Razer founder and CEO Min-Liang Tan said on Thursday that the company is now looking to support Linux on the Razer Blade laptop. He said that support for the open-source operating system is one of the most common requests for the Razer Blade and that Razer is now looking into the possibility. He is now asking all Linux “enthusiasts” to provide their feedback, suggestions, and ideas in the new Linux Corner section of Razer Insider.
“We decided to lead a new forum section that is dedicated to Linux’s applications for gamers or other creators alike,” the company states in its introductory post. “The Linux Corner is a result of this where fans can now discuss their experience, provide feedback, and talk about everything related to Tux’s OS running on the Razer Blade.”
Instead of running Microsoft Windows or Mac OS X, Chromebooks support Google's Chrome operating system (OS), meaning that these machines are entirely internet and cloud-based.
Good for those familiar with the Chrome web browser and the Google productivity suite (Docs, Sheets, Slides), not so good for those wanting to perform heavy duty tasks with external applications.
But keep an open mind, if you're looking for a cheap laptop to perform internet-based tasks, such as emails or web browsing, the Chromebook could be a viable option or a great option for a second machine.
Read on to find out the best Chromebooks for business...
Apple is losing its grip on American classrooms, which technology companies have long used to hook students on their brands for life.
Over the last three years, Apple’s iPads and Mac notebooks — which accounted for about half of the mobile devices shipped to schools in the United States in 2013 — have steadily lost ground to Chromebooks, inexpensive laptops that run on Google’s Chrome operating system and are produced by Samsung, Acer and other computer makers.
According to research company Futuresource Consulting, in 2016 the number of devices in American classrooms that run iOS and macOS fell to third place behind both Google-powered laptops and Windows devices.
Coreboot is a free and open source software. The project aimed at replacing the proprietary BIOS firmware and blobs. Unfortunately, Coreboot does not run on the modern laptop (except Chromebooks) due to Intel ME and other closed source technologies.
Shortly after I announced my intention to migrate to Linux as my primary desktop OS, a number of other folks contacted me and said they had made the same choice or they had been encouraged by my decision to also try it themselves. It seems that there is a fair amount of pent-up interest—at least in the IT community—to embrace Linux as a primary desktop OS. Given the level of interest, I thought it might be helpful for readers to hear from others who are also switching to Linux as their primary desktop OS, and so this post kicks off a series of posts where I’ll share other users’ stories about their Linux migration.
In this first post of the series, you’ll get a chance to hear from Roddy Strachan. I’ve structured the information in a “question-and-answer” format to make it a bit easier to follow.
If you’re a sysadmin who works from home, logs in for after-hours emergency support or simply prefers to work from a laptop in your office, you need to do it securely. Preparation and vigilance are essential in keeping your workstation and network safe from hackers.
Anyone who uses a Linux workstation to access and manage their company’s or project's IT infrastructure runs the risk that his or her computer will become an incursion vector against the rest of that infrastructure.
Docker has no business model and no way to monetize. It’s fair to say that they are releasing to all platforms (Mac/Windows) and integrating all kind of features (Swarm) as a desperate move to 1) not let any competitor have any distinctive feature 2) get everyone to use docker and docker tools 3) lock customers completely in their ecosystem 4) publish a ton of news, articles and releases in the process, increasing hype 5) justify their valuation.
The Hyperledger project, a cross-industry open source blockchain group led by the Linux Foundation, plans to release its first production-ready distributed ledger code base by the end of the month, as projects involving the nascent technology begin to mature.
The group, whose more than 120 members include IBM, JPMorgan Chase & Co, Cisco Systems Inc and the Bank of England, said in a blog post published on Friday that its technical committee had promoted its first blockchain project, Hyperledger Fabric, to an active phase.
Cockpit is the modern Linux admin interface. We release regularly. Here are the release notes from version 133.
Cockpit is the modern Linux admin interface. We release regularly. Here are the release notes from version 130, 131 and 132.
Some days ago I was wondering how Linux decides which process to kill when free memory is running low. (Spoiler: heuristics!)
The Cloud Native Computing Foundation (CNCF) has accepted the CoreDNS networking project into its project roster. CoreDNS had been trying to become hosted CNCF project since at least October 2016, though it's first attempt was not successful.
The CNCF itself is a Linux Foundation Collaborative Project and first got started back in July 2015. The first project to come over to the CNCF was Google's Kubernetes, open-source container orchestration platform. Since then the CNCF has added five other projects including: Prometheus monitoring, OpenTracing, Fluentd logging, LinkerD and the gRPC projects.
Chris Mason has sent in a secondary pull request of Btrfs material for the Linux 4.11 merge window.
Last week Mason sent in the main Btrfs pull request for 4.11 and it basically amounted to fixes. With the secondary pull request mailed in on Thursday, there are more fixes and performance improvements.
Submitted earlier in the Linux 4.11 merge window were the big ARM SoC and platform changes for this next kernel version while some last-minute ARM changes have just arrived.
Arnd Bergmann sent in some last-minute ARM SoC updates for the Linux 4.11 kernel. These late changes include USB 3.0 support for Samsung's Exynos 7, some Samsung power management updates, WeTek set-top box support, and some fixes.
Intel's set to enable atomic mode-setting by default with code slated to land for the Linux 4.12 kernel.
The initial patches for enabling atomic mode-setting by default turned it on for Gen5 (Ironlake) hardware and newer, but left out Valleyview and Cherryview hardware due to problems. But now it looks like for Linux 4.12 the Cherryview/Valleyview problems could be addressed and see those mobile platforms go atomic too.
Besides recent Intel graphics hardware making use of firmware binary blobs now for the GuC/HuC functionality, Intel audio hardware continues in making use of firmware binary-only blobs for audio support.
In May last year, we made good progress with the bug backlog. This was before the systemd-230 release. In November, we were preparing for systemd-232, a we made a nice dip too. After four more months of development, systemd-233 was released. I was a bit disappointed to see that this time we didn't make such visible progress...
Adam Jackson is announcing the release and immediate availability of the second maintenance update to the X.Org Server 1.19 display server stable series for GNU/Linux distributions.
X.Org Server 1.19.2 comes one and a half months after the launch of the first point release and includes a bunch of stability improvements for Xwayland, Glamor, XFree86, Prime, and input support, besides patching a security issue that could brute-force the MIT-MAGIC-COOKIE authentication, namely CVE-2017-2624.
GLX/GLVND fix for "The Binding of Isaac: Rebirth" and other games. When using EGL under X11/DRI3 eglQuerySurface now returns correct geometry. A regression in EGL/Wayland where the wrong format was passed is addressed.
Emil Velikov has announced the first point release to last month's big Mesa 17.0 release.
Curious how Ryzen scales across its CPU cores and SMT? Here are some Ubuntu Linux benchmarks testing a Ryzen 7 1700 with different core counts.
This Arc Telegram theme means users of the Arc GTK theme can now theme the Telegram messaging app to better blend in with their desktop.
My work relies mostly on Google products. I use Google docs for managing documents, Gmail for sending and receiving mails, Google Drive for storing my personal data, Google play books for reading books, google translate for translation. I was wondering if there is any way to access my google contacts from Commandline. I know how to access to use it from a graphical desktop, but not from Commandline. Here is an useful and handy utility called GooBook that allows you to access your Google contacts from commandline. The main purpose of Goobook is to access google contacts from commandline or a command line Email client like Mutt.
Pictures are our everyday needs. We use personal and online images for various personal and professional purpose, but often online images, create lots of legal issues.
There are so many people trying to serve the need of such people through Copy Right Free images online, but the exact need of the image seeker and what is available does not match due to limited images in a single platform.
After two years, pass 1.7 has been released. This has been a huge release cycle, fixing countless bugs and adding all sorts of nice modernization. Hopefully this is a smooth release, though if all the churn results in bugs, we'll do another patch release soon.
We are pleased to announce the new major Rspamd release 1.5 today. This release incudes a lot of major reworks, new cool features and a significant number of bugs being fixed. The update from the previous versions shouldn’t be hard, however, please check the migration document to be sure that the new version will not break the existing configuration.
LibreELEC (Krypton) 8.0.0 has arrived after a long gestation period encompassing 10x official alpha and 3x beta releases in addition to 200+ nightly milhouse builds. Based upon Kodi v17.0, our 8.0.0 release contains many small refinements to our user experience and a complete overhaul of the underlying OS core to enhance stability and extend hardware support. For a description of new features and changes in Kodi please read the official Kodi v17.0 release notice.
Postfix stable release 3.2.0 is available. This release ends support for legacy release Postfix 2.10.
We have released version 2.7 of our Qt application introspection tool GammaRay. GammaRay allows you to observe the behavior and data structures of Qt code inside your program live at runtime.
While the Terminator development is slow, the application is still actively improved, with version 1.91 being the second GTK3 pre-release.
According to Stephen Boddy, the main Terminator developer, the GTK3 branch is already much better than the old GTK2 Terminator version and is already used by some Linux distributions (including Ubuntu 17.04 Zesty Zapus).
Another GTK3 pre-release, version 1.92, should be available toward the end of March, while a final 2.0 (GTK3) release is expected at the end of April.
Argos is a tool inspired by the BitBar app for Mac, which makes it easy to create your own GNOME Shell extensions, using information provided via scripts.
Being a GNOME Shell extension itself, Argos adds a button with a dropdown on the GNOME Shell top panel. This button can display or expose functionality provided by a script, be it Bash, Python, Ruby, and so on (remember to make it executable or else Argos won't use it).
The open source version of LongoMatch is available for Windows, Mac OS X and various Linus distributions. It requires that you download and install a codec pack as well, as it is required for some of the application's functionality.
DaVinci Resolve just keeps getting better and better with each new announcement. A long time staple for cinematic colour correction & grading, Resolve recently started adding editing capabilities. Those still have a little way to go, but they’re coming along nicely. Today, though, they’ve announced that DaVinci Resolve is now available for Linux.
Whistle blowing spook Edward Snowden says that AMD could kick Intel to death if it open sources its PSP and firmware.
In an odd tweet, Snowden appeared to be jolly excited about the release of AMD’s new Ryzen desktop processor. But he said that the release of such a good product would be a good moment for AMD to open source their PSP & firmware.
“In the next cycles, many will discuss replacing Intel. This is a low-cost, low-risk opportunity for AMD to distinguish themselves from Intel on an on-going basis. It's a shame to miss it,” he wrote.
Of course, you can always download the kernel of your choice from the Mainline Kernel PPA, and use dpkg to install it yourself as well, rather than rely on their script.
When building a machine, you must take manufacturer into consideration if you’re building for Linux. If you want a Linux machine and don’t want to worry that your build won’t work, there are several vendors to choose from (one of which is Dell). If you want all your Steam games to work, the best choice of Linux to put on it (short of putting Steam OS on it) is Ubuntu Linux. In the following article, I’m going to walk you through how to pick parts for your Linux machine.
