Christmas is here, and the first review units of the Kubuntu Focus have begun arriving with the reviewers eager to get their hands on them.
Our own Kubuntu Councillor, and Community Manager Rick Timmis, who has been leading the project for the Kubuntu side, provides us with a, festive, sneak preview, and unboxing experience.
ETSI's Open Source MANO group, which focuses on the management and orchestration of virtualised networks, has delivered its latest release, bringing cloud-native applications to network function virtualisation (NFV) deployments.
If 2018 was the year that Kubernetes broke into the mainstream, then 2019 was the year that reality set in. And that reality is that while Kubernetes is awesome, it’s also hard.
The Kubernetes ecosystem did its usual part in feeding the market by staying on track in rolling out quarterly updates to the platform. And that feeding has helped Kubernetes continue to steamroll the cloud market. However, ongoing security and commercialization challenges showed that growth is not coming without challenges.
2019 has been a great year here at Enable Sysadmin. Ops folks from around the world submitted technical how-tos, wisdom to pass along to the younger crowd, sysadmin appreciation day pieces, and even a few horror stories about mistakes that lead to seemingly endless self-inflicted torment.
Whether it's about getting away from your desk, avoiding burnout, relieving stress, or even destroying the thing that manages all of your virtual infrastructure with a single typo, we hope you enjoy this list of our top 10 sysadmin culture articles from 2019. We’re looking forward to a sysadmin-filled 2020!
The Open Mainframe Project (OMP), an open source initiative that enables collaboration across the mainframe community to develop shared tool sets and resources, continues to see rapid growth with a new project Polycephaly, based on IBM DBB using Groovy script to build z/OS applications with Jenkins and Git, and three academic institutions from China: Beijing Institute of Technology, South China University of Technology, and Xidian University. The new project and members solidify Open Mainframe Project's mission to educate and train the next generation of developers and engineers.
"As lifelong mainframers begin to retire, it is our job to make sure that we equip students, developers and engineers with the training and resources they need to continue innovating mainframes and enterprise applications," said John Mertic, Director of Program Management for the Linux Foundation and Open Mainframe Project. "We are particularly ecstatic to collaborate with these universities from China as our geographical footprint expands."
One can almost feel it in the bones: the excitement to come in the world of payments in 2020, as innovation sparks new business models and disruption.
Part of that future seems likely to involve open-source software, and that’s why PYMNTS recently caught up with Arvind Swami, director of FSI for Asia-Pacific at Red Hat. The company made news over summer when IBM closed its $34 billion acquisition of the open-source software firm. IBM had agreed to purchase the software company in October, marking the largest acquisition in the company’s history of more than 100 years, Reuters reported.
Red Hat, which launched in 1993, specializes in Linux operating systems — an alternative to Microsoft’s proprietary software.
As Swami told PYMNTS, open source could spark more payments innovation in the coming decade, as more players involved in payments look to affordable, interoperable and collaborative solutions that are relatively easy to scale — in this case, helped along by cloud computing technology and the work of developers to improve payments technology.
“Most of the people who contribute to [open-source software] are users, and that’s the key for open source,” he said. “It’s easy to consume, and highly usable.”
Topics covered in this episode:
Linux Mint 19.3 Released Dual GPU Improvements Coming to Gnome Purism Announces Librem Server FUSE For macOS Goes Closed Source Life Is Strange 2
elementaryOS 5.1 Hera Released https://blog.elementary.io/introducing-elementary-os-5-1-hera/ Linux Mint 19.3 Beta Available https://blog.linuxmint.com/?p=3816 Debian 11 “Bullseye” Alpha 1 Released https://lists.debian.org/debian-devel-announce/2019/12/msg00001.html Ubuntu Cinnamon Remix 19.10 Released https://discourse.ubuntu.com/t/ubuntu-cinnamon-remix-19-10-eoan-ermine-released/13579 Canonical Introduces Ubuntu AWS Rolling Kernel https://ubuntu.com/blog/introducing-the-ubuntu-aws-rolling-kernel Canonical Announces Ubuntu Pro for AWS https://ubuntu.com/blog/canonical-announces-ubuntu-pro-for-amazon-web-services Purism Announces the Librem 5 USA https://puri.sm/posts/librem-5-usa/ Thunderbird 68.3.0 Released https://www.thunderbird.net/en-US/thunderbird/68.3.0/releasenotes/ Tails 4.1 Released https://news.softpedia.com/news/tails-4-1-anonymous-os-released-with-latest-tor-browser-linux-kernel-5-3-9-528437.shtml Credits: Ubuntu “Complete” sound: Canonical
Authentication Vulnerabilities in OpenBSD, NetBSD 9.0 RC1 is available, Running FreeNAS on a DigitalOcean droplet, NomadBSD 1.3 is here, at e2k19 nobody can hear you scream, and more.
Bill is back on Zorin after a brief diversion to Mint 19.3. He gives us a mini review of Elementary OS and compares the MATE desktop with the Pantheon desktop. We read your feedback on SSL certificates, software license agreements, accessibility, and computer hardware.
A new version, v1.0.20191226, of wireguard-tools has been tagged in the git repository, containing various required userspace utilities, such as the wg(8) and wg-quick(8) commands and documentation.
A new version, v0.0.20191226, of the backported WireGuard kernel module for 3.10 <= Linux <= 5.5.y has been tagged in the git repository.
Please note that until Linux 5.6 is released, this snapshot is a snapshot rather than a secure final release.
WireGuard is to be merged for Linux 5.6 and is already staged in the net-next tree while for those on pre-5.6 kernels going as far back as Linux 3.10, a new out-of-tree module release is now available.
Jason Donenfeld today released wireguard-linux-compat v0.0.20191226 as the newest release of the WireGuard kernel module that can be built on Linux 3.10 through Linux 5.5 kernels. This snapshot follows a rework to their repository configuration in better aligning now towards an upstream Linux mainline kernel workflow.
Santa came a little late this year and dropped NewPipe 0.18.0! In this new version support for PeerTube has been added and many improvements to the downlaoder were made. Additionally many bugs have been fixed and a couple of cool improvements allow an even smoother usage.
The Linux Unified Key Setup (LUKS) is a platform-independent specification for hard disk encryption. In this tutorial, we use the challenge-response feature of a YubiKey to add two-factor authentication (2FA) to an existing LUKS-protected device.
The 2010s were great for the long-standing Wine project that allows Windows games/applications to run near effortlessly on Linux, macOS, and similar platforms. CodeWeavers' investments into Wine continue turning out very well for the continued success and now with Valve's Steam Play built upon the Wine-based Proton, more Linux gamers are happier than ever.
