01.28.15
Posted in News Roundup at 8:22 pm by Dr. Roy Schestowitz

Contents
-
What can you say? In a few short years, that other OS has gone from mainstream to niche and Android/Linux and GNU/Linux are stepping up to displace it as the goto OS of the world. It’s all good. This is the right way to do IT with the world making its own software throughout the whole stack: OS on client and server and a ton of applications too. There is no need for a monopoly in IT. The world wants a revolution not lock-in.
-
We’ve been banging on about the horrific and broken Windows software ecosystem for a long time now. Rather than installing applications from Download.com and every other freeware site, you should just switch to Linux if you want to download freeware safely.
-
Desktop
-
In yesterday’s roundup I included two stories about Windows 10 and the fate of the Linux desktop. Today there’s a story at Datamation that compares Windows 10 with Ubuntu to see which one might be a better fit for readers.
-
In the last two years, the Linux desktop has settled into a period of quiet diversity. The user revolts of 2008-2012 are safely in the past, and users are scattered among at least seven major desktops — Cinnamon, GNOME, KDE,LXDE, MATE, Unity, and Xfce — and likely to stay that way.
So what comes next? What will the next innovations on the desktop be? Where will they come from? Prediction is as safe as investing in penny mining stocks, but some major trends for the next couple of years seem obvious without the bother of a tarot reading.
-
In 2007, Dell became the first major computer OEM to sell pre-installed Linux on their computers. Today, Dell continues to support desktop Linux. In its latest move, Dell will be bringing Ubuntu 14.04 to its top-of-the-line Precision M3800 workstation laptop and the latest model of the Dell XPS 13 .
-
If you’re a developer and like Ubuntu Linux, your coffee may taste sweeter this morning. Dell has unveiled a new Precision M3800 laptop preloaded with the open source operating system and tailored for programmers and high-end applications.
-
Server
-
With a quadrupling of contributors over the past year, the open-source Docker container project has unveiled a new structure aimed at dealing with that accelerating growth.
-
Without a doubt, container technology was one of the hottest stories of last year, and if you mention the container arena to most people, Docker is what comes to mind. As impressive as Docker is, as recently as June of last year, OStatic highlighted some of its instabilities. And, we’ve also chronicled new competition in the container space. Google has set its sights squarely on Docker by transforming its Kubernetes platform into a full-fledged part of Google Cloud Platform with Google Container Engine. Meanwhile Canonical is leaping into the into the virtualization arena with a new hypervisor called LXD that uses the same Linux container tools that have allowed Docker to isolate instances from one another.
-
The popular open-source application container virtualization effort gets an overhaul in a bid to improve project organization.
The open-source Docker application container virtualization project is evolving today, in a bid to improve the project’s organization, scalability and openness.
-
Scientists take computational approach to evidence of plant climate adaptation using iPlant, Stampede and Lonestar supercomputers
-
When it comes to storing this viewing data, Netflix currently uses Cassandra as the primary data store for all persistent data, with memcached layered on top of Cassandra as a guaranteed low-latency path for reading, possible stale, data.
-
Kernel Space
-
Latest kernel 3.18.4 includes many changes, you can check the Changelog for the complete list of changes.
-
The OpenDaylight community is comprised of leading technologists from around the globe who are working together to transform networking with open source. This blog series highlights the developers, users and researchers collaborating within OpenDaylight to build an open, common platform for SDN and NFV.
-
The latest work landing in the DRM-Next code-base for the Linux 3.20 kernel merge window is the Tegra DRM driver updates.
-
Prep Course Comes Bundled With a Linux Foundation Certified System Administrator Exam, Which Can Be Taken Anywhere, Any Time
-
A fresh version of the Linux kernel, 3.18.4, has been released by Greg Kroah-Hartman and is now available for download. This is now the most advanced version you can find and it will remain like this at least for the next couple of weeks.
-
Going along with many DRM graphics driver improvements for Linux 3.20 is the seemingly never-ending work on atomic mode-setting.
Atomic mode-setting/display support has been talked about for years but is finally nearing a reality within the mainline Linux kernel with drivers like the Tegra DRM driver adding initial support.
With Linux 3.20 there’s the actual Linux DRM Atomic IOCTL and along with other changes means that Linux user-space can start accessing the atomic support, albeit it’s hidden for now behind the experimental drm-atomic=1 flag.
-
Graphics Stack
-
Last week NVIDIA released the GeForce GTX 960, a great $200 GPU for Linux gamers that is based on their new power-efficient Maxwell architecture. On launch-day I delivered some initial performance figures of the full GeForce GTX 900 series line-up along with other graphics cards and following that I did many new NVIDIA Linux GPU tests going back to the GeForce GTX 400 (Fermi) series. Not part of those tests were any AMD Radeon graphics cards while in this article are such numbers in making a new 18-way graphics card comparison with the latest Linux graphics drivers.
