Laisa Barro says “Studying Computer Science and Art allows me to combine my creative and technical skills in unique and innovative ways. As a Production Support Engineer intern at Pixar, I’ll have the opportunity to apply those skills while working with almost every group at the studio to help diagnose and problem-solve issues for users on GNU/Linux-based desktop platforms."
Linux computer maker System76 launched its first laptops with 8th-gen Intel Core processors last year. Those computers featured quad-core, 15 watt processors based on Intel’s Kaby Lake Refresh architecture. But now System76 is taking pre-orders for a laptop that packs much more power.
The updated System76 Oryx Pro features an Intel Core i7-8750H hexa-core, 45 watt processor and support for up to NVIDIA GeForce 1070 graphics.
Last week, System76 started to share details about its refreshed Linux-powered Oryx Pro laptop. It would be thinner and more powerful, while adding twice the battery life of its predecessor. Unfortunately, we did not yet know exactly what the laptop looked like. Today, we finally have official images.
This new Oryx Pro is quite breathtaking, as it is a true Pro machine -- with the USB Type-A, Ethernet, and HDMI ports you expect -- while being just 19mm thin. It has the horsepower that power-users need, thanks to its 8th Gen Intel Core i7 processor and NVIDIA GeForce GTX 10-Series GPU. Hey, Apple, this is what a "Pro" laptop should be...
American computer manufacturer System76 has offered the company’s updated Oryx Pro for pre-order. For US$1,599, the buyer would receive a 15.6-inch, Ubuntu-based laptop sporting an i7-8750H processor, Nvidia GeForce GTX 1060 GPU, 8 GB RAM, and a 250 GB M.2 SSD. The official System76 website offers a generous amount of configurations for the Oryx Pro update.
System76 is a hardware vendor that builds laptops with the Pop_OS! Linux distribution pre-loaded. System76 machines do get firmware updates, but do not use the fwupd and LVFS shared infrastructure. I’m writing this blog post so I can point people at some static text rather than writing out long replies to each person that emails me wanting to know why they don’t just use the LVFS.
With Ubuntu 18.04 LTS out as well as System76's Pop!_OS updated against the Bionic Beaver, System76 is in the process of rolling out some new/updated systems. Last week they began teasing the Oryx Pro as their new "thin machine learning laptop" while today we have a better look at it.
They announced the new Oryx Pro is up for pre-order and that it will begin shipping soon with an Intel Core i7 Coffeelake processor and choice of NVIDIA Pascal graphics while having working GPU switching support.
Google announced the support for Linux apps to Chromebooks in its Developer Keynote I/O event. People using Chromebooks will soon be able to run Linux apps on their systems.
[...]
Chromebooks were launched as a cheap alternative to PCs with support for Web Applications through Google Chrome web browser. The Android app support was added a few years later on selected Chromebook models.
Chromebook gradually captured a good part of laptop market in developed countries like the USA. Lightweight, plenty of free cloud storage and cheap price have made Chromebook a popular choice among students.
It is now official, Google announced during the Google I/O summit that Project Crostini is making it possible for users to install Linux applications on Chrome OS via DEB files (from Debian Stretch). This is on top of the already integrated support for Android apps.
The Cloud Native Computing Foundation (CNCF) wants to foster greater interoperability between serverless platforms, through its release of the CloudEvents specification. The project is at version 0.1 iteration, and hopes that it will be approved as a CNCF sandbox project in June.
The CloudEvents specification provides (formerly called OpenEvents) a path that would allow any two components to transfer an event, regardless of whether they are functions, apps, containers or services, said Doug Davis, an IBM senior technical staff member at IBM and a member of the CNCF serverless working group.
“Much in the same way HTTP — in its most basic form — helped interoperability between any two components by standardizing how to represent well-defined metadata about the message being transferred, CloudEvents is doing the same thing,” said Davis. “Defining the common metadata will aid in the transferring of an event from any producer to any consumer.”
While Peter Hutterer has been involved with the X.Org Server's input code and related projects for the past decade now and has spearheaded the projects around Multi Pointer X, X Input 2, and the Wayland/Xorg-using Libinput libraries, he's still had a tough time grasping the X.Org Server's pointer acceleration code.
Due to recent complaints from users about libinput, Peter Hutterer has made a fresh attempt at understanding the X.Org Server's pointer acceleration code. He's now made progress in doing so after coming up with a method to visualize the pointer acceleration code.
Libdrm 2.4.92 is now available as the newest version of the Mesa DRM library that most notably sits between the Mesa drivers and the Linux kernel Direct Rendering Manager code.
Arguably the most notable addition to Libdrm 2.4.92 is now supporting Intel Icelake "Gen 11" graphics. Those initial bits are now in place to go along with Intel's ongoing upbringing of Icelake graphics within the DRM kernel driver and Mesa ANV/i965 drivers. On the Intel side is also syncing against the latest Cannonlake PCI IDs, adding a Kabylake PCI ID that was missing up until now, and other basic Intel updates.
Elie Tournier, the former GSoC student developer who was working on soft FP64 support and then joined Collabora, has shared a status update on the consulting firm's work in the GPU virtualization space.
I am delighted to announce that CodeWeavers has just released CrossOver 17.5.0 for both macOS and Linux. CrossOver 17.5.0 has many improvements to the core Windows compatibility layer and also specific enhancements for several popular applications.
May 2018. The development team is proud to present version 1.14 of The Battle for Wesnoth!
Version 1.14 of the Battle for Wesnoth role-playing strategy game — the first release in over three years — is available.
EVERSPACE the absolutely gorgeous space combat game with roguelike elements is now officially available for Linux gamers. Today, ROCKFISH Games released patch 1.2.3 which has numerous fixes and improvements as well.
I absolutely love the game, it's easily one of the best space shooters available on Linux. Not a traditional one though, since it's based on random sectors so it's much more about the combat than it is about exploration.
Valve has just announced they are rolling out some new Steam Apps in the coming weeks for Android and iOS mobile devices.
The Steam Link App allows for basically turning their iOS/Android phone/tablet/TV devices into a Steam Link-like gaming experience when on 5GHz WiFi or wired Ethernet to a host system just like Steam Link requires. This app will support interfacing with the Steam Controller and more.
Fancy playing your Linux gaming library from Steam on your phone? You're going to be able to later this month. On top of that, they're also going to let you stream your video purchases too.
Rogue-lite, metroidvania action-platformer Dead Cells [Official Site] is to leave Early Access likely in August, with a Linux version currently being worked on.
It seems the latest Battle Pass for Dota 2 is going to be a pretty interesting one, as it's bringing a new game mode which sounds a little like a squad-based Battle Royale.