In reliving some of the most prominent Wine moments of the 2010s, here is a look at the most viewed Wine articles out of the 600+ we've written since 2010.
The Helsinki-based game developer was the only company to have two releases in the top-10, with consumers spending the 10th most money on Clash Royale, a real-time strategy game it published in March 2016.
The second most popular game by consumer spending was Monster Strike by Tokyo-headquartered Mixi and the third Candy Crush by California-headquartered Activision Blizzard.
Last week we sent out our first build of the Vulkan/Metal ready X-Plane (which will be version 11.50) to an external sight, and last night we sent out the first private beta.
Our plan is to move to an open public beta soon once we have some feedback on how well the build is working. When that is will depend on the bug reports; I’m crossing my fingers.
One of the engine upgrades to Vulkan we have been looking forward to the most has been usage by the X-Plane flight simulator to ultimately succeed their long-standing OpenGL pipeline. Laminar Research shared on Christmas day that the X-Plane 11.50 release with Vulkan support is currently in private beta and will soon be available publicly.
As we roll into 2020, the X-Plane 11.50 public beta should be available soon for more widespread testing and ironing out any remaining issues. Vulkan'ized X-Plane should allow for better performance and more long-term potentials as well thanks to the back-end re-architecting for this mature and realistic flight simulator.
The new terrain system is based on the Sparse Virtual Texture (MegaTexture) approach with a number of improvements and engine-specific tweaks, such as smart details caching, optimized culling techniques, etc. The terrain system is tightly integrated with Engine's advanced streaming subsystem, making it VRAM-efficient, and is designed from the ground up with multithreading approach in mind enabling it to utilize the advantages of multi-core systems and handle up to petabytes of data efficiently.
The technology is available for both DirectX and OpenGL API and can be used even on Windows 7 (which is still being widely used by enterprise although it is phased out by Microsoft). Although terrain rendering can be configured even for computers with a limited VRAM capacity, we strongly recommend using a GPU with at least 4 GB of memory for optimum performance.
Unigine developers have delivered a nice Christmas present in delivering Unigine 2.10 as the latest version of their 3D engine used by few games but an increasing number of simulation systems.
Redie is a top-down shooter clearly inspired by Hotline Miami that was released three years ago on Steam. As of today, out of 114 Steam reviews, 94 of them are positive. Just one month ago, an official announcement stated that the title has become absolutely free for everyone.
The digiKam photo management software is closing in on its v7.0 release and over the weekend issued their first beta.
Most notable with digiKam 7.0 is deep learning powered faces management. Using the cascade classifier and deep neural network functionality of the OpenCV library, face detection has been improved upon big time for detecting faces within images being managed by digiKam.
The next major version of the digiKam photo management software, that is digiKam 7.0, looks promising. The digiKam Team has released their first beta with deep learning powered faces management.
Since the algorithms used in background (not based on deep learning) were older and unchanged since the first revision, the team found them to be “not enough powerful” to facilitate the faces management workflow automatically.
The updated version makes use of the cascade classifier and deep neural network functionality of the OpenCV library to improve face detection big time.
Version 2.1 was announced on Distrowatch on August 25, 2019, and since then there have been heaps of minor version releases. Finally, we have reached another milestone release, version 2.2. Here is an announcement blurb:
The last version of EasyOS announced on Distrowatch was version 2.1. Massive changes since then, and we now have version 2.2. Lots of bug fixes, improvements, package upgrades, new applications and utilities. Version 2.2 is built with Debian 10.2 DEBs, and the kernel is 5.4.6 with lockdown enabled -- lockdown is used in the "Copy session to RAM & disable drives" boot option, to ratchet the security even higher. New applications built-in to the download file, include SolveSpace. The seaMonkey suite is built-in and now version 2.49.5. As usual, there is a huge collection of applications built-in, including LibreOffice, Inkscape, Gimp, Planner, Grisbi, Osmo, Notecase, Audacious and MPV. The download file is 515MB. Amongst many setup enhancements, there is a special patched NetworkManager tray applet, and there are considerable improvements to SFSget, EasyContainers and EasyVersionControl GUI utilities. The older series of EasyOS, the "Pyro" series with version numbers 1.x, although considered to be end-of-line, is still receiving updates and has now reached version 1.3. The Pyro series is still being maintained, as there are people using it.
In this video, we are looking at Feren OS 2019.12. Enjoy!
It’s this time of the year again — the time to reflect, and look back at some Fedora Magazine’s most popular articles in 2019. This time it’s all about desktop users. Let’s highlight a few of the many articles written by our great contributors in 2019, focusing on Fedora as a desktop OS.
It makes interesting reading. There is a thread about impeaching Bruce Perens although it is not nearly as gripping as the impeachment of Donald Trump.
[...]
debian-private is a mailing list including over 1,000 Debian Developers who all work in different companies around the world. To pretend this is a private means of communication is a farce.
The former Debian Project Leader's girlfriend, Molly de Blanc, promotes whispering networks in her talk at FOSDEM 2019. Feminists have worked hard to eliminate terms like toxic woman. Sadly, de Blanc's antics have given the term a new lease on life.
Debian's public mailing lists include huge threads preaching about codes of conduct, such as this in December 2019. The mentality of operating debian-private and the things that leadership figures write there contradict all of that.
When the leaders of the organization and key figures in the cabal behave abusively in what they consider to be a safe space, it is completely unreasonable to be upset at other developers for the tone of things they write anywhere else. Human behaviour is often a good reflection of the leadership.
Improving leadership standards and diversity both require real acts of leadership and transparency, not Molly's call-to-gossip. The leaking of this particular material, if it is intended to undermine confidence in debian-private, could be classed as a leadership act.
Debian is debating their init system choices...again. Should Debian remain focused on systemd or should there be a path to one or more alternative init systems? Soon there will be a vote. On the ballot, there will be seven options.
I’m trying to use this to capture some of my thoughts on the current GR, and to document my approach to this vote. If nothing else, I hope to use this to convince myself that I’ve read and understood the various options in the GR.
From my perspective, two of the choices on this ballot are easy to deal with, in that they have very clear meaning and the ramifications are easy to understand. We’re either all in on systemd and we don’t care about compatibility with other init systems, or we’re only loosely integrated with systemd and require that it be possible to replace it. It’s pretty easy to rank these two options relative to each other, depending on how you feel about systemd in general. The other options are the hardest to rank. They basically all come down to variants of “further discussion”, or of the status quo, with slight biases in one direction or another. The significance of them is the lens through which we want to view the situation, or how we want to frame the discussion.