-
NVIDIA has released a new branch of Legacy drivers for the Linux platform and they are the most advanced versions you can get right now for old video cards.
-
For conservative NVIDIA Linux users not quick to jump to new release streams, the 340.76 stable update is now available, which is also the driver that’s continuing to provide long-term support for pre-Fermi graphics card users relying on NVIDIA’s binary blob.
-
As some extra Broadwell Linux performance numbers this morning, here’s some brief test results for the Intel Core i7 5600U when testing the Intel P-State vs. ACPI CPUFreq frequency scaling drivers and the different scaling governors.
-
Applications
-
mpv, an open source media player that has been forked from mplayer2 and MPlayer and that works only from the command line, has been upgraded to version 0.7.3 and is ready for download.
-
unhtml is one of probably two or three (or four or five …) html-strippers that I’ve seen since the start of this silly little site, and while it’s not the most elegant or flexible, it might be the oldest.
-
Achieving good performance from a computer or network is an important part of system administration.The monitoring and maintenance of the system is the most important task listed in the checklists for daily tasks of a system and network administrator. There are many commands line utilities created for this purpose.
-
For the first thing, it’s an optional feature of bash. It can be included in bash if the –enable-restricted option is used with the configure command when bash is built. To make it usable, you (assuming you’re the admin now) create a symbolic link to bash and call is rbash. It’s as simple as that. And if you’re not sure if a system that you use or administer provides the rbash functionality, try this:
-
Now replaced more and more by forums, social networks, or mailing lists, IRC was once the method of communication of the web. And if it stands today as the last bastion of hackers and bearded Linux users, it remains one of the fastest and most specific channel of communication. If you have a technical difficulty, or just want some company, there is an appropriate IRC channel for you. And if you are tired of the YouTube comment section and its torrent of hate, IRC people are in general much more behaved (and moderated). So in short, here is a non-exhaustive list of IRC console clients. Why console? Because if you go down there, you might as well do it in style.
-
Yesterday I released version 0.8 of AppStream, the cross-distribution standard for software metadata, that is currently used by GNOME-Software, Muon and Apper in to display rich metadata about applications and other software components.
-
-
-
GEGL has for a long time supported meta-operations: operations which are built as a sub-graph of other operations. However, they had to be built programatically using the C API which limited tooling support and the platform-specific nature made them hard to distribute.
[...]
This makes Flowhub+imgflo a useful tool also outside the web-based processing workflow it is primarily built for. Feature is available in GEGL and GIMP master as of last week, and will be released in GIMP 2.10 / GEGL 0.3.
-
Proprietary
-
Vivaldi is a web browser based on Chromium, developed by an Opera founder and his team. They want to provide a browser that is aimed at power users and that makes no compromises regarding its functionality.
-
Instructionals/Technical
-
Games
-
-
Sadly sometimes people go on autopilot, and the developer of Two Worlds II and Raven’s Cry has confirmed to me they didn’t read my previous emails correctly, so Two Worlds II is not coming to Linux, but it might be, confused? I am.
-
Borderlands: The Pre-Sequel the latest in the Borderlands series that is available on Linux has gained another DLC titled ‘Lady Hammerlock the Baroness Pack’, and this new DLC is available for Linux thanks to Aspyr Media.
-
The Witcher 2: Assassins of Kings is still being improved on for the Linux platform and a new major patch has been released for the games, although it’s still in the Beta stage.
-
We know how some of you feel about wrappers, but that’s an old argument now. The game is here, and the developers are still working on improving it. The Witcher 2 had a new beta a few days ago, and we took a look and just how much of an improvement it is.
-
A new beta of the Linux port of The Witcher 2 was released this weekend and it aims to deliver improved performance.
The Witcher 2 for Linux was released last May but many Linux gamers remain frustrated with the initial quality of the game port. The Linux port was done using Virtual Programming’s eON layer to ease the developer’s process in porting from Windows to Linux, but it’s caused major performance issues.
-
Darksiders is another big game we are excited about, and sadly the current people in charge of the port haven’t replied to our messages, but thanks to SteamDB we can see it’s still happening.
-
I love the idea of game creation tools that require no programming knowledge, as they enable hobbyists to have fun, quick prototyping and much more. Construct 2 is one of the finest around, and the developers have laid out plans for Construct 3.
-
Cradle (their site is a terrible all-Flash website, urgh!) is a really quite good-looking adventure game coming out, and the developers have teased their Linux testing recently.
-
Curse Client is an addon management tool for games such as World of Warcraft and others, which unfortunately doesn’t work on Linux.
-
Humble Weekly Bundle: Je Suis Charlie is a collection of games from French developers and the proceeds from the sales are going to Freedom of the Press Foundation. Also, most of the games have Linux support.
-
Good news folks, thanks to a comment on a recent article we were poked about taking a look at the progress of porting Outlast to Linux, and it seems to have a new private Linux build in testing.
