At the high-end of Lenovo’s ThinkPad designs, where professionals need server-grade features like ECC and graphics focused on compute or rendering, we get the P1 model which is updated for 2020 as the P1 Gen3. This notebook refresh is a 15.6-inch design, offering an OLED display, choice of Intel 10th Gen or Xeon processors, and Quadro-level graphics. The underlying design of the chassis is carbon fiber, aiming to be sturdy yet lightweight, with a fingerprint resistant finish to enhance the aesthetic of a premium system.
The ThinkPad P1 Gen3 is a 15.6-inch design with options that include a 3840x2160 OLED touch display at HDR500, a 3840x2160 LCD IPS variant up to 600 nits, or a 1920x1080 IPS 500nit HDR lower-cost option. Under the hood it supports Intel’s 10th Gen Core mobile 45 W processors, or their Xeon equivalents, which extends support to up to 64 GB of ECC for the Xeons via two SoDIMM slots. Graphics are available up to an NVIDIA Quadro T2000. There are two M.2 drives in the system, allowing for up to 4 TB of NVMe SSDs in RAID 0/1, and the system comes with an 80 Wh battery. Two power supplies are available – a base 135 W slim model or a 170 W slim model. Operating system options include Windows 10 Home, Pro, Pro for Workstations, Ubuntu, Red Hat (certified), or Fedora.
Although you might be more familiar with the likes of macOS, Android or Windows to get everything you need from your PC, another popular option is Linux. It's been around since the early 90's and well worth thinking about if you're looking for an alternative operating system.
It gets a little confusing when you get into the technicalities, Linux is essentially the soul of the operating system, it's open-source, completely free and there's several types of software (Linux Distros) to choose from to optimise user experience.
Some laptops (although very few) offer Linux as a baseline, pre-installed programme, you can however install it yourself onto most laptops. It's always best to check which models are compatible with the Linux functions you'll need.
If you're a white-collar worker, chances are -- thanks to the coronavirus pandemic -- you've been working from home. And many of you may have turned to Chromebooks for work. They're cheap and require almost no maintenance.
But the weeks of working from home have turned to months. for many of us, we may never return to the office for work. In that case, you upgrade from the old Chromebook you already have at home or the first one that came to hand at Best Buy when the shutdown started to a true business-class Chromebook.
With that goal in mind, I looked for the best Chromebooks available for work. These are not one-size-fits-all machines. Each has its strong points for different users.
Dirk Hohndel, who was then the chief Linux and open-source technologist at Intel, predicted that in 1999, Linux would penetrate the PC desktop market and displace Windows. He’s credited with coining the phrase “the year of the Linux desktop.”
Two decades later, we’re still waiting. Every year or so, an industry pundit will stick their neck out and declare that year the year of the Linux desktop. It’s just not happening. About two percent of desktop PCs and laptops use Linux, and there were over 2 billion in use in 2015. That’s about 4 million computers running Linux. The figure would be higher now, of course—possibly about 4.5 million, which is, roughly, the population of Kuwait.
As part of X's evolution over time, input event handling has gone through a practical change, although one that is what you could call unevenly distributed. The original X protocol has input events, of course, which are sometimes now called core input events. You can see what core events are generated from various activities through the venerable xev program, and many straightforward X programs continue to interact only with core events.
However, core input events have limitations that date from X's origins. Core input events are only really designed to deal with straightforward keyboards and mice with buttons. Even mouse scroll wheels have an awkward representation in core X events; moving the scroll wheel actually generates mouse button events for pressing and releasing button 4 or 5 (for normal, implicitly vertical scroll wheels). I don't think there's anything in the X protocol that reserves these buttons for scroll wheels, it's just a convention that people came up with when they started needing to handle scroll wheels in X.
Doc Searls talks with Jonathan Bennet and Don Marti who is an expert on the California Consumer Privacy Act. They discuss how the CCPA is vital to the open-source community.
Canonical enters the software appliance image market, Israeli researchers discover a set of major flaws in an ancient TCP/IP stack with massive ramifications for embedded and IoT devices, Google partners with Parallels to bring Windows apps to Chromebooks, and Fairphone continues to support its 2015 flagship.
I spotted a Boomer walking around in my backyard, walking around aimlessly and spouting nonsensical drivel at his mobile phone.
pi4, opensuse, model rocketry, 3d printing
Upgrading OpenBSD, Where do Unix man pages come from?, Help for NetBSD’s VAX port, FreeBSD on Dell Latitude 7390, PFS Tool changes in DragonflyBSD, and more.
This week we’ve become Sudoku masters and made Ubuntu MATE images for the Raspberry Pi. We discuss Pine64 announcing the PineTab, plus launching a new OS for PinePhone, the Ubuntu Appliance Portfolio announcement, what Ubuntu Certified device are, more GNOME performance improvements, and 20.04.1 being delayed. We also round up our picks from the tech news.
Serverbuilds.net’s founder JDM joins us to discuss the perfect sever for low or high-end needs, and Alex stages a Pi intervention.
I'm announcing the release of the 5.7.3 kernel.
All users of the 5.7 kernel series must upgrade.
The updated 5.7.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.7.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...
Linus Torvalds recently announced the first release candidate (rc1) for Linux kernel 5.8, which contains 800,000 new lines of code and over 14,000 changed files. This represents about a 20 percent overhaul of the kernel's files, making it one of the biggest releases ever. As Torvalds points out, “That's really a fairly big percentage, and while some of it is scripted, on the whole it's really just the same pattern: 5.8 has simply seen a lot of development.”
According to Torvalds, the development work in the release is all over the place, including fundamental core work and cleanup, as well as filesystem and architecture work, documentation, and of course all the usual driver updates. The two big driver changes are habanalabs and atomisp.
I'm announcing the release of the 5.7.4 kernel.
All users of the 5.7 kernel series must upgrade.
The updated 5.7.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.7.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...
AMD has published a public preview build for enjoying DirectX 12 GPU acceleration within Windows Subsystem for Linux paired with the latest Microsoft Windows Insider Program builds.
A few days ago I wrote about Zink now exposing GLSL 1.30 shader support as one of the few remaining hurdles for exposing OpenGL 3.0 support for this Gallium3D OpenGL-on-Vulkan implementation. It turns out this same week, Zink would already cross the significant OpenGL 3.0 milestone.
As of this morning, Zink has now marked its OpenGL 3.0 support as complete with all necessary functionality being exposed.
The Mesa Radeon Vulkan "RADV" driver's ACO shader compiler back-end has merged its FP16 related bits and in turn putting the ACO back-end very close to being enabled by default for this open-source AMD Vulkan driver.
VK_AMD_gpu_shader_half_float, VK_AMD_gpu_shader_int16, and shaderFloat16 are now working and enabled when using the ACO back-end. The work was merged on Wednesday for Mesa 20.2.
One of the main blockers from AMD Radeon GCN 1.0 "Southern Islands" GPUs achieving feature parity when using the newer AMDGPU DRM kernel driver rather than the older "Radeon" DRM kernel driver has been in regards to UVD video decoding. But in 2020 it looks like that might finally change.
For years there have been experimental patches for UVD with GCN 1.0 on the AMDGPU driver albeit never merged and hasn't come up now in several years. But surprisingly today an AMD engineer posted new patches for bringing GCN 1.0 UVD support to AMDGPU.
VLC media player 3.0.11 was released a day ago as the twelfth update of “Vetinari” branch.
[...]
The official Snap package (runs in sandbox) has been updated. You can install it from Ubuntu Software.
Already installed the Snap package? It will be updated to the latest automatically.
VLC player a free open source multimedia player and available for all opertaing systems Windows,MacOS,iOS,Android, and Linux.
It is one of the most preferred players by users because it supports all video formats and also audio formats too.It also supports Multimedia files from DVD, VCD and Audio CD and etc.
VLC media player 3.0.11 supports 4K and 8K Playback by enabling hardware decoding and supports streaming to Google Chromecast devices
VLC media player for android also updated to version 3.0 and also supports hardware decoding for VC1/WMV3 and MPEG2 streams.
In this tutorial, i will show you how to install the latest stable version of VLC 3.0.11 On Ubuntu 20.04 / 18.04 LTS, LinuxMint 19, Debian, and Fedora.
Time tracking software is a type of computer software that records time spent on tasks. This category of software can enable users to run billing reports, and prepare invoices for clients.
The deployment of this software offers a new level of productivity to organizations, as it provides management with information on what time is spent by employees on different activities such as projects and tasks. This can help to measure productivity over time. This software is commonly used by professionals that charge clients by the hour such as accountants, solicitors, and freelancers. The generation of automatic invoices with minimal or no data entry removes the inconvenience of billing and invoicing clients, and improves efficiency.
Color picker tools in your Linux system help designers in a lot of ways. Most people have got a common misconception that the Linux distros are not designer-friendly. Well, this is partially true because most of the designers use Adobe suite which is not yet available for Linux. But Linux has some powerful designing tools that are completely free to use. Besides they have got almost similar capabilities like other popular premium tools like Adobe Photoshop and Adobe Illustrator. This is why many designers who are open-source enthusiasts at the same time prefer Linux over other platforms.
Getting work done is super important. If you have a planned list of things to do, it makes your work easier. So, it’s no surprise why we’re talking about to-do list apps on Linux here.
Sure, you can easily utilize some of the best note taking apps on Linux for this purpose but using a dedicated to-do app helps you stay focused on work.
You might be aware of some online services for that— but how about some cool Linux apps that you can use to create a to-do list? In this article, I’m going to highlight the best to-do list apps available for Linux.
We have started the work on extending wolfSSL to provide the necessary API calls to power QUIC and HTTP/3 implementations!
Small, fast and FIPS
The TLS library known as wolfSSL is already very often a top choice when users are looking for a small and yet very fast TLS stack that supports all the latest protocol features; including TLS 1.3 support – open source with commercial support available.
As manufacturers of IoT devices and other systems with memory, CPU and footprint constraints are looking forward to following the Internet development and switching over to upcoming QUIC and HTTP/3 protocols, wolfSSL is here to help users take that step.
HomeBank is a completely free accounting software package aimed at helping people get their finances in order and who subsequently want to keep them that way. It features an easy-to-use interface that comes complete with lots of cool visual tools that let you produce charts to illustrate your current state of monetary play.
Admittedly, HomeBank doesn’t come with quite the same level of sophistication found within rival paid-for applications, but as a quick accounting resource for folks with basic requirements it ticks a lot of boxes.
Valorant is hottest new competitive shooter around, and for now, it just so happens to be a PC exclusive. But, as you’re likely aware, there are several operating systems that personal computers run on. With that in mind, the next question is probably obvious: Does Valorant have Linux support?
Art Of Rally Demo running natively on Linux. The demo is available as part of the Steam Game Festival.
Red Martyr Entertainment today released Saint Kotar: The Yellow Mask, a prologue of their upcoming dark narrative point and click adventure.
