Last week we happily announced that we awarded Respects Your Freedom (RYF) certification to fifteen new devices from Technoethical (formerly Tehnoetic): the TET-N150HGA, the TET-N300, the TET-N300HGA, the TET-N300DB, the TET-N450DB, the TET-BT4, the TET-X200, the TET-X200T, the TET-X200S, the TET-T400, the TET-400S, the TET-T500, the TET-X200DOCK, the TET-T400DOCK, and the TET-D16. While Technoethical is based in Romania, they are able to ship to many countries around the world. The RYF certification mark means that the products meet the FSF's standards in regard to users' freedom, control over the product, and privacy.
This is a vast expansion of the currently available RYF products, more than doubling the present count. Users now have more options than ever when it comes to devices they can trust. We hope to repeat the feat accomplished this week with even more big launches in the future. Technoethical should be very proud of what they've accomplished here, and we look forward to seeing even more new hardware from them.
The Free Software Foundation has endorsed fifteen "new" devices under their Respects Your Freedom (RYF) certification.
Shadow icon theme is a new comer for Linux desktop, it looks beautiful with all kind of themes. It is meant to be modern clean and customizable, the primary color of this set most likely bluish and many apps icons are in round shape. So basically this theme is mixture of round and normal (square) shape icons, lets see where this theme will head in the future, it should choose shape what users asks. As creator mentioned this icon theme is his first so please bare any bugs or missing icons. You can report bugs or suggest new icons to include in this set via this link. You can use Unity Tweak Tool, Gnome-tweak-tool to change themes/icons.
Obsidian icons are based on Faenza icon theme which is around from some years but the development of Faenza is almost stopped, hope creator again give some time to his popular icons. Obisidian-1 icon theme offers icons for panels, toolbars and buttons and colourful squared icons for devices, applications, folder, files and menu items, there are two version included to fit with light or dark themes. It is in active development which means if you find any missing icon or problem with this icon set then you can report it via linked page and hopefully it will be fixed in the next update. Arc theme suite used in the following screenshots and you can use Unity Tweak Tool, Gnome-tweak-tool to change themes/icons.
I'm thirty seven years old, which is like ninety nine in programmer years. I'm old enough to remember the earliest days of the public Internet and the first boutique Internet service providers. My first online account was via one called Internet Access Cincinnati (IAC). It provided dialup modem access to a Sun SparcStation 10 where users could run such venerable old terminal applications as elm (a mail client), emacs, lynx (text-mode web browser), and of course IRC.
Later they added the ability to dial into a CSLIP (predecessor to PPP) terminal server and connect your own Linux or Trumpet WinSock equipped Windows system directly to the Internet with a real bona-fide IP address.
[...]
This is all probably water under the bridge. Chances are the path forward will be to develop true secure container multi-tenancy and to achieve with containers what should have been achieved by extending the Unix permission model to networking in user space.
The purpose of this post is to show how small decisions that nobody really thinks about can have dramatic effects on the future evolution of technology (and society). The 1970s decision to use port numbers as an in-band signaling mechanism to implement cross-system security validation might have been, in retrospect, a trillion dollar mistake that pushed the evolution of the Unix platform down a path of significantly greater complexity, resource use, and cost.
But hey, maybe it's not a done deal yet. There's over a dozen Linux distributions and most of them are doing more or less the same things with a slightly different spin. Implementing something like this would be an interesting way for one of them to differentiate. The first step would be to implement networking permissions something like what was discussed above and to propose it as a kernel patch. For backward compatibility you could make it something enabled via a sysctl setting, or maybe a module (if modules can make changes that deep).
The driver landed in kernel 4.10. Note that it only supports the PlayStation 3 version of the tablet, as the Wii and XBox 360 versions require receivers that aren't part of the package. Here, a USB dongle should be provided.
The days when the Linux Foundation was only focused on Linux as an operating system are now long in the past. In recent years, the Linux Foundation has expanded its Collaborative Projects effort to include a growing list of open-source networking efforts, the most recent one being the Open Security Controller Project.
The Linux Foundation already is the home to several Software Defined Networking (SDN) efforts including OpenDaylight which developer an open-source controller platform.
In May 2016, Deloitte’s first blockchain lab was created in Dublin followed by a second hub in New York in January this year and more such announcements are expected. Deloitte joined the Ethereum Enterprise Alliance (EEA) and the Hyperledger Project by the Linux Foundation in May 2017.
I previously reported on Btrfs RAID 5/6 fixes for Linux 4.12 to work on fixing some potentially bad Btrfs RAID 5/6 problems. These changes for Linux 4.12 were enough to elevate the rating of this functionality.
A variety of POWER architecture updates have been submitted for the Linux 4.13 kernel merge window.
Dmitry Torokhov submitted the input subsystem updates today for the Linux 4.13 kernel merge window.
When comparing differences between the RADV Vulkan driver and the AMDGPU-PRO still-proprietary Vulkan driver, David Airlie has uncovered a new area to explore for potentially getting closer performance out of the open-source driver.
Airlie has been exploring the performance of MRT, or Multiple Render Targets. MRT is rendering images to multiple render target textures at once and can be used commonly for deferred shading/rendering. Airlie noted some "magic" happening within the AMDGPU-PRO driver and realized it could be a area of performance improvement for not only RADV but also RadeonSI. He explains the technical bits in this mailing list post and these IRC logs.
Emil Velikov of Collabora has reiterated his release plans for Mesa 17.2 in making it the latest quarterly release to this growing 3D graphics stack.
After the two-part series on the fundamentals of Xwayland, I want to briefly introduce the basic idea for my Google Summer of Code (GSoC) project for X.Org. This means I’ll talk about how Xwayland currently handles the graphic buffers of its applications, why this leads to tearing and how we plan to change that.
The project has its origin in my work on KWin. In fact there is some connection to my unsuccessful GSoC application from last year on atomic mode setting and layered compositing in KWin. You can read up on these notions and the previous application in some of my older posts, but the relevant part of it to this year’s project is in short the transfer of application graphic buffers directly onto the screen without the Wayland server compositing them into a global scene before that. This can be done by putting the buffers on some overlay planes and let the hardware do the compositing of these planes into a background provided by the compositor or in the simpler case by putting a single buffer of a full screen application directly onto the primary plane.
At the end of June I posted some Vulkan vs. OpenGL Linux Game CPU Core Scaling using RADV/RadeonSI with a Polaris graphics card. At that time I also carried out some NVIDIA CPU core scaling results in a Vulkan vs. OpenGL manner, but simply forgot to post those numbers until now.
Due to being preoccupied with other benchmarks, I forgot to post those NVIDIA OpenGL vs. Vulkan CPU core scaling results, but here are those comparison numbers now.