-
Out There: Omega Edition has landed on Linux in the form of a beta, and it’s a game we have been eagerly waiting for. Thankfully I’ve had some time to test before the official release, and here are some thoughts.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
KDE will be at Europe’s largest gathering of free software developering this weekend, taking over the city of Brussels for FOSDEM.
-
The Star-Hopper is an amazing feature present in KStars which allows you to find a path between two points in the sky. It is very commonly used in astronomy. If you have a bright star as a reference and you want to find an object in it’s vicinity, you start from your reference star and trace a route to the destination traversing a sequence of stars/pattern of stars.
-
-
-
Well, that’s not exactly true. Professional-level video editing on Linux has been solid and mature for many years now, with the likes of Lightworks, Cinelerra and Blender. But the “hobbyist” video editor market just wasn’t very well-served. There were video editors out there… but they were often buggy and lacking in critical features.
-
First of all, what is Marble? Marble is a virtual globe application which allows the user to choose among the Earth, the Moon, Venus, Mars and other planets to display as a 3-D model. It is free software under the terms of the GNU LGPL, developed by KDE for use on personal computers and smart phones.
-
Today I had the pleasure of launching the new Planet KDE website theme done by Ranveer Aggarwal. It looks very lovely and importantly makes the site a pleasure to browse on your phone. Everyone hug him and do report any bugs to bugzilla.
-
-
-
Screenshots
-
Arch Family
-
Manjaro Xfce 0.9.0 Pre2, a Linux distribution based on well-tested snapshots of the Arch Linux repositories and 100% compatible with Arch, has been released. The devs have made quite a few improvements to it and users have been asked to test it.
-
Slackware Family
-
The KDE community released the source code to Plasma 5.2.0 today, and some of you are dying to see what it looks like.
-
And yes – let me get this clear right from the start: this Plasma 5.2.0 desktop environment will replace the KDE 4 packages you have installed.
-
Red Hat Family
-
-
Fedora
-
I am extremely pleased to announce that the FUDCon APAC 2015 will be hosted in Pune, India. There was a bid from Pune, India and PhnomPenh, Cambodia. After a lot of discussion, Pune, India has been given an opportunity to be the host for FUDCon APAC 2015.
-
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
The developers of the Ubuntu Linux operating system for desktop, notebook, and server computers are working on a touch-friendly version for smartphones and tablets, with the first Ubuntu phones expected to go on sale this year.
-
Ubuntu Touch is an operating system that uses Unity 8 as the desktop environment and it’s designed to run on mobile devices like phones and tablets, at least for now. With some small trickery, you can make it run its apps in separate and floating windows, just like on a desktop. Let me repeat that, like on a desktop.
-
Details about an Unbound vulnerability in Ubuntu 14.10 and Ubuntu 14.04 LTS, which has been found and corrected, have been published in a security notice by Canonical.
-
Canonical has revealed that the previous update for Firefox has introduced a regression for Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, and Ubuntu 14.10. A new version of the browser has been released and now the users can also upgrade their Firefox browser.
-
This new vulnerability is called GHOST and it has been intensely publicised, but the truth of the matter is that it’s not all that dangerous and it’s pretty well contained. In fact, in order to exploit it a user needs to make some serious efforts and the rewards are not all that great.
-
Unless you manually upgrade your kernel and other system packages from your Ubuntu 14.10 installation, Ubuntu 15.04 Vivid Vervet is an important release for users of new Intel Broadwell systems for ensuring your hardware reaches its maximum performance potential.
-
Linux newbies have probably heard a lot about Ubuntu, but it isn’t the only Linux distribution. In fact, Ubuntu’s standard Unity desktop is still controversial among long-time Linux users today.
Many Linux users prefer a more traditional desktop interface, and Linux Mint offers that. As Ubuntu focuses more on Ubuntu for phones, Linux Mint may be an even clearer choice in the future.
No, Ubuntu isn’t terrible. Some people prefer Ubuntu’s Unity desktop and love it. But you’ll probably have an easier time getting to grips with Linux Mint instead of Ubuntu.
-
-
The ARM CPU used in the BeagleBone Black and other single board computers is designed to interface with half to a few gigabytes of RAM and allow a full operating system such as Linux to be run on the computer. (See my long series of reviews on Linux.com of ARM-based computers that run Linux). By contrast the ARM Cortex-M is a microcontroller level chip which might run at 16-100Mhz, contain 2-100kb of RAM, and some flash memory to contain only the program that you want to execute.
-
The Acnodes “FES8670″ is a rugged industrial box-PC that runs Linux on a 4th Gen Core CPU, and offers four GbE ports and numerous storage and display ports.
So far, we’ve still only seen one company (Congatec) announce products based on Intel’s new 5th Generation Core (“Broadwell”) processors, although we expect many more to break cover at Embedded World next month. Yet, there’s still plenty of juice left in the 4th Gen Haswell Core chips, which drive Acnodes’s powerhouse FES8670. Earlier Acnodes industrial PCs have included the Atom D2550-based FES2215.
