Rumored to come to a Chromebook near you, support for Linux apps just entered beta testing in the latest Chrome OS Dev channel, as confirmed by Kevin Tofel of About Chromebooks. The feature appeared in the Settings and needed to be turned on if you want to use Linux tools, editors, and IDEs on your Chromebook.
The first sign of Linux app support in Chrome OS appeared two months ago when a Reddit user discovered a Chromium Gerrit commit explaining a new device policy designed to allow containerized Linux apps to Chromebooks. Then, someone discovered a Terminal app, whichfailed to install, but suggested upcoming support for Linux apps.
First uncovered by ChromeUnboxed a few months ago, the Chrome OS team seems to be working towards Linux app compatibility. Yesterday, the settings menu was found to be updated in Chrome OS Canary with a new option that confirms the exciting change.
The option says “Run Linux tools, editors, and IDEs on your Chromebook,” and indicates targeting a market that has been so far mostly untapped on Chromebooks: developers.
Humorously, the codename for this feature — Crostini — is basically a big fancy crouton. Google seems to be willing to admit that the OS truly needs the features that Crouton brings to the table, but without the instability that currently comes with it.
The first evidence of Linux application support on Chrome OS appeared in February, and more details have continued to trickle out since. Earlier this month, a Terminal app began appearing on Chrome OS Dev, confirming that "your favorite native apps and command-line tools" would be supported. Google has also been working on its own GTK theme, so Linux apps feel right at home on Chrome OS.
This is born out by the description of this feature which, as many Android/Chrome-related blogs are starting to discover, is now available in Beta form in the Chrome OS Dev channel. “Run Linux tools, editors, and IDEs on your Chromebook,” the description notes.
Just a week ahead of Google I/O 2018, the Chrome OS Canary channel has been updated to support a new exciting feature. A new settings option for Linux apps has appeared hinting that the native support for Linux apps on Chrome OS may be announced next week at the annual developers' conference.
ChromeOS was rumoured to get Linux app support a while ago now, and while we saw hints of it coming fairly recently, it was always believed that this feature would launch at Google I/O 2018.
Linux hardware vendor System76 [Official Site] (and now a Linux distribution maker too) have just announced their new Oryx Pro laptop and it's a beast.
In the mid-1990s, I was enrolled in computer science classes. My university’s computer science department provided a SunOS server—a multi-user, multitasking Unix system—for its students. We logged into it and wrote source code for the programming languages we were learning, such as C, C++, and ADA. In those days, well before social networks and instant messaging, we also used the system to communicate with each other, sending emails and using utilities such as write and talk. We were each also allowed to host a personal website. I enjoyed being able to complete my assignments and contact other users.
Yesterday we’ve been pleasantly surprised to hear from Publisher of the legendary Linux Journal that we have been featured in their latest May issue focused on privacy. Shawn Powers, associate editor at Linux Journal, purchased a Librem 13 for his own use and decided to review it in depth. The result is a glowing review that warms our hearts after this particularly long winter (remember, our team is international, so most of us are not surfing the beaches of San Francisco). To break the ice, Shawn begins his review with this humorous fact: Purism’s laptops, with their modern and power-efficient chipsets and CPUs, are cool-enough to use on your lap, and so we can rightfully call them “laptops” instead of “notebooks”. Well, that’s a great way to start the barbecue season!
The Financial Times' content platform team has reduced its AWS server costs by 80 percent while moving to a much more stable tech infrastructure by adopting containers, but the move wasn't free of challenges.
The FT was a reasonably early adopter of Docker as its container platform in mid-2015.
Speaker at KubeCon in Copenhagen this week, Sarah Wells, technical director for operations and reliability at the FT said: “It [Docker] was pretty leading edge at the time, though we had to do lots of work to glue components together."
Developer focused cloud company DigitalOcean is bringing Kubernetes to its platform and upping its CNCF membership from silver to gold.
Since early 2017, cloud hosting provider DigitalOcean has been expanding beyond the traditional cloud VPS "droplet" hosting that has rocketed the company to becoming the third largest host in terms of web-facing computers, according to NetCraft. As part of this expansion, DigitalOcean announced a preview of Kubernetes container support, according to a Wednesday blog post.
Much in the same way that DigitalOcean simplified server deployment with VPS droplets, the company is taking a similar approach to Kubernetes container deployments.
Rancher Labs’ break from Docker as the basis for its orchestration platform is now officially complete as the company has pushed availability of its Kubernetes-based 2.0 platform to all. Rancher Labs CEO Sheng Liang said the general availability launch followed more than a year of development and more than six months of public trials.
The company initially announced public plans to move away from Docker last September. At that time, Liang said the decision was based on customer demand.
The rise of Kubernetes stems from an overall IT movement toward hybrid cloud platforms and containers to deploy independent, packaged pieces of code. Modern IT practices aim for agility, supporting faster changes in business strategy than previous IT infrastructure designs. There is a strong corresponding need to manage how containers are packaged, implemented, monitored and managed. Full orchestration ensures high availability (HA), security, comprehensive performance monitoring, reporting and active feedback loops. Kubernetes brought orchestration without vendor lock-in to the container space and successfully went up against the biggest player -- Docker -- as well as many narrowly focused systems.
Ten years ago, essentially the only people thinking hard about distributed tracing were academics and a handful of large internet companies. Today, it’s turned into table stakes for any organization adopting microservices. The rationale is well-established: microservices fail in surprising and often spectacular ways, and distributed tracing is the best way to describe and diagnose those failures.
That said, if you set out to integrate distributed tracing into your own application, you’ll quickly realize that the term “Distributed Tracing” means different things to different people. Furthermore, the tracing ecosystem is crowded with partially-overlapping projects with similar charters. This article describes the four (potentially) independent components in distributed tracing, and how they fit together.
The Kubernetes train stops in Europe this week, as over 4,000 attendees attend keynote sessions and technical talks that continue through Friday on containers, container-orchestration, microservices, and even serverless computing at Kubecon and CloudNativeCon in Copenhagen.
Kubernetes, originally designed by Google, is an open-source-based system for developing and orchestrating containerized applications. Containers can be deployed across multiple server hosts and Kubernetes orchestration lets customers build application services that span multiple containers, schedule those containers across a cluster, scale those containers and manage the container health.
Ever since Google created Kubernetes as an open source container orchestration tool, it has seen it blossom in ways it might never have imagined. As the project gains in popularity, we are seeing many adjunct programs develop. Today, Google announced the release of version 0.1 of the Kubeflow open source tool, which is designed to bring machine learning to Kubernetes containers.
As enterprises continue to spread their workloads around – keeping some in their core datacenters while placing others in either private clouds or sprinkling them among disparate public clouds – the portability, visibility and management of those applications becomes an issue. There is no standardization among public cloud providers like Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform, among others, and applications that run well in an on-premises datacenter may hit some rough patches when they migrate to the cloud. Developers also are finding challenges when moving applications into production, either in the datacenter or cloud, also come with their share of challenges.
We continue our summary of vendor announcements from the Kubernetes Conference + CloudFirst Conference Europe with a pair of press releases from Google and New Relic.
Organizations using the Kubernetes platform to build and deploy container applications now have a new option for monitoring the environment for performance-impacting bugs, bottlenecks and abnormal behavior.
Google this week announced the beta release of Stackdriver Kubernetes Monitoring for aggregating logs event data and other metrics from Kubernetes environments. Developers and operations teams can use the data to understand—in near real time—how an application is performing in production and to quickly identify issues that might impact performance.
At the Kubecon and CloudNativecon Europe 2018 day two keynotes on May 3, speakers discussed Kubernetes success stories and what's coming next.
Aparna Sinha, group product manager at Google, outlined the core areas of concern that are leading feature development in future Kubernetes releases. She noted the top three issues the Kubernetes community is working on are security, application enablement and providing a better experience for developers.
Google today announced the release of version 0.1 of the open-source Kubeflow tool, which is "designed to bring machine learning to Kubernetes containers". According to TechCrunch, "the idea behind the project is to enable data scientists to take advantage of running machine learning jobs on Kubernetes clusters. Kubeflow lets machine learning teams take existing jobs and simply attach them to a cluster without a lot of adapting."
This week we made a snap of Linux Tycoon, one of us has been moonlighting on another podcast and went to UbuCon Europe 2018. We discuss the release of the AtariBox, the release of Rise of the Tomb Raider for Linux, Iran blocking Telegram and round up the community news.
The Linux kernel scheduler optimization work continues and it looks like for Linux 4.18 there will be at least another optimization to help out vCPUs in a virtualized environment.
Rohit Jain of Oracle sent in a patch this week that is already queued as part of scheduler work for the next kernel series, Linux 4.18. The patch is sched/core: Don't schedule threads on pre-empted vCPUs.
By now people may have seen complaints of boot slowdown on newer kernels. I want to explain a little more about what's going on and why Fedora seems to be particularly hard hit.
The Linux kernel has a random number generator in drivers/char/random.c. This provides several interfaces for random numbers to the system. There are two main interfaces for random numbers: /dev/random and /dev/urandom. /dev/random is designed to be "secure", meaning it is sufficiently random that it can be used for things like cryptography keys. /dev/urandom is "random" in the sense that most humans won't detect a pattern but sufficient mathematical analysis might find a weakness.
This page is an attempt to track ongoing developments in the Linux development community that have a good chance of appearing in a mainline kernel and/or major distributions sometime in the near future. Your "chief meteorologist" is Jonathan Corbet, Executive Editor at LWN.net. If you have suggestions on improving the forecast (and particularly if you have a project or patchset that you think should be tracked), please add your comments below.
With so much focus on open source software, and so many projects looking to innovate and disrupt the current technology ecosystem, what precisely is the role of the Linux Foundation within the telecoms sector? Ever since the launch of the Open Daylight project in 2013, the Linux Foundation has been instrumental in bringing together multiple companies, demonstrating best practices, and create a neutral space to allow them to help pivot the telecoms networking industry towards virtualisation, edge computing and 5G.