There are a few considerations for me when weighing the options against each other. First, I don’t want to have another discussion about init systems in Debian ever again. Second, I really like systemd the init system and am happy to use it just about everywhere. Third, while I like systemd the init system, I don’t care much for systemd the NTP client, systemd the DNS resolver, systemd the DHCP client, etc. Unfortunately, I think this leaves me somewhat conflicted about choosing any of the stronger options. I’m tempted to prefer “Focus on systemd”, but I worry about where that leads in the long run. In particular, the GR option doesn’t discuss this at all, except to say that “[i]ntegrating systemd more deeply into Debian will lead to a more integrated and tested system…“, which may well be true, but I’d like to stop the integration somewhat short of the point where we start considering whether to rename the project Debian GNU/systemd.
The XCrySDen package is finally back in Debian. It was removed after Togl had been updated to major release 2.0 without coordinating the transition. Upstream then made some efforts to port the application and as of today, XCrySDen hit the archive! Thanks to the FTP Masters.
I’m a junior at William and Mary majoring in Computer Science and Linguistics, currently looking for an internship in software development over the summer. Ideally, I’d like to be in Northern Virginia, though I would look into temporarily relocating for an awesome opportunity.
My current experience includes a lot of time working in a Linux environment programming in Python, C, and a bit of Rust and Go. Specifically, I am interested in being part of a team working on systems programming or back-end web development.
The smallest, thinnest Linux computer There are many business card-sized SBCs, like RPi 4.
Computing and manufacturing have changed so much that things that were almost impossible to do unless you were a giant corporation are now something hobbyists accomplish in their spare time. That apparently includes making computers the size of business cards. No, this is far from being a Raspberry Pi clone that is the size of a hundred business cards stacked on top of each other. This computer that runs Linux is really a business card, the type that you give out for free to impress people and impressed they probably will be.
We doubled our staff for assembly, customer care and product assembly. We also improved and streamlined our testing workflow. As a result we were able to reduce the time from order to shipping by 50%. We are now in a much better position to handle shipping special requests, like shipping at a custom date or time critical shipments.
In June we started assembly of the new Librem Key “Made in USA” completely from our own facility. In September we introduce laptops with pre-installed Pure Boot i.e. each laptop receives an individualized and secured operating system installation during assembly and testing, which got further enhanced in December by an optional anti-interdiction service.
2020 will have a busy start with bulk orders of various Librem 5 components arriving (batteries, chargers etc) and assembly of the larger Librem 5 batches beginning. We also need to process all the Holiday Sale orders and the first Librem Server orders.
BEAGLEBONE PocketBeagle is an ultra-tiny-yet-complete open-source USB-key-fob computer. Unit features slick design and simple usage, making it a suitable development board for beginners and professionals alike. Board comes with the Octavo Systems OSD3358 1GHz ARM Cortex-A8 processor, and includes integrated 512MB DDR3 RAM, plus ARM Cortex-M3. Low cost Linux computer improves expansibility, while its openness and flexibility eliminate limits on design options.
SalesAgility, a specialist in delivering open source CRM software solutions worldwide, is calling for Europe to adopt open source as an enabler and catalyst for digital sovereignty and data privacy as it celebrates 10 years at the heart of the open source community.
As the question of digital sovereignty in Europe intensifies, SalesAgility – which launched in 2009 – firmly believe that adopting open source over standard proprietary software is the key to decentralising the web and taking back control of data from big tech firms based in the US and China.
Businesses that embrace open source benefit from greater control and transparency over their software, processes and crucially, their data. In turn, this enables more flexibility, innovation and drives the economy.
H2O.ai, the open source leader in artificial intelligence (AI) and machine learning (ML), today announced that Credit Suisse has selected it as a member of its 2019 Disruptive Technology Recognition (DTR) Program. Credit Suisse's DTR Program recognizes the top companies who are disrupting traditional IT with new, visionary, and innovative approaches.
Joget Inc, the open source no-code/low-code application platform company, has revealed its brand new logo that symbolizes the new phase of growth and brand identity beginning in year 2020. Initially a workflow engine for business process automation, Joget started as the open source Joget Workflow project in 2009. With more than 200,000 open source downloads and more than 10,000 community members since inception, Joget has matured into an enterprise grade no-code/low-code application development platform for Fortune 500 enterprises, government agencies, mid-market companies and small businesses with notable customers globally.
Hello everyone, in this article I will outline the progress that the Kiwi TCMS team has made towards achieving the goals on our 2019 roadmap. TL,DR: last year we've made lots of big and visible changes in Kiwi TCMS. This year less so. Progress has been slower than before and not so much visible. Community and team is growing. More contributors are welcome.
Open Source is as much about people as it is about technologies. As more and more companies are embracing open source development model, they also need to change their internal culture all the way from top leadership to new interns.
We interpret ALL talks in the five main halls live and in real-time. German talks are interpreted into English, and vice versa. Our work is transmitted live in the lecture halls, streamed to the Internet, and recordings are published on CCC sites and YouTube. A second translation channel will be operated in the same way.
The 36th Chaos Communication Congress (36C3) takes places in Leipzig, 27.-30.12.2019, and is the 2019 edition of the annual four-day conference on technology, society and utopia organised by the Chaos Computer Club (CCC) and volunteers.
The Congress offers lectures and workshops and various events on a multitude of topics including (but not limited to) information technology and generally a critical-creative attitude towards technology and the discussion about the effects of technological advances on society.
I want to write to you a triumphant message about what a wonderful year it has been for open source and the Open Source Initiative (OSI). There has been a lot to celebrate as an organization and a community. More than 600 of you are now members of the OSI, making us stronger than we’ve ever been before. We have increased staffing capacity, which makes it so we can do more of the necessary work to fulfill our mission. Open source adoption is on the rise and people continue to do amazing, innovative things with open source technology.
However, I would be doing us all a disservice to pretend that there have not been incredible challenges for the OSI and open source as a whole. We’ve been asked tough questions about what open source is, its continued value, and how it will need to adapt to the ever-changing landscape of technology. It is necessary to acknowledge everything that has happened over the past year in order for us to move forward and create a bright future for open source.
At the beginning of our planning year, we set a goal of increasing the number and diversity of OSI Affiliate organizations. Now we have over 75 Affiliate members, with significantly increased representation from across Asia. Affiliate members are now welcome to join the Board and each other on regular calls to talk about the work of the OSI, thanks to the efforts of the Membership Committee.
As volunteers for the GNU Project we are happy that the FSF provides GNU with services like fiscal sponsorship, technical infrastructure, promotion, copyright assignment, and volunteer management. And we note that the FSF is looking for feedback on this relationship going forward:
FSF and GNU: https://www.fsf.org/news/fsf-and-gnu
To that end we have held discussions with other GNU maintainers, developers and other contributors, drafting a GNU mission statement and social contract, identifying stakeholders, delegation models and consensus based decision making. We would like to share some of the things we believe should happen to improve the shared understanding of the relationship for the future of the Free Software Foundation and the GNU Project.
