing.
In crafting the budget, Walker is taking his cues from the American Federation for Children (AFC), a major force for school privatization nationwide. It is funded and chaired by billionaire Betsy DeVos, and pushes its privatization agenda in the states with high-dollar lobbying and attack ads.
In the documentary Mad Max: Fury Road, we learned how Australia is controlled by a psychotic strongman who believes in traditional gender roles, strict limits on immigration, and social control through imposed scarcity. This is why Tony Abbott, current Prime Minister of Australia, announced his new Internet censorship plan by warning Aussies, "Do not, my friends, become addicted to the Web."
Finally, no measures were agreed on on the anonymisation of data. Only the pseudonymisation is considered, which is totally insufficient to preserve the anonymity of a person. Pseudonymisation within the processing of personal data is not protection at all and is only another gift for private companies which will allow them to work, with complete impunity, on data whose the origin can be easily found. This gift is re-enforced by the will to authorise profiling person with their explicit agreement. Such an authorisation is necessary but insufficient if there is not a strict framework on the finalities of the profiling. The absence of a regulation of the issue of Safe Harbor in spite of the adoption of the Moraes 2014 report is making the breaches in the protection of personal data every time wider.
It's a sad day for freedom! French representatives just adopted the French Surveillance Law. As an ironic echo to the recent WikiLeaks revelations about NSA spying on French political authorities, this vote calls for a new type of resistance for citizens.
The French president, François Hollande, is holding an emergency meeting of his country’s defence council after claims that American agents spied on three successive French presidents between 2006 and 2012. According to WikiLeaks documents published late on Tuesday, even the French leaders’ mobile phone conversations were listened to and recorded.
The leaked US documents, marked “top secret”, were based on phone taps and filed in an NSA document labelled “Espionnage Elysée” (Elysée Spy), according to the newspaper Libération and investigative news website Mediapart. The US was listening to the conversations of centre-right president Jacques Chirac, his successor Nicolas Sarkozy, and the current French leader, Socialist François Hollande, elected in 2012.
The United States has eavesdropped on at least three French presidents and a whole raft of senior officials and politicians in France for at least six years, according to secret documents obtained by WikiLeaks and revealed here by Mediapart. The top secret reports from America's National Security Agency (NSA) show that the phones of presidents François Hollande, Nicolas Sarkozy and Jacques Chirac were all tapped. But they also show that the espionage carried out on a supposedly key ally of Washington's went even further and deeper, and that senior diplomats, top civil servants and politicians also routinely had their phones tapped. The documents seen by Mediapart reveal proof of the spying on the French state that took place from 2006 to 2012 but there is no reason to suggest that this espionage did not start before 2006 and has not continued since. The revelations are certain to spark a major diplomatic row and highlight once again the uncontrolled and aggressive nature of American spying on friends and foes alike, as first revealed by NSA whistleblower Edward Snowden in 2013. Mediapart's Fabrice Arfi and Jérôme Hourdeaux and Julian Assange of WikiLeaks report.
Today, 23 June 2015, WikiLeaks began publishing "Espionnage Ãâ°lysée", a collection of TOP SECRET intelligence reports and technical documents from the US National Security Agency (NSA) concerning targeting and signals intelligence intercepts of the communications of high-level officials from successive French governments over the last ten years.
Hollande said in a statement that the two spoke by telephone Wednesday after the release of WikiLeaks documents about NSA intercepts of conversations involving Hollande and his two predecessors between 2006 and 2012.
Reports in France suggest the US spied on French presidents from a secret spy nest on the roof of its embassy in Paris, which stands just a stone's throw from the Elysée palace.
It’s hard to pretend to be surprised. Since Edward Snowden revealed, in June 2013, the planetary scope of the electronic surveillance and data collection programs carried out by American intelligence agencies, we have gone from surprise to surprise. We discovered, amongst other things, that this mass surveillance went as far as eavesdropping on the German chancellor’s phone conversations. It also enabled Airbus to be spied on by the German secret services on behalf of the American agencies. Nothing, therefore, should surprise us any more. Sooner or later, we were bound to have a confirmation that the French presidents and top-ranking officials were also spied on by the United States. We now have the proof, according to the WikiLeaks documents published, on June 23rd, by the French daily newspaper Libération and and the Mediapart investigative website
Knowing is one thing, accepting is another. Such practices are obviously unacceptable! Nevertheless, we must not be naive. Intelligence is a crucial tool in the struggle against terrorism. The French parliament has recently approved a far ranging bill to reinforce its interception capabilities. Some provisions of the text have been vividly criticised by civil liberties campaigners, who point out French intelligence services could use them to bypass the right to privacy of French citizens - and even more so, the right to privacy of foreign nationals. In this fight, intelligence services across Europe do need to cooperate with the US, and they have to be able to keep doing so... But only within the framework of the law.