ââ¬â¹Geany is built using GTK and its documentation is read as “a small and fast editor with basic features of an integrated development environment.” still you get the feel of programming in other rich, full-blown IDEs like Codeblocks, Eclipse, etc. And it really benefits those who are crazy about computer resources or have limited virtual memory.
After two and half years of development, Damon Lynch is proud to publish a major new version of the Linux desktop's premier photo and video downloader/importer.
Casync is a new option to complement tools like rsync, which may prove useful to anyone who needs to distribute large filesystem images that also need to be regularly updated. The granularity of "chunks" that casync uses is reminiscent of BitTorrent, but the fact that it is network protocol independent should make the distribution of data friendlier to firewalls and content distribution networks. It should be a useful tool for cloud providers, software distributions, developers sharing customized virtual machine images, and anyone else who needs an efficient way of providing large and constantly updated bundles of data.
Tomb is a free and open source file encryption tool to protect your secret files in GNU/Linux operating systems. It allows the users to create a encrypted storage (a folder) in the file system and save the important data in it. The encrypted storage can be opened and closed using their associated keyfiles, which are also protected by a password chosen by the user. For the sake of security, you can save the keyfiles on a separate medium, say for example an USB drive or a CD/DVD. The encrypted folders are called “tombs”. You can create any number of tombs in your hard drive as long as it has enough free space. A tomb can only opened if you both have the keyfile and the password. It also has advanced features, like steganography, which allows you to hide the keyfiles within another file. Even though, Tomb is a CLI tool, it also has a GUI wrapper called gtomb, which makes the usage of Tomb much easier for the beginners.
Modern computer systems employ various tools for managing contacts in our address books. With the proliferation of social media applications, this complexity has increased considerably and lacks the greatest simplicity in style most Linux users adore. This article shows three tools used in the creation of address books from our linux bash terminal.
If you're an avid book reader, then you must have the Calibre open-source and cross-platform ebook library management software installed on your persona computer to sync books to your e-reader.
Developer Kovid Goyal today announced a new version, Calibre 3.3, which adds a few improvements to the user experience and fixes a bunch of bugs. For example, the Quickview panel was updated to allow users to open and close it through a the Layout button in the bottom right corner.
Readers with long memories might also recall that the CameraV–ProofMode saga marks the second time that the Guardian Project developed a security app only to later refactor the code into a system service. The first instance was PanicKit, a framework for erasing device data from multiple apps that grew out of the project's earlier storage-erasing app InTheClear.
Freitas calls this a coincidence, however, rather than a development trend. With PanicKit, he said, the goal was to develop a service that third-party app developers would find useful, too. ProofMode, in contrast, was merely a simplification of the original concept designed to meet the needs of a broader audience. Regardless of how one looks at it, though, most will likely agree that if security features come built into the operating system at a lower level — eliminating the need to choose "secure apps" or "insecure apps" — then the end users will benefit in the end.
The Wine development release 2.12 is now available.
Wine 2.12 is now available as the latest bi-weekly snapshot leading up to the Wine 3.0 release late into the year or early 2018.
If you fancy running Windows games or apps on your Linux, Android, or OS X operating system, then you should know that there's a new Wine development release available for download, versioned 2.12.
Wine 2.12 continues the bi-weekly development releases of the project, and it brings a new set of features, improvements, and bug fixes, starting with the implementation of an audio driver for Android and initial support for the MSI user interface and continuing with various RegEdit file parser enhancements and some more async I/O performance improvements.
The latest Wine development release is now available and it looks like quite a quiet one for us, nothing truly major. It does have some new features and some notable bug fixes for games.
Valve released today a new Beta version of its Debian-based SteamOS gaming operating system that the company installs on various of the Steam Machines available on the market.
Beyond Enemy Lines [Steam], a rather interesting sounding single-player FPS looks like it's going to get a Linux version.
Hazelnut Bastille [Official Site] is an absolutely amazing looking pixel art topdown adventure and it has plans for a Linux version.
The developers say it takes inspiration from classics like Link to the Past and Super Metroid. Visually, it certainly looks like they could be onto something, it's impressive pixel artwork for sure. Impressive details, colouring looks great and the few gifs they've shown off make it look like it could be a really great game.
Pretend the DLC thing did not happen. ArmA 3 is a superb piece of fun. Raw, hard, difficult, extremely fun. You will need to gear yourself up, and it's not about pretending to be a wannabe soldier or anything like that, although I'm sure quite a few people have probably imagined themselves re-writing Bravo Two Zero and Blackhawk Down after playing ArmA 3 for a few hours. Nope. Let's face it, still something that happens on a computer screen. But it happens with such realistic delight.
KDE Plasma 5.10 released at May 30th 2017. This article simply summarizes what's new from Plasma 5.10.1 (06 June), 5.10.2 (13 June), and 5.10.3 (27 June) for beginners and non-KDE users. Here's what Plasma Desktop would be if you use it on any GNU/Linux distro today.
One of the new features of the upcoming Qt 5.10 is the introduction of the shapes plugin to Qt Quick. This allows adding stroked and filled paths composed of lines, quadratic curves, cubic curves, and arcs into Qt Quick scenes. While this has always been possible to achieve via QQuickPaintedItem or the Canvas type, the Shape type provides a genuine first-class Qt Quick item that from the scene graph’s perspective is backed by either actual geometry or a vendor-specific GPU accelerated path rendering approach (namely, GL_NV_path_rendering).
PackageKit is a distribution-agnostic API for managing installed software packages on a system. For irritating reasons, Ubuntu was stuck for a long time on an old version of PackageKit, but we recently managed to remove the blockers and update to a modern version.
For me, a really positive thing to come out of this is that we are able to remove our Ubuntu specific apt plugin inside GNOME Software. This plugin uses both libapt and aptdaemon to manage package listing, installation, updating and removal. We had to write all this code, it isn’t in the upstream package, and it has been the source of bugs in the pastââ¬Å —ââ¬Å bugs which wouldn’t have happened if we had been able to use PackageKit. Once this work is all uploaded to Ubuntu, we’ll be sharing the same plugin as most other distributions, meaning that we all benefit from everybody’s fixes.
The first phase of my GSoC project is over, and I have passed the evaluation for the same. Honestly speaking, it has been quite a difficult start for me. Given that I had to deal with ‘libical’, which is sparsely documented, and also evolution-calendar code, which is hard to understand, I have finally found the flow that was needed for this project.
For the last 2 weeks I have been working on a modification in edit-dialog that allows the user to create recurring events. The creation part has been taken care of successfully but the editing part (editing recurrence-rules of already recurring events) is not complete.