Saint Kotar: The Yellow Mask along with the planned full game of Saint Kotar support Linux, so with both the prologue and the full game crowdfunding campaign launching today we decided to have a chat about it.
Phobia Game Studio and Devolver Digital have put up pre-orders for CARRION, a reverse-horror that's as gruesome as it is awesome to play. It also appears to be releasing this Summer. No exact date yet but with pre-orders up and Devolver hosting a 'Devolver Direct 2020' mi- July, they said to expect release dates so it's likely the CARRION date will be revealed then too.
CARRION is a reverse horror game in which you assume the role of an amorphous creature of unknown origin. Stalk and consume those that imprisoned you to spread fear and panic throughout the facility. Grow and evolve as you tear down this prison and acquire more and more devastating abilities on the path to retribution.
Mojang has finally given the upcoming Minecraft Nether Update that's set to be huge for June 23, so much is going to be added! They've confirmed it's rolling out on the same day to basically every platform. Most importantly for us is the Java version which is cross platform between Linux, macOS and Windows which is seeing it on the same day.
Currently in Early Access the action-RPG with a jolt of added time travel, Last Epoch, recently had a massive content update and it's sounding great.
Some of what's new includes a whole new story chapter, that features an encounter with a third deity of the world of Eterra: Lagon, the god of storms and the moon—sounds pretty wild. There's also an in-game guide, you can get additional stash storage because there's so much damn loot, multiple new skills, lots of new sound effects, new animations for the Mage class, an updated UI and the list goes on. It's such a big update that going over everything that's changed would be a little ridiculous. It's almost like a whole new game.
Puzzles within puzzles, that have you go inside another puzzle and then push things around and come back into the main puzzle. Patrick's Parabox is quite mind-bending but also brilliant. As part of our ongoing Steam Game Festival coverage after already looking at ASYLUM, DRAG and Drink More Glurp we're now looking at Patrick's Parabox which also has a Linux demo available.
The idea is that puzzles here are recursive, you explore puzzles inside other puzzles, boxes within boxes. You push one box into another, that then shrinks you both down and allows you to move around and manipulate them some more. At the full release the developer said it's planned to have 250 hand-crafted puzzles designed to make you think and each puzzle contains a new idea. It's absolutely fascinating and gorgeous in its initial devilish simplicity.
Drag Demo running natively on Linux. The demo is available as part of the Steam Game Festival.
TimeOut is a free and somewhat short narrative adventure from solo dev Christopher Lee and the style is simply incredible. If you love adventure games and pixel-art, it blends them together in such a fantastic way that you need to try it.
In a city where the lives of humans are subjected to a time based currency system, you play the role of a hard up detective who goes on the hunt for a seller of fake time. Mixing together low-res graphics with wonderful lightning and 3D movement it's impressive with all the detail in each scene. Does the setting sound familiar? The concept is actually from the 2011 movie In Time and it's certainly interesting done in a game.
With quite wonderful dream-like visuals, Into A Dream is an in-development narrative adventure inside the dreams of someone suffering with a deep depression.
"Wake up in a mysterious place devoid of all your memories and come upon a recording addressed to you. As you listen, you realize that your mind has been linked to the dreams of a Luke Williams, a man diagnosed with severe depression. You are Luke’s last hope and must prevent him from fading away."
Mixing shadowy figures like something out of LIMBO with bright coloured lighting, it has a very captivating style choice that really does look fantastic.
GOG are doing another sweet giveaway of some classics for the next two days so don't miss out if you love RPGs. Consider this your quick tip of the day!
The Eye of the Beholder Trilogy with 1991's Eye of the Beholder and Eye of the Beholder II: The Legend of Darkmoon plus the 1993 title Eye of the Beholder III: Assault on Myth Drannor. If you just want to run on over and grab it, find the page for all three here. The giveaway ends 19th June, 5 PM UTC.
Star Renegades, the second title from Massive Damage (Halcyon 6) should be releasing sometime this year with Linux support and there's plenty of new info out there to round-up.
What is it? Star Renegades is a strategy RPG about outsmarting AI-driven adversaries, forging friendships, and toppling galactic empires spanning over multiple generations. It was announced back in 2018 and the original teaser left a lasting impression. Massive Damage have continued tinkering away with Raw Fury now helping as publisher.
As for the new info, back in May they detailed the Timeline Battle System and wow—it looks absolutely stunning. Mixing together wonderfully detailed pixel-art with a view that blends elements of 3D and 2D that they're calling "2DX".
Hand painted adventure Across The Grooves is available to buy from today on Steam, itch.io and the Nintendo eShop.
From Nova-box, the award-winning studio behind Seers Isle and Along the Edge, this time-spinning tale will take you on a trip through Europe to investigate a strange record… While even the smallest choice changes who you become.
Krita 4.3 is out today as the latest major feature release for this popular digital painting program. More than one thousand issues were fixed in this release plus introducing plenty of new functionality.
On top of the 1,000+ fixes, Krita 4.3 features better Android support, many improvements to its animation handling, a new set of watercolor effect brush presets, a variety of filter improvements, better performance of layer styles, multi-dimension export for GIMP GIH files, several color handling improvements, and other changes.
Coming three months after Krita 4.2.9, the Krita 4.3 series is here to fix numerous bugs that were present in previous versions and add a bunch of new features that would please even the most picky graphical artists.
Highlights include a new set of brush presets for watercolor painting, a brand-new magnetic selection tool, a brand-new Palettize filter that’s accompanied by a couple of new patterns and supports dithering, a High Pass filter for making images sharper, and support for exporting multi-dimension GIH files from GIMP.
Three months after the release of Krita 4.2.9, we’ve got a major new feature release for you: Krita 4.3.0! We’ve spent the past year not just fixing bugs, even though we fixed over a thousand issues, but have also been busy adding cool new stuff to play with.
There’s a whole new set of brush presets that evoke watercolor painting. There’s a color mode in the gradient map filter and a brand new palettize filter and a high pass filter. The scripting API has been extended. It’s now possible to adjust the opacity and lightness on colored brush tips separately. You can now create animated brush tips that select brush along multiple dimensions. We’ve made it possible to put the canvas area in a window of its own, so on a multi monitor setup, you can have all the controls on one monitor, and your images on the other. The color selector has had a big update. There’s a new snapshot docker that stores states of your image, and you can switch between those. There’s a brand new magnetic selection tool. Gradients can now be painting as spirals.
The Koozali SME Server development team is pleased to announce the release of SME Server 10 Alpha 5 which will be the next major release of SME Server.
This release is based on CentOS 7. CentOS 7.# has an EOL of 30 June 2024.
Koozali SME Server users should not upgrade production servers to this release but those who can are encouraged to load the alpha to a dedicated test machine and take part in the testing phase.
The Eclipse IoT Working Group has launched the annual IoT Developer Survey. This survey is in its sixth edition and is the largest developer survey in the Internet-of-Things (IoT) open source industry. The deadline to submit your responses is June 26, 2020.
[...]
The 2019 IoT Developer Survey surveyed developers to gain on-the-ground understanding and insights into how IoT solutions are being built, as well as identifying developers’ top choices for architectures, technologies, and tools in the IoT open source ecosystem. That edition highlighted that IoT development is expanding at a rapid pace, fueled by the growth of investments in predominantly industrial markets. Developers’ top technology choices revealed that they were focused on areas like IoT platforms, home automation, and industrial automation.
After many months of waiting, Apache Camel K 1.0 is finally here! This groundbreaking project introduces developers to cloud-native application development and automated cloud configurations without breaking a sweat. With the 1.0 general availability (GA) release, Apache Camel K is more stable than ever, with performance improvements that developers will appreciate.
There is an old—and I think, incredibly stupid—saying that "curiosity killed the cat." I heard this plenty as a kid, though fortunately not from my parents. I personally think this dumb saying is used mostly to stifle kids and adults when their inquisitiveness takes them to places that some parents, teachers, managers, and caregivers would rather not deal with. This is one of the ways in which boxes are built around us early on.
Another terrible saying along the same lines is, "You can't teach an old dog new tricks." This one is usually used as an excuse by or for people who don't like to learn new things. This can be others or even ourselves constructing that box around us.
Rootless and rootful Podman each support running with multiple users. Both, by default, run the initial process as the root of the user namespace they are launched in. When running rootless containers, it launches the first process as the root of the user namespace you are using. In a previous blog, Understanding root inside and outside of the container, I dug deeper into what is happening here.
If you looked at the process from outside of the container, you would see that it is running as your UID.
This three-part series will take you through the main virtio data plane layouts: the split virtqueue and the packed virtqueue. This is the basis for the communication between hosts and virtual environments like guests or containers.
One of the challenges when coming to explain these approaches is the lack of documentation and the many terms involved. This set of posts attempts to demystify the virtio data plane and provide you with a clear down to earth explanation of what is what.
This is a technical deep dive and is relevant for those who are interested in the bits and bytes of things. It details the communication format between the different virtio parts and data plane protocols.
Learning the ecosystem is one of the biggest challenges facing new IBM Z developers. It’s not enough that you’re new to the mainframe. You might also have to learn a new programming language and a new way to interact with a computer. Frequently, you’re forced to abandon your preferred IDE and instead use tooling that’s specific to IBM Z and your organization.
That’s why I’m thrilled to announce the availability of IBM Wazi for Red Hat CodeReady Workspaces (Wazi Workspaces). This environment addresses all of these onboarding challenges and, in the process, makes cloud-native development on IBM Z a reality.
Wazi Workspaces offers you the ability to choose from a variety of IDEs for day-to-day development tasks. You can use Red Hat CodeReady Workspaces, an in-browser OpenShift-native developer workspace, an IDE on your desktop like Microsoft VS Code, or Eclipse-based IDEs such as IBM Z Open Development. Most importantly, Wazi Workspaces provides a personalized and dedicated z/OS sandbox — running on Red Hat OpenShift — to accelerate development and testing.
Adopting modern software development practices, including use of automated testing, has been the focus of a lot of work on IBM Z running z/OS. In the realm of automated testing, the launch of IBM Wazi Virtual Test Platform (VTP) is a major step forward.
Wazi VTP gives developers the ability to do a full transaction-level test starting with CICS and IBM Db2, allowing for integration testing during the build process, and works for COBOL, PL/I, and Assembler.
The task for the first week involved adding a /graphql endpoint that returns “Hello World” and tests to check that endpoint. Learning about requests, responses, and GraphQL was fun.
IBM is excited to be a platinum sponsor at the OpenJS World conference. We look forward to connecting with you to explore the impact of Node.js and JavaScript are having on technology of all kinds, especially in the area of cloud-native development.
The IBM team is delivering sessions on new and relevant topics, and providing opportunities to learn more about why IBM is a great partner for your Node.js deployments. We will have many of our developers and community contributors at our booth to discuss the latest in leveraging Node.js, JavaScript and emerging open source technologies to accelerate Cloud-Naive development.