-
-
Phones
-
Android
-
Apple just reported a record number of iPhone sales in its Q1 earnings.
But while iPhones might be selling like hot-cakes, there are still a bunch of reasons why Android phones are better.
-
The table is made of aircraft-grade aluminum and the table top is only 2.4-inches / 60mm in thickness. On the Windows side, the panel can detect up to 60 distinct touch points, while on the Android one there are only 12.
-
With word that Apple’s long-awaited Apple Watch is set to hit store shelves in April, the World Wide EchoTubes are filling up with all the headlines you’d expect — anything and everything related to the Apple vs. Android “smartwatch war” and which company’s wearables will “win the battle.”
I hate to be the bearer of bad news, but listen closely: Smartwatches are not the same as smartphones. Aside from silly fanboy arguments and meaningless analyst ramblings, there is no direct Apple Watch vs. Android Wear rivalry. Not in any way that’s actually relevant in the real world.
-
Smartphone preference is always a hot topic among enthusiasts, with the iPhone vs. Android rivalry being the most obvious one since the smartphone revolution started by the original iPhone eight years ago. While Google’s Android is the most popular smartphone OS by market share, Apple is still a significant adversary, one that has never been beaten when it comes to smartphone profits. In fact, Apple on Tuesday announced record and estimates-smashing revenue, and most importantly, iPhone sales.
-
A nice array of great mobile games hit the Android Google Play store at the start of the new year. Along with these new games to pass the time with, several other released games have maintained their stronghold over the top games chart. We’re here to make sure you download some of the finer outings available to mobile games who game primarily on Android devices. These are simply the top five best Android games of January 2015. There’s action, puzzle, strategy and racing games that you’ll need to play. Here’s just a few of the best,
-
Here are some notes about my experience adapting android-galaxyzoo to Material design for Android 5.0 (Lollipop) though I only used the most superficial parts of Material design.
-
Dozens of Chinese technology companies have created iPhone 6 look-alikes that run Android and cost a lot less than Apple’s smartphone. Most of these knockoffs, however, look and feel a bit cheaper and come with low-end hardware compared to the iPhone.
-
Gobs of new open source projects are released every year, but only a few really capture the imaginations of businesses and developers.
Open source software management company Black Duck tries to spot these, measuring which projects attract the most contributors, produce the most code, and garner the most attention from the developer world at large.
-
These are just two examples of serious flagship projects, but even on a day-to-day level there are plenty of opportunities for systems librarians to interact with open source software. A large amount of vendor software runs on Linux, so there’s plenty of systems administration to do. I work in a relatively small library, and even here we run five Drupal websites: one as a portal for library services, one as the primary repository for our archive, another provides the public interface for an aboriginal research center, and one to manage safety information for our bio sciences lab.
-
Traditionally, open source software has relied primarily on asynchronous communication. While there are probably quite a few synchronous conversations on irc, most project discussions and decisions will happen on asynchronous channels like mailing lists, bug tracking tools and blogs.
-
Given intense competition for the world’s best engineering talent, can your company really afford to lock up its code behind proprietary licenses? Sure, if you’re in the business of selling software, giving it all away may not make sense. But the vast majority of companies don’t sell software, and should be contributing a heck of a lot more as open source.
-
What is open source? Simply put, it is source code (used to develop software programs) that is freely available and modifiable on the Internet. Open source developers from all over the world contribute to various projects, which are hosted on various websites—GitHub, a popular code hosting site, has over 8 million users and over 19 million code “repositories.”
-
Not so long ago, the open source model was the rebellious kid on the block, viewed with suspicion by established industry players. Today, open initiatives and foundations are flourishing with long lists of vendor committers who see the model as a key to innovation.
-
Events
-
The Embedded Linux Conference + Android Builders Summit on Mar. 23-25 in San Jose is about “Drones, Things, and Automobiles,” but drones get the most love.
Maybe it’s just our imagination, but the Linux Foundation’s Embedded Linux Conference seems to be getting more interesting than ever. The program increasingly reflects new opportunities for Linux in areas such as drones, robots, automotive computers, IoT gizmos, 3D sensing, modular phones, and much more. For those of you worried that ELC North America is skimping on the basics as it explores the more colorful sides of Linux, rest your mind at ease. There are still plenty of sessions on booting, trace analysis, NAND support, PHY frameworks, power management, defragmenting, systemd, device tree, and toolchain. Geeks still rule!
-
Web Browsers
-
Mozilla
-
Today is International Data Privacy Day. It is a day designed to raise awareness and promote best practices for privacy and data protection. It is a day that looks to the future and recognizes that we can and should do better as an industry. It reminds us that we need to focus on the importance of having the trust of our users. At Mozilla, we start from the baseline that privacy and security on the Web are fundamental and not optional. We are transparent with our users about our data practices and provide them options for choice and control. We seek to build trust so we can collectively create the Web our users want – the Web we all want. Still, we are working to do better.