Flat Remix icons and Gnome shell theme are not new, both were initially released back in the 2015 and are still in active development. The icon set fits perfect on all kind of dark and light themes, it is release under GPL V3 license. Flat remix icons is a pretty simple icon theme inspired on material design. It is mostly flat with some shadows, highlights and gradients for some depth and uses a colorful palette with nice contrasts, and it is compatible with almost every desktop environments such as Gnome, Unity, KDE, Xfce, Cinnamon, Mate and so on. You can report bugs or suggest new icons to include in this icon set via this link. Flat Remix theme is pretty simple and elegant, it is a material design theme for Gnome Shell. If you find any bugs then report here. You can use Unity Tweak Tool, Gnome-tweak-tool to change themes/icons.
As team of distro-hoppers (and Arch Linux enthusiasts in particular) we have been spending a lot of this year hopping between three of our favourite distros: Manjaro, OBRevenge, and the new kid on the block - ArchLabs.
Having discovered ArchLabs from a number of great YouTubers including Sudo Reboot and Linux Quest - we were hooked almost immediately with the amazing level of polish and attention to detail evident throughout ever aspect of the distribution. Using Erik Dubois' modern and beautiful Sardi icon set as a design reference, every element of ArchLabs ties back to performance, usability, and just plain gorgeous design.
Endless OS 3.2 is now available as the newest feature release for this GNOME-based Linux operating system that ships on the budget-friendly Endless Computers and is also available for free to all users.
Endless OS 3.2 has a number of underlying system updates including to its Linux kernel and Flatpak. On the UI side, there are big updates to its desktop with the re-basing process from GNOME Shell 3.8 to GNOME Shell 3.22. Moving forward, they intend to re-base their desktop changes much more often to allow for a smoother transition to using the newer GNOME code in their operating system.
There is an update of SparkyLinux stable line 4.6.1-STB “Tyche”. This is Sparky edition based on Debian stable 9 “Stretch”.
In November 2012 I started running an irregular rebuild of all Mageia packages on x86_64, discarding the built packages, to just detect build breakages.
At first it was running a few times a month, now once a week, except before releases where I run it twice a week.
The CentOS distribution has long been a boon to those who want an enterprise-level operating system without an enterprise-level support contract—and the costs that go with it. In keeping with its server orientation, CentOS has been largely focused on x86 systems, but that has been changing over the last few years. Jim Perrin has been with the project since 2004 and his talk at Open Source Summit Japan (OSSJ) described the process of making CentOS available for the ARM server market; he also discussed the status of that project and some plans for the future.
Perrin is currently with Red Hat and is the maintainer of the CentOS 64-bit ARM (aarch64) build. CentOS is his full-time job; he works on building the community around CentOS as well as on some of the engineering that goes into it. His background is as a system administrator, including stints consulting for the defense and oil industries; with a bit of a grin, he said that he is "regaining a bit of my humanity" through his work at Red Hat on CentOS.
If you happen to be a person who finds the Linux font rendering to be good enough for your ocular sensors, you are a happy bunny. If you are like me, then it's only Ubuntu that gives you the right sharpness and contrast, and all other distros be heavily lacking in this space. Fedora, first and foremost, which is why I've spent months trying to perfect its layout and reading clarity.
I ranted about the whole font problem in Linux some time ago, and then we also discussed the use of Ubuntu fonts on top of Fedora a couple of months back in another OCS-Mag article. Now, I want to revisit the topic for a third time, and see if we can somehow improve on Fedora's stock Gnome look, and the way it draws text on the screen. Let us commence hence forth.
There was a GO / NO GO meeting earlier in the week and the Fedora 26 RC 1.5 build passed. As a result Fedora 26 will be officially released on Tuesday, July 11th. According to the original schedule, F26 was set to be released on June 6th. It got bumped 5 times during the alpha and beta phases but that pretty much always happens to this distro that is constantly leading the pack with innovation.
What are the new features? I don't think the release announcement will be made public until release day but you can check out the changeset. Just be aware there are a ton of normal updates beyond the changeset and I mean... how about that new desktop background? LXQT users will also be happy to have their own Spin now. Don't forget that Fedora appears to be supporting quite a few arches, some as primary and others as secondary. Not as many as Debian and Gentoo but still. Which arches? aarch64, armhfp, i386, ppc64, ppc64le, and x86_64. I'm only using the later myself.
Running a linux distro on android devices is a hot topic these days, and why not? After all, android is already based on linux kernel, but a pretty much locked-down and dumbed-down version of it. The OEM doesn’t give you root and in most cases, not even an open source bootloader and/or kernel. That way, its good for maybe the most average user who doesn’t care about the OS and just want to use their phones. But for a power user, that’s not enough.
Recently, a guy asked me two questions: If it is so easy to uninstall and switch init systems why did it take devuan 2 years to figure it out? Why are so many struggling to make something so easy work?
The official Ubuntu install of Kubernetes is first to deliver the new Kubernetes 1.7 release with full enterprise support.
This is a Canonical distribution of pure-upstream Kubernetes, designed for ease of deployment and operations on public clouds and on-premise on bare metal, VMware, or OpenStack. The Canonical distribution osf Kubernetes is also easy to spin up on developer laptops using LXD containers for component isolation and distributed system simulation.
OpenStack is complex and many of the community members are working hard to make the deployment and operation of OpenStack easier. Much of this time is focused on tools such as Ansible, Puppet, Kolla, Juju, Triple-O, Chef (to name a few). But what if we step down a level and also make the package experience easier?
Canonical's transition to the GNOME desktop environment for the upcoming Ubuntu 17.10 (Artful Aardvark) operating system, due for release later this year on October 19, 2017, continues with yet another major change.
The company behind the popular Linux-based operating system for desktops, servers, cloud, and IoT (Internet of Things) revealed last month its plans to replace the eye-candy LightDM login manager, which it used until now on numerous Ubuntu releases by default, with GNOME's GDM (GNOME Display Manager).
Canonical is working to improve the user experience of its popular Ubuntu Linux operating system, and it looks like they are making quite some progress on the hardware-accelerated video playback for Intel GPUs on Ubuntu 17.10.
In yesterday's Windows 10 Radeon Software vs. Ubuntu 17.04 + Linux 4.12 + Mesa 17.2-dev comparison I tested both Ubuntu 17.04 out-of-the-box and then upgraded it to the Linux 4.12 kernel and Mesa 17.2-dev. Here are some complementary tests I did with a larger set of Linux games.
These results show the stock Linux 4.10 + Mesa 17.0.3 performance of Ubuntu 17.04 compared to the same system upgraded to Linux 4.12 + Mesa 17.2-dev for showing the bleeding-edge Linux gaming experience.
Will Cooke of Canonical has shared another weekly status update for the work going into the GNOME desktop for Ubuntu 17.10 and their other efforts this cycle.
Your Data is at risk. And thus, is your personal life and your company’s values. By using your own cloud storage like ownCloud you can avoid hackers, trade espionage, and rogue governments getting your data. Your data is under your control.