Here is quick report on GNU Generation’s Geekerie which happened on 2019-12-14 in Lausanne, Switzerland. We - I have been a member for a few years - are a student association promoting free software on EPFL’s campus, organizing various events over the academic semesters.
The Geekeries take place on a whole day - either Saturday or Sunday - at the end of the semester and are targeted towards somewhat ‘advanced’ students (i.e. our members and anyone that know what free software is, we try to avoid the ‘first-level support’ that is usually done during our Install Fests).
The Pentagon has now gone so far as to ask US-based companies to help develop open-source 5G in the face of Huawei's continued growth. That's according to a recent report from the Financial Times, reporting that Cisco and Oracle are among those that have been asked. Ultimately, the officials warn, not joining on the project could render their businesses obsolete.
The goal of the endeavor is reportedly to create a viable alternative for Huawei. The Chinese The Chinese tech giant offers a full suite of 5G solutions from the towers to software and end-points. So it currently holds its position as a provider that supplies a complete package. That grants the company a great position, holding around a third of the global market share.
Senior U.S. military leaders exhorted companies to develop integrated, standardized training and simulation systems to help them maintain fighting proficiency against other world powers—namely China—during the industry’s largest annual conference.
With numerous companies among the 480 exhibitors at the Interservice/Industry Training, Simulation and Education Conference (I/ITSEC) displaying their own approaches to creating interactive, “immersive” training environments, military leaders called for technological unity.
compiler is software that transforms source code written in a computer language (the source language) into another computer language (the target language, often having a binary form known as object code).
Typically, a programmer writes language statements in a language such as C or C++ using an editor. The programmer then runs the appropriate language compiler, which analyzes the language statements and turns them into machine code that the processor can execute.
Many coders learn to code using a text editor but in time they move towards using an Integrated Development Environment (IDE) as this type of software application makes the art of coding quicker and more efficient. For example, IDEs have semantic knowledge of the programming language which highlights coding problems while typing. Compiling is ‘on the fly’ and debugging is integrated. Our article titled 9 of the Best Free Linux Integrated Development Environments selects the best Linux IDEs.
An early preview release Git v2.25.0-rc0 is now available for testing at the usual places. It is comprised of 531 non-merge commits since v2.24.0, contributed by 61 people, 24 of which are new faces.
Git 2.25 continues re-implementing git add -i functionality within C code, performance tweaks to git push for repos with many refs pointing to unheard of objects, various other performance optimizations, many fixes, and various enhancements to different sub-commands and arguments.
It’s not difficult to conclude that, in the world that places the greatest importance on speed, efficiency and user-friendliness, IT has become the backbone of business in the 21st century. Despite the vast benefits and reliance on technology in today’s business, both employees and leaders in the field are familiar with the skills gap, and need to address it.
IT staff must be able to implement, operate and manage new technologies effectively to procure business benefits, yet a recent study found that 65 per cent of CIOs report IT skills shortages in their organisation. As well as this, the European Commission has conjectured there will be 756,000 unfilled jobs in the region's information communications technology (ICT) sector by 2020.
As more businesses move online and data continues to underpin the modernisation of every industry, businesses lacking in IT professionals are at a major competitive disadvantage. But why is it so difficult to find tech talent?
[...]
For IT organisations worrying about attracting new talent, skills gaps and reskilling staff, Postgres could be the answer.
Postgres is a fork of the original relational language that Ted Codd at IBM developed, which went on to become the foundation of Oracle's database technology. This compatibility means significantly less training for DBAs to understand how to implement and manage Postgres.
So not only do businesses have a route to escape the clutches of Oracle, they can go a long way to reskilling their existing workforce without incurring a huge retraining bill. What’s more, Postgres is supported by an active community, which is constantly innovating – exactly the type of technology that will attract talent to an organisation.
The digital skills gap may be widening, but the growing presence of open source alternatives may be able to bridge the gap. Not only does open-source software give customers in the database sector more choice, it also offers an attractive solution to attracting, retaining and reskilling staff.
Swift is a powerful and intuitive general-purpose programming language for the OS X, iOS, watchOS, and Linux operating systems. It’s developed by Apple Inc. Swift is intended to be more resilient to erroneous code (“safer”) than Objective-C, and more concise.
Swift is a new language, first appearing in 2014. It’s friendly to new programmers, feels familiar to Objective-C developers, and the language is optimized for development. It was launched under a proprietary license, but Apple made the language open source in December 2015 by releasing Swift 2.2 and later under the Apache License 2.0. By open-sourcing Swift, developers are able to use the language for their own purposes and go beyond OS X, iOS and watchOS apps.
There are currently two people who work full-time on the OpenSSL code, which does not include individuals who are assigned by their organization to work on the project. There are also a total of 16 individuals on the committer team and many more in the broader community who contribute patches.
According to Caswell, 30 OpenSSL contributors made 469 commits to the master branch in 2013, which was the last full year before the disclosure of Heartbleed. In comparison, in 2019, roughly 150 authors made over 1,800 commits.
“This broader community engagement means we really do have many more eyes on the code and a much healthier project,” Caswell said.
If you are looking for a tool to deploy machine learning models as production web services, then ‘Cortex’ could be a good option to try. This open-source platform is an alternative to serving models with AWS SageMaker or creating your own model deployment platform over AWS services like Elastic Container Service (ECS), Elastic Kubernetes Service (EKS), and Elastic Compute Cloud (EC2) and even open-source projects like Docker, Kubernetes, and TensorFlow.
This was a great year for sysadmins interested in broadening their skills and making friends with their networking colleagues. As we closed out the last few months of the year, our talented writers shared their expertise throughout the layers of the TCP/IP stack. Network novices had the opportunity to learn basic troubleshooting tools, configure VLANs, befriend Network Manager, become comfortable with DNS fundamentals, and much more.
Of course, we didn’t leave our advanced users hanging. Power users had the chance to familiarize themselves with the latest trends in software-defined networking, build their own VPN service, sniff the wire with tcpdump, and automate DNS configuration with Ansible. Knowing what goes on beyond your NIC isn’t just good for bonding with your networking colleagues; it’s also a great way to better understand the systems that you design, operate, and troubleshoot on a daily basis. Here’s a recap of our ten most popular networking articles
For historical reasons dating back to code written on punch cards in the 1920s and carried on through terminal-screens from the 70s; programming style guides and editors set the line-length to 80-characters per line (cpl) or less. You’ll find this enforced today in the Style Guide for Python Code (PEP 8), the Ruby Style Guide, and many others.