I have to admit, after watching the short gameplay trailer of the currently crowdfunding action RPG Max&Maya [Kickstarter], I am quite amused by it. I wouldn't say you had to be a cat lover to appreciate this, but it sure helps.
Max&Maya is filled with some real dirty humour, like an excrement attack along with an advanced fighting system filled with combo-attacks and what they're calling "meow-magic". The magic system sounds like dumb fun, as you shout into a microphone to perform special attacks—hopefully that's not required though as that type of gimmick is rarely fun for long.
Need more beat 'em ups on Linux? Bud Spencer & Terence Hill - Slaps And Beans looks like a pretty safe bet and it's left Early Access.
Red Hook Studios have just recently announced that the latest DLC Darkest Dungeon: The Color of Madness is set for release on June 19th.
Complementing GNOME's involvement in Google Summer of Code and Outreachy, the GNOME Foundation has announced a new internship program aimed for more complex projects.
This new internship program is higher-paying due to greater complexity: the foundation will pay interns $8,000 USD for three months of work.
The first round of internship projects are open for USB protection via USBGuard for fending off USB-based attacks, improved credentials management via a new program, a new PipeWire portal system, private session support for the desktop, crypto hardware enablement like making TPMs easier to use, and location aware policies/security handling.
While the work on new Gentoo copyright policy is still in progress, I think it would be reasonable to write a short article on copyright in general, for the benefit of Gentoo developers and contributors (proxied maintainers, in particular). There are some common misconceptions regarding copyright, and I would like to specifically focus on correcting them. Hopefully, this will reduce the risk of users submitting ebuilds and other files in violation of copyrights of other parties.
First of all, I’d like to point out that IANAL. The following information is based on what I’ve gathered from various sources over the years. Some or all of it may be incorrect. I take no responsibility for that. When in doubt, please contact a lawyer.
Secondly, the copyright laws vary from country to country. In particular, I have no clue how they work across two countries with incompatible laws. I attempt to provide a baseline that should work both for US and EU, i.e. ‘stay on the safe side’. However, there is no guarantee that it will work everywhere.
CollabNet VersionOne, a global leader in enterprise value stream management, ALM, release automation, agile management and DevOps solutions, announces its Bronze Sponsorship of Red Hat€® Summit 2018. Visit the CollabNet VersionOne booth, #832, for a demonstration of Lifecycle, Continuum and VS for Red Hat OpenShift.
Red Hat's strategy these days revolves around making it easier for customers to set up back-end software systems that can operate simultaneously on their in-house data clouds and the public cloud services of industry players like Microsoft, Google and Amazon, company leaders say.
The "hybrid cloud is not only a reality, it's the driving model in enterprise computing today," Paul Cormier, Red Hat's president for products and technologies, said Tuesday at the kickoff of the annual Red Hat Summit, which is taking place this week in San Francisco.
Alfred Zollar, a veteran of IBM, has been named to Red Hat‘s board of directors.
“Al will help us continue to anticipate and deliver open source technologies,” Naren Gupta, the board of directors chairman at Red Hat, said in Monday’s press release.
Zollar’s career started at IBM where he progressed to senior leadership roles that included serving as a division general manager for network computer software, as president and CEO for the Lotus Software division and as general manager of the eServer iSeries.
Open source giant Red Hat has suggested the Meltdown and Spectre vulnerabilities helped to solve a major industry issue of "polarisation" between software and hardware developers, two groups that were required to work together to release fixes.
Red Hat's chief ARM architect John Masters said that the security industry suffered from a lack of communication between software and hardware companies, and that vulnerabilities exposed earlier this year forced the industry to reassess how new products are developed.
One of the biggest questions at Red Hat Summit in San Francisco was "What will Red Hat be doing with its recent CoreOS acquisition?" Now we know. In a presentation, Ben Breard, Red Hat product manager for Linux Containers, and Brandon Philips, CTO of CoreOS, explained where CoreOS offerings are going now that the company is part of Red Hat.
Red Hat will be integrating CoreOS Tectonic, its Kubernetes distribution; Quay, its enterprise container registry; and Container Linux, its lightweight cluster Linux distribution, into Red Hat's container and Kubernetes-based software portfolio. One popular CoreOS technology won't be making the trip: The rkt container standard. Instead, it will become a community-supported container technology.
Since this April marked the two-year anniversary of the launch of Red Hat Open Innovation Labs, it’s a particularly appropriate time to reflect on what’s worked well, what hasn’t and what still remains to accomplish. We’re starting to see patterns and trends. So in the spirit of open source (and in the spirit of what mom always said), 'it’s better to share’ — here goes:
Jim Whitehurst, Red Hat CEO declared during Red Hat Summit 2017 that in the modern enterprise, old school planning is dead.
At Red Hat Summit 2018 in San Francisco May 9, Whitehurst returned to that same topic, providing insights into how modern, agile enterprises are enabling both executives and staff to thrive in a world where static corporate planning no longer work. In his view, planning is now being replaced with three core ideas: configuration, enablement and engagement.
At Red Hat Summit in San Francisco, Red Hat introduced Kubernetes Operators to the Red Hat OpenShift ecosystem. This provides an easy path for independent software vendors (ISVs) to deliver tested and validated Kubernetes applications on OpenShift.
Red Hat picked up Kubernetes Operators as part of its CoreOS acquisition. Kubernetes Operators are application-specific controllers that extend the Kubernetes application programming interface (API). It can create, configure, and manage instances of complex stateful applications. This takes the "human knowledge" of managing a Kubernetes application and builds it into software, thus making typically challenging Kubernetes workloads easier to deploy and maintain.
Fedora Classroom is a project that aims at increasing awareness among the users about the distribution and understanding how to better use it. It started off ambitiously almost a decade ago and has now been revamped by the members of the Fedora Join SIG.
This set of updated isos will save about 945 MB of updates after install. (for new installs.)
First of all couple of weeks back, I was able to put out an article about riot-web. It’s been on my mind for almost a month or more hence finally sat down, wrote and re-wrote it a few times to make it simpler for newbies to also know.
One thing I did miss out to share was the Debian matrix page . The other thing which was needling me was the comment . This is not the first time I have heard that complaint about riot-web before and at times had it happen before.
The thing is its always an issue for me when to write about something, how to say something is mature or not as software in general has a tendency to fail at any given point of time.
[...]
At the end, I remember a comment made by a DD Praveen at a minidebconf which happened a month ago. It was about how Upstreams are somewhat discouraging to Debian practices and specifically more about Debian Policy . This has been discussed somewhat threadbare in the thread What can Debian do to provide complex applications to its users? in Debian-devel. The short history I know is about minified javascript does and can have security issues, see this comment in the same thread as well as see the related point shared in Debian Policy. Even Praveen’s reply is pretty illuminating in the thread.