But depending on where your storage is located some risks still remain. The connection to your ownCloud installation in the hosted datacenter is TLS protected. All data are encrypted on their transport to the datacenter. But within the datacenter your data is plain text.
You are using ownClouds integrated encryption? You even have the full disk encrypted using LUKS or similar methods? This is fine but only protects you from certain attacks like stealing the sole hard disk. But if the attacker gains access to the very location where the actual encryption takes place, the encryption is useless, since this location also contains the encryption key! Thus, if the attacker has access to the datacenter or – more likely – is a rogue or bribed employee of the datacenter the attacker can get physical access to your encryption key and finally to your data.
A user pairs the Panda hardware with Chfr, a dashcam app previously developed by Comma.ai that lets car owners record and review their drives. If the Panda is paired with Chffr, users can record all the sensor data from their cars. If the car has sensors — Hotz recommends any 2005 or newer luxury car and other vehicles produced beginning in 2010 — then users will be able to see all kinds of data. Users can get simple information like the speed and more complex data like the RPM of the engine, how much gas is in the tank, what the suspension is doing, whether the anti-lock brakes are on, and even how hard the driver hit the brakes.
A little while back I announced that I am starting a new conference called the Open Community Conference in conjunction with my friends at the Linux Foundation.
Recently, I got a chance to speak at Open Source Bridge conference which was held in Portland, Oregon!
I spoke about Outreachy and my open source work. OSB conference was much more than just a ‘conference’. More than content in the talks, it had meaning. I am referring to the amazing keynote session by Nicole Sanchez on Tech Reform. She explained wonderfully the need of the hour, i.e Diversity inclusion is not just ‘inclusion’. Focus should be on what comes after the inclusion, Growth.
Photo Editing 101.” Today we learn about the basics of editing digital photos, using the GNU Image Manipulation Program (a free, open-source program much like Photoshop). Students will learn how to open image files, crop and color correct photos and save them as specific formats.
Our MySQL infrastructure is a critical component to GitHub. MySQL serves GitHub.com, GitHub’s API, authentication and more. Every git request touches MySQL in some way. We are tasked with keeping the data available, and maintaining its integrity. Even while our MySQL clusters serve traffic, we need to be able to perform tasks such as heavy duty cleanups, ad-hoc updates, online schema migrations, cluster topology refactoring, pooling and load balancing and more. We have the infrastructure to automate away such operations; in this post we share a few examples of how we build trust in our infrastructure through continuous testing. It is essentially how we sleep well at night.
TL;DR: if you like Matrix (and especially if you’re building stuff on it), please support us via Patreon or Liberapay to keep the core team able to work on it full-time, otherwise the project is going to be seriously impacted. And if you’re a company who is invested in Matrix (e.g. itching for Dendrite), please get in touch ASAP if you’d like to sponsor core development work from the team. And if you’re a philanthropic billionaire who believes in our ideals of decentralisation, encryption, and open communication as a basic human right – we’d love to hear from you too O:-)
FreeBSD developers have announced the second release candidate of the upcoming FreeBSD 11.1.
FreeBSD 11.1 changes since the previous release candidate include VM subsystem fixes, a gpart issue with systems using an SD card as the primary driver, some network fixes, the ena driver has been added, and various other fixes/alterations.
My favorite tool is GNU Typist. It’s a small command line tool which can help anyone learn touch typing in a few days. Remember that the package name is gtypist.
Has entered a cool project into the Best Product portion of this year’s Hackaday Prize. It’s called an Open Source IoT Dosimeter. It has a Geiger tube for detecting radiation levels along with Internet connectivity and a host of other goodies.
In his PyCon 2017 talk, Miguel Grinberg wanted to introduce asynchronous programming with Python to complete beginners. There is a lot of talk about asynchronous Python, especially with the advent of the asyncio module, but there are multiple ways to create asynchronous Python programs, many of which have been available for quite some time. In the talk, Grinberg took something of a step back from the intricacies of those solutions to look at what asynchronous processing means at a higher level.
He started by noting that while he does a lot of work on the Flask Python-based web microframework, this talk would not be about Flask. He did write the Flask Mega-Tutorial (and a book on Flask), but he would be trying to mention it less than ten times during the talk—a feat that he managed admirably. He has also developed a Python server for Socket.IO that started out as something for "that framework", but has since "taken on a life of its own".
Thousands of developers who publish JavaScript packages in the npm repository have had their passwords reset since May because their login credentials were too weak or had been publicly exposed. The affected accounts were in control of tens of thousands of Node.js modules that, in turn, were direct or indirect dependencies for half of the entire npm ecosystem.
Now, software testers are facing increasingly complex applications, delivered at dramatically accelerated paces—and they’re expected to deliver trustworthy go/no-go decisions at the new speed of modern business. More of the same won’t get us there. We need to transform the testing process as deliberately and markedly as we’ve transformed the development process.
To determine the impact on the city’s drivers, Benjamin Olken, an economist at the Massachusetts Institute of Technology in Cambridge, and colleagues queried Google Maps for real-time driving-speed data before and after the new policy went into effect. Following the policy lift, travel delays, defined as the time it takes to travel 1 kilometer, increased by 46% in the morning and almost 90% in the evening, the team reports today in Science.
We've discussed ad nauseum how, as the Internet video revolution accelerates, the cable and broadcast industry's response has predominantly been to double down on bad ideas in the false belief that they can nurse a dying cash cow indefinitely. Netflix nibbling away at your subscriber totals? Continue to glibly impose bi-annual rate hikes. Amazon Prime Video eroding your customer base? How about we edit programs to be shorter so more ads can be shoveled into every viewing hour? By and large, the cable industry's response to the cord cutting threat has been to do more of the things that forced annoyed consumers to leave.
Helium has two special abilities. It is extremely light, and it can get extremely cold without freezing.
Largely for these reasons, the element is needed to use or make all sorts of things: semiconductors, rocket fuel, computer hard drives, the Large Hadron Collider, magnets in MRI machines, airships, scuba tanks, arc welding, anything that needs to be super cold, and of course, balloons.
Although she has led her state’s public health department, Fitzgerald does not have a background in scientific research, STAT reports, which is “a major function of the agency she has been nominated to lead.”
If President Donald Trump has had one consistent message about space exploration both during his campaign and presidency, it's that America is doing badly in space. About a year ago during a campaign stop in Daytona Beach, Florida, Trump said, "Look what's happened with our whole history of space and leadership. Look what's going on, folks. We're like a third-world nation."
As Vice President Mike Pence has assumed duties over space policy, he has made a respectable effort to tour NASA and Air Force facilities around the country. But during these visits, he's also reiterated this Debbie Downer message. When he delivered a speech Thursday at Kennedy Space Center, Pence said that under the Trump administration, America will lead in space "once again" no less than eight times.