However, you’re not going to fit up to 80-characters of a fixed-width font face onto a mobile screen and maintain a readable font size. You can at most fit 32 characters at a comfortable 18px font size on a 360 px wide display (including a 10 px margin at either side). This is one of the most common mobile resolutions and also the smallest one.
You can fit in 64 characters if you ask your readers to flip their phones horizontally. They’ll surely resent you for asking and interrupting their reading. There are still many phones on the market, even new ones, that have square displays.
You can make a fluid preformatted code block that reflows to fit within the character limits for narrow (mobile portrait), medium (mobile landscape/tablet), and large displays (PCs). You likely have to do this yourself as there are no automated tools for the job.
At this point, advanced CSS-stylists may be thinking of CSS rulesets like white-space: pre-wrap; word-break: break-word;. However, this method won’t handle indentation levels and would break lines in inopportune places.
Instead, you’d need to invest the time to manually wrap segments of code at opportune places in a display: inline-block; elements. Your stylesheet (probably aided by JavaScript) would need to apply proper levels of indentation to wrapped lines. This would be a time-consuming process.
If you’ve ever worked with retail data, you’ll most likely have run across the need to perform some market basket analysis (also called Cross-Sell recommendations). If you aren’t sure what market basket analysis is, I’ve provided a quick overview below.
What is Market Basket Analysis?
In the simplest of terms, market basket analysis looks at retail sales data and determines what products are purchased together. For example, if you sell widgets and want to be able to recommend similar products and/or products that are purchased together, you can perform this type of analysis to be able to understand what products should be recommended when a user views a widget.
Decision Tree is the best and easiest way to analyze the consequences of each possible output, be it in data mining, statistics, or machine learning. It is a supervised learning approach that can be used for both classification and regression.
A decision tree can help in visually represent the decisions and the explicit decision making process. For example: While developing a decision tree, at each node there is a different type of question asked. Based on the type of question, you can calculate output from it.
For ivp_solve an event is a function of the time t and the solution y whose roots the solver will report. To determine the period, we’ll look at where the solution is zero; our event function is trivial since we want to find the roots of the solution itself.
Heap Sort is another example of an efficient sorting algorithm. Its main advantage is that it has a great worst-case runtime of O(n*logn) regardless of the input data.
As the name suggests, Heap Sort relies heavily on the heap data structure - a common implementation of a Priority Queue.
Without a doubt, Heap Sort is one of the simplest sorting algorithms to implement and coupled with the fact that it's a fairly efficient algorithm compared to other simple implementations, it's a common one to encounter.
The principle of least surprise is a guideline when designing user interfaces. It says that when the user performs an action, the program should do whatever would surprise the user the least. This is for the same reason kids love reading the same book over and over again: there is nothing more comforting to people than the ability to predict and have those predictions come true.
A critical insight in the development of the ABC language, Python's inspiration, was that programming languages are user interfaces and need to be designed with the same tools that UI designers use. Thankfully, since then, more languages have adopted the concepts of affordance and ergonomics from UI design, even if they apply them less strictly.
This brings us to the next three principles in the Zen of Python.
Many people have browsed FX trading sites to check FX rates. If you are buying a large amount of foreign currency whether for traveling or paying for oversea expense, you would be checking FX rate frequently (probably several times a day - like me) as a small rate difference could lead to a quite large financial impact.
[...]
You could then leave the code to run for a day or two for it to collect the data. Once the data is collected, you have a series of data to play with.
By plotting line graphs, you could check which banks offer the best rates - in my case, China Merchant Bank offered the more competitive rates at the time. Screenshot 2019-12-26 at 21.18.11.png
I also noticed that both banks charges relatively consistent spreads (the difference between selling and buying rate) across the days. But in comparison, Bank of China seems to be charging higher spreads than China Merchant Bank like calculate below.
These articles range from use cases and tutorials to some very interesting, if somewhat unconventional, ways to use Git. All of these articles can help you improve your Git skills, but if you really need a Git 101 introduction, be sure to check out our Getting started with Git: Terminology 101 article and download our Git cheat sheet.
Like previous years at 36C3 the C3GSM team will run a local cellular network for mobile phones, alongside the POC’s DECT system and the NOC’s IPv4 and IPv6 systems. As core network for our cellular network we use the open source projects osmocom (for 2G/3G) and NextEPC (for 4G). There will only be a very limited number of SIM cards available to buy. However, cards from previous CCC events can be used, so please don’t forget to bring them.
As always, we had to ask commercial operators for permission to use some of their parts of the spectrum, which unfortunately has been completely sold to very few commercial operators. We got permission to use 5 MHz of the 850 MHz band, which we will use for 2G/3G and 10 MHz on the 2600 MHz band for 4G (LTE).
Sometimes math really is a matter of life and death, particularly when it comes to the outbreak of a deadly disease and the strategies to control it. As well as helping us to understand the unusual features of different disease landscapes, mathematical models of epidemics allow us to peer into the future of disease progression and to take proactive preventive measures, rather than always playing reactive games of catch-up.
Mathematical epidemiology helps us answer a number of perplexing questions that surround childhood diseases such as mumps and rubella.
The new policies require developers to submit their apps to Apple to go through a notarizing security process, or they won't run in macOS Catalina. An extension to the existing Gatekeeper process that previously allowed notarization as an option, the requirement is designed to ensure downloaded software is from the source users believe it is from.
"If you have not yet done so, upload your software to the notary service and review the developer log for warnings. These warnings will become errors starting February 3 and must be fixed in order to have your software notarized. Software notarized before February 3 will continue to run by default on macOS Catalina," the company said in a statement.
Developers received word of the impending changes this summer. Apple temporarily adjusted the notarization prerequisites in order to make the transition to macOS Catalina easier for developers and users. The new changes go into effect on February 3, 2020.
Cupertino tech giant Apple announced earlier in June that all apps distributed outside the Mac App Store must be notarized so they can continue functioning on Macs and MacBooks running on the latest macOS version, macOS Catalina.
Reli is part of the Multichain Ventures family of companies and grew out of their own DevOps needs. Their expert team of developers spent hundreds of hours refining their own DevOps tools to establish best practices for modern software engineering. Reli was born out of the realization that MultiChain Ventures’ developer’s work on their DevOps tools could be extended to help other teams who have similar needs.
It’s been a great year at Flexera, and I’m hoping my readers, too, prospered and experienced their own versions of success in 2019. I’ve enjoyed the time I’ve spent on my blog, delivering my views to all valued members of the open source community. Software Composition Analysis (SCA) is thriving; yes at Flexera, but also as a technology that is impacting companies across the globe and how they manage open source software, provide transparency across teams, and enable more innovation because license, IP and security risk protocols are in place. There’s peace of mind.