LWN published today yet another great piece of writing, Loaded terms in free software. I am sorry, the content will not be immediately available to anybody following at home, as LWN is based on a subscription model — But a week from now, the article will be open for anybody to read. Or you can ask me (you most likely can find my contact addresses, as they are basically everywhere) for a subscriber link, I will happily provide it.
In consonance with the current mood that started with the killing of George Floyd and sparked worldwide revolts against police brutality, racism (mostly related to police and law enforcement forces, but social as well) and the like, the debate that already started some months ago in technical communities has re-sparked:
We have many terms that come with long histories attached to them, and we are usually oblivious to their obvious meaning. We? Yes, we, the main users and creators of technology. I never felt using master and slave to refer to different points of a protocol, bus, clock or whatever (do refer to the Wikipedia article for a fuller explanation) had any negative connotations — but then again, those terms have never tainted my personal family. That is, I understand I speak from a position of privilege.
In school, we read the philologist diary of Victor Klemperer about the changes in the German language during the Third Reich, LTI - Lingua Tertii Imperii, a book which makes it clear that the use of language is political, creates realities, and has reverse repercussions on concepts of an entire society. Language was one of the tools that supported Nazism in insiduously pervading all parts of society.
[...]
A change in language is such a new model: it can make oppression and inequalities visible. Words do not only describe our world, they are a vehicle of ideas, and utopias. Analyzing and criticizing our use of language means paving the way for ideas and concepts of inclusion, equality, and unity.
You might be guessing at where am I getting at with this… Right: I am in favor of acknowledging past mistakes, and replacing oppressive metaphors in computing. As noted in the IETF draft about Terminology, Power and Oppressive Language, by Niels Ten Oever and Mallory Knodel, the metaphors "master/slave" and "blacklist/whitelist" associate "white with good and black with evil [which] is known as the 'bad is black effect'", all the while being technically inaccurate.
We’re pleased to welcome the newest ROS 2 release, Foxy Fitzroy. A long-term support (LTS) release, (supported for three years), Foxy runs on the latest Ubuntu LTS, the also-recently-released Ubuntu 20.04 (supported for five years, or even longer with an ESM subscription).
Putting together a distribution like Foxy is a ton of work. Open Robotics, Canonical, and other members of the ROS 2 Technical Steering Committee would never be able to pull this off without the herculean effort from our awesome community, so thank you! If you’re interested in trying out ROS 2 Foxy on your Raspberry Pi now, check out our installation video:
Shasheen Ediriweera, a developer of Rescuezilla, has released a new point version Rescuezilla 1.0.6. It comes with major new features and enhancements such as EFI support, a new 64-bit ISO, and more.
Rescuezilla is a Ubuntu-based Linux distro, and a fork of the old and abandoned ‘Redo Backup & Restore’ application. It is a complete system recovery solution that you can use for several purposes, such as full system backup, bare metal recovery, partition editing, undeleting files, and web browsing.
Dubbed the “Swiss Army Knife of System Recovery,” Rescuezilla 1.0.6 is the first release of this lightweight GNU/Linux distribution for backing up and rescuing operating systems to introduce a 64-bit version that features UEFI/SecureBoot support.
The 64-bit version of Rescuezilla is based on Ubuntu 20.04 LTS (Focal Fossa), but there’s also a 32-bit version for old computers made before 2007, which is based on the Ubuntu 18.04 LTS (Bionic Beaver) operating system series.
Spot Core, for the curious, includes a Core i5 9th Gen Whiskey Lake CPU (unspecified model), 16GB of RAM, 512GB of storage, runs Ubuntu 18.04 LTS, and connects directly to the payload port to draw power.
[...]
Taking a stand on what its products can and cannot be used for is a smart move, particularly right now. Boston Dynamics has done significant work with the US military through projects like Big Dog and Spot, and while it’s always highlighted the ways its robots could be used to protect human life, it’s clearly considering how those products may be perceived by the public.
Qualcomm has announced a new robotics platform based around a variant of its Snapdragon 865 processor. The Robotics RB5 uses the QRB5165 processor with the same CPU, GPU, ISP, and DSP as the Snapdragon 865, but this time with support for industrial-grade temperate ranges from -40€°C to 105€°C, plus some nice enhancements around computer vision.
If you think Qualcomm only makes chips for smartphones, think again. Ingenuity, A.K.A. the Mars Helicopter, is a clever device that will be launched towards Mars this summer. At its heart is a Snapdragon 801 processor. Yes, you read that correctly, the Snapdragon 801. Just think how much things have improved since 2014 when that chip was released in devices like the Samsung Galaxy S5.
The 96Boards-compatible “Qualcomm Robotics RB5 Platform” runs Linux and ROS 2 on a Qualcomm QRB5165 based on the 15-TOPS Snapdragon 865 with optional 5G and cameras including RealSense and ToF.
Qualcomm and Thundercomm have followed up on last year’s Qualcomm Robotics RB3 Platform with a similarly 96Boards form-factor Qualcomm Robotics RB5 Platform that supports 5G communications and input from up to 7x concurrent cameras. The Linux and ROS 2 driven development kit advances from a Snapdragon 845 to new custom robotics SoC called the Qualcomm QRB5165 based on the Snapdragon 865. (In other news, Qualcomm announced a 5G-ready Snapdragon 690 SoC for mid-range phones.)
First of all, I hope you are all doing well. It would be an understatement to say that the last couple of months have been pretty tough.
My way of dealing with the current situation is to stay busy. So I've been baking (simple flatbread and Laugengebäck), improving my poor German, doing a lot of reading, and tinkering with my projects – including Little Backup Box. The first most visible change is the move to the lit.css CSS framework. I use this tiny framework for my other projects, so I wanted to keep the appearance consistent across all of them.
The installer script now installs and configures the vsftpd FTP server. This means that if your camera supports FTP transfers, you can upload RAW and JPEG files from the camera to Little Backup Box. If you own a recent Sony Alpha camera, the Using FTP feature in Sony ñ7 Mark III article penned by yours truly explains how you can upload RAW and JPEG files from the camera to an FTP server.
HARDKERNEL, makers of the Raspberry Pi alternative ODROID boards have announced an upgrade to the ODROID-H2, an Intel Celeron based single board computer.
The ODROID-H2+ has a surprising amount of power in a board measuring only 110x110x43mm.
[...]
From the starting price of $119 we need to add the cost of RAM and storage, which can easily add another $100 so when thinking about purchasing the ODROID-H2+ it would be wise to factor in these costs versus other single board computers. If you need a little more power than what the Raspberry Pi can offer, then the ODROID-H2+ should be on your list.
Harkernel ODROID-H2 is an Intel Celeron J4105 Gemini Lake powered SBC that offers great value and performs reasonably well as we’ve seen in our ODROID-H2 Ubuntu review.
But there’s an upgraded model coming soon with ODROID-H2+ getting a slightly faster Intel Celeron J4115 processor, 2.5 GbE networking, a couple of extra I/O on the header for USB 2.0 and HDMI CEC, and a change to the 12V SATA power circuit to improve the suspend-resume power control sequence of 3.5ââ¬Â³ HDDs.
Embedded Linux is a different world and there are plenty of books dedicated to it. For each topic these books cover, another book somewhere delves into its detail. As a rule of thumb, if you can’t already do everything you want from a command line, it’s not for you. Very little is instantly available and everything has to be built from the ground up. Great strides have been made to automate the building of custom embedded Linux distributions with the likes of the Yocto Project. This, in true Linux style, gets to build itself and the tools required before building for the target you want. Silicon vendors normally can give you a step-up in trying to build Linux for their device, and maybe offer a pre-built image to boot from. Since they can’t offer everything in one go, you will almost certainly need to modify the build for your own needs. It’s amazing how many command-line tools you take for granted don’t show up by default. Don’t be fooled into thinking a move from a Raspberry Pi to another platform will be straightforward.
My childhood consisted of about 20% Dungeons & Dragons (D&D) and 80% Legos, with a pretty strong crossover of the two. I wasn't allowed to actually play D&D for a variety of reasons, but through some mental acrobatics worthy of a level 15 rogue, I determined that building AD&D characters didn't count as playing, and recreating Dragonlance in Lego form was a pretty good approximation of the game.
For that reason, one of my favorite genres of Legos was the castles, and I spent hours upon hours devising gauntlet-like dungeons for my mini figurines. In order to keep track of my creations, and because I saw friends mapping dungeons at school, I mapped out my Lego creations on graph paper. I also tried to track how my creations were constructed, and using graph paper seemed a logical choice for a medium that was mostly based on rectangular bricks, but the lack of understanding of isometric illustration ultimately confounded me.
Project managers go by various names—for example, scrum master, delivery manager, and project coordinator—and have various styles. Yet they all have the same root objectives: to coordinate their team's work as well as that of external and internal teams and to remove any blockers that could hinder a project's implementation. Each project manager has a unique management style, but there are some universal traits that make a great project manager stand out.
In the Summer 2020 issue of Usenix's ;login: Dan Geer and George P. Sieniawski have a column entitled Who Will Pay the Piper for Open Source Software Maintenance? (it will be freely available in a year). They make many good points, some of which are relevant to my critique in Informational Capitalism of Prof. Kapczynski's comment that:
open-source software is fully integrated into Google’s Android phones. The volunteer labor of thousands thus helps power Google’s surveillance-capitalist machine.
Below the fold, I discuss "the volunteer labor of thousands".
Intel's oneDNN 1.5 deep neural network library has been released that is part of their oneAPI initiative and formerly known as MKL-DNN and DNNL.
With oneDNN 1.5 they have continued working on a wide variety of performance optimizations. There are some broad optimizations in v1.5 but particularly for newer Intel CPUs there should be even faster performance.
The cross-platform framework is optimized for applications that run in cloud environments, on desktop and mobile devices. The combination of higher inference speed with platform-independence makes the library ideal for mobile solutions that require both seamless customer experience and on-device data processing.
In just over a week's time, from June 29 to July 2, Collabora will be taking part in the virtual editions of Embedded Linux Conference North America and Open Source Summit North America. Jam-packed with over 230 keynotes, conference sessions, tutorials and BoFs, these events will be the first major Open Source conferences to take place online this year.
Collaborans will be presenting on five separate occasions during the week, on topics including upstreaming image signal processing drivers, PipeWire and the automotive industry, Linux stateless video codec support, creating an Open Source project in a proprietary industry, and building an Open Source AI stack with Panfrost, GStreamer and Tensorflow Lite! Below are the details for each of these presentations.
Mozilla, we are working hard to build products to help you control of your privacy and stay safe online. To help us better understand your needs and challenges, we reached out to you, the users and supporters of Firefox Private Network.
We learned from you and our peers that many of you want to feel safer online without jumping through hoops and decided to start with the goal to provide device-level protection. This is why we built the Firefox Private Network VPN, helping you control how your data is shared with your network. Although there are a lot of VPNs out there, we felt like you deserve a VPN with the Mozilla name behind it.