From a pure performance perspective, the AMD Ryzen is more than just competitive, it is downright awesome. After having hands-on time at the AMD Tech Day, I hit publish on our Ryzen pre-order story then promptly did so for a personal system and a system for our DemoEval lab (ETA on that one late March 2017 as it has some benchmarks it will be running in the meantime.) In fact, I even pre-ordered a complete set of components for STH’s William Harmon since I thought he would love the platform. We are going to have full power numbers once we get them in our standard test beds and into the data center.
Kali Linux is an open source Debian based Linux distro that is specially design and built to enhance the penetration testing and security auditing methodologies. Being funded and maintained by Offensive Security, one of the leading company and the front-runners in the field of penetration testing and security services. Kali Linux is equipped with hundreds of tools to enable extensive development in information security services including Forensics, Reverse engineering, high-end security research and analysis and penetration testing. Backtrack the predecessor to Kali Linux had some major issues with the version updates as many believed that the system will break if the updates are made and that is the reason it was withdrawn and many more new feature and tools were added to release the most promising distro, Kali Linux.
We all need time to find a file that was taken on a specific date, time or name. Ever wondered how are you going to find it? Yeah! I assume you might say about the search function in nautilus, pacman or any other file manager you use, but what if you are not allowed to use it! Your file manager just freezes while searching lots of files. Well, let’s come to point. Today I am going to talk about the famous Linux Find Command. What is it? Keep reading.
The Wine development team announced the availability of a new development release of the open-source and cross-platform application that lets Linux and Mac users install and use games and apps made only for Microsoft Windows operating systems.
Wine 2.3 is now the newest development release, the third of its kind after the release of the major Wine 2.0 stable series earlier this year. Prominent features include improvements to ODBC (Open Database Connectivity) support on 64-bit platforms, more Shader Model 5 instructions, and additional work on the Direct3D command stream.
Wine 2.3 is out as the latest bi-weekly development snapshot.
The Wine development release 2.3 is now available.
Wine 2.3 has officially released today and the developers are continuing their work to improve Wine performance and work on Shader Model 5.
For those of you that don't know what "Direct3D command stream" means, it's multithreading to improve performance of games ran in Wine with OpenGL.
With the rest of the RadeonSI shader cache support landing in Mesa, I have carried out some benchmarks to measure the impact of this on-disk GLSL shader cache not only for the performance of games but also the reduced load-times.
Hey, here’s another game genre that gets some kind of revival! Rally games used to be plentiful in my days (Sega Rally in arcades… and on consoles, remember V-Rally, Colin McRae Rally on PS1 ?? Gran Turismo 2 even had a –piss poor– rally mode) yet these days they have almost become extinct. The dinosaurs of another by-gone era. In an age where there’s few developers who care about Rally, the real question is not simply if Dirt Rally is the best rally game available, rather if that’s a good rally game at all. On Linux, that’s the only Rally game you are likely to be able to purchase anyway (at least for a while), unless you want to get into WINE business.
We all love games. Games are the thing that make us child again and everyone must agree that they always play games whenever they get a chance to play. That is why today we are going to recommend you best 5 games for this month, that you must play at least once if you are on Linux.
Yes, ~13 years after release I have finally finished it. Although, let’s be fair, it’s only been ~3 years since it released on Linux and I have had a lot of other games to keep up with. Still, I wanted to see what all the fuss is about and why people want Half-Life 3 so badly, so I powered through the entirety of Half-Life 2 during a few livestreams.
Today, we are happy to announce the release of KDevelop 5.0.4, the fourth bug fix and stabilization release for KDevelop 5.0. An upgrade to 5.0.4 is strongly recommended to all users of 5.0.3 and below.
And here we are again, with the usual showcase of the most outstanding contributions to Qt 5.8 developed by KDAB engineers.
I'm very excited to announce the release of KStars 2.7.5 for MacOS and Windows!
This is the first official KStars release for MacOS 10.11+, and while we made sure to test it thoroughly, please treat it as a beta release and report any bugs to the KDE bug tracking website.
I flow between the frugal pal who can still find a creative way of making art even when the limitations get worse; And the bon vivant of me and my father at art supplies stores like they were literally our home sweet home. My current notebook is a shabby 32GB onboard flash-disk that barely allows me to draw in a screen sized canvas with Krita Gemini. Yes, I’m using a touch screen pen because my notebook ignores and treats my Intuos 2 as a mouse. So I’m having a much better experience with my tiny android phone with its drawing apps. One of those apps, Autodesk Sketchbook, under my circumstances now, is my only choice for 2D Digital Painting. Good stuff, bought it and am making comics with it!!! Hahahaha.
It offers a convenient, KF5 and Qt5-based GUI coupled with a QML image view to browse, view, and download images hosted in two of the most famous Danbooru boards (konachan.com and yande.re).
We’re happy to release Qt Installer Framework 2.0.5.
2.0.5 is a bug fix release, the full list of bug fixes can be found from Changelog.
A small new feature that was added to Qt 5.8 is the ability for moc (Qt’s meta-object compiler) to extract meta-object information at the namespace level. This means, for instance, that you can have introspection support for enumerations defined in a namespace (not just in QObject subclasses, or classes tagged with Q_GADGET), and use such enumerations in QtScript, QtDBus and QML.
I’m pleased to announce the release of KIMAP2 0.1.0.
KIMAP2 is a KJob based IMAP protocol implementation.
I’m pleased to announce KAsync 0.1.0.
KAsync is a library to write composable asynchronous code using lambda-based continuations.
I’ve seen as well an awesome tutorial being published on Planet KDE, with a very wrong address.
GNOME 3.24 will shortly be upon us, bringing with the first stable release of the (rather spiffy) Games app.
Games, if you’re not familiar with it, and as it’s not available in the Ubuntu archives you might not be, is sort of like a music player but for your video games library.
You can use the app to browse, search, filter, find and quickly play your existing games and ROMs.
Neil McGovern was recently elected as the Executive Director of the Gnome Foundation, a position that was previously held by Karen Sandler.
Prior to joining the Gnome Foundation, McGovern was working with Collabora Productivity, a UK-based company that offers enterprise solutions based on the fully open source LibreOffice project. He spent five years at Collabora before taking over the full-time role at the Gnome Foundation.
As you may already know, Gnome is one of the major open source projects. It’s a desktop environment for Linux and BSD systems. The Gnome Foundation oversees the development of the project.
If you're a SysAdmin, or work anywhere on the Ops side of DevOps, a rescue disc should be an essential part of your arsenal. With a bootable rescue system, either on a CD or on a thumb drive, you can recover a password, detect and remove a rootkit or other malware, repair a Master Boot Record, retrieve data from a damaged drive and more.
You can build your own, of course. All of the necessary tools are freely available under open source licenses and are included in the repositories of most Linux distributions. But the easier route is to use one of the Linux distributions designed specifically as a rescue disc, and which comes with all of the tools you might need already installed. There are many, but we'll look at three of the most popular. Each includes tools to fix problems on machines running either Linux or Windows.
The second quarter of 2017 promises to be very interesting.
Several distributions schedule their release between April and June 2017.
Apart from two usual competitors that issue their new releases every 6 months, Ubuntu and Fedora, we will see Tails 3.0 and Linux Lite 3.4.
LXQt feels like an experiment in thinking, tinkering and development, and there does not seem to be an ultimate goal with a clearly defined end state. The prolific and colorful origins, the co-existence of its root projects, and the multitude of technologies involved present an additional layer of complexity. Then, in between versions 0.10 and 0.11, there has been only a relatively small delta in terms of quality, functionality and user-friendliness.
Comparing the two, unfortunately, most of the visual bugs remain. Options are present in multiple locations, sometimes in more than one place. There isn’t a uniform method to control the system and its behavior, and some of the settings seem hard-coded in applications while others are ignored when you alter the defaults. Functionality, LXQt does not cooperate – or is not aware – well with non-LXQt software, if such a stack may or should be defined. The workflow is not very intuitive. There has been some progress, but not enough.
Like the old song goes, we got a long way to go and a short time to get there. At this point, I am not certain LXQt has enough oomph to weather the infancy problems and rise above the early development stage woes. This is a non-trivial effort, and mostly, it demands sharp focus and strict definitions on usability. Then again, I am not aware of any golden formulas or paradigms when it comes to UI design or user experience in Linux. Some practices are followed, but they are not enforced, definitely not across different desktop environments and applications, and some of the choices are purely development-driven. Which should not be.
It is worthy of an experiment and some rigorous testing, just to get the feel of what it does and how it works. However, LXQt is still not production ready, and it remains a niche offering for hardcore users and enthusiasts, who are interested in Qt first and foremost, rather than any wider populace of users, who just seek to fire and forget and enjoy their machines.
Well, I shall keep an eye and follow this project. I hope you enjoyed this long and possibly exhausting review. The quest for the Linux desktop perfection continues. See you.
The status of the 4MLinux 21.0 series has been changed to STABLE. Create your documents with LibreOffice 5.3.0.3 and GIMP 2.8.20, share them using DropBox 19.4.13, surf the Internet with Firefox 51.0.1 and Chromium 56.0.2924.76, stay in touch with your friends via Skype 4.3.0.37 and Thunderbird 45.7.1, enjoy your music collection with Audacious 3.8.2 and aTunes 3.1.2, watch your favorite videos with MPlayer SVN-r37889 and VLC 2.2.4, play games with Mesa 13.0.4/Wine 2.2 support enabled. You can also setup the 4MLinux LAMP Server (Linux 4.4.44, Apache 2.4.25, MariaDB 10.1.21, PHP 5.6.30 and PHP 7.0.15). Perl 5.24.0 and Python 2.7.12 are also available.
The Maui Team is happy to announce the release of Maui 17.03 – Cuba Libre.
This release comes with plenty new package updates and KDE Plasma 5.9.3. It also ships Frameworks 5.31, Qt 5.7.1 and LTS Linux Kernel 4.4.0~65. Firefox was updated to version 51 and Thunderbird to version 45.
The PCLinuxOS Magazine staff is pleased to announce the release of the March 2017 issue. With the exception of a brief period in 2009, The PCLinuxOS Magazine has been published on a monthly basis since September, 2006. The PCLinuxOS Magazine is a product of the PCLinuxOS community, published by volunteers from the community. The magazine is lead by Paul Arnote, Chief Editor, and Assistant Editor Meemaw. The PCLinuxOS Magazine is released under the Creative Commons Attribution- NonCommercial-Share-Alike 3.0 Unported license, and some rights are reserved. All articles may be freely reproduced via any and all means following first publication by The PCLinuxOS Magazine, provided that attribution to both The PCLinuxOS Magazine and the original author are maintained, and a link is provided to the originally published article.
A while ago, Chromium 56 ‘stable’ was released. It took a while for me to release Slackware 14.1 packages because of a crash bug in XFCE (and probably other non-KDE desktops too). I have been trying to find ways around the crash and been looking for patches, but there does not seem to be a solution for Slackware 14.1 other than working around it and losing some functionality.
Red Hat’s chief executive officer sold more than $400,000 in the company’s shares, according to a filing with the Securities and Exchange Commission.
President and CEO Jim Whitehurst sold 5,099 shares at $83.69, or $426,735 in shares. That represented roughly 1.17 percent of Whitehurst’s shares at the time.