An OSS license grants others permission to modify, use, and distribute software under certain conditions. However, every component is released with a different license, and a different set of terms. With hundreds or thousands of these components in a typical software supply chain, it is easy to see how complications arise.
Liferay, Inc., which makes software that helps companies create digital experiences on web, mobile and connected devices, has formalized compliance with the OpenChain Project since October 29, 2019, becoming the first digital experience provider to do so. As open source projects take on an increasingly important role in enterprise software development, it is critical that vendors and customers have a clear understanding of their licensing requirements. The OpenChain Project seeks to address this need by codifying and standardizing open source license compliance across organizations.
Kate is now in the Windows Store since September, see our initial post.
It was the second application published there with the KDE e.V. account.
One might argue that it is no good thing for an open-source project to promote the use of closed-source operating systems like Windows.
On the other side, a lot of people are stuck on Windows and I think it is a good thing to provide them with open-source software. If people start to use more and more open-source user-space software, they will perhaps be able to switch over to some fully open-source operating system in the future.
openEQUELLA 2019.2 continues the process of redeveloping the platform's user interface to ensure increased usability and appeal to end users. 2019.2 introduces a new default UI style sheet that matches the legacy UI to the new UI, providing a seamless look and feel. This will provide a transitional step for users as new UI technologies are applied across openEQUELLA throughout 2020.
Security updates have been issued by CentOS (firefox, fribidi, nss, nss-softokn, nss-util, openslp, and thunderbird), Debian (opensc), and Mageia (389-ds-base, apache, apache-mod_auth_openidc, kernel, libofx, microcode, php, and ruby).
Almost every week, we hear about another corporate data breach or government attack on privacy. For anyone who wants real privacy online, encryption is the essential component.
Governments around the world keep trying to break encryption, seeking to enhance the power of their law enforcement agencies. They’ve tried for years to require companies to build backdoors into encrypted software and devices, which would enable them to listen in on potentially any digital conversation. The FBI has coined a phrase, “going dark,” that it has used since the late '90s to describe their “problem”—the lack of an omnipresent, all-powerful surveillance tool.
But encryption with special access for a select group isn’t some kind of superpower—it’s just broken encryption. The same security flaws used by U.S. police will be used by oppressive regimes and criminal syndicates.
The only innovation in 2019 has been rhetorical—anti-encryption authorities are determined not to call a backdoor a backdoor. Instead, we saw a proposal from UK intelligence agency GCHQ to add “ghost” listeners to encrypted messaging applications. Later in the year, we saw a revival of the idea of “key escrow,” a discredited idea about how to square the circle on encryption.
WebAuthn, Web Authentication: An API for accessing Public Key Credentials Level 1, is a W3C Recommendation released in March 2019. It defines creation and use of strong, attested, scoped, public key-based credentials by web applications. It is very similar to the Universal 2nd Factor (U2F) standard, but extended and customized for online services.
Security devices with WebAuthn support allow you to use two-factor authentication more easily since they contain a secret key that provides a second factor only by pressing the device's button. They can also be used as a single factor in some cases, storing your credentials for you.
One reason why Microsoft stays silent about ransomware attacks on its Windows operating system is because the company makes money when it is called in to help tackle such attacks which are increasing all the time.
The Norwegian firm Norsk Hydro, which was hit by the LockerGoga ransomware in March last year, has been the biggest company to suffer from this scourge in recent times and has been affected to the tune of about US$75 million.
I live in a large apartment complex (it's literally a city block big), so I spend a disproportionate amount of time walking down corridors. Recently one of my neighbours installed a Ring wireless doorbell. By default these are motion activated (and the process for disabling motion detection is far from obvious), and if the owner subscribes to an appropriate plan these recordings are stored in the cloud. I'm not super enthusiastic about the idea of having my conversations recorded while I'm walking past someone's door, so I decided to look into the security of these devices.
One visit to Amazon later and I had a refurbished Ring Video Doorbell 2â⢠sitting on my desk. Tearing it down revealed it uses a TI SoC that's optimised for this sort of application, linked to a DSP that presumably does stuff like motion detection. The device spends most of its time in a sleep state where it generates no network activity, so on any wakeup it has to reassociate with the wireless network and start streaming data.
So we have a device that's silent and undetectable until it starts recording you, which isn't a great place to start from. But fortunately wifi has a few, uh, interesting design choices that mean we can still do something. The first is that even on an encrypted network, the packet headers are unencrypted and contain the address of the access point and whichever device is communicating. This means that it's possible to just dump whatever traffic is floating past and build up a collection of device addresses. Address ranges are allocated by the IEEE, so it's possible to map the addresses you see to manufacturers and get some idea of what's actually on the network[1] even if you can't see what they're actually transmitting. The second is that various management frames aren't encrypted, and so can be faked even if you don't have the network credentials.
Modern data surveillance relies on the ease of gathering but also the capacity to analyze giant sets of numbers. Run a set of numbers through a computer and the data becomes far more personal and invasive. Data points become a diary. A cluster of pings inside a secure facility reveals clues to the secretive role of an aerospace engineer. Visits to places of worship, trips to Planned Parenthood, a late-night visit to a bail bondsman — all collected in perpetuity and logged forever to be analyzed, traded and monetized. Each mark of latitude and longitude tells the story of the triumphs and tribulations of a life.
Americans would never consent to a government directive that all citizens carry a device that broadcast, in real time, their physical location and archived that information in repositories that could be shared among powerful, faceless institutions. Instead, Americans have been lulled into doing it voluntarily by misleading companies.
If a mobile phone is turned on, chances are its location is collected in a spreadsheet somewhere. What does it feel like to see that archive? We went to Pasadena to find out.
The ongoing fight for digital rights has seen major victories and setbacks this year, and some of these victories would not have been possible without the leaks from Edward Snowden. Snowden bravely blew the whistle on the mass surveillance undertaken by the United States government, and his revelations have informed the public of widespread privacy abuses taking place and helped people understand the urgency of taking back the [Internet]. Thank you, Snowden.
You can read about Snowden’s path to becoming a whistleblower, including his use of Tor, in his new book, Permanent Record.
Cindy Cohn, Executive Director of the Electronic Frontier Foundation (EFF) and Board Member of the Tor Project, was named one of America's Top 50 Women in Tech 2018 by Forbes.
As a tireless defender of digital rights, we wanted to get her take on the state of the [Internet] today, recent victories and challenges ahead, and Tor’s role in taking back the [Internet].
Although today’s public protests against nuclear weapons can’t compare to the major€ antinuclear upheavals€ of past decades, there are clear indications that most Americans reject the Trump administration’s nuclear weapons policies.