Following a beta period since last year as the Firefox Private Network, Mozilla's virtual private network offering is now going official and under the Mozilla VPN branding.
Mozilla VPN is now an official product and the organization's focus on providing a secure and privacy-minded VPN offering that is easy to use.
Mozilla is in the process of transitioning away from the Firefox Private Network branding to Mozilla VPN over the weeks ahead. Their current limited-time offering for the Mozilla VPN is $4.99 USD per month with up to five devices.
There's a new alpha release available for download. If you build Tor from source, you can download the source code for 0.4.4.1-alpha from the download page. Packages should be available over the coming weeks, with a new alpha Tor Browser release by early July.
Remember, this is an alpha release: you should only run this if you'd like to find and report more bugs than usual.
Yoast, the company behind the popular Yoast SEO plugin, announced it had acquired the Duplicate Post plugin earlier today. Along with the acquisition of the project, the company brought on its creator, Enrico Battocchi, as a senior developer. He will continue in a lead role with the future development of the plugin. Duplicate Post currently has over three million active installations and is translated into 46 languages. Of its 451 reviews, it has almost a near-perfect 429 five-star ratings. Few plugins, especially when they garner such a large user base, can pull off the feat of an average 4.9 user rating. Battocchi has put in over a decade of work into building the community around the plugin. The plugin does exactly what its name implies. It allows end-users to duplicate posts. “Post” in this sense means any type of content, including pages and post types from other plugins. It also allows users to choose which fields are copied in the duplicated post.
Safe Exam Browser (SEB) is an open source lockdown browser that allows teachers to restrict student access to external websites, system functions or other applications while they are taking an assessment online. SEB supports teachers to deliver improved and secure online assessments by turning the computer into a secured workstation. SEB is used in a wide range of learning institutions (universities, schools, on the job training), mostly together with in-person proctoring to ensure assessment honesty.
Since shortly after its launch, Google’s Flutter SDK has been transitioning from a simple cross-platform framework for Android and iOS apps into an arm of Google’s “ambient computing” ambitions, with support for web, desktop, and more. Today, the Flutter team is showcasing their work-in-progress support for making apps on desktop platforms like Windows and Linux.
Python programming language has a firm hold on web development as it opens up newer avenues of development every day. The quintessential thing in Python web development is working with the Integrated Development Environment or IDE. There are popular Python IDEs which enable clear coding and debugging of the code. In this article, we will list out the top Python development IDEs for hassle-free coding.
DjangoCon Australia was supposed to take place in Adelaide this year. With the current situation of travel restrictions and isolation requirements this is no longer possible. Instead, DjangoCon Australia will again run as a specialist track alongside PyConline AU, on September 4th, on The Internet. Details about how this is all going to work will be announced soon by the PyConline organizers; right now, everything is changing and everyone is trying to figure out how to react to that change, us included.
Python 3.7.8rc1 and 3.6.11rc1 are now available. 3.7.8rc1 is the release preview of the next bugfix release of Python 3.7; 3.6.11rc1 is the release preview of the next security-fix release of Python 3.6. Assuming no critical problems are found prior to 2020-06-27, no code changes are planned between these release candidates and the final releases. These release candidates are intended to give you the opportunity to test the new security and bug fixes in 3.7.8 and security fixes in 3.6.11.
In this tutorial, we'll look at how to automatically retry failed Celery tasks.
In this tutorial, we'll look at how to prevent a Celery task dependent on a Django database transaction from executing before the database commits the transaction. This is a fairly common issue.
This is a tough announcement to make. After 12 consecutive years of DjangoCons in the United States, we’ve decided to cancel DjangoCon US 2020. We look forward to seeing you in San Diego for DjangoCon US 2021 on October 17-22, 2021.
We have to do what’s right for our community, and the best knowledge available to us right now is that COVID-19 will still be part of our lives this fall. We also have international travel bans that impact our speakers, attendees, and sponsors, along with larger tech companies that have issued company-wide travel restrictions. While we aren’t sure if international travel will be permitted by this fall, we have already heard from larger tech companies that are restricting non-essential travel through mid-2021. These factors make hosting an in-person conference this year impossible for us.
Creating a simple graphical user interface (GUI) that works across multiple platforms can be complicated. But it doesn’t have to be that way. You can use Python and the PySimpleGUI package to create nice-looking user interfaces that you and your users will enjoy! PySimpleGUI is a new Python GUI library that has been gaining a lot of interest recently.
As a quick note, what people post online is often taken as something they will forever agree with and are forever held to. This is unreasonable. There needs to be some equivalent of forgiveness if one posts something horrible online, but that’s a topic for another post. I’m not saying people aren’t responsible for what they post. But I am saying we should aspire to take the most charitable interpretation of what people post if we care about advancing the conversation. Obviously a person’s character is a factor in how you interpret what they post.
On my blog, I want to retain the right to post not only ideas that I understand well. But I also want the freedom to talk about things I’m not sure about. That means I run the risk of being wrong. No one posting their ideas online openly should expect to be immune to criticism. Criticism comes with the territory. But I want to say I’m interested in sharing ideas. If it’s clear to me you’re only interested in taking my words out of context, twisting what I write or using cheap gotcha’s because I didn’t state something perfectly, then I probably won’t respond. If you want clarification about anything I discuss, visit my about page for contact details. With that cleared up, let’s move on to the meat of this post.
But for many years, Apple still greatly benefited from access to this architecture, which was so highly advanced that, at the time the G4 processor was first introduced, it was technically classified as a weapon by the U.S. government due to export limits on processing power at the time.
And in 2001, a PowerPC-based chip actually pulled off the multi-core trick that Apple had dreamed of for itself years prior with Project Aquarius. That chip, the IBM POWER4 microprocessor, became the first commercially available multi-core microprocessor, and was also one of the first processors to top the symbolic 1-gigahertz mark for processing power.
The Intel 8086 microprocessor was introduced 42 years ago this month,1 so I made some high-res die photos of the chip to celebrate. The 8086 is one of the most influential chips ever created; it started the x86 architecture that still dominates desktop and server computing today. By looking at the chip's silicon, we can see the internal features of this chip.
The photo below shows the die of the 8086. In this photo, the chip's metal layer is visible, mostly obscuring the silicon underneath. Around the edges of the die, thin bond wires provide connections between pads on the chip and the external pins. (The power and ground pads each have two bond wires to support the higher current.) The chip was complex for its time, containing 29,000 transistors.
AWS Snowcone is this new edge computing device measuring in at 9 x 6 x 3 inches and providing 8TB of local physical storage. The TPM-backed device has two CPU cores, 4GB of RAM, wired and wireless connectivity, and is built physically well for fitting well into various edge computing environments. Snowcone like the rest of the AWS Snow hardware is intended to provide local storage on the edge when migrating data into and out of the AWS cloud environment.
Brooklyn—Quarantine has been a shock to our systems that will continue to reverberate in many ways. It has shocked me to mindfulness, especially about my consumer habits. I marvel at old restaurant receipts and wonder, how did I become the person who casually spent so much for this cocktail or that itty-bitty plate of fried something or other? How did I come to discard aluminum foil after one use, to waste nourishing foods like broccoli stems or onion skins (great in stock, providing color and flavor), and toss perfectly good leftovers in the trash? Those who raised me would be appalled.
Looking at the total Covid-19/Coronavirus global death statistics on Saturday, 13th June 2020, three things become noticeable. The first remarkable issue is that Donald Trump’s USA has just exceeded the total number of fatalities it suffered during World War I. In that war, the USA lost 116,516. On Saturday morning, the USA had lost 116,795 to the Coronavirus, continuing on an approximately daily death rate of between 800 to 1,000 since the last few weeks. It happened on Donald Trump’s watch and no blame shifting can change the fact that the USA did rather badly compared to all other countries on earth.
Bias is so baked into health care delivery that COVID-19 forces us to rethink how we allocate resources so Black and Brown people don’t suffer more than they already have.
"The excluded small business owners are more likely to be Black and Latinx because of bias in our criminal legal system, and their communities are hardest hit by Covid-19. We won't stop fighting until this economic lifeline is afforded to all."
Constant cutbacks in public resources; the rigid, small-minded mentality; and the corporate establishment's determination to keep the status quo have needlessly boxed us into this full-blown coronavirus catastrophe.
In three previous pieces in CounterPunch I compiled Donald Trump’s statements on the COVID-19 pandemic up to May 2nd-3rd. Here is a continuation of that list.
"Our country sacrificed the lives of meat workers to protect the business of meat companies."
"The White House ignored the threat of Covid-19 until it was too late to stop it, left states without the equipment to fight it, and didn't track its spread to contain it. Now they want to wave a magic wand and declare 'Mission Accomplished.'"
As President Donald Trump prepares for his upcoming rally in Tulsa, Oklahoma, this Saturday, Anthony Fauci, a member of Trump’s coronavirus task force, is saying he wouldn’t personally attend any campaign event at this time, due to the possibility of contracting the disease.
One consequence of the global uprising against police violence is that Covid-19 has been shoved off the front pages in recent weeks. Yet the pandemic has not really gone away, especially in the United States. In contrast to many comparably wealthy countries in Europe, the United States hasn’t seen a steep decline in confirmed Covid-19 cases or confirmed deaths. Rather, America has experienced a slight decline from the peak and then a long plateau that resembles, at best, a gently sloping hill.
The Russian President’s Novo-Ogaryovo residence outside of Moscow has installed a special disinfection tunnel to defend against the coronavirus.€
Pharmaceutical companies are racing to develop a coronavirus vaccine, with the most ambitious timelines ever attempted in history. When announcing Operation Warp Speed, the government’s effort to develop a vaccine, President Donald Trump said in May, “We’re looking to get it by the end of the year if we can, maybe before.”
Vaccine development under normal circumstances typically takes about 10 to 15 years. Now, developers are compressing the traditional timeline with both technological innovation and by putting vast amounts of money at risk.
It’s been six months since researchers in China said they had identified a novel coronavirus spreading in the city of Wuhan. Hope and desire for a vaccine to end the global devastation is growing with each passing week.
Almost every day, I hear people making plans around the eventual arrival of a coronavirus vaccine — office reopenings, rescheduled weddings, family reunions and international travel. In recent weeks, colleagues and friends have asked me with growing urgency: “When will ,,kkwe have a vaccine? Will it be any good?”
As countries “reopen” in this ongoing COVID-19 pandemic, most do so in the dark, using either poor and inaccurate data or worse – no data at all – to inform policies that can in some cases decide who lives and dies.
The common phrase, data over dogma, is often heard from scientists and citizens alike. But is there enough data to drive informed decision-making?
Many countries have lacked evidence-based COVID-19 policies due to the scarcity of data. Good testing data remains elusive, as even some of the world’s wealthiest countries have been slow to increase testing and obtain good estimates of COVID-19 prevalence.