This release fixes several security issues and users should upgrade as soon as possible.
Devuan remains the prominent Debian fork that is focused on "init freedom" by stripping out Debian's dependence on systemd.
Devuan 1.0 was released in 2017 as based on the Debian 8 "Jessie" package set while Devuan 2.0 "ASCII" has been in development as based on the Debian 9 "Stretch" packaging. Devuan 2.0 beta was released back in February while today the Devuan 2.0 Release Candidate has hit the mirrors.
Following in the footsteps of the Debian Project, which recently released a similar kernel security patch for Debian GNU/Linux 9 "Stretch" and Debian GNU/Linux 8 "Jessie" operating system series to address two security vulnerabilities, Canonical also released kernel updates to patch these two flaws and another vulnerability in Ubuntu 17.10, Ubuntu 16.04 LTS, and Ubuntu 14.04 LTS.
One of these security vulnerabilities was caused by the way Linux kernel handled debug exceptions delivered via Mov SS or Pop SS instructions, which could allow a local attacker to crash the system by causing a denial of service. The issue (CVE-2018-8897) was discovered by Nick Peterson and affects only the amd64 architecture.
Ubuntu Bionic Beaver is here and it brings along with it a number of very useful and shiny new features. Two of those features appear in the first-run wizard: One of which is Livepatch. With Livepatch up and running, many security-related updates, such as the kernel, will not require a reboot. For anyone that's served as a Linux admin, you know how big a step forward that is. What Canonical has done with Livepatch, in Ubuntu 18.04, is fairly remarkable. I say that because the setup of this new feature is incredibly simple. In fact, on first boot, you are greeted with a wizard that walks you through the process.
Within that same first-run wizard is the notorious information gathering tool. Rumors of Canonical collecting user data were rampant, which led to many believing a breach of privacy was imminent. The reality is much less intrusive. I'm going to show you how easy it is to set up this often mission-critical feature on the latest iteration of Ubuntu Linux. I'll be demonstrating on the desktop version of the release. You'll be surprised at how easy it is.
The ‘main' archive of Ubuntu 18.04 LTS will be supported for 5 years until April 2023. Ubuntu 18.04 LTS will be supported for 5 years for Ubuntu Desktop, Ubuntu Server, and Ubuntu Core. Ubuntu Studio 18.04 will be supported for 9 months. All other flavors will be supported for 3 years.
It was almost exactly one year ago today that Microsoft shocked the world by announcing developers would be getting Ubuntu support on Windows 10 via the Windows Subsystem for Linux (WSL.) This was great, and yesterday at a breakout session at Build 2018, Microsoft hinted that Windows 10 on ARM WSL is also getting support for Ubuntu and other Linux distributions (via Neowin.)
Oh, and it looks like the move will also let you use the Windows Subsystem for Linux on ARM PCs, allowing you to run native Linux apps on the HP Envy x2, Asus NovaGo, or Lenovo Miix 630.
As you know, at the very beginning of the Ubuntu 18.10 cycle, maintainers of the Ubuntu MATE, Ubuntu Budgie, and Ubuntu Studio official flavors have decided to no longer support 32-bit ISO images. But now it looks like Lubuntu, Kubuntu, Xubuntu, and Ubuntu Kylin might be joining them soon.
"With Ubuntu MATE, Ubuntu Budgie, and Ubuntu Studio joining Ubuntu Desktop and Server in not offering i386 support in order to focus their efforts, and these statistics in mind, we (flavors) should all join them," said Canonical's Bryan Quigley. "Now is the ideal time to do so."
Google released Android Things 1.0 with new ARM-based production platforms and a surprise gift: three free years of OTA support. But commercial production over 100 units requires a licensing deal.
A year and a half after Google announced that its stripped down, IoT-oriented Brillo version of Android was being recast as Android Things, the platform has emerged from Developer Preview as Android Things 1.0. The good news is that Google is offering customers free automated updates for three years, which should save money while improving security and reliability. The bad news is that Android Things is more proprietary than the mostly open source Android.
Google I/O 2018 brought Android P Beta which unveiled several new features in its latest mobile OS, Android P.
While the name of Android version 9.0 still remains a mystery, we got to see a bunch of cool and exciting features. This year Google is focused on making our digital lives more calm and organized through Android P.
Google unveiled four ARM-based production boards for Android Things 1.0: Innocomm’s i.MX8M based WB10-AT, Intrinsyc’s Open-Q 212A and Open-Q 624A, based on the Snapdragon 212 and 634, respectively, and the MediaTek MT8516.
Earlier this week, Google released Android Things 1.0 and announced several consumer products that will ship in the coming months based on the stripped-down, IoT-oriented Android variant. Google also showed off four official production platforms.
Years later I met someone who had helped write a similar game called Dominion which is also very similar. The game has been kept up and is under a GPL license which is probably why it is still findable.
As a first step towards working encryption and decryption, I obviously needed to create some PGP keys for testing purposes. As a regular user of OpenPGP I knew how to create keys using the command line tool GnuPG, so I started up the key creation by typing “gpg –generate-key”. I chose the key type to be RSA with a length of 2048 bits, as those settings are also the defaults recommended by GnuPG itself. When it came to entering user id information though, things got a little more complicated. GnuPG asks for the name of the user, their email address and a comment. XEP-0373 states, that the user id packet of a PGP key MUST be of the format “xmpp:juliet@capulet.lit”. My first thing to figure out was, if I should enter that String as the name, email or as a comment. I first tried with the name, upon which GnuPG complained, that neither name, nor comment is allowed to contain an email address. Logically my next step was to enter the String as the users email address. Again, GnuPG complained, this time it stated, that “xmpp:juliet@capulet.lit” was not a valid Email address. So I got stuck.
Blockchain/cryptocurrency projects & the ever-mysterious open-source. If you come from a nontechnical background, you’ve probably wondered just exactly what open-source means; if you’ve hung around developers, in particular, you might’ve even heard about the powerful GitHub & the world of repositories. If you aren’t familiar with a terminal console, you likely aren’t familiar with previous terms.
Yet understanding how open-source repositories work, as well as exploring the very basics of the GitHub platform, is probably one of the most effective ways to understand cryptocurrencies & their respective communities at a deeper level.
Code talks. And learning how to view the source code for cryptocurrencies projects by yourself, regardless of your programming proficiency (or lack of), is an indispensable tool.
There’s a few open source options out there for creating electrical schematics. KiCad and Fritzing are two that will take you from schematic capture to PCB layout. However, there’s been limited options for creating wiring diagrams. Often these are created in Microsoft’s Visio, which is neither open source nor well suited for the task.