If you’re a Fedora 25 user, please help us test the fix! There is a pending update for krb5 on Bodhi.
Fedorahosted closed down at the end of last month. Unfortunately, Free Media has quite a few components and we haven't been able to migrate the pipeline to Pagure completely yet. In fact, we've temporarily closed Free Media down for the moment - the form says so too. Since we're re-doing the complete process and the infrastructure, we also decided to refresh the membership list.
Well, branching of Fedora 26 off rawhide has come and gone, and it was a bit of a rocky ride this time sadly.
The branched composes were failing at first, then working, but not actually syncing to the master mirrors in order for mirrormanager to notice it and people to you know, actually use it.
For almost a year now, we have been working on making a Norwegian BokmÃÂ¥l edition of The Debian Administrator's Handbook. Now, thanks to the tireless effort of Ole-Erik, Ingrid and Andreas, the initial translation is complete, and we are working on the proof reading to ensure consistent language and use of correct computer science terms. The plan is to make the book available on paper, as well as in electronic form. For that to happen, the proof reading must be completed and all the figures need to be translated. If you want to help out, get in touch.
We have reached the end of Stretch’s development cycle, a phase called full freeze. That means packages may only migrate to Testing aka Stretch after approval by the release team. Changes must be minimal and only address important or release critical bugs. This is usually the time when I stop uploading new upstream releases to unstable to avoid any disruptions. Of course there are exceptions but if you are unsure best practice is to use experimental instead. A lot of RC bugs are still open and affect the next release. In February I could close five one and triage two more.
Debian organizes everything, so it is not a surprise that much of working with post-install Debian involves enabling the right repositories and selecting packages from them.
This approach means that, although configuring Debian naturally overlaps with the configuration of most Linux distributions, it has a perspective that takes awhile to fully grasp and appreciate.
The easiest time to configure Debian, of course, is during installation, and Debian's detailed installer makes it trivial to setup even many advanced features before your first login. However, needs and preferences differ and develop, and after you enter your password for the first time, Debian has all the tools you need to configure everything you need. The only catch is that finding what you need can sometimes take a while.
Debian is a free operating system for your computer. An operating system is the set of basic programs and utilities that make your computer run. Debian comes with dozens of thousands of packages, precompiled software bundled up for easy installation on your machine. A number of other operating systems, such as Ubuntu and Tails, are based on Debian.
German YouTuber Alex has published a new (german) video on his “Warum Linux Besser Ist” (“Why Linux is better”) channel detailing how to install Ubuntu Personal 16.04 on the bq Aquaris M10 FHD tablet.
For the installation process he uses the magic-device-tool created by fellow Ubuntu member Marius Quabeck. Among its many supported device and operating system combinations, the magic-device-tool also offers an option for installing the latest (“staging”) image on the bq Aquaris M10 FHD tablet (both the official Ubuntu version and the Android version). This image identifies itself as “Ubuntu 16.04 (r157)” and was released on March 3, 2017.
Mir is a set of libraries for implementing a display server for Linux, developed by Canonical since 2012 and aimed at replacing the X Window System. It stands in competition with Wayland. Both are designed to be faster, more secure (X11 lets any application snoop on any other application and grab the whole screen), and generally better than the aging X Window System (which was mainly developed for remote connections to mainframes).
There’s a new MirAL release (1.3.0) available in ‘Zesty Zapus’ (Ubuntu 17.04) and the so-called “stable phone overlay” ppa for ‘Xenial Xerus’ (Ubuntu 16.04LTS). MirAL is a project aimed at simplifying the development of Mir servers and particularly providing a stable ABI and sensible default behaviors.
Alan Griffiths of Canonical has announced the release of MirAL 1.3, Mir's abstraction layer to ease bringing up new environments under Mir while providing a stable ABI.
Stanislav Hoferek, the developer of the Lubuntu-based Greenie Linux distribution designed to run on older PCs from ten years ago, was proud to announce the release of Greenie 16.04, which ships in two editions: Desktop and Lite.
And many pack in more powerful specs than the humble fruit-based offering that’s most popular. We’ve seen the Orange Pi PC 2, the Pine A64, the ODROID, and many more.
Joining the fray is the $30 NanoPi M1 Plus from FriendlyElec. The board is two-thirds the size of a Raspberry Pi, and already has Ubuntu Core and Ubuntu MATE images ready for it.
An interesting trend in the industry are SOM (System on Module): a high performance processor typically running Linux, Windows or Android with all the memory and necessary power logic gets put on a small module. The key benefit is that I don’t need to worry about the complex ball grid routing and the DDR memory connections/lines: all these problems are solved on a small module which then I can use in my design. It seems that NXP i.MX application processors are getting popular in this domain, and after looking at the Toradex Colibri modules, I have an i.MX6 module on my desk from e-con Systems:
Nokia's handset return story via HMD is a marketing challenge. How HMD is handling it, tells us they know their marketing and are executing a strategy that should please all marketing professors. HMD understand about a segmented offering, about regional differentiation, about positioning against competition, about brand strengths and weaknesses, about market opportunities ('low hanging fruit') and most of all in handsets of course they know about retail distribution. This is the 'sensible' analysis of the Nokia 6, the Nokia 5 and Nokia 3.
I use Replicant on my main Samsung S3 mobile phone. Replicant is a fully free Android distribution. One consequence of the “fully free” means that some functionality is not working properly, because the hardware requires non-free software. I am in the process of upgrading my main phone to the latest beta builds of Replicant 6. Getting GPS to work on Replicant/S3 is not that difficult. I have made the decision that I am willing to compromise on freedom a bit for my Geocaching hobby. I have written before how to get GPS to work on Replicant 4.0 and GPS on Replicant 4.2. When I upgraded to Wolfgang’s Replicant 6 build back in September 2016, it took some time to figure out how to get GPS to work. I prepared notes on non-free firmware on Replicant 6 which included a section on getting GPS to work. Unfortunately, that method requires that you build your own image and has access to the build tree. Which is not for everyone. This writeup explains how to get GPS to work on a Replicant 6 without building your own image. Wolfgang already explained how to add all other non-free firmware to Replicant 6 but it did not cover GPS. The reason is that GPS requires non-free software to run on your main CPU. You should understand the consequences of this before proceeding!
Another open-source contender making a big play in solving network woes is The Fast Data Project, also known as FD.io (pronounced “fido”). Cooney revealed that this Linux Foundation project will be making a big announcement this week.
Makers, hobbyists and developers that are looking to create projects or control projects using voice recognition, may be interested in a new open source voice recognition platform called, Matrix Voice which has been designed by a small development team based in Miami Florida.
The voice recognition platform consists of a small development board which measures 3.4 inches in diameter and is equipped with a radial array of 7 MEMS microphones connected to a Xilinx Spartan6 FPGA & 64 Mbit SDRAM with 18 RGBW LED’s & 64 GPIO pins.
Not only do open source technologies offer greater flexibility and lower cost, they make user organisations more attractive to the best IT talent on the market, according to the three finalists in the Utilities/Media category of this year's iTnews Benchmark Awards.
Lengthy and expensive lock-in contracts are no longer the way many businesses - like News Corp and Energy Australia, alongside fellow finalist Tabcorp - want to operate.
The Country representative for Daydah Concepts, Mr. Adebayo Adeniyi, has advocated the the adoption of open source solutions for Small and Medium Entrepreneurs (SMEs) in the face of increasing cost of software in Africa’s emerging economy According to Adeniyi, who is a known software developer, arrangement has been concluded with Google, Mozila, Joomila, WordPress, Typo3, Magen,and Grav to brainstorm on content management system.
He said the high cost of software purchase remains a problem for many small and medium scale companies in Africa’s emerging economy and inexpensive as open source solution holds the key to more meaningful and far-reaching adoption of technology for them.
It makes sense for large technology companies like Google and Microsoft to open source AI and machine learning solutions because they have overlapping vertical interests in providing vast cloud services. These come into play when a certain machine learning library becomes popular and users deploy it on the cloud and so forth. It is less clear why financial services companies, which play a much more directly correlated zero sum game, would open up code that they paid the engineering team to create.
If you’re a Python coder who wants to work for a hedge fund and you don’t know Wes McKinney, you might want to familiarize yourself with the name. McKinney started working for Two Sigma, the huge quant hedge fund with around $40bn under management, in August 2016. He’s best known, however, in the world of open source programming.
When it comes to the Open Source opportunity within the potential of Internet of Things Mark Marlier, the director of ISV programs and partners for Red Hat suggests “follow the data.”
How does Open Source fit into the close to $20 trillion IoT business opportunity today? During Marlier’s keynote presentation to the board of director of the Canadian Channel Chiefs Council, he said there are literally millions upon millions of open source projects in the world and all of those need to run on a server somewhere or in the cloud. “We are not out there alone,” Marlier added.
But the problem is this: you've added an extra "brand" to your project. When new users find your project, they are confused. Is it Wibbler, or is it ChartZen? How does ChartZen connect to Wibbler? Do I need to get Wibbler if I just want to use ChartZen? Do I need to run two different servers, one to run Wibbler and another for ChartZen?
By adding the second name, you've confused the original project.
Google last week released its E2EMail encryption code to open source as a way of pushing development of the technology.
"Google has been criticized over the amount of time and seeming lack of progress it has made in E2EMail encryption, so open sourcing the code could help the project proceed more quickly," said Charles King, principal analyst at Pund-IT.
That will not stop critics, as reactions to the decision have shown, he told LinuxInsider.
I was initially afraid that a talk about conflict management would be touchy-feely to the point of uselessness, but found that every time Deb Nicholson described a scenario, I could remember a project that I'd been involved in where just such a problem had arisen. In the end, her "Handle conflict like a boss" presentation may turn out to have been one of the more rewarding talks I heard at FOSDEM 2017.
Nicholson's first contention was that conflict happens because some people are missing some information. She related a story about a shared apartment where the resident who was responsible for dividing up the electricity bill was getting quite annoyed at the resident who had got behind on his share, until Nicholson pointed out that the latter resident was away at his grandmother's funeral. Instantly, the person who'd been angry was calm and concerned, through no change other than coming into possession of all the facts. Conflict is natural, said Nicholson, but it doesn't have to be the end of the world.
The Containers feature in Firefox Nightly gives users the ability to place barriers on the flow of data across sites by isolating cookies, indexedDB, localStorage, and caches within discrete browsing contexts. If you’re interested in the history and technology behind Containers, please read this blog post outlining the rationale for the Nightly implementation.
While the feature has garnered positive notice among our Nightly audience, there remain outstanding questions about the user experience that suggest the need for further exploration.
I worked on Firefox OS for several years as well (I arrived on the project some time after Ben did) until mostly its end. I noticed there was a lot of misunderstanding in what the goal was, and a lot of questions. To me it was a great effort that tried to disrupt the market by opening the silos of mobile applications, using the web, trying to become the third mobile OS. A project a lot of people didn't think fit in Mozilla's mission. Its conclusion was much personal sadness.