While there is no official standard COVID-19 testing rate or proportion, countries that have managed their outbreaks better than others – like Germany, New Zealand, and the United Arab Emirates – tested high numbers of their population each day.
The World Health Organisation suggests several conditions should be met before countries ease restrictions, but the first is to be able to confirm that transmission has been controlled.
Breached information from 14 countries includes personal details for 727,000 accounts - names, addresses, phone numbers and hashed passwords. It also contains latitude and longitude coordinates to six decimal points, which is accurate to within just a few inches. No financial data was leaked.
The data was posted May 19 on a well-known forum for leaking stolen data and also has been reposted online elsewhere.
"Unfortunately, we can confirm that a data breach has been identified concerning personal data dating back to 2016," Delivery Hero says. "The data originates from some countries across our current and previous markets."
Online food delivery service Delivery Hero has confirmed a data breach affecting its Foodora brand.
The cybersecurity incident has exposed the account details of 727,000 customers in 14 different countries. Information exposed in the incident included names, addresses, phone numbers, and hashed passwords.
While no financial data was leaked, customers' geolocation data, accurate to within a couple of inches, was breached. Such data could prove embarrassing to any individuals who have ordered food while pursuing a clandestine affair.
Data breached in the incident was found online on May 19, posted in a forum where stolen data is wont to show up, according to the Gov Infosecurity website. Whoever posted the data on the forum claims that Foodora was compromised in 2019.
Since its acquisition by Verizon, BlueJeans has seen usage soar as video conferencing has become a staple for workers sent home during the pandemic; the company reported a 300% increase in use compared to its pre COVID-19 average.
Citi and Deutsche Bank have offered up a new round of open source contributions to nonprofit Finos (Fintech Open Source Foundation).
In 2020, given the wide proliferation of Free/Libre and Open Source Software (FOSS), we aim to identify how to improve security, including the sustainability of the FOSS ecosystem, especially the FOSS systems heavily relied upon by organizations worldwide.
To do this, the Linux Foundation’s Core Infrastructure Initiative (CII) and the Laboratory for Innovation Science at Harvard (LISH) have developed a survey for contributors to FOSS. If you contribute to FOSS, we would love for you to participate in our study. This voluntary survey takes around 15-20 minutes to complete and allows you to advocate for the FOSS projects you care about.
You need to sign up today for a new online course for cloud engineers if you want to take advantage of a price-reducing deal. The Cloud Native Computing Foundation (CNCF), along with the Linux Foundation, has an introductory offer of a $400 discount.
The Cloud Engineer Bootcamp bundles self-paced eLearning courses with certification exams. Participants also get dedicated instructor support.
Hyperledger has announced it is onboarding eight new members joining its global enterprise blockchain community. The new members will become part of the Linux Foundation, and join the existing membership line-up in their efforts to advance cross-industry blockchain technologies.
Among the organizations joining Hyperledger are IOV Labs and IOHK, the respective companies behind the RSK and Cardano platforms. They join a well-established group of members, which includes ConsenSys, IBM, and JPMorgan.
Security updates have been issued by Debian (drupal7 and python-django), Fedora (glib-networking, kernel, kernel-headers, and nghttp2), openSUSE (adns, chromium, file-roller, and libEMF), SUSE (java-1_7_1-ibm), and Ubuntu (bind9 and nss).
Microsoft has addressed the printer issues introduced in Windows 10 with the recent Patch Tuesday updates while admitting that some Storage Spaces had also been borked by the May 2020 update.
While no timing is ideal when it comes to breaking printing, it's not a great look when many users are working from home, or schooling their little darlings, and so pressing dusty home printers into service.
To that end, an out-of-band optional update has been hurried out by Clippyzilla to deal with afflicted systems running 1803, 1809, 1903 and 1909 versions of Windows 10. "Other affected versions of Windows will have updates released in the coming days," the software behemoth added, so those with shiny new Windows 10 2004 and a seemingly dead printer have a little longer to wait.
There are multiple ways to exploit and take over a Windows machine, today we will look at doing this with a PDF file containing a virus.
For this you will need Kali Linux as your attacking machine and a Windows box, preferably on a virtual machine so that you are not doing anything illegal.
Named the OffSec Academy, it is produced by Offensive Security and includes the opportunity for aspiring penetration testers to pursue their Penetration Testing with Kali Linux (PWK) certification.
According to the company, through OffSec Academy, students gain access to the PWK course material and a level of personal tutoring unmatched in the training industry. Ning Wang, CEO, Offensive Security, said: “We are committed to providing not only the most rigorous and comprehensive cybersecurity training on the market, equipping our graduates with adversarial mindsets, but also providing mentoring and support throughout the student journey.”
The site reliability engineer role can be both challenging and rewarding for IT pros. To stand out in a competitive job market, aspiring SREs must understand exactly what organizations look for in a candidate.
SRE is a relatively new IT role that involves the automation of operations tasks. The role can be a good fit for systems engineers looking to improve programming skills, as well as developers seeking to manage large-scale infrastructures. Candidates with demonstrated strength in IT systems, software and automation have a competitive advantage during the interview.
Any SRE interview will present a candidate with an array of questions or hands-on exercises intended to evaluate their knowledge of key site reliability skill sets. While these questions or tests can vary dramatically depending upon the specific needs of the hiring organization, an SRE candidate can expect to see a smattering of interview questions across four major domains: software development, monitoring and troubleshooting, networking, and infrastructure and operations.
Caught between COVID-19 and cop violence, and now risking their health to protest these conditions, Black communities need a comprehensive anti-racist public health response to this growing pandemic. Instead, some U.S. states are investing in apps to contain the virus.
As uprisings over police brutality and institutionalized racism have swept over the country, many people are facing the full might of law enforcement weaponry and surveillance for the first time. Whenever protesters, cell phones, and police are in the same place, protesters should worry about cell phone surveillance. Often, security practitioners or other protesters respond to that worry with advice about the use of cell-site simulators (also known as a CSS, IMSI catcher, Stingray, Dirtbox, Hailstorm, fake base station, or Crossbow) by local law enforcement. But often this advice is misguided or rooted in a fundamental lack of understanding of what a cell-site simulator is, what it does, and how often they are used.
While it is possible that cell-site simulators are being or have been used at protests, that shouldn’t stop people from voicing their dissent. With a few easy precautions by protesters, the worst abuses of these tools can be mitigated.
We are glad to see Zoom’s announcement today that it plans to offer end-to-end encryption to all its users, not just those with paid subscriptions. Zoom initially stated it would develop end-to-end encryption as a premium feature. Now, after 20,000 people signed on to EFF and Mozilla’s open letter to Zoom, Zoom has done the right thing, changed course, and taken a big step forward for privacy and security.
Other enterprise companies like Slack, Microsoft, and Zoom’s direct competitor Cisco should follow suit and recognize, in the Zoom announcement’s words, “the legitimate right of all users to privacy” on their services. Companies have a prerogative to charge more money for an advanced product, but best-practice privacy and security features should not be restricted to users who can afford to pay a premium.
Misleading posts and images can quickly go viral. For example, a widely shared photo on Twitter of a McDonald’s set ablaze was supposedly taken at the beginning of the Minneapolis protests after George Floyd’s death. But the picture was, in fact, of a restaurant that burned down in Pennsylvania four years ago.
And once an image has been shared countless times, its origin story becomes totally lost and the false narrative takes hold. So how can you judge an account’s accuracy and make sure it’s trustworthy?
The targeting in this campaign occurred between January and October 2019. Targets were sent emails disguised as important communications, such as official summonses, bearing links to malicious software disguised as important documents. If opened, targets’ computers would have been infected with NetWire, a piece of commodity malware.
Eight of the nine targets had worked on campaigns to free a group of jailed activists, popularly known as the Bhima Koregaon 11. The remaining target was involved in efforts to free a jailed academic.
This breakdown of a chunk of code from the app explains what sensitive data Tim Hortons is tracking
The Financial Post provided Erinn Atwater, research and funding director at Open Privacy, a non-profit advocacy organization focused on better tools and practices for privacy and digital security issues, all the data associated with reporter James McLeod’s usage of the Tim Hortons app. Atwater confirmed the Financial Post’s analysis of the data, and helped explain elements of the code.
Pictured is a chunk of code in JavaScript Object Notation (JSON) that records events tied to the Tim Hortons app. This information is stored in the Amazon Web Services servers of Restaurant Brands International Inc., owner of Tim Hortons.
"Make no mistake, the swiftness of this investigation is the result of people marching and demanding accountability."
Unlike body camera footage, which only shows the officer’s point of view, videos from civilians can capture a full scene or even take the perspective of a suspect. “With bystander footage, other people can demonstrate what’s going on, and we’re not relying on officers to show these events,” says Kristyn Jones, who studies how people perceive footage of police encounters at the John Jay College of Criminal Justice.
Body cameras show a scene from the perspective of the officer, and the image on the screen is focused on the suspect. That changes the way the incident is interpreted. People are more likely to think an object or person in their field of vision caused something to happen. A surveillance video, on the other hand, puts the officer’s entire body on-screen along with the suspect, eliminating that psychological effect.
Authorities said Carrillo and a second man traveled to Oakland with the intent to kill police and believed the large demonstrations spurred by the death of Floyd in Minneapolis — which they were not a part of — would help them get away it.
"They came to Oakland to kill cops," said John Bennett, special agent in charge of the San Francisco division of the FBI.
The faction wooed armed groups terrorising the North West and North Central.
The regions have been under unabated attacks by bandits who kill, rape, injure the people, burn houses and rustle cattle, sheep, etc.
The insurgents specifically urged outlaws in Zamfara and Niger States, to partner with Boko Haram.
On Monday, MSF said in a statement that while no information had emerged about the perpetrators or motive of the assault on the at the Dasht-e-Barchi hospital, "mothers, babies and health staff were its deliberate target and similar attacks may repeat in the future".
Whether old or new, the prayer flags bearing mantras are all being removed from their traditional locations, the source said, adding that even the poles on which the flags were hung are being dismantled.
In mid-March, around the time lockdown measures started forcing people to become intimately familiar with their own four walls, a subset of Internet-facing artists searched for the silver lining. “Just a reminder that when Shakespeare was quarantined because of the plague, he wrote King Lear,” tweeted the singer-songwriter Roseanne Cash. Her sentiment was parroted, and ridiculed, ad nauseam across the platform.
More details about the leak of CIA hacking tools are coming to light. And they're not making the CIA look any more deserving of its "Intelligence" middle name.
Indian newspapers and Chinese state media are demanding a continuation of dialogue after a bloody incident on the border. From an Indian perspective, however, New Delhi must "wake up" and assess Beijing's push for power.