-
On November 11, 2014 Mozilla announced the Polaris Privacy Initiative. One key part of the initiative is us supporting the tor network by deploying tor middle relay nodes. On January 15, 2015 our first proof of concept (POC) went live.
-
RequestPolicy is an extension for Mozilla browsers that requestpolicyincreases your browsing privacy, security, and speed by giving you control over cross-site requests.
-
SaaS/Big Data
-
What can OpenStack do for you? How about helping you along your career? OpenStack is a growing space and there are more than enough jobs still to go around for qualified seekers. So how do you go about getting one of those jobs?
In this video from the Kilo OpenStack Summit in Paris, Niki Acosta, Ryan Yard, Shamail Tahir, Kenneth Hui, Eric Wright, and Aaron Delp offer their perspectives on a variety of topics around creating and building a career in cloud software through the OpenStack community.
-
When the topic turns to job market opportunities these days, hardly any technology trend is drawing more attention than Big Data. And, when talking Big Data, the subject of Hadoop inevitably comes up, as it remains the star open source framework for drawing insights from large data sets. Big tech companies like Yahoo and eBay use Hadoop extensively, but it’s also used by smaller companies these days, and we’ve reported before that the job market is very healthy for people with Hadoop skills.
-
Despite all these challenges, exceptions, and subtleties, we’ve made good strides in separating the wheat from the chaff when it comes to identifying important data, in no small part thanks to open source. In particular, gains made in search engine technology like Apache Lucene and Solr have revolutionized our ability to deal with multi-structured content at scale, rank it and return it in a timely manner. Search engines have evolved significantly in recent years to seamlessly collect, collate, and curate data across a wide variety of data types (text, numeric, time-series, spatial, and more) and are no longer about just doing fast keyword lookups. Combined with large scale data processing frameworks (Hadoop, Spark, et. al), R for statistical analysis, machine learning capabilities like Apache Mahout, Vowpal Wabbit, MLlib and NLP libraries like Stanford’s NLP libraries, Apache OpenNLP, NLTK and more, it is now possible to build sophisticated solutions that take in your data, model it, serve it up to your users and then learn from their behavior.
-
VMware announced its own OpenStack distribution in August of 2014. Gelinsger said that the market will be hearing more this quarter about the VMware OpenStack product and he’s very excited about what’s coming.
-
Oracle/Java/LibreOffice
-
We are very close to release LibreOffice 4.4 and I thought I’d share my thoughts on the work that has been put into this new branch and what the general idea is about it. LibreOffice 4.4 is unusual; as a major release you may expect some important underlying change in its architecture, or the inclusion of a set of major features. The 4.4 does include several important features and improvements, most notably for Impress and the much forgotten HTML editor (the comprehensive release notes may be found here). But the most important details are not to be found in this area. If you want to understand where the 4.4 branch is headed, I think it is useful to keep two fundamental trends in mind.
-
The next major LibreOffice desktop release is just around the corner and now the developers behind the open source productivity suite are preparing to extend it to Android.
-
The Document Foundation on Tuesday announced it had assigned the work necessary to build the Android apps to two companies. The Document Foundation is hoping the result will be a “compelling, elegant and full-featured experience of LibreOffice on Android”, Ital Vignoli, one of its founders, said.
-
BSD
-
While FreeBSD, DragonFlyBSD, OpenBSD, and other BSD distributions have made much headway in the past year or two in porting the Linux DRM/KMS drivers to their kernels, the work still measurably lags behind the latest upstream Linux kernel code.
-
FSF/FSFE/GNU/SFLC
-
GNUzilla is the GNU version of the Mozilla suite, and GNU IceCat is the GNU version of the Firefox browser. Its main advantage is an ethical one: it is entirely free software. While the Firefox source code from the Mozilla project is free software, they distribute and recommend non-free software as plug-ins and addons. Also their trademark license restricts distribution in several ways incompatible with freedom 0.
-
Public Services/Government
-
Four citizens of the German city of Dortmund have started a citizens’ initiative, asking the city council to seriously consider the use of free and open source software. “The city needs to recognise free software as a topic in the public interest”, the DO-FOSS initiators write.
-
Ahead of the parliamentary elections in Greece last week, the Greek Free/Open Source Software Society (GFOSS) contacted all political parties to ask about their positions [in Greek] with regard to open software, open data, open hardware and open government. The four parties to respond all came out generally in favour of openness. Some of them were even able to present very detailed planning on how to improve the current institutional and legislative framework and outlined how openness could help reconstruct Greek productivity.
-
Openness/Sharing
-
Open Data
-
Recently, the German Ministry of the Interior presented ‘The Federal Government’s National Action Plan to implement the G8 Open Data Charter’.