While this week brought the NVIDIA 396.24 stable Linux driver, for those Vulkan developers/gamers there is a new beta release that is actually version 396.18.07 but contains their very latest Vulkan changes.
Maarten Lankhorst has sent in a pile of updates from the drm-misc-next tree today of new feature material to queue in DRM-Next in turn for Linux 4.18.
Most notable with this pull is the new driver it includes: V3D. That's the much talked about new Broadcom VideoCore driver previously known as VC5. The DRM driver is ready for mainline now for this modern VC5/VC6 Broadcom graphics hardware set to appear in more devices. The OpenGL/Gallium3D driver is coming along and there is also early work on OpenCL/Vulkan too.
While Mesa 18.0 was just released a little over one month ago, Mesa 18.1 is already gearing up for release this month after going through two release candidates already. Here's a look at the new features of this second quarter 2018 Mesa 3D update.
Following the renaming of the VC5 DRM driver to "V3D" and the new driver on its way to the mainline Linux 4.18 kernel, Eric Anholt is now renaming the user-space VC5 Gallium3D driver to V3D and is also ready to enable it by default.
A bit more than one month ago I wrote about AMD developers working on updated color management support for their AMDGPU X.Org driver. Today a significantly updated patch-set is available.
Just days ago AMD rolled out the Radeon Software 18.10 Linux driver that brought support for Ubuntu 16.04.4 LTS but hadn't supported the newly-released Ubuntu 18.04 LTS "Bionic Beaver", but that has now changed.
AMD has now issued a public preview release driver for the Radeon Software 18.20 series. The notable changes -- well, in fact, the only mentioned changes -- for this early preview release in the 18.20 series is initial support for Ubuntu 18.04 and Red Hat Enterprise Linux 7.5.
Last week AMD released Radeon Software 18.10 as their latest official Linux driver release for what previously was referred to as "AMDGPU-PRO" while now also offers the "All-Open" driver option too. For our latest Linux GPU benchmarking is a look at how Radeon Software 18.10 with its closed-source OpenGL/Vulkan driver builds compare to that of the RadeonSI and RADV open-source drivers when testing from the Mesa 18.2-devel state.
Today, we will be discussing about an useful application called “filemanager”. It provides a file managing interface within a specified directory or you can assign your own directory. You can use it as the way you use your local file manager. The only difference we use it from the web browser.
Cloud commander is a web-based file manager application that allows you to view, access, and manage the files and folders of your system from any computer, mobile, and tablet Pc via a web browser. It has two simple and classic panels, and automatically converts it’s size as per your device’s display size. It also has two built-in editors namely Dword and Edward with support of Syntax-highlighting and one Console with support of your system’s command line. So you can edit your files on the go. Cloud Commander server is a cross-platform application that runs on Linux, Windows and Mac OS X operating systems, and the client will run on any web browser. It is written using JavaScript/Node.Js, and is licensed under MIT.
Wondering how to use AWK command in Linux? Here are 25 AWK command examples that will help you master the basics of AWK.
The developers behind Underworld Ascendant [Official Site, Steam] gave a lot of weird mixed messages about their RPG being on Linux, thankfully they've now cleared it up properly.
I've been following it for a while, not particularly impressed by what they were saying. The game was funded on Kickstarter, where Linux support was added into their base funding goal during the campaign. They were successfully funded, with well over $860K. However, since then they repeatedly said (and rather clearly) that the Linux version would be available to backers, but they hadn't worked out a plan to sell them outside of that. They repeated this, making it quite confusing.
It's good to see Valve be open about this and get it fixed, as many people suspected issues for a while now and it's interesting to see some validation of certain theories about cyber cafe use. The funny thing is, someone mentioned this to me on reddit today and I didn't actually think it would have been such a big issue, so it's fun to be wrong.
Transport Fever has long-suffered some big performance issues, which the developer is attempting to fix with this latest performance patch.
It's time to take another look at what interesting Linux games are currently on sale, plus you can try XCOM 2 free all weekend on Steam. Easily one of my favourite strategy games available on Linux, it's also 67% off if you decide you like it enough to purchase it.
We already knew BATTLETECH [Official Site] was coming to Linux since the Kickstarter, but it's good to see Harebrained Schemes continue to mention Linux support is important.
Oxygen Not Included, the rather good space-colony simulation game has another major update available with some good stuff.
While it doesn't mention Linux in the release announcement trailer shown below, they did specifically state in their Steam announcement that this release date includes Linux support.
The developers of the KaOS Linux open-source operating system released a new monthly snapshot, for the April 2018, which comes with a complete redesign to celebrate five years of activity.
KaOS it's five years old, and you might want to download the KaOS 2018.04 release as it comes with a brand new look and feel, including theme, icons, and login screen, an all-new welcome screen app called Croeso to make setting the system a breeze for newcomers, as well as the most recent KDE software and GNU/Linux technologies.
"It is five years ago this month that KaOS started, a nice way to commemorate is with releasing 2018.04. This ISO has a complete redesign of the Midna theme for 2018. Some 2500 new icons in use, rewritten SDDM login theme and a KaOS community selected new wallpaper (created by Jomada)," reads the announcement.
This year Calamares is participating in Google’s Summer of Code. While Calamares doesn’t live under the KDE umbrella — for political reasons, basically, to emplasize that it is a desktop-agnostic system installer — it has a great deal of KDE DNA inside. The maintainers (that’s Teo, then myself) have been KDE people, some of the technology is definitely KDE (KPMCore in particular). So we’re happy to be participating under the KDE umbrella in a mixed KPMCore / Calamares role.
Month after my proposed design (but in truth i am working on this for longer time), i am finally finished basic functionality for wireless section of mobile settings. Basics of UI is also almost done, even it’s need some polishing and good criticism of designers.
I have been selected to participate in Google Summer of Code 2018, where I will collaborate in KDE Partition Manager and Calamares under KDE Community. My proposal involves finishing the LVM support and implementing RAID support in kpmcore, KDE Partition Manager and Calamares. For those who want to know more details about it, here is my proposal link.
In a previous blog post I asked feedback about adding an always visible action bar to Nautilus that integrated the floating bar info too.
It was very useful, as most of you confirmed our suspicions that it was too heavy, so we researched for a better solution for the goals we had: Make actions more discoverable, have good touch support and better pointer accessibility (not being able to access actions in list view anyone?).
'Pænt goddag' (Danish greeting). My name is Niclas Moeslund Overby. You can find me on IRC as noverby and Matrix as @noverby:matrix.org. GNOME/Linux have been my daily driver for 7 years and I follow every blog from GNOME and Fedora planet, so I feel heavily invested in FOSS ecosystem. I know GNOME contributor Bastian Ilsø from my participation in Open Source Aalborg, where we had a weekly meet-up with workshops and talks all about Open Source.
GNOME.Asia Summit is the featured annual GNOME conference in Asia. It focuses primarily on the GNOME desktop, but also covers applications and the platform development tools. The summit brings together the GNOME community in Asia to provide a forum for users, developers, foundation leaders, governments and businesses to discuss the present technology and future developments.
Last weekend I was in Brussels for FOSDEM, a super awesome conference about free and open source software. Since my first year, three years ago, a few things have changed. This year I went as a speaker and I brought with me a talk about my experience writing Teleport, my first GTK+ application. I really hope I could motivate somebody to start their own project. Also, in the past year my relationship to free software has changed, from just being a user and advocate to an active contributor (primarily to the GNOME Project).
The other day I worked on improving the auto-scroll in Fractal (a super cool GTK+ Matrix Client). While doing this I discovered some nice features in GTK+.
Fast-forward two years, I have a couple of small Rust projects and some contributions and continuing to enjoy the language. So, it should be of no surprise that when I learned about GSoC I started looking for Rust-related projects. I applied to both Xi (a novel text editor with a fully async architecture) and librsvg (a GNOME library for rendering SVG files) and got accepted into librsvg on a project to help with the ongoing effort to port it to Rust, specifically the SVG filter effects.
[...]
Next comes the most interesting part, experimenting with Rust abstractions over common filter actions, such as iterating over pixels in various ways, like one by one or using a square window. This has to be fast and ergonomic and support the different filter use cases.
The most common way to build flatpak is using a tool called flatpak-builder. This is a tool that takes a higher level description of the sources that go into an application and generate the build commands to build it. This description is called a manifest, and is traditionally a JSON file.
JSON is very common in the web world, and it is a well known format that have many implementations. However, it is not really great for humans to write.
Q4OS is an open source Debian-based distro that boasts a UI similar to that of Windows XP and Windows 7 straight out of the box. It focuses on long-term stability, security, speed, and reliability.
Q4OS was created not too long before Microsoft ended support for Windows XP on April 8, 2014. After this period many Windows users who had not completely transitioned from XP were forced to use workstations that were vulnerable to security threats, app bugs, and general unreliability.
The dev team tagged it “the right desktop for your business” and they have their commercial support feature to back it up – they are ready to provide client support by helping users with system modifications, UI customization, and core level API programming. The OS also does a good job of working with virtual cloud environments and that’s thanks to its low hardware requirements.
The PCLinuxOS Magazine staff is pleased to announce the release of the May 2018 issue. With the exception of a brief period in 2009, The PCLinuxOS Magazine has been published on a monthly basis since September, 2006. The PCLinuxOS Magazine is a product of the PCLinuxOS community, published by volunteers from the community. The magazine is lead by Paul Arnote, Chief Editor, and Assistant Editor Meemaw. The PCLinuxOS Magazine is released under the Creative Commons Attribution- NonCommercial-Share-Alike 3.0 Unported license, and some rights are reserved. All articles may be freely reproduced via any and all means following first publication by The PCLinuxOS Magazine, provided that attribution to both The PCLinuxOS Magazine and the original author are maintained, and a link is provided to the originally published article.