This outfit has targeted thousands of people at hundreds of organisations all over the world, carrying out what Norton LifeLock, a cyber-security firm that worked with CitizenLab, describes as “financial, political and industrial espionage”. Its targets have included company bosses, judges, journalists, members of various parliaments, government officials and ordinary people in the midst of a divorce in America, Mexico and elsewhere.
Rising tides driven by global heating could swamp the mangrove forests – bad news for the natural world, and for humans.
If we are silent about the climate emergency, others interpret our silence as a lack of concern, as a sign that things are normal. We need to channel our inner Larry Kramer, and loudly tell the truth to everyone we know.
This article is adapted from “The Climate Beat,” the weekly newsletter of Covering Climate Now, a global journalism initiative committed to more and better climate coverage.
Deaths from the coronavirus pandemic foreshadow another global disaster, one that will not be eased by a vaccine or masks: the climate crisis. And like Covid-19, the calamities of climate change will not be experienced equally. The wealthy will escape the brunt of environmental destruction, while much of the world’s poor will be forced to migrate, fall ill, or die. The United Nations warned last year that the world is rushing toward “climate apartheid.”
Climate change will kill 250,000 people every year between 2030 and 2050 by malnutrition, malaria, diarrhea, and heat stress alone, and by 2050, it will displace 140 million people, according to predictions from a 2019 UN report.
“I can’t breathe.” These were among the final words that George Floyd and Eric Garner gasped before their deaths at the hands of white police officers. That plea has become part of the current rallying cry for racial justice and an end to police brutality in the U.S. But for Black people living near industrial facilities, the phrase has an additional layer of meaning: a reminder of their disproportionate pollution€ burden.
"We must curb the high risk trade and consumption of wildlife, halt deforestation and land conversion, as well as manage food production sustainably."
"Now the Senate must pass our Raise the Wage Act," the senator said, "and guarantee a dignified, living wage for every worker in America.
As hurricane season begins, we look at moves to privatize Puerto Rico’s electric grid and a new investigation that reveals the island’s government failed to follow proper oversight or examine the environmental impact when it issued a $1.5 billion contract to a company for the first large power generation project since Hurricane Maria, that will continue its reliance on fossil fuels. Former Puerto Rico Chief of Staff Ingrid Vila Biaggi co-authored the report and calls it “an ill-conceived project full of fiscally irresponsible practices.”
A coalition of civil rights groups including the ACLU sued the Trump administration on Tuesday for denying coronavirus relief loans to small business owners with criminal records, arguing the restrictive policy violates the law and perpetuates systemic racial injustices by discriminating against people of color.
We are trapped in an abusive relationship. When we finally have enough, our abuser comes after us with flowers and apologies, promising never to do it again.
Congress should pass a three-year “Emergency Charity Stimulus” to move $200 billion to frontline working nonprofit groups by increasing payout requirements for private foundations and donor-advised funds.
Opposition politician Alexey Navalny has published a draft bill that suggests raising monthly pensions for Russia’s remaining veterans of the Second World War to 200,000 rubles (approximately $2,875).€
By pitting us against each other – blaming immigrants, blaming liberals, and especially blaming people of color, and Black people in particular – they’ve divided us, and gotten away with it.This needs to end. Stand together, and know the truth about the real looters in America.
We cannot cling to the idea of “going back to normal” because “normal” is what got us here.€ We can no longer accept piecemeal reforms of our broken systems. We need to reimagine a political and economic system that values humanity and builds prosperity for every American. Let’s get to work.
Spurred on by the coronavirus pandemic, global capitalism is on the brink of a new round of worldwide restructuring based on a much greater digitalization of the entire global economy and society. This restructuring began in the wake of the 2008 Great Recession but the changing social and economic conditions brought about by the pandemic will vastly accelerate the process. It is likely to heighten the concentration of capital worldwide and worsen social inequality. Enabled by digital applications, the ruling groups — unless they are pushed to change course by mass pressure from below — will turn to ratcheting up the global police state to contain the coming social upheavals.
President Donald Trump from his New Jersey private golf club tweeted this past Friday morning June 12, that “The terrorists burn and pillage our cities.” He was referring to demonstrators occupying three blocks along a single street, in Seattle’s most culturally active neighborhood. Trump demanded that the mayor and governor, “Must end this Seattle takeover now!” Or else he would call in the army.
"Jamaal is up!" wrote attorney Zephyr Teachout. "You know what to do. Work harder. Six days until voting ends."
This Voters' Calendar will stretch our civic attention span to make high-turnout elections a task that mere mortals can perform, not a superhuman feat that tests the endurance of even the most dedicated voters.
I want to do a bit more beating up on a NYT piece this morning on breaking ties with China. There is a widely held view in policy circles that the pandemic showed that our extensive economic ties with China are a bad thing. I will ask a simple question, how?
On June 16, members of Moscow’s local election commissions were set to hold their first meetings on conducting the July 1 plebiscite on constitutional amendments. However, several regions have only half the required number of electoral commission personnel, Open Media reports, citing members of the territorial electoral commission and election monitor coordinators.€
President Donald Trump has signed an executive order in response to protests around the nation triggered by the cold-blooded killing of a black man by a white police officer in Minneapolis, Minnesota.
Vital Democratic primaries, many of them with national consequences, will take place next on Tuesday, June 23. Nation Justice Correspondent Elie Mystal and National Affairs Correspondent John Nichols have identified a handful of races that they’re keeping their eyes on in New York and Kentucky—two states that delayed their primary elections because of the pandemic. Here’s a roundup of seven candidates Mystal and Nichols think are making noteworthy runs.
As of this week, I am a Philadelphian once again. I returned here after a two-and-a-half-year interval in Brooklyn, which even in the midst of a pandemic is both a stimulating garden of eclectic delights and a horror show of metastasizing gentrification.
If the prospect of the Trump – Biden presidential election fills you with horror and despair, you might give some thought to not just replacing both candidates but the presidency as well, at least as we now conceive it.
Moscow residents are being offered money to register fake accounts on the government platform mos.ru and vote online in support of amending the constitution, reports the television channel Dozhd (“TV Rain”). Would-be participants are being promised 75 rubles for each registration (about $1), and another 50 rubles (about $0.70) for voting through the created account. According to Dozhd, the organizers of the scheme recommend registering a minimum of 20 accounts per day.
On the afternoon of June 1, as President Donald Trump raged about the Black Lives Matter protests outside his gates, reporters noticed a familiar figure in Lafayette Park across from the White House. William Barr, Trump’s attorney general, was scoping out the scene with top military and law enforcement officers. It was an ominous sight, coming just hours after the president promised the nation’s governors that “we will activate Bill Barr and activate him strongly.”
"The leader of the United States government is defying science in order to hear cheers from his supporters," said the Senator from Vermont.
President Donald Trump says he will push ahead with a massive campaign rally in Tulsa, Oklahoma, on Saturday, even as COVID cases are surging there as the state reopens. Trump delayed the rally by one day after it was originally scheduled for June 19 — the day of the Juneteenth celebration marking the emancipation of enslaved people. Tulsa is also the site of one of the deadliest massacres in U.S. history, when a white mob in 1921 killed as many as 300 people in a thriving African American business district. “The rally is troubling to a lot of people because of both the venue, Tulsa, and because of the timing,” says Hannibal B. Johnson, attorney and author of Black Wall Street: From Riot to Renaissance in Tulsa’s Historic Greenwood District.
The veteran activist has been described as "simply a man that shows up to stand for peace and justice."
The BBC plumbed the depths of hypocrisy in dressing up the final episode of the Salisbury Poisonings as a homage to Dawn Sturgess while systematically lying about the facts of her death, yet again to cover up the implausibility of the official narrative.
A child exposing the nakedness of the emperor by speaking truth to power?
In the Bronx, the second most economically unequal district in New York state, the insurgent primary campaign of former middle school principal Jamaal Bowman threatens to unseat 16-term Democratic congressmember and House Foreign Affairs Committee Chair Eliot Engel. Bowman supports defunding the police, Medicare for All and a Green New Deal. He has also gotten high-profile endorsements from Senators Elizabeth Warren and Bernie Sanders, Representative Alexandria Ocasio-Cortez and The New York Times editorial board. “I’ve worked in this district for the last 10 years as a middle school principal,” Bowman says. “Over that 10 years, I’ve developed thousands of amazing relationships with the children and the families of this community, and I’ve learned intimately the impact of poverty and bad policy on their lives each and every day.”
The deputy head of Moscow’s Education Department, Marina Smirnitskaya, says that opposition leader Alexey Navalny published fake audio recordings of her voice. The recordings in question allegedly proved that Smirnitskaya was involved in forcing teachers to register to vote in the July 1 plebiscite on constitutional amendments.
"Bolton is a moral abomination in every way. It's also the case that basically everyone in government who comes close to Trump comes away thinking he's even worse than they realized."
I thought it was over in September 2019, when Donald Trump and his third national security adviser, the execrable John Bolton, got into a “You’re Fired/I Quit!” fight on the front page of all the papers. “Maybe he’s really gone now,” I thought wistfully of Bolton, the war-humping neoconservative ghoul who has haunted U.S. foreign policy in one form or another since the Reagan administration, lo these 40 long years.
According to a book written by former National Security Advisor John Bolton, set to be made public next week, President Donald Trump sought the help of China’s President Xi Jinping to benefit politically in this year’s presidential race.
"The Senate must act so we can prevent tragedies like this from happening again."
It’s all getting nasty.€ The urge to remove statues in hurried indignation; the lust to censor programmes now deemed offensive; the erasure of history, which, any sensible sort should know, is often a panoramic account of crimes and slaughter worth knowing rather than banning and hiding.€ This is surely not what the late George Floyd intended, but it hardly matters anymore.€ His death has propelled a movement that has capitalised on a publicised event of police brutality in the United States to re-order matters and sort out grievance across the board.
But the situation that MFF finds itself in is one that’s common after a cause goes viral: A small organization has been overwhelmed with donations from well-meaning people, but doesn’t necessarily have an urgent need for that much money. At the beginning of the protests, the organization had earmarked $10,000 to help bail out protesters, and soon found itself with many times that amount.
Amplifying existing narratives developed by the members of the target audience is cheaper than paying for experts to develop them.
"So where are we?" Vischer summarized. "The average black household has 1/10th the wealth of the average white household. This didn't happen by accident, it happened by policy. We, the majority culture, told them where they could live and where they couldn't. Then we moved most of the jobs to the places we told them they couldn't live. When the predictable explosion of unemployment and poverty resulted in a predictable in drug use and crime, we criminalized the problem. We built $19 billion of new jails and sold grenade launchers to the police. As a result, a white boy born in America today has a 1 in 23 chance of going to prison in his lifetime. For a black boy, it's 1 in 4. And that is why people are angry."