-
Open Hardware
-
The latest motherboard being supported by Coreboot for replacing the board’s proprietary BIOS is the ASUS KFSN4-DRE.
-
Standards/Consortia
-
Everyone hates Flash, right? You have to install a plug-in, it’s resource intensive, it doesn’t work on mobile, and it causes all sorts of security problems. YouTube has been working on ridding itself of Adobe’s ancient Web plug-in for several years now, and while the whole site has been slowly transitioning away from Flash, today YouTube announced that it finally serves HTML5 video by default. Users of Chrome, IE 11, Safari 8, and “beta versions of Firefox” will all have a Flash-less experience.
YouTube’s transition seems to have been pretty straightforward. Four years ago, YouTube laid out a laundry list of problems it had with HTML5, and today it has a blog post explaining how it has worked with the Web community to solve each issue.
-
-
It’s been a long time coming, but YouTube has finally made the switch from Flash to HTML 5 and no one seems to really care about that.
[...]
Basically, you can mark this day in the calendar as the official date for the death of Flash, or at least as the culmination of its decline.
-
The Philippines government came under fire on Friday after admitting that hundreds of homeless people were taken off Manila’s streets and put into luxury accommodation during Pope Francis’s recent visit, when he preached compassion for the poor.
-
Security
-
US regulator the FTC says now is not the time for new laws on the “Internet of Things” – but security needs to be improved as we enter the era of always-on, always-connected gadgets, sensors and machines embedded in homes, streets and pockets.
In a report [PDF] published today, the commission’s staff make a number of policy recommendations for the wave of new devices that collect and transmit data on our everyday lives.
From the camera that posts pictures online with a click, to automated home lighting and heating, to FitBits and Apple Watches, the Internet of Things (IoT) was the focus of this year’s Consumer Electronic Show, as well as a speech by FTC chairwoman Edith Ramirez.
-
I work on SE Linux to improve security for all computer users. I think that my work has gone reasonably well in that regard in terms of directly improving security of computers and helping developers find and fix certain types of security flaws in apps. But a large part of the security problems we have at the moment are related to subversion of Internet infrastructure. The Tor project is a significant step towards addressing such problems. So to achieve my goals in improving computer security I have to support the Tor project. So I decided to put my latest SE Linux Play Machine online as a Tor hidden service. There is no real need for it to be hidden (for the record it’s in my bedroom), but it’s a learning experience for me and for everyone who logs in.
-
-
Defence/Police/Secrecy/Aggression
-
It was 42 degrees and raining lightly around 3 a.m. on Monday when an inebriated off-duty employee for a government intelligence agency decided it was a good time to fly his friend’s drone, a 2-foot-by-2-foot “quadcopter” that sells for hundreds of dollars and is popular among hobbyists.
But officials say the plan was foiled, perhaps by wind or a tree, when the employee — who has not been named by the Secret Service or charged with a crime — lost control of the drone as he operated it from an apartment just blocks from the White House.
-
The official said the White House is taking urgent steps to protect itself from its association with the murderous state terror of the drone campaign. “We’re going to be stepping up the number of happy, peppy events we have at the White House,” he said, “and making sure they all have a very prominent ‘White House’ label. In the next few weeks, we’ll be having the ‘White House Sweet Ole Granny Quilting Bee’ featuring photogenic grannies from all over the country, and the ‘White House ‘Smores and More Weekend,’ where the President and Mrs. President will gather with kindergarten kids from across this great land of ours to make some simple, tasty picnic treats.
-
So when a man said he was flying a drone for fun just after 3 a.m. in downtown Washington, D.C., and had an accidental crash-landing into a tree on the wrong side of one of the world’s most highly protected fences, he didn’t merely touch the famous property at 1600 Pennsylvania Ave.
-
Brandon Bryant’s recent exposé of drone operations killing hundreds of innocent civilians during his service, which led to his post-traumatic stress and retirement, explains the dark side of the CIA led US drone operations in Afghanistan, Pakistan, Yemen and Somalia.
Adding to Bryant’s shock and surprise, his peers believed that they had killed a dog and not a kid that day, and thus it was nothing to worry about.
Bryant worked as a drone sensor operator for the USAF from 2006 to 2011, mainly operating from a dark container at a facility in New Mexico. But his oversight of these operations, where he became directly and indirectly responsible for the death of more than 1,000 people, nagged at his conscience forcing him to call it quits.
-
A Notre Dame University law professor says the legal and moral issues related to the U.S. government’s use of unmanned drones to kill individuals in war zones could be more difficult than similar issues on torture.
-
A message to President Obama: saying something does not make it so. How does killing people, so many of them innocent of any wrongdoing whatsoever, with missiles launched from drones by “pilots” thousands of miles away, demonstrate respect for human dignity and the application of “proper” constraints?
Let’s consider all the ways in which Obama’s drone assassination program undermines “human dignity” and lacks proper constraints. To do so, one need only consider the many reports that have been entered into the public record by United Nations Special Rapporteurs, human rights organizations, and academic institutions.