In the May 2018 issue:
* Firefox Quantum: The Improvements Keep Coming * PCLinuxOS Family Member Spotlight: onkelho * Short Topix: The 411 On 1.1.1.1 DNS Service * ms_meme's Nook: PCLOS Caravan * Tip Top Tips: pmiab (Poor Man's Internet Ad Blocker) - Ad Blocking Without A Browser Extension * GIMP Tutorial: Sphere Variations * YouTuber - More Tips To Get There With PCLinuxOS * PCLinuxOS Recipe Corner * Repo Review - Day Planner * And much more inside!
This month’s magazine cover image was designed by Meemaw.
Download the PDF (6.0 MB) https://pclosmag.com/download.php?f=2018-05.pdf
Download the EPUB Version (7.0 MB) https://pclosmag.com/download.php?f=201805epub.epub
Download the MOBI Version (6.7 MB) https://pclosmag.com/download.php?f=201805mobi.mobi
Visit the HTML Version https://pclosmag.com/html/enter.html
Back when EAPI 6 was approved and ready for deployment, I have written a blog post entitled the Ultimate Guide to EAPI 6. Now that EAPI 7 is ready, it is time to publish a similar guide to it.
Of all EAPIs approved so far, EAPI 7 brings the largest number of changes. It follows the path established by EAPI 6. It focuses on integrating features that are either commonly used or that can not be properly implemented in eclasses, and removing those that are either deemed unnecessary or too complex to support. However, the circumstances of its creation are entirely different.
The Arch Linux 2018.05.01 snapshot for May 2018 is here, and it's the first to be powered by the Linux 4.16 kernel series, which brings mitigations for Meltdown and both variants of the Spectre vulnerabilities for ARM64 (AArch64) architectures, as well as Spectre mitigations for IBM System z (s390) architectures.
Linux kernel 4.16 also updates numerous drivers for best-in-class hardware support, and adds various improvements to existing features, such as KVM (Kernel-based virtual machine) support for AMD Secure Encrypted Virtualization, Memory Protection Keys support for the POWER architecture, and others.
This blog is part of a series of technical blogs leading up to the release of openSUSE Leap 15. All of the blogs provide a use case regarding openSUSE Leap and the packages available in the distribution. Happy reading.
[...]
Docker implements a high-level Application Programming Interface to provide lightweight containers that run processes in isolation.
Because Docker containers are so lightweight, a single server or virtual machine can run several containers simultaneously.
What this means is that, within the Linux landscape, you can find a distribution that perfectly fits your needs and your penchant. If you want something ultra-modern, you can install any distribution that features either GNOME or KDE Plasma. If you want something moderately modern, take a look at Elementary OS, or any distribution featuring the Budgie Desktop (or Mate or Cinnamon). But what if your desktop desires are rooted in something from the past? Say Windows XP? Believe it or not, there are plenty of distributions that cater to those who long for the days of yore, when the desktop metaphor trended toward the simple Microsoftian look and feel.
Having trouble bringing containers into production? Red Hat and Hewlett Packard Enterprise (HPE) have an answer. They're optimizing Red Hat OpenShift Container Platform (RHOCP), Red Hat's Kubernetes container orchestration platform, on HPE platforms, including HPE Synergy.
Sure, it's easy to deploy containerized applications in development and test environments, but it's not so easy in enterprise-sized production environments. Enterprises often require container scalability, added security features, persistent storage, and manageability to deploy containers in production. To help speed up container application delivery, HPE and Red Hat are collaborating in what HPE calls the industry's "first composable infrastructure".
With the IoT Working Group and Edition moving forward I’ve been looking for an x86_64 device suitable for testing IoT related use cases. I was originally planning on using the MinnowBoard or Joule but given Intel has killed those product lines off it was back to the drawing board. I eventually settled on the UP€², in particular I chose the UP€² Pentium-4GB-32GB-PACK as it had everything I wanted in one box.
The Fedora Project has released Fedora 28, a significant update which includes something shunned for years – an official repository for non-free third-party apps.
The new third-party repositories allow you to easily install Chrome and Steam on Fedora 28, but for some they may come at the sacrifice of Fedora's long-standing ideals. Fedora has always had a very clear policy about which types of software were included, though it has always allowed for non-free firmware, which keeps it from making GNU.org's list of truly free distros. The new third-party repos go a step further, though, offering non-free apps in an official way.
Now that Ubuntu 18.04 LTS (Bionic Beaver) was released, it's time for the Ubuntu development team to concentrate their efforts on the next release of the Linux-based operating system.
That's right, we're talking about Ubuntu 18.10, the next Ubuntu Linux release that's expected to arrive later this fall. It will be a short-lived release supported for only 9 months, but it should come with some of the latest GNU/Linux technologies and Open Source software applications.
Now that Canonical decided to move to GNOME by default, we expect Ubuntu 18.10 to ship with the upcoming GNOME 3.30 desktop, due for release on September 6, 2018. The first point release, GNOME 3.30.1, is scheduled for September 26, so Ubuntu 18.10 might ship with this version considering it's launching sometime in October.
The Ubuntu 18.04 release arrived at the end of April and plenty of news coverage was there to greet it.
Most major tech publications no longer carry reviews of Ubuntu, instead preferring to give readers with a punchy “overview”, with a blow-by-blow rundown of the key improvements or changes at hand.
So this post is less of a “review roundup” and more of a “overview roundup”.
The good news is that plenty of such posts appeared after the Bionic Beaver burrowed its way out on April 26, 2018.
And in this article we recap the best of them!
In late April, Canonical released the final stable release of Ubuntu 18.04 Bionic Beaver. As it’s an LTS release, it’s of greater importance than other Ubuntu releases with nine-month support cycle. 18.04’s release also meant that the work on the next release has started.
Ubuntu 18.10 codename, release date, new features and everything important associated with it compiled in one single article.
Both Ubuntu MATE and Ubuntu Budgie are dropping 32-bit installer images ahead of their next stable release.
Neither Ubuntu flavour will release a 32-bit ISO image for their ‘18.10’ releases in October.
They’re not alone in doing this; the regular version of Ubuntu dropped 32-bit ISO images in 2017.
After writing the article about the Ubuntu MATE team deciding to drop support for new 32-bit installations with the upcoming Ubuntu MATE 18.10 release, we discovered that Ubuntu Budgie team also requested that 32-bit ISOs to no longer be generated for the Ubuntu Budgie 18.10 release as they want to concentrate only on 64-bit support.
"We have had a successful release of Ubuntu Budgie 18.04 LTS and we now are in full planning mode for 18.10. Similar to the decision made by Ubuntu themselves at 17.10, we have decided to concentrate all our efforts on producing a really good image based on the hardware almost all of you actually use now," said project leader David Mohammed. "From 18.10 onwards we would like to concentrate on the 64-bit ISO only."
If you're a Snap app developer, you'll be glad to know that Canonical will now send you alerts via email everytime new Ubuntu Security Notices (USNs) are published and contain details about security fixes for the staged packages in the Snap. This will work only if you use "stage-packages" in Snap's snapcraft.yaml configuration file.
"Once a day, the service examines snaps that have manifest.yaml files for their currently published channels/tracks and checks whether USNs have been issued for the versions of the staged packages in the snap. If any snap revisions are affected, the tool will generate a report to send via email," said Canonical in a blog post.
Since its inception, LXD has been striving to offer a fresh and intuitive user experience for machine containers. LXD instances can be managed over the network through a REST API and a single command line tool. For large scale LXD deployments, OpenStack has been the standard approach: using Nova LXD, lightweight containers replace traditional hypervisors like KVM, enabling bare metal performance and very high workload density. Of course OpenStack itself offers a very wide spectrum of functionality, and it demands resources and expertise. So today, if you are looking for a simple and comprehensive way to manage LXD across multiple hosts, without adopting an Infrastructure as a Service platform, you are in for a treat.
Acme has launched a rugged, 22mm thick “CM3-Panel” 7-inch capacitive touch-panel computer built around a Raspberry Pi Compute Module 3. Four models are available: WiFi, USB, WiFi and 868MHz Yarm RF, or USB and Yarm.
Acme has followed up on last December’s CM3-Home home automation carrier board for the Raspberry Pi Compute Module 3 with a 7-inch touch-panel computer built around the RPi CM3. The open spec CM3-Panel is less than 22mm thick and supports -20 to 70€° temperatures. It’s available in four different models, including two with modules that support Acme’s open source 868MHz Yarm RF radio module spec.
Diamond has launched three rugged, Linux-friendly “SabreCom” mission computers with MIL-spec connectors and IP67 protection, based on its Aries (Bay Trail), Venus (Skylake), and Zeta (Apollo Lake) boards with mini-PCIe and PC/104 expansion.
Aaeon’s 3.5-inch “GENE-APL6” SBC ships with an Intel Apollo Lake SoC, SATA storage, a pair each of GbE, USB 3.0, and mini-PCIe, and up to 128GB eMMC.
Next time I’ll probably show you our user data synchronization feature, that you can use to synchronize several device contents using safe hosting services.
Thanks to Docker, containers are everywhere now. But, while containers have revolutionized how we develop, package, and deploy applications, we've not done a great job of securing them. That's where Google has a new answer in locking down containers: gVisor.
Backed by its operator membership, the Open Networking Foundation (ONF) is continuing its effort to herd traditional telco vendors into the world of open source.
To wit: ONF announced its Optical Disaggregated Transport Network (ODTN) open source project on Wednesday, which is backed by China Mobile, Comcast, NTT, TIM and Telefónica.
Like similar efforts by ONF, ODTN was designed to put operators in control of projects and to negate vendor lock-in by allowing service providers to select best-of-breed components instead of buying an entire system from a single vendor.
On Thursday, Google unveiled Asylo, a new open source framework aimed at protecting apps and data by running them in a confidential computing environment. According to a Google blog post, Asylo also encompasses an SDK, and is geared toward developing applications that run in trusted execution environments (TEEs).
In the post, Google describes the work of TEEs as defending "against attacks targeting underlying layers of the stack, including the operating system, hypervisor, drivers, and firmware, by providing specialized execution environments known as 'enclaves.'" It also noted that TEEs can help in mitigating risks around compromise from outside parties.
Google Inc. is touting a better way for enterprises to secure their cloud applications and corresponding data in what it calls a confidential computing environment.