In an earlier article (FAIR.org, 12/18/19) regarding the Washington Post’s Afghanistan Papers (12/9/19), I discussed how the Post’s exposé also exposed the Post as one of the primary vehicles US officials use to spread their lies, and why it’s impossible for corporate media outlets like the Post to raise more substantive questions about the deceptive nature of US foreign policy.
The Australian bush is burning. But the extreme conditions are wreaking havoc on more than just our flora, and more than just fauna outside our suburbs. Add in the chaos unleashed by hunters and it’s a pretty awful time to be an animal in Australia, writes Geoff Russell.
Now is NOT the time to discuss politics (or climate change), at least not while the nation burns. So says our Prime Minister, Scott Morrison. But now IS the time to play politics, with the Morrison government announcing today that it will launch a federal bushfire inquiry which will specifically look into state policy.
The bush fire situation in Australia is now deemed catastrophic. And it started early, with a relentless ferocity that has seen thousands of volunteers stretched across the states and a slow but assured rise in the number of deaths. Currently, there are fires raging at emergency level across New South Wales, and major incendiary activity in South Australia and Victoria. Saturday was deemed by NSW Rural Fire Service commissioner Shane Fitzsimmons “awful”, given the loss of 20 homes in a “mega-blaze” northwest of Sydney in the Gospers Mountain. To this could be added fires at Currowan, Kerry Ridge and Upper Turon Road, Palmers Oaky.
Here, we are seeing extreme weather events like never before. The other day we had about eight centimetres of rain in 20 minutes. These downpours are like rain bombs. They are so ferocious that a farmer lost all of his fences, and all it did was silt up the dam so he had to use a machine to excavate the mud.
Most farmers in my district have not a blade of grass remaining on their properties. Topsoil has been blown away by the terrible, strong winds this spring and summer. We have experienced the hottest days that I can remember, and right now I can’t even open any windows because my eyes sting and lungs hurt from bushfire smoke.
That is the inevitable conclusion for readers of a NYT article on Putin and Russia that had the headline, “Russia is a mess. Why is Putin such a formidable enemy.” While the article notes the recent economic stagnation in Russia, it misses the extraordinary turnaround that took place under Putin.
In Alabama, the county in which you’re arrested could be the deciding factor in who will be financially responsible for your medical bills behind bars.
In Baldwin County, known for its white-sand Gulf Coast beaches and waterfront communities, the sheriff’s office ensures that inmates in the county jail do not have to pay anything more than a $15 copayment for medical care.
Sarah Lindgren, 61, of Oakdale, was scanning groceries in a self-checkout lane at Walmart with her teen daughter a couple of days before Thanksgiving. There was more in her cart than there was money in her account, but she bagged up the discounted meat anyway and headed toward the door in her motorized wheelchair.
[...]
Woodbury police officer Bryan Wagner came to the room. He listened to her story but wasn’t sure he believed it.
“As a police officer, I am lied to often and tend to become skeptical of stories given by people who are potentially being arrested,” he said. “I released her from Walmart with a citation for theft. She was remorseful, and, from my experience, it was likely her first time stealing.”
Wagner began to wonder if she was telling the truth, so he did some digging.
South Bend Mayor Pete Buttigieg faced attacks over big-dollar donors at the last debate. Then an email came out that implied “pay-to-play.”
Now Buttigieg will likely face more criticism and mocking after his team revealed a contest to send his campaign the lowest donation.
Sen. Bernie Sanders’ recent surge in national and early-state polls, enthusiastic progressive base, and resilience in the aftermath of his heart attack have reportedly forced some within the Democratic establishment who were previously dismissive of the Vermont senator to concede — both in private and in public — that he could ultimately run away with the party’s presidential nomination.
Designed primarily to provide funding for other candidates running for office, leadership PACs are an important instrument for Washington politicos seeking leadership positions to raise money and build connections.
Israeli Prime Minister Benjamin Netanyahu on Thursday scored a landslide victory in a primary race for leadership of the ruling Likud party, giving the embattled leader an important boost ahead of the country’s third election in less than a year.
It's difficult, just before Christmas, not to agree right off the bat with the proposal being discussed by several German states to unilaterally take in child refugees currently languishing in Greek refugee camps. Indeed, Heinrich Bedford-Strohm of the Evangelical Church in Germany supports the idea, noting that Jesus and his family were themselves refugees after his birth. Only the heartless aren't moved by images of misery in refugee camps in Greece while here we are getting our homes cozy for the holidays. And if you're hoping for a common solution at the EU level, you're in for a long wait that will likely end up in kicking the can down the road.
Still, Habeck and others are wrong. Taking in thousands of children would be sending the wrong message in a number of ways.
Mr Shaveddinov was working as a project manager at Mr Navalny's Anti-Corruption Foundation (FBK) when he was seized.
Russian opposition leader Alexei Navalny said Wednesday that one of his allies had been forcibly conscripted and sent to serve at a remote Arctic base, in a move his supporters said amounted to kidnapping.
Ruslan Shaveddinov, a project manager at Navalny's anti-corruption foundation, went missing Monday after police broke into his Moscow flat and his phone's SIM card was disabled.
In 2019, lawmakers grilled tech executives at multiple hearings in Washington and federal regulators slapped record fines on tech firms. They promise action in the coming year on a host of issues: competition, online privacy, encryption and bias.
U.S. tech companies such as Apple, Facebook, Google and Amazon are girding themselves for more federal scrutiny.
“As the [Internet] companies matured without a lot of regulation, some issues have emerged where attention is needed,” said Rep. Zoe Lofgren, a Democrat representing Silicon Valley since 1994 and who has introduced a national online privacy bill.
“I think it’s fair enough to examine what kind of rules should be set in certain elements of the tech economy,” she said.
Another case of nonexistent "customer confusion" is being litigated. Tofurky, the maker of several vegetable-based products, sued the state of Arkansas over its bogus [squints at Legiscan in disbelief] "Act To Require Truth In Labeling Of Agricultural Products That Are Edible By Humans" law.
The Maccabeats, as I have just discovered, is an Orthodox Jewish a capella group that specializes in Jewish-themed parodies of hit songs (pretty much all a cappella groups seem to do a bunch of parodies). Their latest video, for this year's Chanukkah, was a parody of both Billie Eilish's Bad Guy (here: "Pan Fry") and Lil Nas X's "Old Town Road." It's pretty entertaining. Anyway, on Tuesday, they got a takedown notice from YouTube, saying that the video is no longer allowed to be shown for copyright violations:
Some sanity has finally prevailed in Austria, where libel laws are anything but sane. Earlier this year, a guest of the Ferienhof Gerlos hotel in Austria was sued by the hotel after posting reviews that mentioned the unexpected presence of a photo of a man in a Nazi uniform by the front entrance.