Francis notes that it’s unlikely Mozilla will revive the project anytime soon, but he thinks cancelling Firefox OS was a mistake and that if he were starting from scratch he’d focus first on a mid-range tablet rather than entry-level smartphones, focus on a browser-based user interface and try to cede less control over the direction of the project to hardware and network partners.
In order to drive more social media traffic to your WordPress blog, you will love these WordPress social media plugins. These plugins will let you add a beautiful set of social share buttons on your posts which will encourage your visitors to share your content on their social networks. This will help your website get better exposure and it will increase the user engagement.
In the days leading up to the vote, the city received a record-breaking number of comments, one city councillor noted. A handful of activists attended the city hall meeting, and an alliance of German and international free and open source organisations questioned the city's plans in an open letter.
In a statement, the Free Software Foundation Europe (FSFE) says that the door is still open, “although the mandate is highly suggestive, in that it suggests that the existing vendor-neutral approach is to be replaced with a proprietary solution.” The advocacy group says it will continue to campaign: “The vendor-neutral strategy must prevail.”
Interesting little tidbit for the weekend: we now know what operating system the Nintendo Switch is running. Since it's basically an NVIDIA Shield, I kind of expected it to be running Android - heavily modded, of course - but it turns out it's running something else entirely: it's running FreeBSD.
Some days of the week, I work on Free Software projects that aren’t ready to see the light yet; they live in my own git repo’s, or wherever. While I have the intention of publishing eventually, I usually want to get things somewhat working before throwing code out there.
Part of checking if things work is packaging, and installing the stuff on more than one system. Sure, I can build everywhere, or copy around executables, but it struck me that it’d be cool to have packages — you know, installable with the system package manager — for the stuff I make. O yeah, I know flatpak is the new orange, but I’m not that hip. I’ll stick with Debian and FreeBSD packages, thanks.
GIMP is Free Software, but even before this, it is people: the ones who create it, the ones who create with it… We don’t have accurate statistics and we take pride on not gathering your data. Yet we know (through other websites that have logged partial statistics over the years) that this is a widely used piece of software, by millions of people around the world. So wouldn’t it be neat to meet some of the individuals who make this project come alive?
Some people think there’s a huge company behind GIMP. This is not the case. GIMP has always been developed by a handful of random people scattered around the world. Most of them are volunteers and none of them work on it full-time. As an insider myself, I’ve wanted to launch a series of interviews with the many awesome people I’ve met since I started contributing. So who better to start with than our own benevolent dictator, GIMP maintainer, and the biggest code contributor: Michael Natterer, aka “mitch”.
This interview was held on Friday, February 3, 2017 at around 3AM in front of a fireplace and after a day of hacking at Wilber Week. With us were several team members, including Michael Schumacher (schumaml (S)) and ÃËyvind KolÃÂ¥s (pippin (P)), who also asked questions.
For those looking for some interesting weekend reading, the Free Software Foundation Europe (FSFE) has provided a lengthy write-up about what happened in Munich with regards to LiMux and the possibility of abandoning their Linux/open-source efforts in favor of going back to Microsoft Windows.
The Munich city council and mayor haven't totally reverted their mind yet, but they have postponed the final decision. FSFE says their new mandate buys them additional time to work to convince them to stay with Linux and free software.
Issues of when and how to enforce free-software licenses, and who should do it, have been on some people's minds recently, and Richard Fontana from Red Hat decided to continue the discussion at FOSDEM. This was a fairly lawyerly talk; phrases like "alleged violation" and "I think that..." were scattered throughout it to a degree not normally found in talks by developers. This is because Fontana is a lawyer at Red Hat, and he was talking about ideas which, while they are not official Red Hat positions, were developed following discussions between him and other members of the legal team at Red Hat.
To his mind, GPL enforcement has always been an important element of free-software law; not that we should all be doing it, all the time, but like it or not, litigation is part of a legal system. Awareness of its possibility, however, was making some Red Hat customers and partners worried about the prospect. There has not, in fact, been much actual litigation around free-software licenses — certainly not compared to the amount of litigation software companies are capable of generating in the normal course of business — thus Fontana felt their fears were unreasonable.
At the recent Data & Technology in Clinical Trials conference, I had the pleasure of listening to Aneesh Chopra speak. Chopra is the president of NavHealth and formerly served as assistant to President Barack Obama and Chief Technology Officer of the United States. His speech was electrifying, dynamic, and set the room abuzz.
“Pope Francis has urged us to have fewer children to make the world more sustainable,” a panelist at a Vatican-run workshop on “how to save the natural world” claimed on Thursday.
This solution to securing the world’s sustainability was presented by botanist and environmentalist Peter Raven during a press conference that concluded the “Biological Extinction” workshop that took place at the Vatican earlier this week.
Greg Burke, director of the Holy See Press Office, moderated a panel, which included Raven, President of the Pontifical Academy of Sciences (PAS), Werner Arber, University of Cambridge Professor Emeritus of Economics Partha Dasgupta, and PAS chancellor Bishop Marcelo Sanchez Sorondo.
Wouldn't it be nice to take an entire season off work? Perhaps, but don't expect farmers to be the ones to tell you what that's like. Whether or not their crops are in peak season, farmers work tirelessly throughout the year to ensure you're getting the highest quality food possible.
Earlier in her career she worked for Médecins Sans Frontières in Uganda, worked as a doctor in Sudan, and for the Pan-American Health Organization/World Health Organization in El Salvador.
The United Nations Human Rights Council in Geneva this week will host a panel discussion among a notable range of experts on access to medicines and the controversial UN Secretary-General’s High-Level Panel report issued last September. The panel is expected to lead to a report sent on to the Human Rights Council for possible action next autumn.
Michigan environmentalists are continuing to criticize a bottled water company’s plan to increase the amount of water it withdraws from an Osceola County aquifer.
An environmental group called Clean Water Action delivered more than 5,000 letters to the Michigan Department of Environmental Quality Friday showing opposition to Nestle Waters North America’s request to increase the amount of water it takes from the current 250 gallons per minute to 400 gallons. The underground reservoir has been used for the company’s Ice Mountain bottled water brand.
The DEQ requires $5,000 for a permit application related to the withdrawal, which would total about 210 million gallons a year.
HackerOne has already made an impact by making bug bounty programs easier to launch and maintain, but the company wants to go further by offering paid services for free to the open-source community.
HackerOne announced on Thursday the availability of a free version of its bug bounty platform called HackerOne Community Edition that will give open source projects tools for managing vulnerability submissions and creating bounty programs to improve software security.
A 50-member team of Google engineers voluntarily worked to patch 2,600 open-source projects against a Java deserialization bug in 2016. A Google security researcher this week offered the first details on an effort by a 50-member volunteer team at the company last year to help patch more than 2,600 open-source projects against a critical vulnerability in a widely used Java process.
A consultant at FoxGlove Security first drew attention to the so-called Java deserialization issue in November 2015 when he demonstrated attacks exploiting the vulnerability in WebLogic, Websphere, JBoss and other middleware products.
Geoff Huston is the chief scientist at the Asia-Pacific Network Information Centre (APNIC). He's got a message for organisations that haven't secured their domains with DNSSEC, the cryptographically secured version of the domain name system (DNS) protocol.
Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns. Consequently, various recent research efforts are actively seeking countermeasures to SGX side-channel attacks. It is widely assumed that SGX may be vulnerable to other side channels, such as cache access pattern monitoring, as well. However, prior to our work, the practicality and the extent of such information leakage was not studied.
The vulnerability here is that the full URL with all parameters (including usernames, passwords etc.) was passed to the FindProxyForURL function. A malicius attacker could manipulate the local network and distribute a PAC file which then leaks the full URL (e.g. over the network), even though HTTPS is supposed to protect the URL. The issue has been fixed for HTTPS in two commits (here and here). There is no fix for HTTP as it is unencrypted and the proxy can always see the full URL anyways.
I am now at 03:44 minutes into this epic instruction video and I notice that the instructor seems to be running Windows via an administrator account...
This is my talk at the RSA Conference last month. It's on regulation and the Internet of Things, along the lines of this essay.
I have no memory of the attack, but the pictures of my husband’s bloody, motionless body on the street, me next to him pleading for help, the four large stab wounds on my head and a sliced-off thumb, will remind me forever of the hatred and intolerance that changed my life.
Our assailants, armed with machetes, were Islamists who on 26 February 2015, ambushed us while we were visiting our homeland, Bangladesh, for a book-signing trip. They hacked my husband, Avijit Roy, to death and left me gravely injured.
Why did we deserve such violence? Because fundamentalists were threatened by our writings – on science, philosophy and criticism of religious dogma – and they identified us as enemies of Islam. This week, I attended another book fair in The Hague, organised by the Hague Peace Project and Muktomona (our blog which was created by Avijit as a freethinking platform) to commemorate the second anniversary of Avijit’s death – at a time when our world seems more polarised than ever.
Pakistani police say unidentified gunmen have killed a prominent attorney in an apparent targeted shooting in a northwestern town near a tribal region bordering Afghanistan.
Khalid Khan, a police officer in Shabqadar, says two gunmen on a motorcycle opened fired on Mohammed Jan Gigyani when he was driving his car Saturday. Khan said Gigyani was critically wounded and died en route to a hospital.
Khan says Gigyani was a prominent lawyer affiliated with the secular Qaumi Watan political party.
For almost two years, the United States has backed—with weapons, logistics and political support—a Saudi-led war in Yemen that has left over 10,000 dead, 40,000 wounded, 2.5 million internally displaced, 2.2 million children suffering from malnutrition and over 90 percent of civilians in need of humanitarian aid.
A recent UN report on the humanitarian crisis and near-famine conditions in Yemen (that encompassed South Sudan, Nigeria and Somalia as well) has led to a rare instance of Western media taking notice of the war and its catastrophic effect. But missing from most of these reports is the role of the United States and its ally Saudi Arabia—whose two-year-long siege and bombing have left the country in ruins.
A Daily News editorial (“USA for Africa (and Yemen),” 2/27/17) called on readers to give to aid organizations helping to alleviate the crisis, but neglected to mention the US/Saudi role in the humanitarian disaster the Daily News itself insisted was “caused by acts of man rather than God.” Which men were those? The Daily News doesn’t say.
The massacre of the Unión Patriótica party is another such emblematic moment – a previous attempt on the part of the FARC to demobilise and enter a peace process, on this occasion 5,000 people were murdered, as some organisations in Colombia have documented. This is only one moment out of so many in our history which remain unaccounted for.
As FAIR has noted before (4/1/15, 3/8/16), how a story is framed is as important—if not more so—than the content of an article. Sixty percent of Americans don’t read past the headline and 60 percent of Americans share articles on social media without reading them. How a story is teed up to the reader is an essential element in how our media shape our understanding of the news.
Unfortunately, using personal accounts/devices is still widespread at all levels of government. This means there's no quick fix. It will take a steady stream of court rulings to make this official everywhere. And that makes it the public's problem, as it takes constituents with the will and the funding to spend years in court forcing government agencies to do what they always should have been doing.