IBM’s Adversarial Robustness Toolbox, an open AI library, was released in April. Since then, developers have found some interesting uses for the tool.
IBM launched an open library to help secure artificial intelligence systems in April.
They call it the Adversarial Robustness Toolbox (ART) to help developers better protect AI systems and neural network. It contains benchmarks, defenses, and attacks in a framework-agnostic library.
This year’s Google I/O developer conference might not have had much to share about VR, but one of the biggest reveals of last year’s event is now available to all.
SecureDrop will take part in PyCon US development sprints (from 14th to 17th May). This will be first time for the SecureDrop project to present in the sprints.
If you never heard of the project before, SecureDrop is an open source whistleblower submission system that media organizations can install to securely accept documents from anonymous sources. Currently, dozens of news organizations including The Washington Post, The New York Times, The Associated Press, USA Today, and more, use SecureDrop to preserve the anonymous tipline in an era of mass surveillance. SecureDrop is installed on-premises in the news organizations, and journalists and source both use a web application to interact with the system. It was originally coded by the late Aaron Swartz and is now managed by Freedom of the Press Foundation.
A few weeks back in Dublin, Ireland, OpenStack engineers gathered from dozens of countries and companies to discuss the next release of OpenStack. This is always my favorite OpenStack event, because I get to do interviews with the various teams, to talk about what they did in the just-released version (Queens, in this case) and what they have planned for the next one (Rocky).
The new, super fast Firefox supports Windows Group Policy, so enterprise IT pros can easily configure the browser for organizational use.
In the fall of 2017, Mozilla introduced Firefox Quantumââ¬Å —ââ¬Å the blazing fast, completely reinvented Firefox. The new Firefox quickly won critical acclaim, with Wired writing that “Firefox Quantum is the browser built for 2017”.
Firefox 60 is now available to download and among the changes it sports is support for CSD on Linux.
The latest stable release of Mozilla’s hugely influentially open-source web browser also brings a number of other tweaks, including a somewhat controversial change to the new tab page…
So, to say that I’m happy about this particular release would be an understatement. I’m absolutely ecstatic that Mozilla decided that adding support for enterprise features was important.
But I have to admit something; over the years in my zeal to get enterprise support into Firefox, I’ve encouraged just about every method possible to get customizations into Firefox. As a result, I know there are many installations of Firefox that use methods that are definitely not recommended anymore, especially now that we have real policy support.
Activity Stream has become an integral part of Firefox, officially replacing the existing New Tab and soon integrating code for displaying snippets and onboarding content. For this reason, we’re working on moving translations to mozilla-central.
Currently, Activity Stream is managed as a stand-alone project in Pontoon, and store its translations in a GitHub repository. Once this meta bug is fixed, Activity Stream’s strings will be exposed as part of the Firefox project.
While this makes the relation between Activity Stream and Firefox more obvious for localizers, it will also allow to make some improvements in the future, like reducing the lag between translations landing in repositories and actually being available for testing in Firefox.
Now that Mozilla released the final Firefox 60 "Quantum" web browser, it's time for them to concentrate on the next release, Firefox 61, which enters beta testing today with a bunch of much-needed enhancements.
While Firefox 60 marked the Quantum series as ready for enterprise deployments, Firefox 61 will focus on performance enhancements and improvements of all sorts. For starters, Firefox 61 promises to enable faster tab switching on both GNU/Linux and Microsoft Windows platforms and makes WebExtensions run in their own process on Apple's macOS.
Talking about WebExtensions, Firefox 61 will improve the way they manage and hide tabs. Mac users are also getting a new feature in the Page Actions menu that allows them to share the current URL with the sharing providers from macOS, and it looks like the dark theme will receive various improvements for a more consistent experience across Firefox's user interface.
Rounding out today's Firefox 60 release comes with promoting Firefox 61 to beta.
Firefox 61.0 is now available in beta form and it excites us a lot for a sizable amount of performance work that's been ongoing. Among the work to find with the Firefox 61 Beta are Quantum CSS improvements for faster page rendering times, improved page rendering speed thanks to retained display lists, and faster switching between tabs on Linux/Windows.
Mozilla released today the Firefox 60 "Quantum" web browser for supported desktop platforms, including GNU/Linux, macOS, and Microsoft Windows, as well as for Google's Android mobile operating system.
Mozilla Firefox 60 "Quantum" is the next ESR (Extended Support Release) version of the open-source and cross-platform web browser, introducing USB token based authentication support, enhancements to New Tab and Firefox Home pages, revamped Cookies and Site Storage section, enhanced camera privacy indicators, better WebRTC audio performance and playback on Linux, and a new a policy engine to make enterprise deployments a breeze for IT professionals.
The recent fsync() woes experienced by PostgreSQL led to a session on the first day (April 23) of the 2018 Linux Storage, Filesystem, and Memory-Management Summit (LSFMM). Those problems also led to a second-day session with PostgreSQL developer Andres Freund who gave an overview of how PostgreSQL does I/O and where that ran aground on some assumptions that had been made. The session led to a fair amount of discussion with the filesystem-track developers; real solutions seem to be in the offing.
PostgreSQL is process-based; there are no threads used, Freund said. It does write-ahead logging (WAL) for durability and replication. That means it logs data before it is marked dirty and the log is flushed before the dirty data is written. Checkpointing is done in the background with writes that are throttled as needed. In general, all data I/O is buffered, though the WAL can use direct I/O.
Adobe Photoshop is a household name, and is widely regarded as one of, if not THE best photo editing and image manipulation suites around.
Basically, it's an industry leader, and if you work in a professional industry that relates to photography, publishing, design or any other simiar creative sphere, chances are it takes centre stage.
It's useful in a non-professional capacity too, however, being a much more powerful editing suite than things like Microsoft Paint.
But the problem is, it's expensive. You have to buy Adobe Photoshop and it costs a fair bit to do so. Hardly surprising that quite a few alternative software packages have emerged over the years for those on a budget, or for those who don't want to pay a penny.
For this article I could have quite easily put together a list of multiple different free alternatives to Adobe Photoshop, however, from my years of dabbling with what's available there's only one I can really say is worth bothering with - Gnu Image Manipulation Program, aka GIMP.
Late last month, open-source contributor Raymond Nicholson proposed a change to the manual for glibc, the GNU implementation of the C programming language's standard library, to remove "the abortion joke," which accompanied the explanation of libc's abort() function.
Nicholson said: "The joke does not provide any useful information about the abort() function so removing it will not hinder use of glibc."