The company is pitching an open-source framework its just released called Asylo, which is designed to provide greater isolation for sensitive cloud workloads.
The Asylo framework will verify code integrity in enclaves, provide isolation for sensitive workloads and offer communication encryption tools. The current version of Asylo offers the ability to develop applications in enclaves portable across software and hardware backends, and the next iteration will expand to allow developers to copy and run an entire application in the protected spaces.
There are other VM-like approaches for container security isolation, but Google's Kubernetes cred could make its gVisor a multi-cloud standard for security-sensitive enterprise apps.
I'm pleased to announce the immediate availability of: Liferay Portal 7.1 Alpha 1!
Liferay Community Edition Portal 7.1 Alpha 1 is now available, which means it’s entering phase two of its beta program focused on reporting and fixing bugs within the software.
Liferay has called on the open source software community to participate in the beta program to find bugs and report them through its feedback forum.
NGINX recently released version 1.0 of Unit, an open-source web and application server. The server supports remote and dynamic configuration and incurs no service interruptions for configuration changes. Unit 1.0 also supports multiple languages (Go, Perl, PHP, Python, and Ruby) running on the same instance, including multiple versions of the same language.
NGINX Unit does not rely on a static configuration file, but is instead configured via a REST API using JSON. All configuration is stored directly in memory, allowing for changes to happen without restarting the running services. The router process is persistent and does not require a restart.
The operator-led Open Networking Foundation (ONF) has announced a new community initiative to bring the benefits of open networking to the optical domain. The Open Disaggregated Transport Network(ODTN) project looks to build new network architectures using disaggregated optical equipment, open and common standards, and open source software.
If your computer is hanging or freezing after installing the Windows 10 April 2018 Update you’re not alone, and Microsoft is aware of the problem.
Google is rolling out a new update in its latest version of Chrome which will stop websites from automatically playing sound. This means you can browse peacefully in Chrome 66 without audio randomly blaring out of your speakers.
The winners of the Firefox Quantum Extensions Challenge will be announced on Tuesday, May 8.
Tune in to the live awards ceremony on Air Mozilla at 17:00 UTC (what time is that in my region?) to discover which extensions were named Best Dynamic Theme, Best Tab Manager / Tab Organizer, and Best Extension for Games & Entertainment.
The Mozilla IoT team recently released the Things Framework, which allows you to build IoT devices that speak the Web Thing API. Last week, James built an ESP8266 web thing. This time, I’m going to show you how to build web things with Python, Node.js, or Java. These languages are definitely not optimal for small embedded devices; this tutorial is intended for higher-end devices that can run these languages with ease, or even your own desktop computer.
To demonstrate, we’ll be turning the Music Player Daemon (MPD) into a web thing. The libraries we’ll be using here are webthing-python, webthing-node, and webthing-java.
I just released libopenraw 0.1.3. It has been a year since the last release. It mostly add new cameras.
I already have a branch for a new feature that will introduce Rust, for the next release.
A changelog is “a log or record of all notable changes made to a project. [It] usually includes records of changes such as bug fixes, new features, etc.” Publishing a changelog is kind of a tradition in open source, and a long-time practice on the web. We thought readers of Hacks and folks who use and contribute to MDN Web Docs would be interested in learning more about the work of the MDN engineering team, and the impact they have in a given month. We’ll also introduce code contribution opportunities, interesting projects, and new ways to participate.
Upbound announced its new funding at the KubeCon and CloudNativeCon EU 2018 conference here, where the company has multiple talks on Rook. The Rook project formally joined the Cloud Native Computing Foundation (CNCF) on Jan. 29 as a new cloud storage effort.
You can help turn the pyramid of Albania's former communist dictator into a ham radio station for OSCAL 2018 on 19-20 May 2018. This will be a prominent demonstration of ham radio in the city center of Tirana, Albania.
Under the rule of Enver Hoxha, Albanians were isolated from the outside world and used secret antennas to receive banned television transmissions from Italy. Now we have the opportunity to run a ham station and communicate with the whole world from the very pyramid where Hoxha intended to be buried after his death.
While the funding goal hasn't been reached yet, my other goal, learning a little bit about the workings of crowdfunding sites, has been helped along by this experience. Before trying to run something like this again I'll look a little harder for a self-hosted solution that I can fully run through my blog.
I've told GoFundMe to immediately refund all money collected through their site so donors can send money directly through the Paypal donate link on my blog. If you would like to see the ham radio station go ahead at OSCAL, please donate, I can't take my own batteries with me by air.
While the debut of GCC 8.1 was the GNU Project's biggest software release of the week, GNU Octave 4.4 also crept out as the latest feature release.
Octave, the high-level programming language for numerical computations akin to -- and largely compatible with -- MATLAB, is out with its newest stable feature release.
The new Version 8.1 of the Gnu Compiler Collection (GCC) improves diagnostics and C++ support. GCC provides front ends and libraries for the Ada, C, C++, Fortran, and Google Go languages.
Despite what the version number indicates, GCC 8.1 is actually the first production release in the new GCC line.
GCC 8.1 was released yesterday. This is a major release and contains "substantial new functionality not available in GCC 7.x or previous GCC releases". See this page for a summary of the "huge number of improvements", including improvements to inter-procedural, profile-driven and link-time optimizations.
The Australian Government has been urged not to trade off short-term budget savings for the country's long-term prosperity by making changes to the $3 billion R&D Tax Incentive and restricting claims for software R&D.
The Australian Labor Party says it is committed to fast, reliable and affordable Internet for the country, and that means more fibre in whatever remains of the NBN rollout after the next election which it expects to win.
With the inflation in textbook prices over the past few decades comes a reasonable need for more affordable learning. Open Educational Resources has created a solution to this inflation.
OERs can be defined as open source textbooks or other educational materials, usually for lower level undergraduate classes, that are low cost or even free to use for educators and their students.
The movement toward a more open source educational system is of high importance to the Ohio Dept. of Higher Ed. and they, along with OhioLINK, Ohio’s Library Consortium, have been very interested in making these resources more available to all educators.
2018 has been a busy year already, and we’re not even halfway through. Eclipse Che 6 brought team and enterprise features including multi-user and multi-tenancy as well as a large number of other great capabilities (you can read all about it in our Che 6 release post).
Python is a very popular general purpose programming language — with good reason. It’s object oriented, semantically structured, extremely versatile, and well supported. Programmers and data scientists favour Python because it’s easy to use and learn, offers a good set of built-in features, and is highly extensible. Python’s readability makes it an excellent first programming language.
Data visualization is an important method of exploring data and sharing results with others. When it comes to this field, Python is rubbing shoulders with R as the language of choice. Unfortunately, Python’s visualization landscape is pretty difficult to fathom without some serious digging. In part, this is because there are so many good open source Python visualization libraries available. Some of the packages are suitable for any field, others excel at a specific task.
Measurement Computing Corporation (MCC) today announced the release of Universal Library (UL) for Linux, a programming library for use with MCC DAQ devices. Due to the strength and growth of the Linux community, the need for open-source DAQ solutions has increased. Th
There’s a belief in some open source circles that standards can be consigned to the ash heap of history now that OSS development has become so central to information technology. While it’s true that today many use cases can be addressed with OSS where open standards would have been used in the past, that approach can’t solve all problems. Most obviously, while resolving interoperation issues through real-time collaboration among up and downstream projects may meet the need within the same stack, it doesn’t help that stack communicate with other software.
Blockchain technology is an architecture where collaboration on software alone will often not suffice to meet the challenge at hand.
The number one rule in open source marketing is: You have to participate in the community. But participate how? Where? And how often? Doing those things right is the key to successful engagement.
Fortunately, Kim McMahon of IT marketing firm McMahon Consulting answers those questions and more in her Lightning Talk, "Promoting Your Open Source Project and Building Online Communities Using Social Media," at the 16th annual Southern California Linux Expo (SCALE).
Focusing on audience needs also helps to reduce personal bias or favoritism. When you're thinking of the perspectives of others, it's a lot harder to be influenced your own. Naturally, reviewers should rely on their own personal knowledge—such as whether the subject is popular right now or (if proposals are not being reviewed blind) whether the proposer is a missing stair—but they should also be careful not to put their own needs or those of their employer before those of the audience.
When the agreement on intellectual property was adopted by the World Trade Organization, a number of flexibilities were included in the text, mainly to give developing countries policy space to implement the agreement with development considerations. However, some countries through lack of awareness or economic pressure have not used those flexibilities fully, and found themselves facing difficulties addressing their public health needs, which some associate with this failure to use the flexibilities. Civil society has engaged in notable efforts to counter pressure and raise policymakers’ awareness for a wider access to medicines.
This week the media reported that the Brazilian federal court removed the patent protection for eculizumab, sold under the brand name Soliris by Alexion Pharmaceuticals Inc. Eculizumab is used in the treatment of paroxysmal nocturnal hemoglobinuria (PNH), a rare and life-threatening blood disease. The product was approved by the US FDA for this indication in 2016. Brazil’s health care system spent $184.2 million to treat 442 patients with Soliris, an average of over $416,000 per patient. The ruling of the federal court may affect more pharmaceutical mailbox patents. This blog explains why this is.
When the World Trade Organization (WTO) was created, and the TRIPS Agreement went into force on 1 January 1995, Brazil did not grant patents for pharmaceuticals. Therefore Brazil could make use of a transitional flexibility in the TRIPS Agreement that allowed developing countries not yet granting medicines patents to delay the granting of patents until 1 January 2005. TRIPS (Article 70.8), however, did require countries that made use of this transition flexibility to provide a mailbox in which would-be patent holders could file their patent applications from 1 January 1995 onwards. Brazil had such a mailbox, which was maintained until May 1997 when Brazil’s new TRIPS-compliant patent law went into force and the National Institute of Industrial Property (INPI), the Brazilian patent office, started to grant pharmaceutical patents. Brazilian patent law (Article 40) prescribes that the patent term shall be 20 years for inventions. The patent term was set to be 20 years from filing and not less than 10 years from the date of grant. This minimum 10-year protection is not required by TRIPS and was included to cover instances where the INPI would take more than 10 years to examine and grant a patent. The 10-year minimum did not extend to mailbox patents; however, INPI has been granting mailbox patents with a ten-year duration since 1997 even though this was not required. Hence, patent PI 9507594 claiming eculizumab granted on 10 August 2010 was due to expire 10 years later.