The subtext here is that America has fallen far behind in space—and that it needs strong leadership to get back on its feet. While there are definitely significant problems with US space policy—starting with the lack of a clear direction for human spaceflight and the funding to support those goals—no other nation can come close to the United States in space. Moreover, because of the long lead times baked into aerospace development, almost every "accomplishment" that demonstrates American leadership in space during the next 3.5 years will have started long before President Trump took office.
Venus' atmosphere is rightfully famous for a combination of being stunningly hot and containing sulfuric acid. Those conditions, not surprisingly, have ensured that every bit of hardware we've sent through said atmosphere has had an extremely short lifespan.
But at least one of those pieces of hardware—the Soviet Union's VeGa-2 probe—sent back some data that's hard to explain, a hint of an unstable atmosphere. Now, a pair of scientists is suggesting that the oddity can be explained by an equally odd feature of the atmosphere: it's a supercritical fluid where different chemicals partially separate at different altitudes.
“Alternative facts” aren’t new. Young-Earth creationist groups like Answers in Genesis believe the Earth is no more than 6,000 years old despite actual mountains of evidence to the contrary, and they've been playing the “alternative facts” card for years. In lieu of conceding incontrovertible geological evidence, they sidestep it by saying, “Well, we just look at those facts differently.”
Nowhere is this more apparent than the Grand Canyon, which young-Earth creationist groups have long been enamored with. A long geologic record (spanning almost 2 billion years, in total) is on display in the layers of the Grand Canyon thanks to the work of the Colorado River. But many creationists instead assert that the canyon’s rocks—in addition to the spectacular erosion that reveals them—are actually the product of the Biblical “great flood” several thousand years ago.
Since May, hackers {sic} have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing plants in the United States and other countries.
[...]
The fake résumés were Microsoft Word documents that were laced with malicious code. Once the recipients clicked on those documents, attackers could steal their credentials and proceed to other machines on a network.
The Department of Homeland Security and FBI have issued a joint report providing details of malware attacks targeting employees of companies that operate nuclear power plants in the US, including the Wolf Creek Nuclear Operating Corporation, The New York Times reports. The attacks have been taking place since May, as detailed in the report issued by federal officials last week and sent out to industry.
The "amber" alert to industry—the second-highest level of severity for these types of reports from the FBI and DHS—noted that the attacks had been focused on employees' personal computers but had not managed to jump to control systems. Administrative computers and reactor control systems in most cases are operated separately, and the control networks are generally "air-gapped"—kept disconnected from networks that attach to the Internet.
India is ranked a high 23rd out of 165 nations in a global index that measures the commitment of nations across the world to cyber security. The second Global Cyber security Index (GCI), released by the UN telecommunications agency International Telecommunication Union (ITU), said only about half of all countries have a cyber security strategy or are in the process of developing one and urged more countries to consider national policies to protect against cyber crime.
Let’s Encrypt will begin issuing wildcard certificates in January of 2018. Wildcard certificates are a commonly requested feature and we understand that there are some use cases where they make HTTPS deployment easier. Our hope is that offering wildcards will help to accelerate the Web’s progress towards 100% HTTPS.
Let’s Encrypt is currently securing 47 million domains via our fully automated DV certificate issuance and management API. This has contributed heavily to the Web going from 40% to 58% encrypted page loads since Let’s Encrypt’s service became available in December 2015. If you’re excited about wildcard availability and our mission to get to a 100% encrypted Web, we ask that you contribute to our summer fundraising campaign.
In one sense, the Stack Clash vulnerability that was announced on June 19 has not had a huge impact: thus far, at least, there have been few (if any) stories of active exploits in the wild. At other levels, though, this would appear to be an important vulnerability, in that it has raised a number of questions about how the community handles security issues and what can be expected in the future. The indications, unfortunately, are not all positive.
Since there are signs of the US backing off from its position of the global leader, China is eyeing that role. But for that it needs to shed the image of a bellicose dictatorship and an unreliable trader. That's why China is increasingly presenting itself as a responsible power to the world.
The Indian Navy has sighted over a dozen PLA-N warships, submarines and intelligence-gathering vessels in the Indian Ocean in the last few months.
The Yemeni farm laborer was picking crops in a hot field when the call came. His children, all seven of them, had fallen gravely ill.
Some were vomiting, others had diarrhea, and all were listless, indicating that they had fallen victim to the latest disaster to afflict this impoverished corner of the Arabian Peninsula: one of the worst outbreaks of cholera infection in recent times.
The laborer, Abdulla Siraa, set about frantically trying to raise money to treat the children — $240, or about six times what he typically earns in a month — and raced as fast as he could on the 30 miles home over roads virtually destroyed in Yemen’s civil war.
“I spent the whole journey reciting Quranic verses and praying for the survival of my children,” he said. Continue reading the main story
But when he arrived, he learned that his 4-year-old daughter, Ghadeer, had already died, after hours of calling out for him, though the rest of his children would survive.
For much of the world, cholera, a bacterial infection spread by water contaminated with feces, has been relegated to the history books. In the 19th century, it claimed tens of millions of lives across the world, mainly through dehydration and electrolyte imbalance.
Numbers from the Energy Information Administration (EIA) reflect the extent of renewable energy development in the US over the past several years. Construction costs per kilowatt for solar, wind, biomass, and hydroelectric projects have fallen, in some cases steeply, since 2013, and natural gas generators are also getting cheaper to build despite getting more expensive year-over-year from 2013 to 2014. Only petroleum liquid generators have shown an increase in cost per kilowatt between 2013 and 2015.
The G20 governments against some odds passed a joint communique today, but had to accept differences on climate and in one point also on free trade. The US delegation remained firm in their decision to withdraw from the Paris climate agreement and continue to support conventional energy resources, instead of renewable ones. German Chancellor Angela Merkel in her press conference explained that there was a clear division in the climate chapter of the G20 2017 Declaration.
Whole Foods came back with a counterproposal of $45 a share, which got Amazon to increase its offer to $42. But Amazon’s bankers from Goldman Sachs then “stressed several times” that the increase to $42 represented Amazon’s “best and final offer.”
Amazon’s bankers “also made it clear again ... that Amazon.com would disengage from its efforts to acquire the Company and pursue other alternatives and initiatives if the $42.00 per share price were not accepted,” the filing said, “and that Amazon.com expected that the Company would not approach other potential bidders while the Company was negotiating with Amazon.com.”
Amazon also threatened it would walk away if the talks leaked to the press, which they did not.
Translation: $42 or nada.
Brexit will damage Britain's ability to influence world events, former foreign secretary Lord Hague has warned. He told a House of Lords committee it was "logical" that the UK would lose foreign policy influence in both Brussels and Washington. And British ministers would have to work harder if they wanted to lead action in global trouble spots. Lord Hague's successor at the Foreign Office, Boris Johnson, says Brexit will free the UK to play a more global role. But Lord Hague, who supported remaining in the EU, said: "If you are less influential in crafting the overall approach of the EU you end up with less influence in the rest of the world."