Containers are, of course, all the rage these days; in fact, during his 2018 Legal and Licensing Workshop (LLW) talk, Dirk Hohndel said with a grin that he hears "containers may take off". But, while containers are easy to set up and use, license compliance for containers is "incredibly hard". He has been spending "way too much time" thinking about container compliance recently and, beyond the standard "let's go shopping" solution to hard problems, has come up with some ideas. Hohndel is a longtime member of the FOSS community who is now the chief open source officer at VMware—a company that ships some container images.
He said that he would be using Docker in his examples, but he is not picking on Docker, it is just a well-known container management system. His talk is targeting those that want to ship an actual container image, rather than simply a Dockerfile that a customer would build into an image. He has heard of some trying to avoid "distributing" free and open-source software that way, but is rather skeptical of that approach.
In case you missed it, last month Gibson, the famed guitar company, filed for bankruptcy. Matt LeMay has a really fascinating and worth reading Medium post up, claiming that Gibson's failure is a "cautionary tale about innovation." He compares what Gibson's management did over the past few years to another big name in guitars: Fender. And finds quite a telling story in the contrast.
Specifically, he notes that Gibson doubled down on "innovation" and trying to come up with something new -- almost none of which really seemed to catch on, while more or less ignoring the core product. Meanwhile, Fender took a step back and looked at what the data showed concerning what its existing customers wanted, and realized that it wasn't serving the customer as well as it could. LeMay points to a Forbes interview with Fender CEO,
Qualcomm Inc., the biggest maker of mobile-phone chips, is preparing to give up its push to develop processors for data-center servers, an effort that sought to break Intel Corp.’s hold on the lucrative market, according to a person familiar with the company’s plans.
The San Diego-based company is exploring whether to shutter the unit or look for a new owner for the division, which was working on ways to get technology from ARM Holdings Plc into the market for chips that are at the heart of servers, the person said. ARM is one of Intel’s only rivals in developing semiconductor designs, and its architecture is primarily used in less power-intensive products, such as smartphones.
[...]
Qualcomm began selling a server chip, the Centriq 2400, based on ARM technology last year. At the time, the company said the chips, which were manufactured by Samsung Electronics Co., offered better results than an Intel Xeon Platinum 8180 processor, based on energy efficiency and cost. At the public introduction of the server chip line in November, potential customers such as Microsoft Corp. took to the stage to voice their interest in the offering. Since then, Qualcomm has been silent about its progress.
Calxeda as the first interesting ARM-based servers didn't pan out and the company went bust, attempts by the likes of AMD at ARM server CPUs so far have not panned out, and now today is a report that Qualcomm is looking to end its Centriq server CPU line or sell off that division.
While the parts began shipping and they have some interesting offers up to a 48-core SoC and they were punctual with their Linux kernel support for these "Falkor" CPU cores, GCC support, etc. It looks like the Centriq server division isn't making financial sense for Qualcomm. This is a bit surprising with their current Centriq wares offering competitive cost and performance-per-Watt to the x86 server competition.
As scary as the epidemics of malware for Internet of Things devices have been, they had one saving grace: because they only lived in RAM (where they were hard to detect!), they could be flushed just by rebooting the infected gadget.
But a new strain of malware, dubbed "Hide n Seek," can live through a power-cycle: it writes a copy of itself to the /etc/init.d/ directory in the IoT device's embedded GNU/Linux system, where startup programs are stored. When a device that's been infected this way is rebooted, it is freshly infected.
The Romanian citizen - who had been extradited to Los Angeles to face the charges - pleaded guilty in February to one count of causing damage to a protected computer.
Early this week, a developer noticed that multiple backdoored versions of the SSH Decorate module, the malicious code included in the library allowed to collect users’ SSH credentials and sent the data to a remote server controlled by the attackers.
What is troubling, though, is that Ozzie’s reputation as one of the foremost engineers of recent years will allow some to claim that the backdoor puzzle has now been “solved” – because Ray Ozzie says it has. That’s definitely not the case, as the two critiques mentioned above, and others elsewhere, make plain. But politicians won’t worry about such technical niceties when it comes to calling for laws that mandate these “safe” backdoors in devices. That’s why it’s important that everyone who cares about their privacy and security should be ready to push back against attempts to turn a flawed idea into a flawed reality.
I have no idea why anyone is talking as if this were anything new. Several cryptographers have already explained explained why this key escrow scheme is no better than any other key escrow scheme. The short answer is (1) we won't be able to secure that database of backdoor keys, (2) we don't know how to build the secure coprocessor the scheme requires, and (3) it solves none of the policy problems around the whole system. This is the typical mistake non-cryptographers make when they approach this problem: they think that the hard part is the cryptography to create the backdoor. That's actually the easy part. The hard part is ensuring that it's only used by the good guys, and there's nothing in Ozzie's proposal that addresses any of that.
Donald Trump bombed Syria for allegedly using chemical weapons last month and he has now officially pulled out of the Joint Comprehensive Plan of Action (JCPOA) nuclear agreement with Iran.
But Syria officially has no chemical weapons and Iran has no nuclear ones. The Organization for the Prohibition of Chemical Weapons (OPCW)verifiedSyria to be chemical free, and the International Atomic Energy Agency (IAEA) has verifiedIran’s consistent and continued compliance with the JCPOA. To the best of anyone’s knowledge, Syria has no chemicals and Iran has no nukes: that’s what verification means.
Why doesn’t CNN Defense Department reporter Barbara Starr just leave CNN and instead work directly for the Trump DoD?
On Tuesday, hours after President Donald Trump pulled out of the Iran deal (formally known as the Joint Comprehensive Plan of Action), Starr (5/8/18) rushed to publish an anonymously sourced and transparently propagandistic press release for the Trump administration and Pentagon. Wouldn’t it be easier if Starr just skipped the middleman and just worked for the DoD?
WikiLeaks founder Julian Assange remains cut off from the web after his Ecuadorian Embassy hosts severed his communications with the outside world, the Ecuadorian foreign minister said.
"He remains disconnected from the Internet and other communications," Maria Fernanda Espinosa said. "A dialogue is continuing, and there is a will and interest to make progress."
Ecuador suspended his Internet access in March after accusing the whistleblower of interfering with other countries’ internal affairs via his social media posts.
Last year, AAA began asking Americans if they planned to buy an electric car. 15% said yes. AAA plans to ask the same question every year and track the results — at least until electric cars become the norm. This year, 20% of Americans said they are considering an electric car for their next vehicle purchase.
[...]
“For instance,” Fisher says, “some of the reliability problems we see are with new multispeed transmissions. Having a one-speed, direct drive eliminates any of those issues.” Automatic transmissions with 8, 9, or 10 gears are becoming more common in conventional cars as manufacturers struggle to hit higher fuel consumption targets. But they can be fiendishly complex and devilishly expensive to repair when they fail.