For some time, we’ve wanted a mechanism to alert snap publishers to security updates which affect their snaps. All the pieces have come together and we are now sending alerts via email. Stated more precisely, publishers who use ‘stage-packages’ in their snapcraft.yaml will now be alerted when Ubuntu Security Notices (USNs) have been issued for their staged packages. An example report looks like this:
Twitter is ringing in World Password Day by notifying its users, all 330 million of them, that their login credentials were left unencrypted in an internal log file and should be changed.
Chief technology officer Parag Agrawal broke the news on Wednesday that its internal team had found that, while passwords are usually stored scrambled by encryption, something had caused at least one log to record them in plaintext.
[...]
The timing of the disclosure is particularly bad for Twitter, as much of the internet is today observing World Password Day by raising awareness of good password management practices and safe storage.
Certainly this was not the type of exposure Twitter was seeking, particularly as it tries to beef up its protection of user data in the wake of the Cambridge Analytica data-harvesting scandal.
Twitter has advised its 330+ million users to change their passwords, following the discovery of a bug that stored passwords in plaintext.
The microblogging site Twitter is advising its 336 million users to change their account passwords immediately. The reason, a bug in their system exposed the passwords in plain text.
According to a blog post, the bug (now fixed) existed in the hashing process that is used to secure account passwords by turning them into random numbers and characters.
Microsoft has emitted a patch to fix a critical vulnerability in a wrapper used to launch Windows Server Containers from Go.
The issue (CVE-2018-8115) is a nasty one, allowing remote code execution when importing a container image due to a failure of the library to validate what was on the way in.
Exploiting the issue could be a challenge, as Microsoft stated:
"An attacker would place malicious code in a specially crafted container image which, if an authenticated administrator imported (pulled), could cause a container management service utilising the Host Compute Service Shim library to execute malicious code on the Windows host."
Israeli Prime Minister Benjamin Netanyahu’s claim in his theatrical 20-minute presentationof an Israeli physical seizure of Iran’s “atomic archive” in Tehran would certainly have been the “great intelligence achievement” he boasted if it had actually happened. But the claim does not hold up under careful scrutiny, and his assertion that Israel now possesses a vast documentary record of a covert Iranian nuclear weapons program is certainly fraudulent.
Netanyahu’s tale of an Israeli intelligence raid right in Tehran that carted off 55,000 paper files and another 55,000 CDs from a “highly secret location” requires that we accept a proposition that is absurd on its face: that Iranian policymakers decided to store their most sensitive military secrets in a small tin-roofed hut with nothing to protect it from heat (thus almost certainly ensuring loss of data on CDs within a few years) and no sign of any security, based on the satellite image shown in the slide show. (As Steve Simon observedin The New York Timesthe door did not even appear to have a lock on it.)
New York Times Cairo bureau chief Declan Walsh went to Benghazi, Libya, which is in ruins, to find out how it got that way.
“When I went to Benghazi, I was guided by one main question: How did the city come to this?” he declares in his multimedia presentation, which combines text, audio, video and large-format photography. One thing that’s not conveyed via any medium, though: Seven years ago, the United States and its allies used military force to overthrow Libya’s government. The country has been in almost continual civil war since then, which you would think would be crucial in explaining “how the city came to that.” But apparently you don’t think like a New York Times bureau chief.
The thing is, when President Barack Obama—egged on by Secretary of State Hillary Clinton—called for an attack on Libya, the justification they offered was that Libyan leader Moammar Gadhafi would otherwise destroy Benghazi. So the fact that military intervention actually turned out to lead to the destruction of Benghazi seems like something you might want to tell Times readers, or Times consumers of multimedia, anyway.
Pamela Anderson, the former poster girl for Malibu and red swimsuits, has moved from sunny California to the south of France with her new boyfriend, French soccer star Adil Rami. But Anderson, 50, has also created an unlikely network of influential friends and world figures. She’s pals with GOP billionaire Sheldon Adelson, Bill Clinton, and former congressional candidate and now kosher sex guru Rabbi Shmuley Boteach. Anderson has also been asked to speak at a wide range of venues, including the Kremlin, where she discussed the fate of Siberian tigers. There have even been rumors about her dating Vladimir Putin, The Hollywood Reporter writes.
Even the most devoted Baywatch fans would hesitate to claim that the 1990s television hit was an obvious launchpad for a globe-trotting activism career in the company of some of the world’s most powerful people.
Matt Wender’s vision for Fayette County begins with the New River Gorge. Whitewater rafters, hikers and mountain bikers congregate there every summer. Craft beer and artisan pizza are helping his home emerge as an outdoor tourism hub.
Just upstream from the river, there’s another reality: A company called Danny Webb Construction Inc. pumps waste from natural gas drilling underground. Chloride, strontium, lithium and other markers of gas waste have been found in Wolf Creek, which flows into the river.
In the southeast corner of the county, developers of a 300-mile gas pipeline hope to turn a wooded, 130-acre plot into the site of a gas compressor station, a facility local leaders say would be noisy and would change the inviting nature of the area.
But Americans, as of now, have nowhere else to turn. The habits of the library and the newsstand, to say nothing of pre-digital social life, are lost to us. Instead, we’re stalled in the data smog that hangs over social media and search engines.
Never underestimate the capacity of the United States’ Inauthentic Opposition Party, the corporate Democrats, for self-congratulatory delusion and the externalization of blame.
Look, for example, at the Democratic National Committee’s (DNC) recently filed 66-page lawsuit against Russia, WikiLeaks, and the 2016 Donald Trump campaign. The document accuses Russia of “mount[ing] a brazen attack on the American democracy,” “destabilize[ing] the U.S. political environment” on Trump’s (and Russia’s) behalf, and “interfering with our democracy….”
“The [RussiaGate] conspiracy,” the DNC Complaint says, “undermined and distorted the DNC’s ability to communicate the [Democratic] party’s values and vision to the American electorate” and “sowed discord within the Democratic Party at a time when party unity was essential…”
The cushioned world of denial within which some corporate journalists live, at this time of national crisis, was best reflected by Bloomberg senior White House reporter Margaret Talev's telling CNN that she "regretted" that Michelle Wolf's now-infamous remarks at the April 28 White House Correspondents' Association dinner "are now defining four hours of what was a really wonderful, unifying night. And I don't want the cause of unity to be undercut."
Think for a moment about that statement.
A major national journalist believes that "a unifying night" is possible at a gala in which a free press mingles with members of a historically unprecedented American pre-fascist regime that demonizes and blackballs truthful reporters, tells flagrant lies with breathtaking and ferocious regularity, eagerly dooms human life on Earth by embracing fossil-fuel falsehoods for the sake of a few decades of profits, rationalizes murders by white supremacists as being equivalent to the nonviolent protests of anti-racists, fills this administration with outrageous liars and spouse abusers and defiantly corrupt industry cronies, defies the Constitutional Emoluments Clause's prohibition of personal financial gain from the presidency and defiles the moral body of the presidency with Trump's profane hatred and contempt toward women.
Bloomberg's Talev apparently believes that conscientious journalists can make peace with these obscenities for at least one nationally televised evening in the spirit of a long-standing Washington media tradition. So, it appears, do venerable NBC reporter Andrea Mitchell (who called for Wolf to apologize for her remarks) and The New York Times' Maggie Haberman and Peter Baker.
Jared Kushner’s ethics disclosure filing misstated the financials on two Brooklyn loans, the latest in a long series of errors and omissions on the form.
A Kushner representative confirmed the errors, attributing them to data entry and accounting mistakes. The representative said the figures will be revised in the next annual filing, which is due soon.
The form has been updated at least 40 times since Kushner first submitted it in March 2017. Each update can contain multiple revisions.
The newly revealed errors center on a pair of loans that Kushner Companies made to projects at 215 Moore Street in Bushwick and 9 DeKalb Avenue in downtown Brooklyn.
Lobbyists who joined the Trump administration and now want to return to their old trade have a problem: President Trump said they can’t.
Days after taking office, President Donald Trump signed an executive order requiring every political appointee to sign a pledge as a condition of taking office. The appointees agreed not to lobby the agencies they had worked in for five years after they left government service. Nor would they lobby anyone in the White House or political appointees across federal agencies for the duration of the Trump administration.
But never doubt the ingenuity of the Washington swamp class. At least eight former Trump officials have found ways around the so-called ethics pledge.
Using staffing lists compiled for ProPublica’s Trump Town, the first exhaustive database of current political appointees, we found at least 184 people who have left the Trump administration. Of those, at least six former officials are now registered lobbyists and several others work at firms in roles that resemble lobbying in all but name.
Twenty-five years ago, the so-called New Democrats were triumphant. Today, afundamental battle for democracy is in progress—a conflict over whether to reduce the number of superdelegates to the party’s national convention in 2020, or maybe even eliminate them entirely.
That struggle is set to reach a threshold at a party committee meeting next week and then be decided by the full Democratic National Committee before the end of this summer.
To understand the Democratic Party’s current internal battle lines and what’s at stake, it’s important to know how we got here.
After a dozen years of awful Republican presidencies, Bill Clinton and running mate Al Gore proved to be just the ticket for the corporate wing of the Democratic Party. Clinton settled into the White House in early 1993 as the leader of pathbreaking New Democrats. Many media outlets hailed him as a visionary who had overcome left-leaning liberalism to set the party straight.
In filing a lawsuit accusing Russia, the Trump campaign, and Wikileaks of a conspiracy to win the 2016 election, Democratic National Committee chair Tom Perez says the party is standing up to Russian meddling in not just that contest, but in the next one as well. “[When] you’ve seen attempted interference in the past, they’re going to do it again,” Perez told NBC News. “I’m punching back for democracy.”