Our case study is the announcement this week of an anti-piracy agreement between search engines and creative industries, that was brokered by the UK Intellectual Property Office. This self-styled "Voluntary Code of Practice" requires search engines Bing and Google to take additional steps to remove links to alleged copyright-infringing content from the first page of search results that they return in response to user queries that would otherwise include such links, and from auto-complete suggestions.
Late yesterday evening, news broke that TransCanada, the company behind the formerly rejected Keystone XL pipeline, will not be required to use U.S. steel to construct the dirty tar sands pipeline from Alberta, Canada through the U.S. to refineries in the Houston area. This is in spite of the repeated pledges by Donald Trump -- including at Tuesday’s speech before a joint session of Congress -- that it will be built with “American steel.”
Earlier this week, TransCanada delayed its $15 billion Investor State Dispute Settlement (ISDS) suit under NAFTA over President Barack Obama’s rejection of the pipeline until March 27, the same day that the final permitting decision for Keystone XL is due. It has been speculated that the lawsuit was suspended rather that dropped to ensure that TransCanada was not required to use U.S. steel despite Trump’s public statements that it would be.
With reports swirling that President Donald Trump intends sharp cutbacks at the Environmental Protection Agency, the Free Press has learned that a drastic reduction may be under consideration for Great Lakes restoration efforts, which in the past have received bipartisan support.
The National Association of Clean Air Agencies confirmed for the Free Press late Thursday that an initial proposal from the White House Office of Management and Budget calls for the Great Lakes Restoration Initiative to be cut from $300 million a year to about $10 million.
An Oklahoma-based Native American tribe filed a lawsuit in its own tribal court system Friday accusing several oil companies of triggering the state's largest earthquake that caused extensive damage to some near-century-old tribal buildings.
The Pawnee Nation alleges in the suit that wastewater injected into wells operated by the defendants caused the 5.8-magnitude quake in September and is seeking physical damages to real and personal property, market value losses, as well as punitive damages.
Britons are dying because of the Volkswagen emission scandal with dozens killed from fumes travelling across the North Sea from Germany and 'many times' more killed by pollution from cars on UK roads, a study suggests.
Between 2008 and 2015 Volkswagen rigged diesel cars so they could pass stringent environmental tests while emitting dangerous levels of pollution.
More than one million VW cars in Britain were fitted with ‘defeat devices’ which pumped deadly nitrogen dioxide into the atmosphere at banned quantities.
Despite advancements in fuel-saving technologies over the last 25 years, on-road fuel economy for all vehicles is up only one mile per gallon during that time.
In an update to research conducted two years ago, Michael Sivak and Brandon Schoettle of the University of Michigan Transportation Research Institute say that actual, on-road fuel economy for the entire fleet of vehicles (including cars, trucks, buses and motorcycles) has improved from 16.9 mpg in 1991 to 17.9 mpg in 2015.
The rising and falling of the sea is a phenomenon upon which we can always depend. Tides are the regular rise and fall of the sea surface caused by the gravitational pull of the moon and sun and their position relative to the earth.There are some factors that cause the tides to be higher than what is "normally" seen from day to day. This bulletin tells you when you may experience higher than normal high tides for the period of time between March and May 2017.
On December 4, the Army Corps of Engineers did the right thing by refusing to give Energy Transfer Partners permission to build a portion of the nearly 1,200-mile-long Dakota Access Pipeline under Lake Oahe in North Dakota. The corps’ decision to perform an environmental impact assessment and explore alternative routes for the pipeline fulfilled the U.S.'s treaty obligations with the Standing Rock Sioux Tribe, which vigorously protested the pipeline out of a credible fear that it could rupture and destroy its water supply, as well as acted in accordance with this nation's environmental protection laws. It was a big win for the tribe and its supporters.
Animals exported live from EU countries are routinely being subjected to abuse, illegal transportation conditions and inhumane slaughter, an investigation has found.
Dozens of undercover videos and photographs obtained by the Guardian show live cattle and sheep from EU countries being beaten, shocked with electric prods, held for days in overcrowded pens and covered head to toe in faeces as they are transported from Europe to their final destinations in Turkey and the Middle East in conditions that breach European law.
Despite a decline in users, no revenue to speak of, no headquarters, new competition entering the market and an extremely young CEO, Snapchat doesn’t seem to be going anywhere. Many social media experts report that the app may soon gain the popularity of Facebook, with younger generations preferring it over the curated feel of other apps.
There are very few things that $5bn can’t buy, but one of them is manners. This week video emerged of Travis Kalanick, the CEO and founder of ride-share app Uber, patronising and swearing at one of his own drivers, who complained that harsh company policies had forced him into bankruptcy. “Some people don’t like to take responsibility for their own shit,” sneered Kalanick. Truer words were never spoken by a tycoon: for Uber, along with many other aggressive corporations, not taking responsibility for your own shit isn’t just a philosophy, it’s a business model.
Uber has barely been out of the news this year, with a succession of scandals cementing the company’s reputation as a byword for cod-libertarian douchebaggery. Accusations of strike-breaking during protests against Donald Trump’s “Muslim ban” sparked a viral campaign to get customers to delete the app. A week later, a former employee went public with accusations of sexual harassment and institutional misogyny. Kalanick, who was pressured to withdraw from a position as a business adviser to Trump, is now facing legal suits across the world from drivers who insist that they would be better able to “take responsibility” for their lives if they could earn a living wage.
You think you had a bad week? Welcome to Uber's terrible, horrible, no good, very bad week.
First, a little context. Last week was already one of the worst in the ride-hailing company's history. It started on a Sunday when a former engineer, Susan Fowler, published an explosive blog post alleging sexual harassment and discrimination. Then Uber got blasted by its own investors for fostering a "toxic" culture. To make matters worse, it also got sued by Google-parent Alphabet's Waymo for allegedly stealing some driverless car technology. Uber, of course, denies doing that.
Uber has been using a secret tool in countries across the world in order to avoid law enforcement authorities, it has been revealed.
Greyball, a tool which uses geolocation data, credit card information and social media account data, has been used by the company for years in order to identify and avoid officers aiming to catch drivers out in cities where the discount cab firm is not permitted.
Rides hailed from a location near a city enforcement agent suspected of launching a sting to specifically trap Uber drivers could be ignored or cancelled using the app, The New York Times reported.
It has surprised the naïve that in the last two weeks Tory ministers have been lining up to assure employers that there will be no reduction in the flow of immigrant workers into the UK after Brexit.
There are two things that infuriate me about the “left wing” argument that EU immigration lowers wages in the UK through importing labour. Firstly it is not left wing at all, it is narrowly nationalist and founded on the protectionist premise that the condition of the worker in say Poland – who would benefit both from opportunities in the UK and from international labour competition elevating wages there – does not matter. The “left wing” proponents of the protected national labour market are actually just ill-disguised racists.
Consider this major disconnect. On one hand, President Trump presents a proposed budget that calls for a major increase in spending on the military, even while drastically slashing funding for huge parts of much else that the federal government does. On the other hand, his first address to Congress says almost nothing about foreign policy and provides almost no explanation of what supposedly requires that expansion in the military and how it is to be used.
May seems to be suffering an extraordinary degree of hubris; she sees the Tories having achieved very slightly over half of the SNP vote at the Holyrood elections as a sign of mass popularity. She is laying down that Unionism means Unionism just as purely as Brexit means Brexit. Devolution is only represented in her speech as an evil that must be guarded against.
Most of us recognize Donald Trump and Paul Ryan as politicians, who hold their jobs as a result of being able to gain the support of important interest groups. It really doesn’t make much difference what their political philosophy is. Contrary to what the New York Times might lead us to believe, this is not a battle of political philosophy, it is a battle over money.
[...]
The claim that Paul Ryan is concerned that these programs would “swallow the bulk of government spending” directly contradicts everything Paul Ryan has been explicitly advocating for years. Ryan has repeatedly put forward budgets that would reduce the size of the federal government to zero outside of the military, Social Security, Medicare and Medicaid. (See Table 2 in the Congressional Budget Office’s analysis.) It is difficult to understand how a major newspaper can so completely misrepresent a strongly and repeatedly stated view of one of the country’s most important political figures.
What came to be known as the “expectations game” during the George W. Bush years was wielded with notorious cynicism. The assumption behind this game in those days was that Bush was a bumbling doofus who could hardly string together a coherent sentence, so if he got to the level of a high school debate, media chalked it up as a “win.”
The game, successfully rebooted by Donald Trump over the past 18 months, was in full play during Trump’s speech to Congress last night: So long as Trump wasn’t his petulant, incoherent, race-baiting self, it would be considered a victory for the 45th president.
As most of the world knows by now, Attorney General Jeff Sessions did not tell the truth when he was asked during his confirmation hearings about contacts with Russian officials.
But Sessions isn’t the only one. At least four other cabinet members made statements during their nomination hearings that are contradicted by actual facts: EPA Chief Scott Pruitt, Education Secretary Betsy DeVos, Treasury Secretary Steve Mnuchin, and Health and Human Services Secretary Tom Price.
The statements were all made under oath, except those of DeVos. It is a crime to “knowingly” lie in testimony to Congress, but it’s rarely prosecuted.
But the problem is not that Sessions “did not disclose” his meetings with Russian Ambassador Sergey Kislyak; it’s that he lied about them under oath.
As the Post‘s story notes in its sixth paragraph, when asked during his confirmation hearings about contacts between the Trump campaign and the Russian government, he replied, “I have been called a surrogate at a time or two in that campaign and I did not have communications with the Russians.”
“I did not have communications with the Russians”—an unqualified denial of the kind of meetings he now acknowledges that he had.
Now that Attorney General Jeff Sessions has recused himself from any involvement in investigations by the Justice Department involving potential Russian interference in the 2016 presidential election, the authority to make decisions on the issue — including whether the appointment of a special prosecutor is necessary — falls to the deputy attorney general.
This turn of events gives the members of the Senate Judiciary Committee the power to demand a special prosecutor, if they choose to wield it.
There is currently no permanent deputy attorney general, just Acting Attorney General Dana Boente, a former U.S. Attorney who stepped in after Sally Yates, an Obama appointee, was fired. However, Donald Trump’s nominee, U.S. Attorney for Maryland Rod Rosenstein, will undergo confirmation hearings with the Senate Judiciary Committee this month.
I am still more sorry because Kaufman became a victim of the current ludicrous, but media-supported, campaign to whip up accusations of anti-Semitism against any critic of Israel. In one extraordinarily horrible manifestation of this, Tal Ofer, Labour Progress member and a member of the board of Deputies, sought to have Gerald Kaufman, a Jewish MP, excluded from the parliamentary Channukah celebrations. That seems to me extraordinarily graceless and unpleasant and the polar opposite of Kaufman’s own kindliness.
Last night, President Donald Trump delivered the first address to Congress of his short but disastrous presidency. For more than an hour, the president engaged in the empty rhetoric of unity and concern for all Americans in a speech completely divorced from the reality of harm he has already inflicted on America’s most vulnerable communities. In just five short weeks, the Trump administration has rolled out policy after policy that tramples on core American ideals.
Before answering questions from the Senate Judiciary Committee on 10 January, then-Sen. Jeff Sessions raised his hand and pledged an oath to tell “the truth, the whole truth, and nothing but the truth”.