For example, the Chevy Bolt gets especially high marks for reliability from Consumer Reports. “It’s the most reliable car GM makes, which is especially impressive for a completely new model,” says Anita Lam, CR’s associate director of data integration.
In less than three months, rank-and-file teachers and educational support staff in five states—West Virginia, Kentucky, Oklahoma, Colorado and Arizona—have turned the entire country into their classroom. They haven’t just pushed for—and won—better pay and working conditions for themselves. They’ve also mounted a direct challenge to decades of bipartisan tax cuts for corporations, helping us all understand what austerity means. And by championing a raft of policy proposals to redistribute wealth away from the 1 percent and back to the working and middle-class, they’ve shown us how austerity can be defeated. As Emily Comer, a middle-school Spanish teacher who was a leader in the strikes in West Virginia, put it, “The phase we are in now—to win a real, progressive solution to the health-insurance crisis—forces us to dream bigger. This isn’t just about our healthcare plan. It’s about rebalancing the power of workers and corporations in our state.”
Twice in the past three years, Kimberly Williams-Hayes has filed for bankruptcy. The first time, she made about $5,400 in total payments toward her debt before her case was dismissed, when she failed to hand over her tax refund.
Only a fraction of that amount went toward a car loan, while her thousands of dollars in unpaid tickets and assorted other debts were untouched. One bill got paid in full: the bill from her bankruptcy lawyers.
By the time she filed for Chapter 13 bankruptcy again, in September of last year, represented by another firm, her debt had grown. And again, her lawyers added language into her proposed payment plan to ensure they, too, would be paid first.
For years, putting the lawyers and their fees ahead of other creditors through so-called “step up” payment plans has been standard practice among bankruptcy firms in the Northern District of Illinois, which includes Chicago.
Stormy Daniels lawyer Michael Avenatti yesterday dropped a bit of a bombshell on DC in the form of this document (pdf), which alleges that Trump lawyer and "fixer" Michael Cohen was engaged in far deeper, shadier financial shenanigans than had so far been reported. Numerous allegations are made in the document, including claims that Cohen may have violated banking laws in setting up and funneling money through a front company by the name of Essential Consultants, including payments made by Columbus Nova, a U.S.-based affiliate of a company controlled by a Russian millionaire, Victor Vekselberg.
[...]
Granted AT&T's also been pressuring the Trump administration to "reform" NAFTA to make it easier on AT&T's telecom ambitions in Mexico. AT&T was also trying to secure the administration's blessing for its $86 billion acquisition of Time Warner. But given the Trump DOJ proceeded to sue to block that deal for anti-competitive reasons (or hey, just good old cronyism), if the payments were to grease the M&A skids AT&T certainly didn't get their money's worth.
The most likely reason is that AT&T, for some idiotic reason, thought paying a shady NYC fixer's dubious front company would help curry general favor with the Trump administration. That's certainly not out of character. AT&T is a company with pretty greasy track record, whether we're talking about the time it turned a blind eye to drug dealers running a directory assistance scam on its own users, the time it was caught helping scammers rip off telecom systems for the hearing impaired, or that time it was caught making bills harder to understand just to help crammers rip off AT&T customers.
The United States is so far doing virtually no trade with Iran anyway. In 2017 total US exports to Iran were just 138 million dollars, and total imports a mere 63 million dollars, figures entirely insignificant to the US economy. By contrast, for the EU as a whole imports and exports to Iran were each a very much more substantial 8 billion dollars in 2017 and projected to rise to over 10 billion dollars in 2018.
There is one very significant US deal in the pipeline, for sale of Boeing aircraft, worth $18 billion dollars. It will now be cancelled.
Which brings us to the crux of the argument. Can America make its will hold? Airbus also has orders from Iran of over US$20 billion, and it is assumed those orders will be stopped too, because Airbus planes contain parts and technology licensed from the US. It is possible, but unlikely, that the US could grant a waiver to Airbus – highly unlikely because Boeing would be furious.
[...]
I shall be most surprised if we do not see increased US/Israeli/Saudi sponsored jihadist attacks in Syria, and in Lebanon following Hezbollah’s new national electoral victory. Hezbollah’s democratic advance has stunned and infuriated the US, Israel and Saudi Arabia but been reported very sparsely in the MSM, as it very much goes against the neo-con narrative. It does not alter the positions of President or Prime Minister, constitutionally allocated by religion, but it does increase Hezbollah’s power in the Lebanese state, and thus Iranian influence.
Iran is a difficult country to predict. I hope they will stick to the agreement and wait to see how Europe is able to adapt, before taking any rash decisions. They face, however, not only the provocation of Trump but the probability of a renewed wave of anti-Shia violence from Pakistan to Lebanon, designed to provoke Iran into reaction. These will be a tense few weeks. I do not think even Netanyahu is crazy enough to launch an early air strike on Iran itself, but I would not willingly bet my life on it.
When the Joint Comprehensive Plan of Action was announced in 2015, the Iranian people poured into the streets to celebrate what they thought was the beginning of a new era.
Long squeezed by both U.S. pressure and their own government, they had just cause for optimism. The threat of war was receding, and the sanctions that had stifled Iran’s economy were soon to be lifted. Many hoped that Iranian President Hassan Rouhani, vindicated by his success at the negotiating table, would leverage his political capital and ease Iran’s harsh security environment at home.
Today, as President Donald Trump tears up the agreement, the Iranian people are once again those who will suffer most. Iranian hardliners, empowered by the deal’s failure, are sharpening their knives for Rouhani and Foreign Minister Javad Zarif, and the chances of catastrophic war are undoubtedly greater.
The news on Tuesday that the same shell company that Michael Cohen, a longtime personal lawyer for Donald Trump, had used to pay $130,000 to porn star Stormy Daniels had also received about $500,000 in 2017 from a firm linked to a Russian oligarch set off a frenzy of commentary on Twitter and cable TV.
At the heart of the story is an investment firm called Columbus Nova, which has close links to Renova Group, a conglomerate founded by Russian billionaire Viktor Vekselberg. A Columbus Nova spokesman has said the payments to Cohen were for unspecified investment consulting.
Now there’s a new wrinkle: Another longtime Trump personal lawyer, Marc Kasowitz, also represented Columbus Nova in recent years in a commercial case. A spokesman for Kasowitz said the case settled in early 2017.
As ProPublica reported last year, Cohen spent a short period in February 2017 working at the offices of Kasowitz Benson Torres in midtown Manhattan, alarming several lawyers at the firm who worried about the brash attorney’s reputation. That was at the beginning of the period, between January and August 2017, when Columbus Nova made its payments to Cohen.