The lawsuit is an outgrowth of the Democratic Party’s more than yearlong focus on Russiagate “above all else,” as a top Hillary Clinton aide once described it. This approach has definitively shaped both the resistance to Donald Trump and the media coverage of his presidency. Trump’s critics have clung to the hope that Special Counsel Robert Mueller will undo his presidency, leaving Democrats and pundits to focus less on White House policies than on its endless controversies and rotating cast of characters.
As I write, with over 75% of all yesterday’s English local election results in, Labour has a net gain of 55 councillors compared to the high water mark of the 2014 result in these wards, while the Tories have a net gain of one seat against a 2014 result which was regarded at the time as disastrous for them, and led the Daily Telegraph to editoralise “David Cameron Must Now Assuage the Voters’ Rage”.
Yet both the BBC and Sky News, have all night and this morning, treated these results, in which the Labour Party has increased by 3% an already record number of councillors in this election cycle, as a disaster. What is more, they have used that false analysis to plug again and again the “anti-Semitism in the Labour Party” witch-hunt. It was of course the continuous exacerbation of this mostly false accusation by Blairite MP’s which – deliberately on their part – stopped the Labour Party doing still better. The Blairites are all over the airwaves plugging this meme again today.
Since the 2016 presidential election, political committees have spent at least $3.1 million at various properties owned by The Trump Organization, including hotels, restaurants, golf courses and the famed Mar-a-Lago Club in Palm Beach, Florida. The vast majority of the spending — all but $731 of it — was done by committees connected to Republicans.
The $3.1 million is on top of the $12.5 million spent during the 2016 campaign, which mostly paid for flights taken by the campaign on Trump’s private plane.
In our FEC Itemizer database, we’ve started tracking details on which committees spend money at Trump-owned properties and how much they spend. The data comes from expenditure reports submitted to the Federal Election Commission by the committees. The data will be updated monthly, and more often when, closer to the election, multiple filing days occur in a month.
Ars requested a comment from Amazon, but we have not yet received a response. Meanwhile, Amazon and Google have had to contend with widespread blocking of their services in efforts to stop the use of domain-fronting proxies and other cloud-proxy services, especially in Russia—where Roskomnadzor, Russia’s federal communications authority, has ordered the blocking of the encrypted chat applications Zello and Telegram and, in the process, blocked portions of Amazon’s and Google’s networks.
The Malaysian government got a jump on the rest of the world by being the first to actually enact a "fake news" law. The government had several hundred million good reasons to do so, most them residing in the prime minister's bank account. Lawmakers cited concern for the public's well-being, but critics noted the law was just an efficient way for the government to shut down reporting it doesn't like.
The nation's Ministry of Truth (a.k.a., the Malaysian Communications and Multimedia Commission) cited free speech champion Donald Trump as the inspiration for this new censorship tool.
[...]
There's a difference between a police car and an ambulance, which may make the video technically correct. But that really shouldn't matter. Even if his claims were false, there's no way the government should have reacted with anything more than a statement denying Sulaiman's claims. The new law allows the government to arrest and fine anyone who publishes anything the government disagrees with. Six months in jail and fines up to $128,000 are one hell of a chilling effect. All the government seemingly needs to do to make charges stick is deny allegations made by citizens -- or in this case, a nonresident visitor who claims he did not know the government had recently outlawed 'fake news."
Those concerned about the state of speech protections around the world will view this as severely troubling. Those who actually have the power and desire to further restrict criticism and unfavorable reporting will see nothing but upsides for enacting legislation targeting "fake news."
Germany's terrible speech laws continues to be tools for abuse and stupidity. A recently-enacted law holds service providers responsible for lingering "hate speech" to the tune of €50m per violation. Social media companies have shown a tendency to over-enforce, resulting in the preemptive removal of things even the badly-written law doesn't consider criminally hateful.
Whatever damage social media companies are doing in order to steer clear of massive fines, politicians are compounding by using the law to target opponents and critics. Courthouse News Service reports a German court has indulged a politician's hypocritical outrage to demand the disappearance of a critical, but hyperbolic, comment posted to Facebook.
Reporters Without Borders has gone public with an interesting project called Uncensored Playlist, which asks musicians to turn censored articles into pop songs.
The idea was sparked after the organisation noted that streaming services like Spotify and Apple Music often remain freely available in countries where media censorship online is otherwise rife. This, they realised, presented an opportunity to circumvent these barriers to information.
To launch the project, Uncensored Playlist worked with five journalists from China, Egypt, Thailand, Uzbekistan and Vietnam, who have all experienced censorship. Initially, the songs were released without any promotion, so as not to alert authorities. It proved successful, with the Vietnamese songs they created reaching the top ten in the country’s streaming charts.
The annual Delta Sigma/Delta Upsilon art competition took place on April 14 in Smith Union. While this event ostensibly served as a “way to continue the tradition of ‘non-formalized’ creativity that Delta Sigma/Delta Upsilon fostered during its time at Bowdoin,” the actions of the curators belied a more elitist vision of what works warranted inclusion.
[...]
The irony is clear. An art competition, whose goal was to promote “‘non-formalized’ creativity,” was the locus of censorship. We do not profess to represent traditional art—none of the collective’s members study visual media, nor do we feel entitled to display our art in any public space on campus. We merely wished to exhibit our works in an art show that was open to the entire campus, with no qualifiers as to quality or content of submissions. The non-inclusion, both metaphorically and physically, of our works speaks to a censorship we find especially troubling. A vital art scene requires freedom to explore all themes in all media. We won’t apologize for our vision; we won’t compromise on our self-expression.
Governments across the world continue to suppress media through censorship or even arrests of journalists on dubious grounds, a prominent human rights watchdog said on Thursday on occasion of the World Press Freedom Day.
“Governments the world over want to control the media – without an inconveniently free press, officials find it easier to do what they want .
There are three ways for governments to exercise control over the media: by enacting and enforcing laws that make free speech impossible and that hold out the threat of prison for any violation of those laws; by fear and intimidation, harsh and subtle, over owners, editors and journalists, but without any legal basis; and, perhaps the most dangerous of them all, by seduction. Of course, killing journalists is the most extreme form of pressuring the media and sadly, India is no exception to that.
Last week 13 journalists and staff working for Turkey’s Cumhuriyet newspaper were convicted of terrorism-related crimes and given sentences that ranged between two and a half and eight years. The defendants and their lawyers told the court, ‘journalism is not a crime’, but in Turkey, where there are more than 174 journalists and media workers in prison, it would appear that it is.
Today is World Press Freedom Day, a day to both celebrate press freedom and defend the media from attacks. Increasingly, it would appear that we are doing more of the latter than the former. One of the trends that we at ARTICLE 19 have observed in our work around the world, is that most journalists, wherever they are reporting, are facing an increasingly hostile environment .
What do you do when a government censors the media? You use social networks.
This was how thousands of young Nicaraguans started the #SOSNicaragua movement as the country’s government censored independent outlets and violently suppressed protests. All in just seven days.
As seen in the Arab Spring and the #19S mobilization in Mexico, Nicaraguans managed to organize and report through the only means that the state did not control: the internet. Social media was key for Nicaraguans to rise up and take to the streets demanding justice and for reporters to cover the protests.
Conservative claims that Facebook's liberal staff treats them unfairly have been simmering for years — and exploded in 2016 — but are gaining momentum as Facebook concedes it made missteps in moderating the vast amount of content that streams through its platform.
Unsafe? Two black women who like President Trump? Yes, unsafe, all right, but only to Democratic electoral prospects.
On World Press Freedom Day when the U.N. chief was touting the "invaluable" role of a free press, a U.N. panel discussion on international media freedom and fake news was suddenly postponed, sparking accusations of censorship.
The postponement was raised at Thursday's official U.N. event marking World Press Freedom Day, where Secretary-General Antonio Guterres said in a video message that the service of the media to the public "is invaluable."
Robert Mahoney, deputy executive director of the Committee to Protect Journalists thanked organizers of the official event for shining a light on the work of journalists — but said unfortunately "as we battle censorship around the world ... the panel was cancelled because one of the presenters was going to mention by name countries that jail journalists."
In his World Press Freedom Day message on Wednesday, the United Nations secretary general called a free news media “crucial to building transparent and democratic societies.” By the end of day, though, a United Nations group was itself facing accusations of censorship.
The group, the United Nations Alliance of Civilizations, “postponed” a panel discussion marking World Press Freedom Day and acknowledged asking a participant to alter a video presentation that had singled out countries with heavy restrictions on the news media.
The alliance, a political initiative of the United Nations, said in a statement that the event was put off because the scheduled time had conflicted with another World Press Freedom Day event.
Hey, everyone, today is World Press Freedom Day, which is a day created by the UN to "celebrate the fundamental principles of press freedom," to "assess the state of press freedom throughout the world" and to "defend the media from attacks on their independence." Sounds good, right? So how is the UN itself celebrating World Press Freedom Day? Why, by refusing to allow a presentation to be heard that calls out Turkey for its suppression of press freedom.
For real.
The News Literacy Project -- which, as the name suggests, seeks to increase new literacy among students -- was all set to do a presentation at the UN's Alliance of Civilizations (UNAOC) for World Press Freedom Day. However, just before the event, the UNAOC told NLP that it was "indefinitely postponing" their presentation unless references to the suppression of press freedoms in Turkey were removed. Really.
Since I’ve started eelo.io, at the end of 2017, I had many discussions about the privacy of Chinese smartphone firmwares. Many people told me: if it’s technically possible to put some anti-privacy features into the firmware, they do it.
What would be the benefit of running eelo on such smartphones if their proprietary firmware drivers leak some personal data to corporates or to the Chinese government?
We solved privacy in the natural world with clothing, shelter, manners and laws. So far in the digital world, we have invisibility cloaks and the GDPR. The fastest way to get the rest of what we need is to recognize that privacy isn't a grace of platforms or governments.
In the physical world, privacy isn't controversial. In the digital world, it is.