U.S. President Barack Obama reaffirmed in a phone call with his French counterpart Francois Hollande on Wednesday Washington's commitment to end spying practices deemed "unacceptable" by its allies.
The presidents' conversation, announced by Hollande's office, came after transparency lobby group WikiLeaks revealed on Tuesday that U.S. National Security Agency (NSA) had spied on the last three French presidents.
The directive was stern and uncompromising. In the depths of the Cold War, then-FBI Director J. Edgar Hoover ordered his agents to undertake a new mission: Identify every gay and suspected gay working for the federal government.
Only Hoover didn’t describe his targets as gays. He called them “sex deviates.”
GCHQ’s covert surveillance of two international human rights groups was illegal, the judicial tribunal responsible for handling complaints against the intelligence services has ruled.
The UK government monitoring agency retained emails for longer than it should have and violated its own internal procedures, according to a judgment by the investigatory powers tribunal (IPT). But it ruled that the initial interception was lawful in both cases.
British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for the hacking efforts, known as “reverse engineering,” since such activity could have violated copyright law. But GCHQ sought and obtained a legally questionable warrant from the Foreign Secretary in an attempt to immunize itself from legal liability.
GCHQ’s reverse engineering targeted a wide range of popular software products for compromise, including online bulletin board systems, commercial encryption software and anti-virus programs. Reverse engineering “is essential in order to be able to exploit such software and prevent detection of our activities,” the electronic spy agency said in a warrant renewal application.
The once-secretive, now-notorious Joint Threat Research Intelligence Group ran its online propaganda and manipulation operations at home as well as abroad.
JTRIG's domestic operations used fake accounts to "deter," "promote distrust" and "discredit" in political discussions on social media, uploaded fake book/magazine articles with "incorrect information," hacked websites, set up ecommerce sites that were fraudulent operations designed to rip off their adversaries and so on. They relied on psychological research on inspiring "obedience" and "conformity" to inform their work.
The spy unit responsible for some of the United Kingdom’s most controversial tactics of surveillance, online propaganda and deceit focuses extensively on traditional law enforcement and domestic activities — even though officials typically justify its activities by emphasizing foreign intelligence and counterterrorism operations.
Documents published today by The Intercept demonstrate how the Joint Threat Research Intelligence Group (JTRIG), a unit of the signals intelligence agency Government Communications Headquarters (GCHQ), is involved in efforts against political groups it considers “extremist,” Islamist activity in schools, the drug trade, online fraud and financial scams.
Last Friday the folks at Reason confirmed what I suggested on Thursday — that the U.S. Attorney's Office for the Southern District of New York, after hitting Reason with a federal grand jury subpoena to unmask anonymous hyperbolic commenters, secured a gag order that prevented them from writing about it.
Nick Gillespie and Matt Welch describe how it all went down. Read it.
So, the truth is out — and it's more outrageous than you thought, even more outrageous than it appears at first glance.
What, you might ask, could be more outrageous than the United States Department of Justice issuing a questionable subpoena targeting speech protected by the First Amendment, and then abusing the courts to prohibit journalists from writing about it?
The answer lies in the everyday arrogance of unchecked power.
The Council of Europe, the self-proclaimed “democratic conscience of Greater Europe,” urged the United States on Tuesday to allow NSA whistleblower Edward Snowden to return home and make the case that his actions had positive effects.
Net neutrality is the principle that Internet Service Providers should treat all data on the Internet equally. It's about minimising the restrictions on which parts of the Internet you can access. And it's about allowing startups to compete with big Internet firms and supporting innovation in the digital economy.
Negotiations on Net Neutrality between the European Parliament, the European Commission and the Council of the European Union (trialogue) started on 11 March in order to settle an agreement on the final regulation. Political groups send few representatives to the trialogue but political groups do not necessarily adopt it and compromise with a text that does not respect main democratic values. Citizens shall urgently call all S&D and ALDE Members of European Parliament (MEPs), who are about to decide, in the next days, of their group positions, and urge them to resist against a text that would infringe fundamental rights and liberties of any European citizen. La Quadrature has sent MEPs the following letter.