In May 2010, Philip Alston, UN Special Rapporteur on extrajudicial, summary or arbitrary executions, submitted a report to the UN Human Rights Council. In his report, Alston noted that some states, including the U.S., had adopted targeted killing policies, which they have justified as necessary for fighting terrorism. According to Alston, “In the legitimate struggle against terrorism, too many criminal acts have been re-characterized so as to justify addressing them within the framework of the law of armed conflict.”
-
Over the past decade, the United States has manufactured more than 6000 drones of various kinds. 160 of these are Predators, which are used not only in Afghanistan but also in countries officially at peace with the US, such as Yemen, Somalia and Pakistan. In Pakistan, CIA drones carry out on average of one strike every four days. Although exact figures of fatalities are difficult to establish, the estimated number of deaths between 2004 and 2012 vary from 2562 to 3325.
-
The Bureau of Prisons contacted me Friday, assigning me a prison number and a new address: for the next 90 days, beginning Saturday I’ll live at FMC Lexington, in the satellite prison camp for women, adjacent to Lexington’s Federal Medical Center for Men. Very early Saturday morning, Buddy Bell, Cassandra Dixon, and Paco and Silver, two house guests whom we first met in protests on South Korea’s Jeju Island, traveled with me to Kentucky and deliver me to the prison gates.
In December, 2014, Judge Matt Whitworth sentenced me to three months in federal prison after Georgia Walker and I had attempted to deliver a loaf of bread and a letter to the commander of Whiteman Air Force Base, asking him to stop his troops from piloting lethal drone flights over Afghanistan from within the base. Judge Whitworth allowed me over a month to surrender myself to prison; but whether you are a soldier or a civilian, a target or an unlucky bystander, you can’t surrender to a drone.
-
The Jordanian government has agreed to release a female prisoner in exchange for the freeing of an air force pilot captured by militants in Syria a month ago. The Islamic State had threatened to kill the pilot and a kidnapped Japanese journalist if the prisoner, Sajida al-Rishawi, was not released. She had been facing a death sentence for her role in a 2005 attack on three hotels in Amman that killed more than 57 people.
-
-
The U.S. reportedly killed three al Qaeda members in a drone strike Monday, the first strike on militants since Yemen’s U.S.-backed president resigned last week, according to Reuters. The strike is a sign that the U.S. air campaign in Yemen will continue without the blessing of President Abed Rabbo Mansour Hadi, who was a leading U.S. partner against the militant group.
-
The MQ9 Reaper – now deployed 24/7 over Pakistan, Afghanistan and elsewhere – makes killing too easy. It makes war easier to initiate and perpetuate. US drone wars are started with little or no public awareness or support – and with little apparent stake in the game. The weaponized drone cheapens honor. It cheapens life.
-
A young Israeli soldier, fresh from the front, bluntly recounts the orders from above. “They never said, ‘Leave no one alive,’ but they said, ‘Show no mercy,’ ” he explains. “The brigade commander said to kill as many as possible.”
Another recalls encountering Arabs on rooftops. “They’re civilians — should I kill them or not?” he asks himself. “I didn’t even think about it. Just kill! Kill everyone you see.” And a third makes it personal: “All of us — Avinoam, Zvika, Yitzhaki — we’re not murderers. In the war, we all became murderers.”
-
More details come in the 12th paragraph: The January 18 airstrike “killed five fighters from Hezbollah, including the son of the group’s slain military commander, Imad Mughniyeh, and an Iranian general.” So that’s a more serious flare-up, right? Assuming that we’re not defining the seriousness of an attack based on the nationality of those killed, that is.
But the New York Times is seemingly able to forget about the Israeli attack moments after it mentions it: “The flare-up shattered a fragile calm that has mostly held along the frontier since the month-long war between Israel and Hezbollah in 2006.” Mostly–aside from that Israeli airstrike that killed six people ten days ago.
-
Transparency Reporting
-
People often tell reporters things their employers, or their government, want to keep suppressed. But leaking can serve the public interest, fueling revelatory and important journalism.
-
Back in the solidarity movements of the 1980s, activists were encouraged to apply for our FBI files under the Freedom of Information Act.
Nobody expected the FBI to tell the truth about what it had. It was intended as a protest of the FBI’s spying on activists.
I applied. Eventually, I got back a letter from the FBI, saying: “We have no records responsive to your request.” Everybody said, that doesn’t mean anything, the FBI lies.
-
“The US attorney’s office thought the notice and the resulting publicity was a disaster for them,” Gidari said. The Perkins Coie partner added that federal prosecutors at the US Attorney’s Office in Alexandria, Va. “went through the roof” after the name of assistant US Attorney Tracy Doherty-McCormick was published.
A spokesperson for the federal prosecutor’s office did not respond to The Post’s request for comment because the investigation of Wikileaks is ongoing, the spokesperson said. Gidari said that Google is still fighting gag orders on subpoenas “to the present.”