The difference is that we've had thousands of years to work out privacy in the physical world, and about 20 in the digital one. So it should help to cut ourselves a little slack while we come up with the tech, plus the manners and laws to go with it—in that order. (Even though the gun has been jumped in some cases.)
A recent ICE raid of a New York farm made national headlines thanks to the agency's apparent disregard for the Fourth Amendment, among other things. The show of force, coupled with the lack of Constitutional compliance, presented ICE as ruthless enforcers of the law. But there's not much respect for the "rule of law" contained in these actions, no matter how the current administration -- with its emphasis on expelling foreigners from the US -- presents itself.
[...]
ICE can't honestly say it doesn't need warrants to perform these actions. Its own training manual (published by Unicorn Riot) stresses the need for warrants. Searches still require warrants, even if they're looking for illegal activity. ICE can search businesses for illegal workers, but it still needs "Blackie's" warrants (named after a 1981 case brought against the INS), which allow the government to search for people, rather than property. There is no known warrant exception to intrude on private land to search for illegal workers. ICE may feel the Alternatives to Detention program gives it the right to search homes occupied by members of the program (and it does), but when the home resides on property owned by a US citizen, the barrier to entry remains a search warrant. The immigrant arrested in this case had proper documentation to work and resided in a house owned by John Collins on the C
Internet technology has increasingly become compromised and militarized. More and more hackers are active in cyberspace, and the scope of their activities poses a serious threat to global security, German newspaper Sueddeutsche Zeitung wrote.
"The Internet is an American invention; the NSA dominates surveillance and sabotage, just as Facebook, Google and Apple run the commercial side. After all, the work has been going on for years," the newspaper noted.
[...]
"Because one could do something terrible to each other, one would renounce their use. In fact, such resources are used constantly, never with full force, but by more and more states," the newspaper concluded.
Earlier, US Senator John McCain called on the United States to take an offensive stance in the information war with Russia and expressed sharp criticism of Trump's perception of Moscow as a potential ally.
Prior to getting their big break through a public database used by genealogy enthusiasts to find potential relatives, investigators hunting the Golden State Killer used a subpoena to force a DNA testing company to reveal the identity of one of its customers.
That news will add to a growing debate over the balance between law enforcement and genetic privacy sparked by the dramatic arrest last week of Joseph James DeAngelo, believed to have committed 12 murders and at least 51 rapes in California.
Recently, a genealogy service provided law enforcement with the information they needed to locate a murder suspect they'd been hunting for over forty years. GEDMatch admitted it was the service investigators used to find a familial match to DNA samples it had taken from crime scenes. This revelation led people to question how private their DNA data was when shared with genealogy services. The answer is, of course, not very, what with the purpose of these services being the matching of DNA info from thousands or millions of unrelated individuals.
Police created a fake account to submit the sample they had and received matches that allowed them to narrow down the list of suspects. This was combined with lots of other regular police work -- combing public records and obituaries for living relatives near the locations the crimes occurred -- to gradually hone in on Joseph James DeAngelo, who is believed to have murdered twelve people and committed at least 51 rapes.
But there was more to this than the DNA search at GEDMatch. Investigators had also used a service called FamilyTreeDNA to look for possible matches. The public database maintained by the company apparently helped investigators narrow down the list of suspects. Peter Aldhous of Buzzfeed has more details.
Earlier today in the U.S. Capitol Visitor Center, EFF convened a closed-door briefing for Senate staff about the realities of device encryption. While policymakers hear frequently from the FBI and the Department of Justice about the dangers of encryption and the so-called Going Dark problem, they very rarely hear from actual engineers, cryptographers, and computer scientists. Indeed, the usual suspects testifying before Congress on encryption are nearly the antithesis of technical experts.
The all-star lineup of panelists included Dr. Matt Blaze, professor of computer science at the University of Pennsylvania, Dr. Susan Landau, professor of cybersecurity and policy at Tufts University; Erik Neuenschwander, Apple’s manager of user privacy; and EFF’s tech policy director Dr. Jeremy Gillula.
Every Californian from Yreka to Chula Vista, from Pismo Beach to Truckee, deserves a say in what types of surveillance technology are deployed in their communities and the governing policies for their use. They deserve a public process in which officials who are accountable to voters make the ultimate call about whether or not to acquire spy technology. The public deserves periodic updates from law enforcement officials about the impact of these technologies on public safety and civil liberties.
EFF has joined a statewide coalition to support S.B. 1186, a California bill introduced by Sen. Jerry Hill to enact baseline transparency measures for every police department, sheriff’s office, district attorney’s office, school district and state university public safety department, the California Highway Patrol, and California Department of Justice.
A resident of Virginia, with the ACLU's help, has won at least a partial victory against the mass collection of license plate/location info by automatic license plate readers (ALPRs). The question of whether or not mass collections of this data violated state privacy law has been answered, which may mean significant changes to the way state law enforcement deploys them.
Virginia's history of ALPR use is questionable, to say the least. Some towns in the state obtained ALPRs by claiming a need to swiftly capture the worst of the worst criminals, but decided to put them to use locating people behind on their property taxes. In 2013, state police were discovered to be using ALPRs to troll parking lots at political rallies, giving law enforcement a convenient way to connect drivers to their political leanings. Many of these devices were deployed without public comment or oversight. And law enforcement agencies drew a blank when asked for documentation of the devices' crime-fighting effectiveness.
This passive collection violated the state's "Government Data Collection and Dissemination Act," which forbids collection of personal information without a "clearly established need" to do so. The law prevents codification of abusive practices by requiring agencies looking to harvest personal information to seek approval first, rather than ask for forgiveness later.
On Tuesday, at the Facebook developers conference, CEO Mark Zuckerberg once again asked the social media site's users for their trust, when he announced a new privacy control for the site. Called "clear history," Zuckerberg claims it will allow users to clear their browsing history on Facebook, apparently including activity like which Web sites one has visited.
This is an empty gesture. Facebook is clearly attempting to placate an angry public and defend itself against scrutiny by the US government, but it is still putting the impetus to protect user privacy on users, rather than simply choosing not to collect information on Facebook users in the first place.
It will surprise many people clicking this new button to learn that, while Facebook says you will be able to clear your history, the company will still have a copy of that activity -- it just won't be associated with your account.
This is a symptom of a fundamental problem. When you interact with Facebook, you are giving up control over your computing to a server run by someone else -- it's Service as a Software Substitute. The parts of it that do run on your local system are nonfree JavaScript.
During preparations for my GSoC project, I’m finding first traces left by developers who dealt with OpenPGP before. It seems that Florian was right when he noted, that there is a lack of usable higher level Java libraries as I found out when I stumbled across this piece of code. On the other hand I also found a project which thrives to simplify OpenPGP encryption as much as possible. bouncy-gpg – while apparently laying its focus on file encryption and GnuPG compatibility – looks like a promising candidate for Smacks OX module. Unfortunately its code contained some very recent Java features like stream semantics, but I managed to modify its source code to make it compatible down to Androids API level 9, the version Smack is currently targeting. My changes will eventually be upstreamed.
“The most recent [Facebook] scandal has served to expose a broken and unbalanced ecosystem reliant on unscrupulous personal data collection and micro-targeting for whatever purposes promise to generate clicks and revenues.
“The digital information ecosystem farms people for their attention, ideas and data in exchange for so called ‘free’ services. Unlike their analogue equivalents, these sweatshops of the connected world extract more than one’s labour, and while clocking into the online factory is effortless it is often impossible to clock off.”
Cambridge Analytica sought information on Facebook to build psychological profiles on a large portion of the U.S. electorate. The company was able to amass the database quickly with the help of an app that appeared to be a personality test. The app collected data on tens of millions of people and their Facebook friends.
A national campaign to amend state constitutions to protect “victims’ rights” would jeopardize our constitutional rights.
Since 2008, a national campaign entitled “Marsy’s Law” has sought to enshrine in state constitutions a specific and lengthy set of victims’ rights. Funded by California billionaire Henry Nicholas, the campaign’s goal is to lock its formula into every state constitution and then to amend the U.S. Constitution to include similar victims’ rights. Though well intended, the Marsy’s Law formula is poorly drafted and is a threat to existing constitutional rights.
Marsy’s Law has hit resistance in states in which legislatures must approve a constitutional amendment before it goes to the voters. The New Hampshire House of Representatives recently voted down Marsy’s Law by a vote of 284 to 51. The Idaho Legislature voted down similar legislation for the second time this year. However, Marsy’s Law will be on the ballot in a handful of states wherein only signatures are needed to put an issue before the voters in November. The potential impact of Marsy’s Law, both at the state and national level, warrants national attention and alarm.
Marsy’s Law is premised on the notion that victims should have “equal rights” to defendants. This opening salvo is a seductive appeal to one’s sense of fairness. However, the notion that victims’ rights can be equated to the rights of the accused is a fallacy. It ignores the very different purposes these two sets of rights serve.
The U.S. Constitution and all 50 state constitutions guarantee defendants’ rights because they are rights against the state, not because they are valued more by society than victims’ rights. Defendants’ rights only apply when the state is attempting to deprive the accused – not the victim – of life, liberty, or property. They serve as essential checks against government abuse, preventing the government from arresting and imprisoning anyone, for any reason, at any time.
Early last month, the FTC took a small step towards enforcing a decades-old law. The 1975 Magnuson-Moss Warranty Act forbade manufacturers from placing repair restrictions on electronic devices costing over $5. This means the little stickers claiming "warranty void if removed" are not just bullshit. They're also illegal.
Forty years of "void if removed" stickers being plastered on tons of consumer electronics means the law has done little to prevent manufacturers from placing repair restrictions on consumers. The language is so ubiquitous consumers assume tinkering with their purchased products will instantly void warranties. Many also believe taking their electronics to anyone but the manufacturer (or manufacturer-approved repair shops) for service will similarly remove warranty protections.