One of the most beneficial aspects of the election is that a degree of realism has been injected into the Brexit debate. A no-deal outcome, which was for a while there starting to look like the most likely one, has now been all-but ruled out, even if Brexit ministers still pay lip service to it. It's also understood pretty much across the board that any comprehensive free trade agreement with the EU will take a lot longer than the two years of Article 50 - especially once you lose the first three months to a pointless election and the final six to votes in Westminster and Brussels.
Tuition fees of €£9,250 and rising won’t survive. Nor do they deserve to. The only question is whether they are abolished entirely or whether cross-party support can be built to keep fees to between €£1,000 and €£3,000, as per their introduction 13 years ago.
[...]
Tony Blair followed, with his mantra “education, education, education”. But he really meant “schools, schools, schools”, which were the political priority of Middle England. When the vice-chancellors realised that they were not New Labour favourites, they agitated hard for fees higher than the modest €£1,000 at which they were introduced in 1998. As Blair’s head of policy, I was on the receiving end, and persuaded him that he should forge a new settlement for university funding – copying the Australian scheme of part-payment by students on a sliding scale to reflect cost and benefit, with repayments made only after graduation through the tax system, with no interest. That way, concerns about access for poorer students could be met, while providing a vital new source of income for the universities.
A new cap was set at €£3,000, but the intention was that fees would vary between €£1,000 and €£3,000, depending on the cost and benefit of the individual course. I expected that this would enhance student choice while making students more demanding and universities more responsive. Virtually none of this happened. The vice-chancellors formed a cartel and charged €£3,000 for almost every course. Students continued to choose universities and courses mostly based on where they could get in with their A-level grades. The quality of university teaching remained patchy, and often got worse as lecturers focused on their research ratings – upon which research funding was based – while neglecting their students who had no choice but to pay. Many students never see a professor from one month to the next, and are required to produce far less work than they did at school.
Ivanka Trump briefly took her father’s seat at a G20 Summit session on Saturday, sitting next to world leaders including British Prime Minister Theresa May and Russian President Vladimir Putin.
In most cases, advertisers use Facebook’s data and targeting resources for somewhat benign purposes — growing a customer base, selling a product, increasing awareness of a service. But the Trump presidential campaign clearly demonstrated how these tools can be used for social and political manipulation.
As press watchers and members of the media wrestle with the president’s rhetoric, some have begun to question a central tenet of modern journalism: striving to be objective and nonpartisan, conveying the news of the day with calm gravitas. But Mr. Trump is not the only disrupter in media; his presidency coincides with fast-paced changes in society and technology that are also reshaping journalism.
Separately, The Daily Caller wrote today that Trump doesn't want the merger to be approved unless CNN President Jeff Zucker is fired. The conservative news website attributed the information to "a source familiar with President Trump's thinking."
Zucker told the New York Times that the pending merger has not affected his journalistic or management decisions.
It appeared as if Putin was sympathetic and he was perceived to be defending Trump against attacks from the media.
President Trump's team at the G-20 insisted on limiting the number of people present at his Friday meeting with Russian President Vladimir Putin to avoid leaks and multiple accounts of the event, according to the New York Times.
The Russians reportedly wanted to bring several staff members to the meeting. But Trump aides insisted on keeping the meeting small to prevent any potential leaks from the highly anticipated meeting.
The Hill has reached out to the White House for comment on the report.
President Donald Trump needed to accomplish two things this week during his visits to Poland and the G-20 Summit in Hamburg. First, he needed to reassure America’s allies that he was committed to collective defense and the core set of values and principles that bind us together. Second, he needed to demonstrate that he understands that the greatest threat to that alliance, those values, and our security is the Kremlin.
The first day of the G20 summit in Hamburg was notable for the attention given to Donald Trump's first face-to-face meeting with Vladimir Putin and the ferocity of the day's protests.
It would be nice to think that the protesters were particularly irked by the sight of two autocratic, media-hating leaders with dodgy business connections getting together. Sadly, the Trump-Putin meeting is a sideshow as far as the anti-globalization movement is concerned. They object to the whole idea of the G20, seeing the summit as the epitome of a global system based on a rapacious economic model and run by unaccountable elites.
I’ve been storing a truckload of my deceased parents’ stuff. This summer, after several moves and even more years, I decided to go through it and make the hard decisions about getting rid of (at least) some of it.
In one box was a clear plastic bag with newspapers in it. Tribune-Stars, haphazardly folded, but with a similarity; they were the D section of the Sunday Trib containing my essays. My mother was saving my essays. I’d discovered a treasure trove. Until 2007ish I didn’t save my Tribune-Star essays, so these have been termed “Mom’s archive” and I’ve been digitizing them and (re)publishing them on my personal blog.
[...]
Ninety-one percent of students agreed that “people should be able to express unpopular opinions.” And those who more frequently consume news and actively engage with news through social media demonstrate stronger support for First Amendment freedoms. Unfortunately, the report does not include data on how many students regularly consumed and engaged with news sources. Based on my experience with my students, I would guess the proportion to be small. Of those who said they engaged “often” the smartphone was their overwhelming source for their news.
July, more than most other months, is loaded with politically sensitive anniversaries that keep Communist Party of China (CPC) censors and security forces on their toes.
First comes the July 1 anniversary of Hong Kong’s transfer from British to Chinese rule. Then there is July 5, marking the 2009 ethnic violence in the Xinjiang region that sparked an unprecedented crackdown on its mostly Muslim Uyghur population. The very next day, July 6, is the Dalai Lama’s birthday, and July 9 is the second anniversary of a sweeping repressive action against China’s human rights lawyers. Finally there is July 20, the date in 1999 when the CPC banned the popular spiritual practice Falun Gong and began a massive — and often violent — campaign to eradicate it.
This year, the anniversaries overlap with other news stories that Beijing likely wants to quash, including an international uproar surrounding democracy activist Liu Xiaobo’s belated release on medical parole with terminal cancer, and a campaign by exiled tycoon Guo Wengui to publicize corruption allegations involving top Chinese leaders.
CNN is still licking their wounds after a rather disastrous couple of weeks, where a shoddy Russia-Trump story led to three staffers resigning, a Project Veritas investigation exposed that the network's producers peddled the Russia story for ratings, and what came off as a wholly inappropriate veiled threat against an anonymous Reddit user who created a Trump WWE video, which the president tweeted before the Fourth of July Holiday. The video shows Trump beating up WWE’s Vince McMahon, whose face has been superimposed with the CNN logo. The media went apoplectic as an attack against the press; it wasn’t. This spurred the network's reporters to find the user and pretty much threaten to dox him if he continues to post things CNN doesn’t like. Yet, before we get to that, let’s revisit the Russia-Trump story that had to be retracted, along with The Intercept’s Glenn Greenwald torching the media for their repeated trip ups in covering this story.