One of the most frustrating things out there is the idea that content moderation choices made on various platforms are coming directly from the top. Too often, I've seen people blame Jack Dorsey or Mark Zuckerberg for content moderation decisions, as if they're sitting there at their laptops and twiddling their fingers over who gets blocked and who doesn't. Over the last decade or so, an entire industry has been built up to figure out how to make internet services as usable as possible, to deal with spam, and abuse, and more. That industry is generally called "trust and safety," and as a new industry it has grown up and professionalized quite a bit in the last decade -- though it rarely (if ever) gets the respect it deserves. As I mentioned on a recent episode of The Pivot podcast, many of the assumptions that people make about content moderation unfairly malign the large crew of people working in trust and safety who aren't interested in political bias, or silencing voices, but who legitimately are working very, very hard to figure out how to balance the many, many tradeoffs in trying to make internet services useful and welcoming to users.
So there were rumors about Senator Hawley's bill to reform Section 230 earlier this week, saying that it would remove 230 protections if you used targeted ads. Today, Hawley released the actual plan, which is very different, but even dumber. It would certainly turn the GOP from the party that wanted to push for tort reform and limit frivolous and vexatious lawsuits into the party that encouraged an avalanche of wasteful litigation.
Because today wasn't insane enough, just hours after Senator Josh Hawley released his ridiculous bill to flip Section 230 on its head and turn it from a law that protects against frivolous lawsuits into one that would encourage them, the Justice Department has released recommendations for Section 230 reform that appear to have been written by people who haven't the first clue about how content moderation works online.
A federal court declared an “ag-gag” law in North Carolina unconstitutional and barred the state government from enforcing key parts of the law against journalists or whistleblowers. Judge Thomas Schroeder concluded the state’s Property Protection Act violated the First Amendment and removed multiple provisions from the law, leaving parts that did not target speech intact. North Carolina was the fifth state to have their “ag-gag” law struck down by a federal court.“Ag-gag laws” are essentially corporate-backed farm secrecy statutes that are intended to suppress and criminalize speech about industrial agricultural production. They are especially designed to discourage employees from taking photos or recording video that may expose abuse or misconduct.On June 3, 2015, the North Carolina General Assembly overrode a veto by the governor and passed the Property Protection Act, which amended the law to provide a “civil remedy for interference with certain property rights by creating a civil cause of action for the owner or operator.” It empowered the attorney general and chancellors of state universities, where animal research and experiments are conducted, to file civil lawsuits that could result in steep fines—$5,000 for each day a “violator” committed offenses. The law was challenged by a coalition of organizations, including People for the Ethical Treatment of Animals (PETA), Center for Food Safety, Animal Legal Defense Fund (ALDF), Farm Sanctuary, Food and Water Watch, Farm Forward, the Government Accountability Project, and American Society of the Prevention of Cruelty to Animals (ASPCA).As a coalition, the organizations claimed the law would discourage them from “employment-based undercover investigations to document and expose animal abuse” or inhibit their ability to collect information from whistleblowers and investigators that could be incorporated into their advocacy work. ALDF told the court it was prepared to conduct undercover investigations at state-owned facilities, but preparations were “thwarted” by the passage of the law. Similarly, ASPCA halted the funding of investigations in North Carolina because they feared they would be targeted and held liable. Each of the organizations highlighted ways the law undermined their ability to produce content that was central to their missions because the law prevented information from reaching them.The federal court in North Carolina acknowledged [PDF] one key difference between the law and many of the other “ag-gag” laws that have been deemed unconstitutional. However, because it empowered private citizens or entities to bring lawsuits did not mean it satisfied constitutional guidelines. As Schroeder described, the law empowered the state government to “identify speech—or in some cases conduct that includes speech”—and enforce the prohibition against this speech. IT was the University of North Carolina Chancellor or the North Carolina Attorney General, who would represent targeted state agencies.It is also likely that the law was struck down because it had no discernible purpose outside of discouraging undercover investigations. North Carolina has a trespass law to protect private property, and the judge was presented with zero evidence to show that the trespass law was deficient. “The ASPCA is proud to have been a part of this lawsuit and applauds the court’s decision, which is a huge victory for farm animals and the fight to create a more humane, transparent food system,” ASPCA stated. “Ag-gag laws are unconstitutional and have no place in our society.”Yet, the victory came a week after the Iowa state legislature passed its third “ag-gag” bill. It was tucked into legislation that was drafted to deal with the impact of the coronavirus. “The latest bill would create a new crime, ‘food operation trespass,’ for anyone who enters a location without permission where a ‘food animal’ is kept or where meat is sold or processed,” The Intercept’s Alleen Brown reported. The first Iowa “ag-gag” law was declared unconstitutional, and the second Iowa law was challenged in federal court.Altogether, Idaho, Iowa, Kansas, North Carolina, and Utah have each seen their “ag-gag” laws defeated by lawsuits brought by organizations impacted by them.
North Carolina also is notorious for its pig farms, which can smell like decomposing bodies if waste is illegally sprayed.
The new rules draw on a workshop the Justice Department held early this year, and cover several disparate complaints about Section 230. The proposal suggests allowing lawsuits against sites when users upload child abuse and exploitation, terrorism, or cyberstalking content — along the lines of the 2018 SESTA/FOSTA law. It would also deny protection if sites had “actual knowledge or notice” that the content had violated criminal law and didn’t remove it. Also, Section 230 — which already doesn’t apply to federal criminal cases — would no longer restrict civil cases brought by the federal government.
CAIR has long fought to sanitize educational texts of considers derogatory against Islam. It entered into a formal partnership in 2010 with the 57-nation global Organization of Islamic Cooperation's (OIC) Islamic Educational Scientific and Cultural Organization (ISESCO) to "redress the image of Islam and Muslims in textbooks." Like CAIR, the OIC condemns connecting Islamic doctrine and terrorism in the minds of Westerners as "unfair," saying it has "created an unfair misinterpretation of the Islamic message in the Western and Non Muslim worlds."
Instagram became the most popular social network in Iran after access to Telegram was blocked by a judicial order on 30 April 2018. Facebook was blocked several tears ago. Many Iranians now use Instagram -- the only social networking platform that is accessible without using a VPN or proxy -- for personal entertainment, networking or business on a daily basis.
Along with the recent arrests of Instagram influencers, Qomi's remarks in the parliament have widely been interpreted as a sign that the authorities have an urgent plan to block access to Instagram and worried many Iranians who use it for business.
For the free-speech absolutists out there, let me point you to a corner of the digital world that embraces its utter lack of free expression: Apple’s app stores.
Apple alone decides what apps you can download on your iPhone, iPad and Mac. The company reviews every line of software code and is happy to block any app that it believes promotes harmful behavior, is in poor taste, enables surveillance, or is trying to steal money or your data.
Schrader, whose book Badges Without Borders analyzed the co-development of global counterinsurgency and American policing during the twentieth century, argues that police in the United States have developed into a self-interested social actor since the 1960s, helping eviscerate social spending by aggressively organizing to expand their own budgets. Through this kind of fiscal intimidation, Schrader writes in Public Culture, “police have come to protect neither party machines nor the legitimacy of the state but, rather, themselves.”
A variety of voices were quoted in the testimony, including locals who said that the actions of Turkish-backed "Islamist extremist groups" against minorities "remind us of ISIS behavior." ISIS committed a genocide against Yazidis and other minorities in 2014 and killed thousands. It appears that Yazidi villages in Afrin have also been subjected to ethnic cleansing and their shrines destroyed under Ankara's occupation of that part of Syria. Some of the testimony read into the record asserted that Turkey's role in harming minorities was a legacy of the 1915 attacks against Armenians and other Christians in Turkey. Some of these Christian minorities had fled to Syria after 1915, only to find their villages once against threatened by Turkey and Turkish-backed groups. Turkey is a member of NATO and is supposed to uphold democratic and human rights. The testimony paints a picture of a NATO member involved in destroying the shrines of minorities, ethnically cleansing other minorities and engaging in demographic change similar to what was done in the Balkans in the 1990s. In the Balkans NATO powers intervened to stop ethnic cleansing. In Syria a NATO power has now been accused of enabling harm to minorities and women.
More devastating testimony came from Michael Rubin, a Resident Scholar at the American Enterprise Institute. Rubin said that the "Turkish-backed administrators refuse to register locals with Kurdish names and the Turkish administration refuses to issue identification cards to Christian and minority women who do not cover their hair or wear conservative Islamic veils." He also claimed that "Turkish forces have razes Kurdish and minority graveyards in the region, action mores more consistent with ethnic cleansing than counter-terrorism."
They were asked: "Some are proposing the creation of a new agency of first-responders, like emergency medical services or firefighters, to deal with issues in the community that need to be remedied but do not need police. Would you support or oppose calling such an agency?"
The survey found that 58 percent of Americans said they would support calling such an agency to deal with issues without police involvement, including 25 percent who said they would "strongly support" it.
It is these Taqiyyah Muslims who compiled the so-called list of atheists that the petitioners said they would use to "pick up" other atheists who would be prosecuted along with Mr. Bala.
Despite Shafqat’s forced confession, his illiteracy means he could not have sent the messages in the first place.
“He couldn’t,” Allen explained to Mission Network News. “Number one, he’s illiterate. Number two, the text messages weren’t even in Urdu, the national language of Pakistan. They were in English. He doesn’t even know how to speak English, let alone read or write it.”
Since their arrest in 2013, Shafqat and his wife have been jailed in separate prisons. The couple has been in the process of appealing their case since their death sentences were handed down in 2014. The latest appeal hearing was set to take place on June 3, however, the hearing was delayed until June 22.
The organizations added: "Hundreds more have been convicted of vague and broad national security-related charges, often stemming from the peaceful exercise of their rights to freedom of expression, association and assembly, and sentenced up to 10 years in prison as well as, in some cases, flogging. Courts relied on torture-tainted “confessions” as evidence on which they based their verdicts, even when retracted by defendants."
[...]
Mr. Rehman's mandate can be extended on an annual basis for up to six years. Several other previous rapporteurs had also been denied entry into Iran.
In order for this country and people in this country to perform reprehensible acts, it has to deny its own professed values and laws while pretending to uphold them. Coming to grips with this is not easy, but it must be done.
Now is the time for people to demand that state and local governments take effective measures to ensure all eligible persons are permitted to exercise their constitutional right to vote—and that means removing all barriers and obstacles to voting.
For three weeks now, in 1,000 cities and towns across the country, unprecedented, massive, multi-racial, daily mobilizations against the ingrained institutional racism that permeates every aspect U.S. society have exploded in scope and intensity.
Senate Republicans may be at a crossroad in their unwavering fealty to a bunkered racist Donald Trump as his chances of re-election appear to be dimming.