The fact is that the burden rests on manufacturers to prove any tinkering or third-party repair voided the warranty's coverage. Of course, given the number of restrictions and exceptions contained in electronic device fine print, chances are doing anything to anything is probably gives manufacturers the "evidence" they need to duck out of warranty obligations.
FIFA should call on the Kremlin to secure the unconditional release of a Chechen human rights defender before the start of the 2018 World Cup championship, Human Rights Watch said today. The tournament, which Russia is hosting, starts June 14. Grozny, Chechnya’s capital, is slated to be the home base for Egypt’s national team during the tournament, making Chechnya part of FIFA’s World Cup operations.
The defender, Oyub Titiev, 60, is Grozny director for Memorial, Russia’s leading human rights group. Titiev has been in jail since his arrest on January 9 on bogus marijuana possession charges. The fabricated case against him seems to be part of an effort by Chechen authorities to shut Memorial out of the region. Memorial is the only rights group remaining on the ground in Chechnya, and its departure would leave victims of human rights abuses with no local recourse. If convicted, Titiev faces a maximum 10-year prison sentence. On May 3, Chechnya’s Supreme Court will review Titiev’s appeal against the extension of his pre-trial custody.
Sens. Corker and Kaine have a deadly plan to cede Congress’s war-making powers to the presidency.
Just when you thought things couldn’t get any worse with this Congress, a bipartisan pair of senators have teamed up to write the single most dangerous piece of unconstitutional legislation of this Congress.
Last week, Sens. Bob Corker (R-Tenn.) and Tim Kaine (D-Va.) introduced S. Res. 59, which is a new Authorization for Use of Military Force (AUMF). An AUMF is roughly the modern equivalent of a declaration of war, and the Corker-Kaine AUMF gives President Trump and lots of future presidents the authority to take the country to war against an endless list of groups and individuals in an endless list of countries.
The result will be true global war without end.
The two senators wanted to get a quick vote in the Senate Foreign Relations Committee last week and have the bill rocket through the Senate and House and onto the president’s desk. Fortunately for all of us, senators from both parties, from Sen. Mike Lee (R-Utah) to Sen. Jeff Merkely (D-Ore.), forced a slowdown. But Corker and Kaine are working overtime to try to jam through their AUMF, which is a dumpster fire of bad ideas.
Immigration authorities have a well-documented record of creating dangerous environments for pregnant women in detention.
In 2016, Immigration and Customs Enforcement issued a policy advising against the detention of pregnant women. The rationale seemed simple enough: incarceration creates serious health risks for expectant mothers, and detention facilities are not equipped to serve those unique needs.
But in December 2017, Thomas Homan, the acting director of ICE, announced that the agency would change that directive to comply with President Trump’s executive order on immigration and eliminate the presumption of release for pregnant women.
In addition to requiring mandatory detention, the policy change also allows ICE to remove critical reporting procedures required for oversight of the detention system, making it extremely difficult to monitor the treatment of pregnant women, despite evidence that such oversight is desperately needed.
The mistreatment of pregnant women in ICE detention is well-documented. Despite the earlier directive not to detain pregnant women, the agency frequently did do anyway — as many as hundreds of pregnant women, according to its own figures. Based on reports that we and partner organizations have received, we’re concerned that many of them may not have received adequate healthcare in detention. So with aggressive enforcement practices targeting immigrants, an expansion of the detention system, and the removal of various oversight mechanisms, pregnant women in ICE detention face more danger than ever before.
Time and time and time again, U.S. telecom companies have promised us that better customer service, lower prices, and more competition is only possible if the latest industry mega merger is approved. But time and time again those promises not only don't materialize, but the deals wind up making an already broken market worse. As a result, the telecom sector sees historically awful customer service, higher prices, and all manner of additional problems ranging from broadband coverage gaps to net neutrality and privacy violations (both symptoms of limited competition).
Everybody's favorite villain, Comcast, is a direct result of mindless M&A mania where upgrades, customer service, and genuine innovation took a repeated back seat to growth for growth's sake. So is AT&T, who we've allowed to slowly but surely re-assemble itself in the wake of Ma Bell's 1982 breakup. And despite history being very fucking clear on the negative impact of telecom consolidation, here we are again bearing witness to the same, age old idiotic "synergy" claims as T-Mobile tries to sell the press and public on its planned $26 billion acquisition of Sprint.
As we noted previously this deal simply isn't necessary. Those pushing this merger like to pretend that Sprint was on the brink of collapse and simply couldn't survive without this merger. And while Sprint does have a heavy debt load and has been arguably incompetent on the branding and PR front, the company just announced what it's calling the "best financial results in company history."
While Facebook professes to be a net neutrality advocate here in the States, their silence as Comcast, Verizon and AT&T have dismantled the open internet has long proven otherwise.
And overseas, Facebook has routinely undermined net neutrality -- at times under the banner of altruism. Thinking it could corner the ad market in developing nations, Facebook has been pushing for years something known as "Free Basics" under its Internet.org initiative. Under Free Basics, Facebook delivers users a free, AOL-esque walled garden version of the internet featuring content from Facebook-approved partners. But the program quickly came under fire by content partners who didn't like Facebook being the curator of what gets viewed. Others criticized the program for at one point banning encrypted content.
Countries like India ultimately wound up banning Free Basics as a violation of net neutrality, viewing the program as little more than glorified collusion -- since a cornerstone of the project involved Facebook determining which services users will be able to access. Users in these nations, meanwhile, began conflating "the internet" with Facebook itself, which is what Facebook obviously wanted, but which presented a whole host of new problems.
EFF supporter Benjamin McLean was kind enough to send along his "Mashup Maker" as a new entry to our Catalog of Missing Devices, a tour through some of the legitimate, useful and missing gadgets, tools and services that don't exist but should. They're technologies whose chance to exist was snuffed out by Section 1201 of the Digital Millennium Copyright Act of 1998, which makes tampering with "Digital Rights Management" into a legal no-go zone, scaring off toolsmiths, entrepreneurs, and tinkerers.
Mashup Maker: A boon to mashup artists everywhere, this tool will rip the isolated tracks you buy online or that come with your personal copies of Guitar Hero and Rock Band and auto-imports them into a personal library. A built-in editor automates pitchbending, tempo-matching and other dark arts to make mashup mixing easier than ever. As a bonus, Mashup Maker liberates your proprietary music tracks for use with free/open alternatives like Performous.
Hong Kong media reports claim that Huawei recently withdrew a patent invalidation case against ZTE, in a move that is interpreted as the two telecom rivals attempting to present a united front. This may be reading too much into a relatively routine administrative case. But it is true that China’s entire tech sector – and Huawei in particular – is watching ZTE’s predicament closely and preparing for the worst. A few days ago the Beijing Higher People’s Court apparently allowed Huawei to withdraw a pending appeal against SIPO.
Tuesday’s news that RPX’s board of directors had accepted a $555 million offer for the company draws a line on an episode in the company’s history that effectively began in the months leading up to John Amster’s exit early last year. The defensive aggregator’s co-founder and CEO had wanted to take it private, clearly recognising that tougher conditions for RPX’s core business made a public company model far less appealing. The Board obviously disagreed with Amster’s position but, faced with the challenging headwinds in its sector, shifted its position and earlier this year started a sales process.
An intellectual property strategy unveiled in Canada includes a provision aimed at preventing the rise of trade mark trolls, in response to soaring all-class applications
The Canadian government unveiled its first national intellectual property strategy at the end of April, in which one provision was to prevent the misuse of the trade mark registration system such as instances of "trade mark squatting".
Valparaiso-based Family Express, which makes one of the Region's favorite doughnuts, is taking a new angle in its long-baking legal fight to continue to use the term square donuts.
The convenience store chain sued Terre Haute-based Square Donuts two years ago after the 51-year-old family owned doughnut shop refused to enter into an agreement to allow Family Express to keep using the square donuts name as it expanded further south into Indiana. Square Donuts has threatened legal action with cease-and-desist letters alleging trademark infringement since Family Express first introduced the four-sided doughnuts in 2005.
Stories like this aren't supposed to have happened. Back in 2006, a Terre Haute company called Square Donuts Inc. sent a cease and desist notice to a convenience store chain in Indiana called Family Express, which also sells square-shaped donuts. The notice claimed that the latter was infringing on the former's trademark for "square donut", for which it had received a trademark registration from the USPTO. In 2016, Family Express sued Square Donuts Inc. to have a court declare its use non-infringing due to the lack of customer confusion and, more importantly, the fact that the trademark should never have been granted on the grounds that it is purely descriptive. As is usually the case, the ultimate fault for all of this lies at the feet of the USPTO, which never should have granted this trademark to begin with.
Yet that doesn't change how absurd it is that this dispute is still going on. Very, very strangely, the most recent happening in this story is now it's Square Donuts Inc. that is petitioning the court for a judgment on the matter.
We’ve talked quite a bit about our Canadian lawsuit, but we haven’t ever really gone into detail about what Canadian law says about Kodi addons. Technically we have the word of the law on our side, the problem is that civil law is ridiculously unfair. Exhausting their opponents financial resources is very common practice for the kinds of vicious litigators suing us. Billion dollar corporations do whatever they want in order to dominate, manipulating the law to meet their goals by any means necessary. This is why the original Federal Court judgement (which was later appealed) said that the true purpose of their original proceedings was to “destroy livelihood of the defendant.”
There are a few important points regarding the whole Canadian legal situation which we feel that everyone could benefit from understanding. The law has been completely disregarded, and the Canadian Telecom Cartel has already managed to destroy our original platform. We are rebuilding, but succeeding in doing so will be nothing short tof a miracle. We had all of our domain names, social media accounts, and other property seized – meanwhile we still even don’t have a trial date nearly a year later. We had initially won in court, but these companies don’t accept a loss, so they appealed meaning we had to defend ourselves once again at a cost of tens of thousands.
Fortnite and PUBG are two of the hottest games of the moment. While the games are similar, the same can't be said for how cheaters are treated. This week Epic Games settled another case against a copyright infringing cheater, without any damages. At the same time, several PUBG cheaters have been arrested in China, and slapped with millions in fines, according to local authorities.