Cohen told ProPublica last year that he used Kasowitz’s offices “because we were working on several matters together after the inauguration.” Both he and Kasowitz have declined to specify what they collaborated on.
Taiwan was scrubbed from my biography.
I’d been invited to give a keynote speech and accept an award at Savannah State University’s Department of Journalism and Mass Communications. In a description of my background, I’d listed the self-governing island as one of the places where I’d reported. But in the printed materials for the event, the reference to Taiwan had been removed.
The department had given the award annually since 1975. But in the past few years, finances had dwindled and organizers struggled to find the resources to cover the expenses of bringing in a speaker from out of town.
Enter the Confucius Institute, a Chinese government-affiliated organization that teaches Chinese language and culture and sponsors educational exchanges, with more than 500 branches around the globe. The branch at Savannah State, founded four years ago, agreed to sponsor the speech.
The theater and the arts is generally more progressive than the rest of the world. It's a place where stories take shape that reflect the parts of society that many aren't quite ready to face. Unfortunately, that hasn't always been the way.
Sholem Asch's God of Vengeance was a beautifully edgy play, depicting the first woman-on-woman kiss on Broadway. Written in 1907 but not performed in the States until 1923, the contents shocked theatergoers in America, leading to the arrest of the Broadway cast on obscenity charges. The hostile use of government resources fanned the discussion around morality onstage.
Russia's so-called “Digital Resistance” has struck out against the country's internet blacklist, an ever-growing list of websites censored by the Russian government.
Since April 16, Russia's media regulatory agency Roskomnadzor has been trying — with mixed results — to block Telegram, a popular mobile messaging service. Since then, the blacklist, or registry of blocked websites, has grown and shrunk many times.
The collateral damage of their approach has been enormous. Millions of unrelated IP addresses and internet services were blocked when the agency went after internet cloud services that are used by Telegram and plenty of other products, a move that some say could cost Russian businesses up to one billion dollars. Roskomnadzor began removing addresses from the blacklist on May 8, in what appeared to be a tacit acknowledgement of defeat.
Besides the occasional breaking news dispatch, Matt Drudge spends more time arranging the front page of the Internet than actually reporting. One of the most influential journalists, Drudge is normally remarkably silent, which is why his latest condemnation of free speech is noteworthy.
The Drudge Report publisher tweeted Wednesday to condemn President Trump’s assault on Fake News:
I fear the future result of Trump’s crusade on ‘fake news’ will be licensing of all reporters. [Dems already floated this in the senate pre-Trump.] The mop up on this issue is going to be excruciating...
A former Director-General, Nigerian Television Authority, Dr. Tonnie Iredia, has highlighted the need for the Nigerian media to be courageous in discharging its duties as the 2019 elections draw near, describing self-censorship as a major problem.
Iredia stated this on Wednesday during a courtesy visit by the Media and Publicity Committee of the International Press Institute Congress 2018 to The Punch Place, headquarters of Punch Nigeria Limited in Ogun State.
In a victory for privacy rights at the border, the U.S. Court of Appeals for the Fourth Circuit today ruled that forensic searches of electronic devices carried out by border agents without any suspicion that the traveler has committed a crime violate the U.S. Constitution.
The ruling in U.S. v. Kolsuz is the first federal appellate case after the Supreme Court’s seminal decision in Riley v. California (2014) to hold that certain border device searches require individualized suspicion that the traveler is involved in criminal wrongdoing. Two other federal appellate opinions this year—from the Fifth Circuit and Eleventh Circuit—included strong analyses by judges who similarly questioned suspicionless border device searches.
EFF filed an amicus brief in Kolsuz arguing that the Supreme Court’s decision in Riley supports the conclusion that border agents need a probable cause warrant before searching electronic devices—whether manually or with forensic software—because of the unprecedented and significant privacy interests travelers have in their digital data. In Riley, a case that involved manual searches, the Supreme Court followed similar reasoning and held that police must obtain a warrant to search the cell phone of an arrestee.
In a rebuke to the Trump administration’s immigration enforcement policies, a New Hampshire court ruled last week that a Border Patrol checkpoint on an interstate highway last summer was “unconstitutional under both State and federal law.”
Don’t believe for a second the administration’s official response that this decision “does not affect the U.S. Border Patrol’s federal authority to conduct immigration checkpoints.” All motorists’ constitutional rights got a huge boost from Judge Thomas Rappa’s refusal to give Trump’s deportation force a blank check to pretextually set up a drug checkpoint under the guise of immigration enforcement.
Why was this checkpoint unlawful?
Because federal customs and border agents used impermissible dog-sniff searches to go after drugs without a warrant and without any reasonable suspicion that a crime had been committed. After conducting these dog-sniff searches, CBP agents then turned over to the local police the resulting evidence for state drug prosecutions.
At the end of each summer for the last 14 years, the small Welsh town of Porthcawl has been invaded. Every year its 16,000 population is swamped by up to 35,000 Elvis fans. Many people attending the yearly festival look the same: they slick back their hair, throw on oversized sunglasses and don white flares.
At 2017's Elvis festival, impersonators were faced with something different. Police were trialling automated facial recognition technology to track down criminals. Cameras scanning the public spotted 17 faces that they believed matched those stored in databases. Ten were correct, and seven people were wrongly identified.
South Wales Police has been testing an automated facial recognition system since June 2017 and has used it in the real-world at more than ten events. In the majority of cases, the system has made more incorrect matches than the times it has been able to correctly identify a potential suspect or offender.
Law enforcement agencies have embraced facial recognition. And contractors have returned the embrace, offering up a variety of "solutions" that are long on promise, but short on accuracy. That hasn't stopped the mutual attraction, as government agencies are apparently willing to sacrifice people's lives and freedom during these extended beta tests.
The latest example of widespread failure comes from the UK, where the government's embrace of surveillance equipment far exceeds that of the United States. Matt Burgess of Wired obtained documents detailing the South Wales Police's deployment of automated facial recognition software. What's shown in the FOI docs should worry everyone who isn't part of UK law enforcement. (It should worry law enforcement as well, but strangely does not seem to bother them.)
The Guardian had an article this past weekend about what looks like a potentially successful attempt by an American to use UK data protection law to force Cambridge Analytica to divulge what information it had collected about US voters like him. Whether the UK Information Commissioner’s Office (ICO) is truly entitled to compel Cambridge Analytica to do anything, much less on behalf of an American, is an open question. But for purposes here, let's assume that UK data protection law works this way, that it was intended to work this way, and that it's good policy for it to work this way.
The problem is, it's one thing for the ICO to force Cambridge Analytica to share with the American voter himself what personal data it had about him. But it's another thing entirely for the ICO to force Cambridge Analytica to share the personal data it has about American voters with it. Yet it looks from the article like that's what ICO may have threatened to force Cambridge Analytica to do.