If you’ve made a habit of either watching Fox News’ Tucker Carlson Tonight or following the anti-abortion groups that frequently appear on the program, then you’ve heard allegations that these organizations — and the anti-choice misinformation they spread — are being censored by any number of media platforms.
Most recently, Lila Rose, founder of the anti-abortion group Live Action, appeared on the June 26 edition of Tucker Carlson Tonight and claimed that Twitter was censoring Live Action’s ads. Beyond alleging that Twitter was biased against the anti-abortion group, Rose also conveniently mentioned that Live Action had a $40,000 fundraising goal to meet within the week. Mere hours after Rose’s appearance, Live Action’s homepage carried a large ad decrying Twitter’s censorship and begging for donations to meet the fundraising deadline. By June 30, the organization had reached its fundraising goal and was asking supporters to continue donating in order to “guarantee” it could continue working “to expose the abortion industry.”
We've been covering just how silly coal boss Bob Murray's SLAPP lawsuit against John Oliver is, and things keep getting sillier. Late last week, Murray's lawyers dug themselves in even deeper, asking for a gag order on Oliver and HBO (first reported by Betsy Woodruff at the Daily Beast). Specifically, they filed for a temporary restraining order and preliminary injunction to gag Oliver. They even admit that it's a "gag order" on Oliver and HBO. This kind of prior restraint is not supposed to be allowed under the First Amendment, but Murray's lawyers already have shown some fairly wacky legal theories, so it doesn't seem likely that "what the law says" is going to stop them from asking for ridiculous things.
The document specifically requests that the defendants in the case be barred from re-broadcasting Oliver's hilarious report (which already has 6.6 million views and counting) and also that he be stopped from "publicly discussing the substance of this litigation." Of course, Oliver himself has already said on his show that, on the advice of HBO's lawyers, he won't be discussing the case until it's over, so this request is even more bizarre. But it's also silly legally. The First Amendment doesn't allow for a gag order to prevent someone from discussing a case. That's blatant prior restraint, and in the immortal words of Walter Sobchak, "the Supreme Court has roundly rejected prior restraint."
[...]
Sure. The courts have noted that defamation isn't protected by the First Amendment, but this gag order request is not asking for a blocking of just defamatory statements (hell, they barely identify any potentially defamatory statements amidst all the hand waving). They're literally asking for a gag order on discussing the case itself. The case itself is not defamatory. You can't silence a defendant from talking about the fact that you stupidly sued him. That's not what the Supreme Court is saying. Indeed, the two citations that Murray's lawyers point to from the Supreme Court notably do not support injunctions against speech. They merely note that defamation is not protected speech. But plenty of other cases explicitly make it clear that injunctions on speech should not be granted because of prior restraint. In Near v. Minnesota, the court said that a law granting injunctions on defamation was unconstitutional. In Bantam Books v. Sullivan the court famously said that "[a]ny system of prior restraints of expression comes to this Court bearing a heavy presumption against its constitutional validity."
Twitter's First Amendment lawsuit against the government for limitations on National Security Letter reporting will be allowed to continue. This is good news for Twitter -- and the general public -- although it's somewhat disheartening to see things have only moved this far in the three years since the lawsuit was filed.
Reporting on NSLs is limited to "bands." A social media service receiving three NSLs has to report it as "0-499." The same goes for a service that receives 300 NSLs over the same period. Twitter is fighting to have these "bands" removed, in order to more accurately report the number of NSLs it receives.
This detail, contained in the US Courts' latest wiretap report, shows how much the government can get with a single wiretap order. Using assertions of "training and expertise," US drug warriors intercepted millions of phone calls, ringing up a $335,000 third-party phone bill in the process.
But hey, the Drug War can't be won without casting a wide dragnet. Drug conspiracies are vast and far-reaching, often leading law enforcement to bigger fish further down the line. Or so the affidavit assertions say…
At the G20 meeting in Hamburg today, the German hosts chose a retreat over the fight against terrorism as a warm-up, before turning to the controversial topics of free trade and climate change. Governments were very much in agreement when it comes to one thing: Internet platform providers must do more to fight radicalization and the use of the internet by terrorists.
A three-judge bench of the Supreme Court, headed by Justice J. Chelameshwar and also comprising Justices A. M. Khanwilkar and Navin Sinha asked the petitioners to mention it before the CJI court. The apex court on Friday allowed the petitioners challenging the making of Aadhaar as mandatory, to mention it before the Chief Justice of India (CJI) for the Constitution bench to hear the matter.
But now the Defense Information Systems Agency or DISA, the Pentagon's branch that oversees email, says it will finally start using STARTTLS within the year, according to a letter from DISA.
You don’t have to be on image-sharing app Snapchat to have heard about its controversial new “Snap Map”, which shows users their friends’ locations in near-real time, and disconcerting detail. Picture cheery cartoon avatars identified in not just suburbs, not even just streets, but at specific addresses.
Police already have access to visors with built-in face recognition and fugitive spotting. The technology was in prototype stage a few years ago, and was successfully tested when police officers walked into dark cinemas full of people and got so-called People of Interest highlighted directly onto their field of vision. The future is approaching fast, and it’s not all shiny happy rainbow unicorns.
Sunday morning I made the mistake of checking Twitter first thing upon waking up. As if just a quick check of Twitter would ever be possible during this administration... It definitely wasn't this past weekend, because waiting for me in my Twitter stream was Trump's tweet of the meme he found on Reddit showing him physically beating the crap out of a personified CNN.
But that's not what waylaid me. What gave me pause were all the people demanding it be reported to Twitter for violating its terms of service. The fact that so many people thought that was a good idea worries me, because the expectation that when bad speech happens someone will make it go away is not a healthy one. My concern inspired a tweet storm, which has now been turned into this post.
I don't write any of this to defend the tweet: it was odious, unpresidential, and betrays an animus towards the press that is terrifying to see in any government official – and especially the Chief Executive of the United States of America. But inappropriate, disgraceful, and disturbing though it is, it was still just speech, and calls to suppress speech are always alarming regardless of who is asking for it to be suppressed or why.
Obviously, Smith liked throwing his weight around. And he had plenty of it, according to the decision's footnotes: 6' 3" and 270 pounds -- all of it apparently deployed to show these arrestees who was in "control" of the situation.
Sentencing guidelines called for 33-41 months imprisonment. The court considered some mitigating effects (community work, difficult childhood) and those calling for the harsher end of the sentencing spectrum (assaulting juveniles at a detention facility, "unaddressed anger issues," lying to investigators). For reasons not adequately explained, the district court sentenced Smith to less than half the minimum: 14 months.