Today it appears Sessions violated that oath before the committee, and the Senate Judiciary Committee must open a full investigation into whether the attorney general perjured himself when he said he had no contact with Russian officials during the election.
Imagine if someone, after reading something you wrote online that they didn’t agree with, decided to forge racist and anti-Semitic emails under your name. This appears to be what happened to J. Alex Halderman, a computer security researcher and professor of computer science at the University of Michigan. Halderman is one of many election security experts—along with EFF, of course—who has advocated for auditing the results of the 2016 presidential election. The recent attempts to smear his name in retaliation for standing up for election integrity are a threat to online free speech.
Halderman, who is a frequent collaborator and sometimes client of EFF, published a piece on Medium in November 2016 arguing that we should perform recounts in three states—Wisconsin, Michigan, and Pennsylvania—to ensure that the election had not been “hacked.” To be clear, despite a report in New York Magazine, Halderman never stated that there was hard evidence that the election results had in fact been electronically manipulated.
This story offers no end of rolling punchlines, the kicker being the vitriol the vice president showed during the campaign toward Hillary Clinton’s use of a private email server. More importantly, as the Indianapolis Star first reported, it represents a troubling security lapse by a high-ranking public official. The batch of emails released by the state of Indiana reveals that Pence’s AOL inbox hosted plenty of sensitive material, up to and including the arrests of terror suspects.
You can pull any number of threads here, split all kinds of hairs about the relative vulnerabilities of private servers and personal accounts, and crack endless “you’ve got mail” jokes. But the biggest thing to remember has little to do with Pence: From a security standpoint, email is fundamentally broken. Until that changes, expect email hacks and scandals aplenty.
Vice President Mike Pence defended his use of a personal email account to conduct state business while he was Indiana's governor, saying "there's no comparison" between his situation and the controversy surrounding Hillary Clinton's use of a private email server that rocked the 2016 presidential campaign.
"There's no comparison whatsoever," Pence said following an event he did with House Speaker Paul Ryan in Janesville, Wisconsin, when asked about whether his situation gave him any sympathy for the Democratic presidential nominee.
I can only assume Mike Pence is so self-absorbed he's literally incapable of recognizing his own hypocrisy. Either that or he's completely shameless.
After engaging in a presidential campaign where much was made of Hillary Clinton's private email address/server, Pence went to court to prevent his AOL emails from being released to public records requesters.
I can only assume Pence is now welcoming an FBI investigation into his use of an AOL account.
A fake news report claiming that President Donald Trump’s unsecured Android cell phone is probably the source of several news leaks from the White House is actually the fabrication of a well-known source of contrived stories.
A Feb. 26, 2017, article on TheSeattleTribune.com says in a headline, "Trump’s Android device believed to be source of recent White House leaks." The post was flagged by Facebook users as being potentially false, as part of Facebook’s efforts to combat fake news.
Attorney General Jeff Sessions is rightfully in hot water for lying to Congress about his contacts with Russian officials during the presidential campaign. This underscores the need for a special prosecutor to independently investigate alleged Russian interference in the 2016 elections as well as possible ties between the Trump campaign and the Kremlin.
But the problem with Sessions goes well beyond Russia. He’s put the Trump administration on the wrong side of every major issue when it comes to civil rights, the Constitution, and the rule of law.
The kids aren’t alt-right. Right?
A few weeks ago a neighbor posted to Facebook about some skinheads at our local middle school. The post went something like this:
“Some punks at school draw swastikas and shows them to [my son]. He thinks he’s a Jew and that this will freak him out. Skinheads. Can’t even get it right.”
Kind of flip. Don’t get me wrong, she wasn’t trying to minimize. She was disgusted. But after reading the back and forth in the comments and chatting with her myself, it was clear that she wouldn’t be reporting this incident to the school. She was confident that they wouldn’t do anything. When it came down to it, this incident didn’t set off the same alarms for her as it did for me. Her son isn’t Jewish. My daughters are. And not only is my daughter who attends this same middle school a Jew, she is vocal and proud of who she is. Up until these past few weeks, I didn’t think that was a danger.
The David Horowitz Freedom Center, a controversial California-based nonprofit that sponsors virulently anti-Muslim and anti-immigrant campaigns in the U.S., has quietly played a prominent role in financing Dutch far-right nationalist Geert Wilders’s People’s Party for Freedom (PVV). The PVV’s platform calls for an end to Muslim immigration and the closing down of mosques and Islamic schools in the Netherlands — and polls suggest it may win the largest number of seats in the Netherland’s parliamentary elections this month.
And Trump himself has garnered many comparisons to Nixon for the president's failure to divest from his businesses, his administration's attempts to use government agencies to protect its own interests, and his right-wing campaign rhetoric.
A former policy adviser to President Obama is firing back at President Trump's claim that Obama wiretapped Trump Tower, saying it didn't happen — at least not under Obama's orders.
"No President can order a wiretap. Those restrictions were put in place to protect citizens from people like you," Ben Rhodes tweeted Saturday morning.
He also said "only a liar" could make the case, as Trump suggested, that Obama wire tapped Trump Tower ahead of the election.
Former president Barack Obama responded to President Donald Trump's accusation that Obama ordered the wiretapping of Trump Tower phones while still in office.
"A cardinal rule of the Obama Administration was that no White House official ever interfered with any independent investigation led by the Department of Justice," Obama spokesperson Kevin Lewis said in a statement on Saturday. "As part of that practice, neither President Obama nor any White House official ever ordered surveillance on any U.S. citizen. Any suggestion otherwise is simply false."
No one should lie under oath, but doing so ought to disqualify an attorney-general nominee from the job. However, that’s essentially what Attorney General Jeff Sessions admitted doing Thursday afternoon in a bizarre press conference where he announced he will recuse himself from Justice Department investigations into Donald Trump’s presidential campaign. Sessions’s explanation for failing to tell the Senate Judiciary Committee about his meetings with Russian Ambassador Sergey Kislyak raised more questions than it answered. His demeanor was at times oddly flippant and unprofessional—as when he said it was possible he discussed the Trump campaign with Kislyak, because “most of these ambassadors are pretty gossipy.”
Sessions seemed to be trying to head off perjury charges when he told reporters “my reply to the question…was honest and correct as I understood it at the time,” referring to Senator Al Franken’s inquiring about possible ties between the Trump campaign and Russian officials. “I was taken aback…by this brand new information…that a surrogate—and I had been called a surrogate for Donald Trump—had been meeting continuously with Russian officials.… in retrospect, I should’ve slowed down and said, ‘But I did meet one Russian official a couple of times, and that would be the ambassador.’”
In fact, Sessions wasn’t being asked about his own meetings with Russian officials. In the confirmation hearing, Franken summarized a news story that reported on a “continuing exchange of information” between Russian officials and Trump advisers, and then asked Sessions what he would do “if there is any evidence that anyone affiliated with the Trump campaign communicated with the Russian government in the course of this campaign.” In retrospect, Sessions’s dishonest answer is even stranger. “I’m not aware of any of those activities,” Sessions told Franken, adding, “I have been called a surrogate at a time or two in that campaign, and I did not have communications with the Russians.” Why Sessions chose to give an answer about his own contact with the Russians—when Franken hadn’t asked about that—is a mystery that we can only hope ongoing investigations will explain.
Sessions went on to describe one of his meetings with Kislyak, a scheduled sit-down in his Senate office with two senior aides there as well. He flashed back and forth between saying he couldn’t “recall” much of the meeting, and going into detail about their discussions of Ukraine. “To listen to him…Russia had done nothing that was wrong in any area, and everybody else was wrong with regard to the Ukraine,” Sessions recalled. “It got to be a little bit of a testy conversation at that point.” That’s a lot of information for a meeting Sessions seemed not to recall.
Moreover, the revelation that the Kislyak meeting was on his calendar, and that senior staffers attended with him, makes it even more remarkable that Sessions didn’t disclose it to the Senate Judiciary Committee—or go back and correct the record after he was “taken aback” by “brand new information” (which wasn’t at all new) about connections between Trump campaign officials and Russian leaders.
I am giving a talk entitled “Palestine/Israel: A Unitary Secular State or a Bantustan Solution” in Leeds University tomorrow. I have just been told by Leeds University Union I will not be allowed to speak unless I submit what I am going to say for pre-vetting.
I am truly appalled that such a gross restriction on freedom of speech should be imposed anywhere, let alone in a university where intellectual debate is meant to be an essential part of the learning experience. I really do not recognise today’s United Kingdom as the same society I grew up in. The common understanding that the values of a liberal democracy are the foundation of society appears to have evaporated.
I was mildly shocked last week to learn that Mishi Choudary had to train people in the U.S. to differentiate between Afghan turban styles of wearing and the Punjabi style of wearing the turban. A simple search on ‘Afghani turban’ and ‘Punjabi turban’ reveals that there are a lot of differences between the two cultures. In fact, the way they talk, the way they walk, there are lots that differentiate the two cultures.
Back in early January, during the confirmation hearings for now-embattled Attorney General Jeff Sessions, Senator Orrin Hatch posed a question about obscenity, an issue that has always obsessed him. If appointed, would Sessions consider bringing back obscenity prosecutions and cracking down on the porn industry? "Would you consider reestablishing a specific unit dedicated to prosecuting this category of crime?" asked Hatch.
The Turnbull government has shown that it will stop at nothing to prevent criticism of its functioning, with the office of one of its ministers, Alan Tudge, leaking information against a woman who wrote about the Centrelink debt notice stuff-up in a newspaper.
Welfare recipient Andi Fox had her personal information released after she penned an op-ed for Fairfax Media about the problems she had faced following receipt of one of the many automated debt notices sent out by Centrelink in December. Fox is claimed to have got some details wrong.
In a surprise move, Switzerland has a bill passing through parliament that would introduce net censorship to protect domestic gambling against foreign competition. This is as dangerous as it is misguided and utterly ineffective, and it is alarming to see that even a strong democracy like Switzerland not seeing censorship for what it is, especially when it’s being used for protectionist means.
The official Sina Weibo account of prominent Chinese feminist group Feminist Voice (女æÂÆä¹â¹Ã¥Â£Â°) has been temporarily banned for 30 days after the group posted a Guardian article on a women’s strike planned in the U.S. on March 8, which allegedly “violated the state’s laws and regulations.” Netizens’ response to the ban has been mixed, with some criticizing the group and others expressing support. At The Diplomat, Lotus Ruan looks at why everyone should support the group, arguing that the it is ultimately about standing up to China’s arbitrary system of censorship and information control.
Most creative people can deal with criticism; it goes with the territory, as they say.
I have very often been asked (mostly by men) how I like being called a feminist. And my reply is, “well, compared to the other names I’ve been called, I like it very much”. These are people who have never understood the definition of the word “feminist”, which is just the radical notion that women are human. Feminism believes that women are treated differently and unequally, simply because they are women and for no other reason and that, society needs to remedy this inequality.
Fiction is a space where you know the content emerges from the imagination of the filmmaker, inspired by real life events.