This exemption will affect everyone involved in an immigration case, for example: those seeking refuge in the UK, those affected by the Windrush scandal, the three million EU citizens who will have to submit their applications for a new immigration status after Brexit. If this Bill becomes law, people won’t have the right to access their personal data held by the Home Office.
According to the Chief Inspector of Borders and Immigration, the Home Office has a ten percent error rate in immigration status checks. This exemption would allow these mistakes to go unchallenged. These errors could lead to an application being refused or even deportation.
Ever since the Cambridge Analytica fire sparked, Mozilla has been busy leg-pulling Facebook wherever and whenever they can. They have already released Facebook Container meant to prevent the social network from tracking users on the web.
[...]
It turns out, just 11.43%% of the 47,000 respondents agreed that they’d shell out up to $10/month to continue using the social network. Around 1% of the respondents were even comfortable in paying more. For the rest, it was a strick ‘No’ in the case of 62.84%, and 34.68% were not sure.
If Ida B. Wells had depended on Facebook, would we ever have had a National Lynching Memorial?
Two stories collided in my head this week. One of which was the opening of the National Memorial for Peace and Justice in Montgomery, Alabama—this country’s first major effort to confront the vast scope of the racial-terror lynchings that ravaged the black community under a pervasive, prevailing culture of white supremacy. It is the first because, until now, that same majority culture of white supremacy hasn’t wanted to look.
During today’s nomination hearing for Gina Haspel, President Donald Trump’s pick to lead the CIA, Haspel testified about a topic that has rightly generated significant controversy: the destruction of 92 videotapes showing CIA torture.
Sen. Diane Feinstein (D-Calif.), asked a question about the destruction of those tapes, misspeaking when she referred to tapes showing interrogations “of 92 detainees.” Haspel, seemingly determined to correct Feinstein, stated that the tapes “were of only one detainee.”
But the CIA’s own records produced in response to the ACLU’s torture transparency litigation contradict Haspel. According to those records, which include a declaration under oath from then-CIA Director Leon Panetta, the 92 destroyed tapes depicted abuse of two detainees: Abu Zubaydah and Abd al-Rahim al-Nashiri.
Here’s what we know: The videotapes were subject to long-running ACLU Freedom of Information Act litigation seeking to make public information about the torture program. After news about the videotape destruction broke, the judge in the case ordered the CIA to produce information about, among other things, the content of those videotapes.
President Trump’s nominee to be CIA director, Gina Haspel, faced pointed questions from the Senate Intelligence Committee Wednesday morning. Senators asked about her role in the agency’s torture program and its cover-up, including her role in the destruction of dozens of videotapes documenting torture.
Haspel, however, was far from forthright, regularly evading questions or giving only vague answers.
"Excited delirium" makes an appearance in another case where medical help for a mentally ill person was sought, but instead, police arrived and delivered someone to an early grave. (h/t Radley Balko)
22-year-old Adam Trammell was spotted wandering the halls of his group home completely naked. Feeling the young man was experiencing a psychotic break, the neighbor whose door Trammell had knocked on called the police. When officers arrived, they found Trammell in a distinctly non-threatening state: naked in the shower.
In December 2017, the Federal Communication Commission (FCC) voted to repeal the policies that protected net neutrality.
Rather than merely accepting this, Senator Ed Markey launched a Congressional Review Act (CRA) to save net neutrality. A CRA allows a simple majority (more than 50%) of Congress (the Senate and House of Representatives) to overturn an FCC vote. You can read more about CRAs on Wikipedia.
Already, 50 senators are supporting the CRA. We need one more vote to pass this effort to overturn the FCC's ruling.
In December, the FCC voted to end the 2015 Open Internet Order, which prevented Internet service providers (ISPs) like AT&T and Comcast from violating net neutrality principles. A simple majority vote in Congress can keep the FCC’s decision from going into effect. From now until the Senate votes, EFF, along with a coalition of organizations, companies, and websites, is on red alert and calling on you to tell Congress to vote to restore the Open Internet Order.
The Congressional Review Act (CRA) allows Congress to overturn an agency rule using a simple majority vote. It likewise only requires 30 signatures in order to force a vote. The petition to force the vote was delivered today. That means we’re likely to see the Senate—which has only been only one vote away from restoring net neutrality protections for quite a while—vote in mid-May.
Since the revision, detailed regulations, judicial interpretations and examination standards have also been implemented. The first of two instalments, this update focuses on how the revised law has been used to tackle bad-faith filings and looks at the latest trends in such cases.
Techdirt readers with long memories may recall a post back in 2011 about a 440-page report entitled "Media Piracy in Emerging Economies." As Mike wrote then, this detailed study effectively debunked the entire foundation of US attempts to impose maximalist copyright regimes on other countries. That report was edited by Joe Karaganis, who has put together another collection of articles, called "Shadow Libraries: Access to Knowledge in Global Higher Education", that are also likely to be of interest to Techdirt readers.
If you're a gamer, you know all about loot boxes. We haven't covered them or the associated controversy here, as both are slightly outside of the usual topics we cover. But we do in fact cover digital marketplaces and how companies and industries react to market forces and it's becoming more clear that the gaming industry and the gaming public are on something of a collision course over loot boxes.
As a primer, a loot box is a digital randomized thing, typically purchased in-game and resulting in a random reward of in-game content. Some content is more valuable than others, leading to some referring to loot boxes as a form of gambling, particularly when some of the game content can provide benefits to players in multiplayer settings. Overwatch popularized loot boxes somewhat in 2016, although mobile games have used some flavor of this kind of monetization for pretty much ever. The gaming public never really liked this concept, with many arguing that it breaks in-game competition by giving players willing to pay for loot boxes an advantage. But the loot box fervor hit its pique after the release of Star Wars Battlefront 2, with EA being forced to massively alter how its loot boxes worked in game. Since then, loot boxes are a topic of consumer backlash as a general rule.
Patrick Wingrove asks UK practitioners how copyright will change after Brexit, and analyses the EU Commission's recent report on the subject
Is the originality requirement in copyright a non-requirement? In other words: is there any meaningful threshold to copyright protection?
I’ve had the opportunity to discuss this issue three times over less than a month: first, at a workshop in Berlin, then with a Belgian student and, finally, with an IP lawyer based outside Europe. If these three situations had anything in common, it was the suggestion that the originality requirement is not really a requirement – whether under EU or US law – and that copyright protection is very easy to obtain.
While it is true that originality is not a particularly difficult condition to satisfy, it is still a requirement and: (1) it is not a mundane one, both in the EU and the US; and (2) there are a few instances in which the threshold would unlikely to be passed.