Keep on keeping on — that’s what one of the brothers tells himself in a crucial part of Spike Lee’s new film Da 5 Bloods, now streaming on Netflix. Last year African-Americans commemorated the 400th anniversary of their arrival as slaves in America. At the end of Bloods Lee flashes a snippet of Martin Luther King, Jr’s 1967 Riverside Church speech where he reminds the listener that in order “to save the soul of America,”
President Donald Trump says he will push ahead with a massive campaign rally in Tulsa, Oklahoma, on Saturday, even as COVID cases are surging there as the state reopens. Trump delayed the rally by one day after it was originally scheduled for June 19, Juneteenth, a celebration marking the emancipation of enslaved people. Tulsa is also the site of one of the deadliest massacres in U.S. history, when a white mob in 1921 killed as many as 300 people in a thriving African American business district. “The rally is troubling to a lot of people because of both the venue, Tulsa, and because of the timing,” says Hannibal B. Johnson, attorney and author of “Black Wall Street: From Riot to Renaissance in Tulsa’s Historic Greenwood District.”
The systemic racism and brutality of the criminal justice system extend far beyond police misconduct.
Even here, people are organizing demonstrations to protest racism and police violence.
"You have the power to help us get justice for my brother George Floyd. I am asking you to help him. I am asking you to help me. I am asking you to help us—black people in America."
Rebellions are clarifying. They not only respond to conditions — they shape them. A month into a popular uprising against policing and the broader edifice of state violence, politicians are rushing to catch up with its energy — or contain its spread.
On Friday, April 10, Dashujauhn “Heavy” Danzie heard that his fellow prisoner had finally gotten out of bed. During the previous week, everyone in the 9B barracks had watched nervously as the bedridden man kept coughing. Other prisoners told Heavy that the man had stood up and walked—or at least tried to. He collapsed on the way to the library and was taken to the infirmary.
The knee is the largest and most complex joint in the human body. A flexible hinge connecting thigh and shin bones, a€ focal point of leverage and stability, it helps carry the weight of the body; it is essential for movement and vulnerable to injury.
"Use of these tools to monitor protesters is having a chilling effect against those exercising their constitutional rights to assemble and express their views."
Let us name the system: "racial capitalism."
Author, activist, and intellectual Chris Hedges referred to an often quoted statement by the late€ Stokely Carmichael€ (Kwame Ture): “In order for nonviolence to work, your opponent must have a conscience. The United States has none.”
Since 2004, the Orleans Parish Prison Reform Coalition (OPPRC) — which includes Women With A Vision, Families and Friends of Louisiana’s Incarcerated Children, Voice of the Experienced, and New Orleans Workers’ Center for Racial Justice — has been building a movement to reduce the parish’s jail population and improve conditions for those in detention. Over the years, the organization has won many victories, such as lowering the rate of incarceration as well as gaining the passage of a municipal bail reform ordinance — effectively eliminating bail and bond for most municipal offenses. During the pandemic, the coalition continues to advocate for the health and well being of the community. OPPRC has succeeded in gaining an en banc order in the Criminal District Court that has led to decarceration, and has helped establish Orleans Parish as one of the top-five districts in the country to have reduced jail population during Covid-19. To further understand the group’s organizing efforts throughout the pandemic, I spoke with Sade Dumas, the Executive director of OPPRC.
On Wednesday, June 17, Donald Trump signed into law the Uighur Human Rights Policy Act, which seeks to punish China for “gross human rights abuses” against Uighurs and other Muslim minorities in the country’s western Xinjiang province. It is the first piece of legislation in the world targeting a sprawling, years-long detention campaign in China that experts say constitutes the largest internment of ethnoreligious minorities since the Holocaust.
Late on Wednesday night, police officers arrived outside the studio of the independent television network Dozhd, where they demanded to speak with journalist Anton Baev, the author of a recent investigative report that claims Moscow residents are being offered money to register fake accounts (using real senior citizens’ passport information) and vote online in support of amending Russia’s Constitution.
Speaker of the House Nancy Pelosi is hoping to establish firm rules on wearing facial coverings in committee hearings, and giving the sergeant-at-arms the authority to remove from the chamber lawmakers who do not abide by the standards.
There’s a lot of bad news out there, but I hope we’ll celebrate amid the pain.
The most powerful protest music can perfectly encapsulate the moments and moods being experienced by society. At times, it can even come across as eerily prophetic.
The detention of immigrants who are in removal proceedings, fighting to remain in the US with their families, or seeking a safe haven from government repression, gang violence or domestic abuse in their home countries, is unjust to begin with. The COVID-19 pandemic has added to that injustice by forcing these same immigrants, many with underlying health problems, to remain in crowded conditions that do not allow for social distancing and expose them to a deadly virus. This webinar will provide both new and experienced advocates with tools and strategies for seeking the release of detained immigrants, from bond and humanitarian parole to habeas proceedings in Federal Court, and review the class action litigation that has been filed to secure the release of thousands from detention facilities. An organizer with a faith rooted program that fights for social justice will then discuss the work that activists are engaged in to both help secure the release of detained individuals and provide them with support once they are released from custody.
Following weeks of non-stop protests in all 50 states, the Movement for Black Lives (M4BL) is calling for a weekend of actions June 19-21 to honor the legacy of Juneteenth. Hundreds of events are planned across the country, and the NLG is coordinating with M4BL and Law for Black Lives (L4BL) to provide legal support along with local jail support groups, bail funds, and legal collectives.
Juneteenth commemorates the emancipation of enslaved people in the United States, and this year will build on ongoing mass mobilizations against racial injustice and police brutality against Black people. As the SixNineteen website describes: “Juneteenth is a day that honors Black freedom and Black resistance, and centers Black people’s unique contribution to the struggle for justice in the U.S. This Juneteenth is a rare moment for our communities to proclaim in one voice that Black Lives Matter, and that we won’t tolerate anything less than justice for all our people.”
For much of the last year, T-Mobile and Sprint insisted that their $26 billion megamerger would result in untold amazing "synergies," lower prices, and better service. You know, pretty much the complete opposite of what US telecom merger history indicates and antitrust experts had predicted. And so far, the antitrust experts have had it largely right; the company has been busy laying off employees at its prepaid division (despite repeatedly claiming this wouldn't happen), and the DOJ's attempt to cobble together a fourth replacement carrier out of Dish Network appears to be bogged down in infighting.
The MoU lays out a few areas of joint interest including:
Supporting communities and local entrepreneurs to solve their own connectivity challenges through design and deployment of community networks, training and capacity building efforts, and knowledge sharing opportunities for solving policy and regulatory challenges.
Working through Internet Society Chapters and Special Interest Groups, A4AI National Coalitions, and other communities to mobilize resources and partners in support of the implementation of priority programs and projects.
Engaging in joint research efforts to support expansion of Internet access in underserved regions.
One of the most salient features of Spanish patent litigation, in comparison to other countries, such as the United Kingdom, is its extreme rigidity. Judges do not seem entitled to have a sip of water during Court hearings unless a specific provision of the law empowers them to do so. A recent Decision dated 19 May 2020 from the Court of Appeal of Barcelona is highly illustrative of such rigidity. Although the facts of the case were so convoluted that it would be impossible to expound them within the narrow bounds of this blog, the main points of interest may be summarized as follows:
The patent holder, on the eve of the 2019 edition of the Mobile World Congress, filed an application for provisional measures asking the Judge to seize some models of mobile phone handsets expected to be exhibited during the fair. At the same time, the applicant requested the Judge to carry out some “saisie-contrefaçon” type investigations to find out whether other mobile phone handsets that the applicant had not been able to purchase fell within the scope of protection of the applicant’s patent and, if so, “extend” the provisional measures (i.e. seizure and preliminary injunction orders) also against this second group of handsets. The First Instance Judge decided to “bifurcate” the proceedings (i.e. one procedure dealing with the application for provisional measures and another procedure dealing with the application for the “saisie-contrefaçon” inspection), which resulted in a saga of different decisions, an explanation of which would require forcing the readers to navigate a complex labyrinth, which is unnecessary for the purposes of this blog.
CBM reviews can only be used to address certain types of patents—patents that “claim[] a method or corresponding apparatus for performing data processing or other operations used in the practice, administration, or management of a financial product or service.” In other words, patents on financial operations. There’s a caveat, though—CBM patents “do[] not include patents for technological inventions.”
That’s been the key to why CBM challenges have been used less and less frequently. Until late 2016, the class of patents that were considered to be related to a financial product or service was treated fairly broadly. But in a case called Unwired Planet, the Federal Circuit significantly cut back on that broad definition. And then last year, the Federal Circuit went further in SIPCO, redefining “technological invention” to mean any patent which claims technology as part of the solution, rather than where the claim itself innovates in a technological way.
Before the Unwired Planet decision, there were typically 100-200 CBM petitions per year. After that decision issued, CBM petitions dropped to 48 in FY2017, 36 in FY2018, and 22 in FY2019.
In the 9 months since the 2019 SIPCO decision, there have been a total of 10 CBM petitions. Between the two, the Federal Circuit’s review of PTO decisions to institute CBMs has prevented the program from achieving the goal Congress intended—a stringent look at patents being asserted against the financial industry.
I love the elvish doll designed by Dr. Dudley Joy Morton uncovered by Prof. Burstein. Morton was an orthopedic surgeon who was also an amateur “paleoanthropologist.” He was apparently the first to suggest that Australopithecus was a hominid. Morton published several books about feet, but only one related to gnomes & elves: The Grampas’ Toyshop (1922), a book of Christmas poetry. “After lights out on Christmas Eve, Grampa Stabler, an old elf, takes Ned and Sister to Toyland to meet Santa Claus and see the inner workings of his toy-making workshop.”
PhaZZer defaulted in the litigation and the district court awarded $7.8 million to Taser. On appeal, the Federal Circuit quickly issued a R.36 no-opinion affirmance in 2019. Then, in February 2020 the USPTO finally cancelled the claims of the asserted patent (via reexamination). US7234262.
[...]
This case is related to the pending petition in Chrimar where the petitioner is arguing that timing of USPTO cancellation is important — namely that USPTO cancellation should not be used to undermine an already issued district court final judgment. The Supreme Court is considering the Chrimar petition in its penultimate conference of the term on June 18, 2020.
The World Trade Organization has found that Saudi Arabia failed to live up to its obligations under the TRIPS agreement. In a dispute that centers around the pirate broadcaster beoutQ, the WTO sides with Qatar which suggested that a large piracy conspiracy may have taken place within its neighboring country.
Lawyers acting for Nintendo are leaving no stone unturned in their battle to prevent Team-Xecuter's modchips from becoming a market success. The latest target is a company that offered to install SX devices into customers' Switch consoles, an activity which Nintendo describes as a breach of the DMCA's anti-circumvention and anti-trafficking provisions.
Back in May, we wrote about something of an economy springing up around Nintendo's hit game Animal Crossing. With so many folks enduring the hardships of layoffs, or unable to find work, it turns out there are people making very real world money selling in-game assets and collecting payment outside of Nintendo's platform, which doesn't have a method for these types of transactions. This sort of thing fascinates me on many levels, perhaps mostly in how nearly perfectly this highlights the reality of income disparity in America. Some folks have to farm digital bells to make money by selling them to people with enough money to buy them.