Both parties appealed. In retrospect, Smith may have been better off letting the sentence ride. The Appeals Court sent the case back with instructions to either explain its downward sentencing departure better or to apply a sentence within the guidelines. It pointed out the lower court said Smith was unlikely to reoffend but did not show its homework as to why it had chosen to depart so drastically from the guidelines.
The lower court took another look at the case and… arrived at the same exact sentence. The court considered the time the officer had served as well as some steps he had taken to reintegrate himself into the real world again. It also pointed to the officer's statement as a proper expression of remorse for his wrongdoing. The Appeals Court notes the second sentencing attempt is basically a word-for-word replay of the first. It also notes Smith's "remorseful" statement mainly discussed how difficult things were for him rather than for his victims.
For years, AT&T worked tirelessly to erode its customers' legal rights, using mouse print in its terms of service preventing consumers from participating in lawsuits against the company. Instead, customers were forced into binding arbitration, where arbitrators employed by the companies under fire unsurprisingly rule in their employer's favor a huge percentage of the time. Initially, the lower courts derided this anti-consumer behavior for what it was, critics highlighting that however brutally-flawed the class action system can be, binding arbitration in many ways made things worse.
Three Mobile’s Go Binge plan offers unlimited Netflix, and violates net neutrality
The cable TV industry has won a big victory against rate regulation via a court decision that will make it harder for cities and towns to impose price controls on pay-TV service.
Today's ruling from the US Court of Appeals for the District of Columbia Circuit upheld a June 2015 decision by the Federal Communications Commission that helped cable companies avoid local rate regulation. The FCC, under then-Chairman Tom Wheeler, ruled that cable TV providers face "effective competition" nationwide, mainly because of the widespread availability of satellite TV service from DirecTV and Dish.
In the last year, we've seen cracks appearing in the foundation of the DRM status quo.
Of course, the companies that profit from Digital Restrictions Management (DRM) are still trying to expand the system of law and technology that weakens our security and curtails our rights, in an effort to prop up their exploitative business models.
Yesterday Tim Berners-Lee, the chief arbiter of Web standards, approved the controversial proposed Digital Restrictions Management (DRM) standard for the Web, Encrypted Media Extensions (EME).
For years now, we've discussed the various problems with the push (led by the MPAA, but with some help from Netflix) to officially add DRM to the HTML 5 standard. Now, some will quibble with even that description, as supporters of this proposal insist that it's not actually adding DRM, but rather this "Encrypted Media Extensions" (EME) is merely just a system by which DRM might be implemented, but that's a bunch of semantic hogwash. EME is bringing DRM directly into HTML and killing the dream of a truly open internet. Instead, we get a functionally broken internet. Despite widespread protests and concerns about this, W3C boss (and inventor of the Web), Tim Berners-Lee, has signed off on the proposal. Of course, given the years of criticism over this, that signoff has come with a long and detailed defense of the decision... along with a tiny opening to stop it.
There are many issues underlying this decision, but there are two key ones that we want to discuss here: whether EME is necessary at all and whether or not the W3C should have included a special protection for security researchers.
The final vote was more controversial than any in W3C history. As the months ticked by afterward without a decision from W3C Director Tim Berners-Lee, one W3C member proposed an even more modest compromise: a promise by W3C members not to sue security researchers who revealed defects in DRM that exposed users to privacy breaches. This was immediately rejected by Netflix and the CEO of the W3C and all discussion on it halted.
After consideration of the issues, the Director reached a decision that the EME specification should move to W3C Recommendation. [...]
Doctorow calls out a few specific points that have come up in the five-year-long debate over whether this standard should be approved. One is that there’s no protection for security researchers — in the US, breaking DRM, even for otherwise legal purposes, can be a crime, and the fact that EME doesn’t do anything about that keeps security researchers exposed to prosecution.
Alphabet Inc. Chief Executive Officer Larry Page was ordered to submit to questioning by Uber Technologies Inc. in his company’s lawsuit over trade secrets for self-driving car technology.
As the march of progress of robotics and artificial intelligence continues on, it seems that questions of the effects of this progress will only increase in number and intensity. Some of these questions are very good. What effect will AI have on employment? What safeguards should be put in place to neuter AI and robotics and keep humankind the masters in this relationship? These are questions soon to break through the topsoil of science fiction and into the sunlight of reality and we should all be prepared with answers to them.
As we've discussed there's this stupid big fight going on these days, in which some in Congress -- mainly at the urging of the legacy entertainment industry -- are looking to move the Copyright Office out of its historical home in the Library of Congress. The first proposal to sort of (but not completely) do that, involved just making the head of the Copyright Office a Presidential appointment position, rather than (as now) appointed by the Librarian of Congress. The main reason that various members of Congress put forth in support of this change was that this would magically give the Copyright Office the freedom to modernize. Of course, there are few facts to support this argument. We broke the story about serious incompetence at the Copyright Office in managing its own modernization efforts, and there was also plenty of evidence that the current Librarian of Congress was successfully moving forward with a thorough modernization plan.
The claim that the best way to combat content piracy is to offer good legal alternatives and make them widely available isn't exactly breaking new ground. Case studies made out of several nations' piracy rates, such as in Australia and Norway, demonstrate the severe impact creating good digital marketplace alternatives to piracy can have. Techdirt's think tank arm, the Copia Institute, produced the definitive report highlighting this in multiple countries nearly two years ago.
And, yet, the copyright industries and their mouthpiece organizations typically choose to beat the punishment drum instead, going the route of litigation against pirates that ultimately ends up being a PR nightmare, or instead going the route of wholesale censorship on the internet that is equal parts ineffective and alarming to those of us that think such censorship ought to have a high bar to hurdle in order to be implemented. It's with that in mind that any new example that simply offering legal alternatives is a better route is useful to highlight.
A federal court in Florida has granted a preliminary injunction against more than two dozen relatively small pirate sites. The order allows the media conglomerate ABS-CBN to seize the associated domain names. In addition, advertising networks including Google Adsense and MGID are instructed to freeze their funds.
Internet subscribers who are caught downloading pirated content have no constitutional right to Internet access, BMG says. The music rights group is countering a defense ISP Cox Communications submitted to the Supreme Court, arguing that the cited ruling doesn't apply here.
The Pirate Bay has slowly but steadily returned to its former glory. After more than three years, the deviant torrent site has regained a spot among the 100 most-visited sites on the Internet. While many of the site's users may cheer at the news, there's also a dark side to the recent resurgence.
[...]
Many other indexers rely on TPB for their content, which is something not everyone realizes.
Following seven years of legal problems and several court cases, the operator of a defunct warez site has been ordered to pay 13 million euros to movie studios and companies including Microsoft. He also faces a year in jail but with his whereabouts unknown, it seems unlikely that Disney and friends will get a Hollywood ending.