The independent book store in Norwich that was branded “anti-Trump” and accused of censorship by author Susan Hill has experienced an outpouring of support from the local community and around the world.
Censorship, whether at a broader or more personal scale, ultimately leaves society with more harm done than good.
A bipartisan Congressional committee’s recent report showcases troubling details about police abuse of cell-site simulators, and calls on Congress to pass laws ensuring that this powerful technology is only deployed with a court-issued probable cause warrant.
Cell-site simulators, often called IMSI catchers or Stingrays, masquerade as cell phone towers and trick our phones into connecting to them so police can track down suspect targets, but their use also collects the data and location of innocent bystanders and extracts unnecessary sensitive data in the process.
EFF urged the Supreme Court of Virginia today to protect the state's residents from a police surveillance database created with automated license plate readers (ALPRs).
We've been following law enforcement use of ALPR technology a long time, because the information that these readers collect can reveal sensitive details about our lives. Police departments that use ALPRs mount them on patrol cars or on stationary objects and leave them on all the time, meaning that the police can learn where we are and when, whether it’s at our house of worship, our doctor’s office, or a political meeting, and the police can track this data over time.
There’s a little-known federal agency whose job is to ensure U.S. spy agencies protect privacy and other civil liberties even as they work to defeat terrorists and criminals, and to blow the whistle when that doesn’t happen. But the agency, known as the Privacy and Civil Liberties Oversight Board, is down to just a single voting member — which means it has been stripped of nearly all its powers, according to emails obtained by The Intercept.
This week Sen. Wyden (D-OR) sent a letter to Department of Homeland Security (DHS) Secretary John Kelly stating that he will soon introduce legislation that would require law enforcement agencies to obtain a warrant before searching the data on digital devices at the border. We applaud Sen. Wyden for taking a stand on this important privacy issue.
Sen. Wyden said that he wants to “guarantee that the Fourth Amendment is respected at the border.”
We have been arguing for a while that the Fourth Amendment requires a warrant based on probable cause for border searches of cell phones, laptops and other mobile devices that contain gigabytes of highly personal information.
The movement to encrypt the web has reached a milestone. As of earlier this month, approximately half of Internet traffic is now protected by HTTPS. In other words, we are halfway to a web safer from the eavesdropping, content hijacking, cookie stealing, and censorship that HTTPS can protect against.
Over the last month, the Trump administration has waged a war on the rights of immigrants and foreigners — including by issuing a policy that strips away basic privacy protections that have been provided by Democratic and Republican presidents for decades.
When you go online you reveal a tremendous amount of private information about yourself. What you browse, what you purchase, who you communicate with—all reveal something personal about you. Long ago, Congress made privacy a legal right, so that your telephone company was prohibited from using its position as your communications provider to exploit your personal information. The Federal Communications Commission (FCC) recently updated the protections to apply when you use your broadband provider. Now in the near future, Comcast, Verizon, AT&T, and other major cable and telephone companies must get your permission before they can use sensitive information you reveal through your online activity.
A group of Mexican nutrition policy makers and public health workers have been the latest targets of government malware attacks. According to the New York Times, several public health advocates were targeted by spyware developed by NSO Group, a surveillance software company that sells its products exclusively to governments. The targets were all vocal proponents of Mexico’s 2014 soda tax—a regulation that the soda industry saw as a threat to its commercial interests in Mexico.
Specifically targeting black children for unlawful DNA collection is a gross abuse of technology by law enforcement. But it’s exactly what the San Diego Police Department is doing, according to a lawsuit just filed by the ACLU Foundation of San Diego & Imperial Counties on behalf of one of the families affected. SDPD’s actions, as alleged in the complaint, illustrate the severe and very real threats to privacy, civil liberties, and civil rights presented by granting law enforcement access to our DNA. SDPD must stop its discriminatory abuse of DNA collection technology.
VPN services have become an important tool to counter the growing threat of Internet surveillance. Encrypting one's traffic through a VPN connection helps to keep online communications private, but is your VPN truly anonymous? We take a look at the logging policies of dozens of top VPN providers.
A Former British spy who campaigned over the murder of WPC Yvonne Fletcher has been charged with harassing a Midland cop.
Michael Arnold, 59, was a technology officer at the GCHQ intelligence centre when the tragic 25-year-old was shot and killed outside the Libyan Embassy in 1984.
In 2014 he went public to allege an order to “cover the streets of London with blood” by Libyan dictator Colonel Gaddafi was intercepted, decoded and translated by GCHQ staff - but not acted upon.
There is a war waging today, and shots are being fired through the wire. You make your move. They make theirs. Who’s winning? The ones trying harder of course. In this game of oversized entities vs. techies, we are significantly out-powered.
Information. That’s all anyone ever wanted. For a government, it is its lifeblood. In the past, information was relatively easy to control and stiffen. Today, information is out of control.
Information travels at the speed of light, the fastest possible speed of anything in the universe. How do you possibly stop something like that? You can’t. Our troubles begin when an over-eager entity thinks it can.
The latest arena for deployment of cell tower spoofers is prisons. Along with the diminished rights and lowered expectation of privacy afforded to prisoners, those incarcerated can now expect their cell phone calls to be blocked or intercepted.
The Register reports a new bill being introduced in the UK would give prisons legal authority to install IMSI catchers to monitor prisoners' communications and track/locate contraband devices. The use of Stingray devices in prisons isn't exactly new, although it hasn't really received much attention. Last year, Motherboard reported the Scottish prison system had been deploying cell tower spoofers for one specific reasons: to make prisoners' cell phone communications impossible. The devices blocked 2G and 3G signals, according to FOI'ed documents. (The documents also noted prisoners had already defeated the repurposed cell tower spoofers, so whatever was included in those documents is already outdated.)
The White House wants Congress to reauthorize two of the NSA’s largest surveillance programs before they expire at the end of the year.
One of them scans the traffic that passes through the massive internet cables going in and out of the U.S. and ends up catching a vast number of American communications in its dragnet.
A new bill intended to update the Computer Fraud and Abuse Act would allow victims of computer attacks to engage in active defense measures to identify the attacker and disrupt the attack.
Proposed by Rep. Tom Graves (R-Ga.), the bill would grant victims of computer intrusions unprecedented rights. Known as the Active Cyber Defense Certainty Act, the legislation seeks to amend the CFAA, the much-maligned 1986 law that is used in most computer crime prosecutions.
La Quadrature du Net joins a coalition of European and global civil society organisations and signs a letter asking to suspend the Privacy Shield, the arrangement enabling the transfer of personal data between the US and the EU. These organisations consider that the US do not currently give sufficient safeguards for ensuring the data protection of Europeans. This arrangement is also currently challenged before the European Court of Justice by Digital Rights Ireland and by the Exégètes Amateur 1.
Under a new proposal from the UK Law Commission, journalists who handle or report on leaked documents demonstrating corruption or government malfeasance would face prison sentences.
The recommendation applies to any documents that relate to the "economic wellbeing of the country" and other "national secrets" -- including documents that relate to the ongoign Brexit negotiations.
A man has been told he will be deported from the UK weeks after he saved two children from a house fire in Manchester. Robert Chilowa, who was commended by police for the rescue, said the order felt like a “slap in the face”.
The Zimbabwean national was hospitalised for smoke inhalation after the fire at his neighbour’s house and says officials have now also told him he cannot use the NHS.
“I did a great job but now what they are saying is, ‘Get lost’,” he said on Friday. “Friends said, ‘When are you going to see the Queen? When are you going to be knighted?”
Chilowa ran out of his house barefoot when he heard screams in the early hours of 10 February. A girl who had jumped from the building told him her siblings were still inside. Fighting the heat and smoke, he called up and told the two youngsters to jump and he would catch them.
In response, Uber has claimed that the program was designed to greylist "terms of service violators", but if that's the case it can just kick them off the service and tell them they violated the ToS. From the report, it seems clear that even if the program was used for ToS violators, it was also used against regulators.
I've certainly been vocal about the fact that I think city and state regulations limiting Uber/Lyft and the like are generally bad ideas. What may have started out as a good idea to prevent cabbies taking advantage of riders has turned into quite a corrupt system used to limit competition and artificially inflate prices. I think that the idea behind Uber and Lyft and similar services is super powerful. But, that doesn't mean the company should get a pass for this kind of stuff.
Directly building an app to avoid regulators just looks really, really shady, and it's going to come back to haunt you (just ask Zenefits or Volkswagen). And while the article claims that the tool might be a CFAA violation, I don't see how that's possible, unless it involved even more nefarious activities under the hood (none of what's revealed in the article would seem to qualify as a CFAA violation, even under the really stretched interpretations of the CFAA that we've seen).
Uber has been using a tool called “Greyball” to identify authorities in markets where the ride-hailing service is curtailed or outright banned by regional rules. If the authorities try to hail a ride through Uber’s app, the company will show ghost cars, which aren’t really in the area, or show no cars in the area at all.
Uber’s annus horribilis continued apace Friday, as it was hit with revelations of a secret program to evade law enforcement, the resignation of another top executive and more allegations of workplace discrimination.
The New York Times reported that for years Uber used a tool called Greyball to systematically deceive law enforcement officials in cities where its service violated regulations. Officials attempting to hail an Uber during a sting operation were “greyballed” – they might see icons of cars within the app navigating nearby, but no one would come pick them up. The program helped Uber drivers avoid being ticketed.
Uber has for years engaged in a worldwide program to deceive the authorities in markets where its low-cost ride-hailing service was resisted by law enforcement or, in some instances, had been banned.
The program, involving a tool called Greyball, uses data collected from the Uber app and other techniques to identify and circumvent officials who were trying to clamp down on the ride-hailing service. Uber used these methods to evade the authorities in cities like Boston, Paris and Las Vegas, and in countries like Australia, China and South Korea.
Greyball was part of a program called VTOS, short for “violation of terms of service,” which Uber created to root out people it thought were using or targeting its service improperly. The program, including Greyball, began as early as 2014 and remains in use, predominantly outside the United States. Greyball was approved by Uber’s legal team.
Uber has lost its attempt to prevent its drivers being forced to take English language tests.
The ride-hailing app went to court after Transport for London (TfL) said that drivers should have to prove their ability to communicate in English.
Uber argued that the standard of reading and writing required by the test was too high.
The US firm said the test was "unfair and disproportionate" and it would appeal against the court's decision.
The European Parliament has voted to end visa-free travel for Americans within the EU.
It comes after the US failed to agree visa-free travel for citizens of five EU countries – Bulgaria, Croatia, Cyprus, Poland and Romania – as part of a reciprocity agreement. US citizens can normally travel to all countries in the bloc without a visa.
The vote urges the revocation of the scheme within two months, meaning Americans will have to apply for extra documents for 12 months after the European Commission implements a “delegated act” to bring the change into effect.
The Commission discovered three years ago that the US was not meeting its obligations under the reciprocity agreement but has not yet taken any legal action. The latest vote, prepared by the civil liberties committee and approved by a plenary session of parliament, gives the Commission two months to act before MEPs can consider action in the European Court of Justice.