Marcella Zoia, Toronto’s infamous Chair Girl, made a cameo appearance in Drake’s latest video. Fan reaction to the appearance quickly led to her removal, though.
The court’s justices reportedly voted 10-6 in favor of Wikipedia.
Turkey blocked access to Wikipedia under a law that allows it to restrict access to material that is considered to be a threat to national security in April 2017.
Turkey blocked Wikipedia in April 2017, accusing it of being part of a “smear campaign” against the country, after the website refused to remove content that allegedly portrayed Turkey as supporting the Islamic State group and other terrorist organizations.
Access to Wikipedia and all its language editions was blocked under a law that allows the government to ban websites it deems pose a national security threat.
Iran's authorities have restricted mobile [Internet] access in several provinces, an Iranian news agency reported on Wednesday, following a trend of social media posts and messages from relatives of those killed in unrest last month calling for more protests and ceremonies to commemorate the dead.
Iran's authorities have restricted mobile [Internet] access in several provinces, a day before new protests were expected to kick off following calls for the demonstrations on social media.
Social media posts, along with some relatives of people killed in unrest last month, have called for renewed protests and for ceremonies to commemorate the dead to be held on Thursday (local time).
The semi-official news agency ILNA quoted an informed source at the Communications and Information Technology Ministry as saying mobile [Internet] access to overseas sites was blocked by "security authorities" in Alborz, Kurdestan and Zanjan provinces in central and western Iran and Fars in the south.
"According to this source, it is possible that more provinces will be affected by the shutdown of mobile international connectivity," ILNA said.
Network data show two distinct falls in connectivity at approximately 6:30 a.m. local time (03:00 UTC) and 8:00 a.m. (04:30 UTC) affecting mobile provider RighTel, Iran’s third licensed mobile network operator. Impact to other providers including fixed-line networks has been reported and is being investigated. Observations are consistent with a targeted disruption and do not appear to be related to any international issue, and users have speculated a possible connection with protests planned for 26 December 2019.
An official denied any order by the authorities to block the [Internet] this week, and mobile operators have not reported service disruptions.
Internet blockage observatory NetBlocks said on Twitter that there was evidence of [Internet] disruption in parts of the country.
The Guardian has corrected an article describing a “plot” to “smuggle” WikiLeaks founder Julian Assange out of London, more than a year after publication. Russia called the article “disinformation and fake news” from the outset.
Assange is currently languishing in London’s Belmarsh Prison, awaiting a hearing on his extradition to the US where he is facing espionage charges. However, in the runup to Christmas 2017 he was still safe inside the city’s Ecuadorian embassy. At the time, Assange had become a thorn in the side of Ecuador’s new president, Lenin Moreno, and Moreno was reportedly mulling a plan to offer him a diplomatic post in Russia, shifting him out of the UK and away from the threat of extradition.
[...]
The Russian embassy in London called the article a clear example of "disinformation and fake news by British media."
On Sunday, the Guardian itself issued a correction. “Our report should have avoided the words ‘smuggle’ and ‘plot’ since they implied that diplomatic immunity in itself was illicit,” read a statement from the paper.
The correction was made after a complaint from Fidel Narvaez, who served as Ecuador’s London consul at the time of the alleged “plot.” The paper described Narvaez as a middleman between Assange and the Kremlin. Narvaez outright denied any discussions with Moscow.
Last year, the Guardian reported on a plan to transfer Julian Assange from the Ecuadorian embassy in London to Ecuador’s embassy in Moscow by making Assange a member of the Ecuadorian embassy staff, first in London and then in Russia. Giving Assange diplomatic status would have allowed him to leave the Ecuadorian embassy, where he was a fugitive from UK justice. Assange, Ecuador and Russia were all parties to the plan, which was abandoned after the UK Foreign and Commonwealth Office refused to recognise Assange as a member of the embassy staff. Our report should have avoided the words “smuggle” and “plot” since they implied that diplomatic immunity in itself was illicit.
Lawyers for WikiLeaks founder Julian Assange told a London court Thursday that he should not be extradited to the United States to face spying charges because the offenses he is accused of are political in nature.
U.S. authorities accuse Assange of scheming with former Army intelligence analyst Chelsea Manning to break a password for a government computer and leak hundreds of thousands of classified documents.
Lawyers for Julian Assange said on Thursday they will argue that the WikiLeaks founder cannot be sent from Britain to the United States to face spying charges because a treaty between the two countries bans extradition for political offenses.
Julian Assange may be an odious character in the eyes of some. He may not be a journalist in the estimation of others.
He may be regarded as a serial pest by his detractors, but his case in the British courts has become a cause celebre for free speech and civil liberties advocates.
In a London magistrate's court on Friday, early shots will be fired in the Assange defence team's efforts to block his extradition to the United States on 17 charges under the Espionage Act with a separate indictment under the Computer Fraud and Abuse Act.
Assange is facing a jail sentence of 175 years on alleged breaches of the Espionage Act, and further penalty under the Computer Fraud and Abuse Act.
If today’s Incels had a sense of humor and a real flair for decadence like Zalman Schneour, they might be able to tell us something about how paranoia can dance. But contemporary Underground Man rarely goes out; content in his chat rooms, squinty-eyed, immobile and listless. The solitary’s terror now consists of a mania for being safe.
Memorial, Russia's oldest rights group, now faces fines totaling 3.5 million rubles ($57,000) for violating a law that the European Parliament in Brussels earlier this month said creates "an atmosphere that is hostile to civil society."
Russia passed the original "foreign agent" law -- which requires all nongovernmental organizations receiving foreign funding to register -- in 2012 following a major wave of anti-government protests.
Profit Disgorgement – Reset to 1946: I will start with the profit disgorgement provision – which is a major change away from the current compensatory scheme in U.S. Utility Patent Law. That said, disgorgement remains available for design patent infringement as well as other IP regimes such as copyright, trademark, and trade secret misappropriation. The basic approach to disgorgement is to calculate the infringer’s profits associated with the infringement and then hand those profits over to the rights holder. As Supreme Court explained in Tilghman v. Proctor, 125 U.S. 136 (1888), this approach is designed to avoid unjust enrichment by the infringer — what patent owners term “efficient infringement.”
Nintendo has responded to a motion to dismiss previously filed at court by the operator of the popular site RomUniverse. The game company accuses the site of brazen and mass-scale copyright infringement and stresses that the site's operator is not protected by a "safe harbor" or "first sale doctrine" defense.
The video for Nirvana’s “Smells Like Teen Spirit” recently reached an important milestone: it surpassed one billion views on YouTube.