Australia, Brunei, Japan and Canada were also failing in their obligations, but all four have lifted, or are soon to lift, any visa restrictions on travel for EU citizens.
Hundreds of students at Middlebury College in Vermont shouted down a controversial speaker on Thursday night, disrupting a program and confronting the speaker in an encounter that turned violent and left a faculty member injured.
Laurie L. Patton, the president of the college, issued an apology on Friday to all who attended the event and to the speaker, Charles Murray, 74, whose book “The Bell Curve,” published in 1994, was an explosive treatise arguing that blacks were intellectually inferior to whites because of their genetic makeup.
This week, the government announced plans to target “sexting and cyberbullying” as part of an initiative to make the internet safer for young people. It is to meet with technology companies, charities, academies and mental health professionals to develop a strategy. All this sounds wonderful, but the speed of reaction to what has been a very real situation for years has been painfully slow.
My previous efforts in trying to make a difference on this issue have not resulted in any meaningful government response, and I fear that more discussion will lead to a slow solution, or one with no impact. I also notice that a key stakeholder has been missed from the government’s list – the social media giants themselves.
Since 1980, Saudi Arabia has devoted millions of dollars to exporting its strict brand of Islam, Salafism, to historically tolerant and diverse Indonesia. It has built more than 150 mosques (albeit in a country that has about 800,000), a huge free university in Jakarta, and several Arabic language institutes; supplied more than 100 boarding schools with books and teachers (albeit in a country estimated to have between 13,000 and 30,000 boarding schools); brought in preachers and teachers; and disbursed thousands of scholarships for graduate study in Saudi Arabia. All this adds up to a deep network of Saudi influence.
“The advent of Salafism in Indonesia is part of Saudi Arabia’s global project to spread its brand of Islam throughout the Muslim world,” said Din Wahid, an expert on Indonesian Salafism at Syarif Hidayatullah State Islamic University (UIN) in Jakarta.
She and her husband were hoaxed by an agent in Mumbai, who promised to provide a job for them in Riyadh, but offered a different one in the Saudi city of Dammam. She was separated from her husband right after landing in Saudi Arabia, and held captive, tortured, and harassed on a daily basis. She was also forced to work for a “home service,” which is a byword for the flesh trade in Saudi Arabia, she says. Her struggle to gain back her freedom lasted several years.
The words on the screen, in small type, were as innocent and familiar as a house key. “By clicking Join,” they read, “you agree to abide by our terms of service.” Hundreds of college students tapped the big green “Join” button to become members of NameDrop, a new social network. But according to paragraph 2.3.1 of the terms of service, they’d agreed to give NameDrop their future first-born children.
Only a quarter of the 543 students even bothered to look at the fine print. But “look” is not “read”: on average, these more careful joiners spent around a minute with the thousands of words that make up NameDrop’s privacy and service agreements. And then they all agreed to them.
Ten years ago, Willacy County officials made a catastrophic mistake. And they’re about to make it again.
In 2006, “Tent City” opened in Willacy County as a detention facility for civil immigration detainees held by Immigration and Customs Enforcement. Also known as “Ritmo” — the “Gitmo” of Raymondville, the city where it was located — it soon became infamous as one of the most inhumane facilities in the country.
Some 1000 employees at the Department of State are said to have signed a formal memo sent through the “Dissent Channel” in late January, opposing President Donald Trump’s Executive Order initially blocking all Syrian refugee admissions indefinitely, delaying other refugees 120 days, prohibiting for 90 days all other travelers (diplomats excluded) from seven Muslim-majority nations, and other immigration-related issues.
Nearly four decades later, state and local social workers and judges in Rapid City, South Dakota, are violating the rules in open defiance of ICWA, the Constitution, and now a federal judge. The reason for their noncompliance is unclear but the consequences are striking. Since 2010, more than 1,000 Native-American children in Pennington County, home to Rapid City, have been removed from their families by state welfare workers and placed in foster care, disproportionately in non-Indian homes.
If you go to CNN.com today, the front page of their website will take up just shy of 100 MB of RAM while it is loaded. By comparison, the same page from the year 2000 takes literally 1/10th that (thanks Archive.org).
CPU usage is even worse. The idle CNN.com from the year 2000 just sits there. Happily eating just about 0% of even the slowest CPUs. Today’s version gobbles up a good 10% of the i7 sitting in front of me—while sitting idle. For a single page. Displaying a few news headlines.
Results may vary from day to day and browser to browser, but all of you have experienced frustration at the resources used by websites and modern browsers.
This is, to say the least, absolutely ridiculous.
When wireless networking based around the 802.11b standard first hit consumer markets in the late nineties, it looked pretty good on paper. Promising "11 Mbps" compared to original wired Ethernet's 10 Mbps, a reasonable person might have thought 802.11b was actually faster than 10Mbps wired Ethernet connections. It was a while before I was exposed to wireless networking—smartphones weren't a thing yet, and laptops were still hideously expensive, underpowered, and overweight. I was already rocking Fast Ethernet (100 Mbps) wired networks in all my clients' offices and my own house, so the idea of cutting my speed by 90 percent really didn't appeal.
When I was growing up in Brooklyn, my father owned a small pest-control business. If his competitor down the street had received preferred electricity service, he would have been rightly outraged—and the law would have protected him from that unfair treatment. We don’t reserve certain highways for a single trucking company, and we don’t limit phone service to hand-picked stores.
In today’s economy, it is equally important that access to the backbone of twenty-first century infrastructure, the Internet, be similarly unfettered. That is why it is critical that we maintain the net neutrality protections and clear oversight authority that the Federal Communications Commission put in place in 2015 through the Open Internet Order.
Tim Berners-Lee, inventor of the World Wide Web, star of the 2012 Olympics opening ceremony, and one of the best-known tech celebrities outside of Silicon Valley, believes he is powerless.
Well, at least when it comes to keeping Web users free and safe.
On Monday, he published a blog post defending his recent decision to override objections to streaming and browser companies' plan to enshrine insecure, freedom-defying DRM (Digital Restrictions Management) in the technical standards that underly the Web. The plan, known as EME (Encrypted Media Extensions), would grant perceived legitimacy to these digital handcuffs and energize the long-standing campaign to incorporate them ever deeper into the digital world.
[...]
Portraying DRM as a necessary evil, Berners-Lee goes on to argue that it must be welcomed into the Web through enshrinement in official standards. If it is not, he fears that Hollywood will take its movies to other platforms—such as proprietary applications and set-top boxes—which will spy on users more than the DRM that mediates Web-based streaming. But it is dubious how much better Web-based DRM really is for users, considering that the W3C can only suggest that companies implement it in a way that spies on users less, and there is little incentive for companies to heed that suggestion, regardless of the streaming medium.
There seems to be something in the air at the World Intellectual Property Organization committee working to find solutions to protect indigenous traditional cultural expressions (folklore) from misappropriation. After 16 years of snail’s pace and mostly unfruitful efforts, the landscape appears to be moving, as developing countries seek a common proactive position, with new treaty language, while the European Union and the United States seem to be increasingly lonely, according to sources.
Major entertainment companies are once again trying to expand copyright law to gain leverage over a wide variety of user-generated content sites. If they succeed, they would have a veto over Internet users’ access to the tools that allow us to remix, mashup, and participate in popular culture. EFF, along with the Center for Democracy and Technology, and Public Knowledge, filed an amicus brief in the case of BWP Media v. Polyvore, urging the United States Court of Appeals for the Second Circuit to defend copyright law’s important protections for user-generated content platforms.
An essential principle of copyright law is under threat: the principle that a copyright cannot grant a monopoly over the idea of adding up numbers, drawing a design specified by the user, or moving a robot arm using the designer's movement commands. We are all free to write our own code to achieve the same functional results; copyright only monopolizes the creative expression – if any – in the written code that implements that idea.
SAS Institute would like to change that, harming all of us who rely upon competition in the tech sector and enjoy the benefits that come with it. EFF filed an amicus brief today in the United States Court of Appeals for the Fourth Circuit, urging the judges to protect interoperability, reverse engineering, and innovation by upholding traditional limits on the scope of copyright power.
The “notice-and-takedown” process for addressing online copyright infringement isn’t perfect: it’s often abused to remove lawful speech from the Internet. But it many cases this process, described in Section 512 of the Digital Millennium Copyright Act (DMCA), works pretty well—particularly because of the safe harbors that protect Internet services that comply with the law. That’s why it’s so frustrating that major media and entertainment companies are still pushing the Copyright Office to recommend throwing away the safe harbors and instead order Internet platforms to filter users’ communications.
Public submissions on the Australian Productivity Commission's proposal to introduce a fair use right into Australian copyright law have just closed, and Australian rightsholders are frothing at the mouth in their attempts to block this long-overdue reform.
A joint letter that rightsholder groups issued last week repeats the already-debunked claim that the adoption of fair use would "smash GDP to the tune over 1 billion dollars" [sic], and a separate letter from Screen Producers Australia [PDF] predicts that with the adoption of fair use, "the Australian film and television sector would go from an internationally renowned industry … to a cottage industry overnight."
On behalf of three national library associations, EFF today urged a federal appeals court for the second time to protect librarians’ and students’ rights to make fair use of excerpts from academic books and research.
Nearly a decade ago, three of the largest academic publishers in the world— backed by the Association of American Publishers (AAP) trade group— sued Georgia State University (GSU) for copyright infringement, insisting that GSU owed licensing fees for the use of excerpts of academic works in its electronic reserve system. Such systems are commonly used to help students save money; rather than forcing students to buy a whole book when they only need a short excerpt from it, professors will place the excerpts “on reserve” for students to access. GSU argued that posting excerpts in the e-reserve systems was a “fair use” of the material, thus not subject to licensing fees. GSU also changed its e-reserve policy to ensure its practices were consistent with a set of fair use best practices that were developed pursuant to a broad consensus among libraries and other stakeholders. The practices are widely used, and were even praised by the AAP itself.
A German court has ruled that a father is liable for an audiobook his 11-year old son downloaded. The man told the kid to only use the computer for school purposes and not to simply download things. However, the court ruled that this was not a proper anti-piracy instruction.
City of London Police’s Intellectual Property Crime Unit is claiming success in denying potential revenue to more than 200 'pirate' sites. As a result of Operation Creative, the division says that in the past twelve months there has been a 64% decrease in advertising placed by the UK’s top ad spending companies.
Because Killer Mike and El-P connect with their fans on so many levels -- they treat their fans well, don't take themselves too seriously, and have built up a following that enjoys their work. For example, the whole Meow the Jewels effort from a couple years ago fits right in with our increasingly long list of examples artists connecting with fans and giving them a reason to buy. It started with (of course), offering the music for free, combined with a variety of premium packages -- including the "I'm on the List, Asshole" package, in which you get backstage passes to a bunch of shows, and a promise that El-P and Killer Mike will pretend to be friends with you. But El-P also joked about remixing the album with just cat sounds, called "Meow the Jewels." And their fans took them seriously and put together a Kickstarter campaign. The guys originally felt uncomfortable about this, but eventually embraced it with a plan to donate all the music to charity. And, of course, they did, in fact, make the remix, and it's... actually pretty cool.