-
Environment/Energy/Wildlife
-
“US, India Move Forward on Nuclear Energy Deal” read the headline at the top of USA Today’s front page (1/26/15). Moving forward–that sounds good, doesn’t it? The subhead was “Obama makes progress on the 1st day of his 3-day visit”–making progress also generally being seen as a good thing.
-
Broadcast Networks Provided The Most Climate Coverage In Five Years. During 2014, the major broadcast networks’ evening and Sunday news programs aired a total of 154 minutes of coverage of climate change. This was an increase from the previous year’s 129 minutes and was significantly above the six-year average of about 108 minutes, but remained below the 205 minutes of coverage in 2009.
-
Finance
-
Syriza, a hard left party, that outrightly rejects EU-imposed austerity, has given Greek politics its greatest electoral shake-up in at least 40 years.
You might expect the man who now occupies the role of finance minister to be a radical zealot, who could throw Greece into the fire.
He is not.
Yanis Varoufakis, the man at the core of the coalition Syriza has forged, is obviously a man of the left.
-
PR/AstroTurf/Lobbying
-
Defense contractor Northrop Grumman has ended its relationship with the American Legislative Exchange Council (ALEC), thanks to shareholder engagement from the Fond du Lac, Wisconsin-based Congregation of Sisters of St. Agnes.
-
-
-
That’s how much Charles and David Koch’s political network hopes to spend on the presidential race, House and Senate contests, and other elections and policy fights in 2016. That figure is not far off from how much President Barack Obama’s and Mitt Romney’s presidential efforts each spent in 2012. It is well over what John Kerry and George W. Bush together spent during the 2004 campaign. This fundraising target was announced Monday morning at the Koch brothers’ winter retreat for members of their elite donor network.
-
Watchdog organizations Common Cause and the Center for Media and Democracy jointly filed a public records request today seeking details of Governor Scott Walker’s trip to a secret fundraising retreat hosted by billionaire industrialist mega-donors Charles and David Koch in Palm Springs, California.
-
The final point, is of course, the conflation of anti-zionism with anti-Semitism. That seems to me the fundamental design of the media campaign exaggerating the scale of anti-Semitism at the moment. Yes, we must always remember the terrible warnings from history and it is right to remember those who died in the concentration camps, Jewish, Polish, Romany, Gay, Communist or any other category. But we should be aware of those who wish to manipulate the powerful emotions of horror thus evoked, for present objectives of the powerful.
-
Why media fall for sports industry’s bogus economic claims
-
Censorship
-
Last week justice ministers from across the European Union called on ISPs to conduct voluntary censorship of online content—but documents in preparation for a meeting of telecoms ministers suggest such a move could be illegal.
The documents, prepared by the Latvian presidency of the Council of the EU, note that calls to allow Internet service providers to block or filter content in the “public interest” as part of a proposed net neutrality law could violate privacy laws that protect the confidentiality of communication.
-
Only two weeks after Facebook CEO Mark Zuckerberg released a strongly worded #JeSuisCharlie statement on the importance of free speech, Facebook has agreed to censor images of the prophet Muhammad in Turkey — including the very type of image that precipitated the Charlie Hebdo attack.
-
-
Blogs, and online political activism generally, changed all of that. Though they tried – hard – these journalists simply could not ignore the endless stream of criticisms directed at them. Everywhere they turned – their email inboxes, the comment sections to their columns, Q-and-A sessions at their public appearances, Google searches of their names, email campaigns to their editors – they were confronted for the first time with aggressive critiques, with evidence that not everyone adored them and some even held them in contempt (Chait’s bizarre belief that “PC” culture thrived in the early 1990s and then disappeared until recently is, like his whole grievance, explained by his personal experience: he heard these critiques while a student at the University of Michigan, then was shielded from all of it during most of the years he wrote at The New Republic, and now hears it again due to blogs and social media).
-
Privacy
-
Although calls to ban or backdoor encryption have been made in the past, David Cameron’s rather vague threats against crypto clearly mark the start of a new, concerted campaign to weaken online privacy. Thanks to a leaked paper, written by the EU Counter-Terrorism Co-ordinator and obtained by Statewatch, we now have a clear statement of what the European authorities really want here (pdf)…
-
A Facebook spokesperson said, “Earlier this evening many people had trouble accessing Facebook and Instagram. This was not the result of a third party attack but instead occurred after we introduced a change that affected our configuration systems. We moved quickly to fix the problem, and both services are back to 100% for everyone.”
-
Contrary to suggestions hacker group Lizard Squad took out Facebook, there was almost certainly no attack on the social network and its photo sharing property Instagram, which both went down late last night. According to a source with knowledge of the matter, the downtime was the result of a technical foul up. Facebook is now confirming this in statements to media.
-
British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.
The document, included in a trove of Snowden material released by Der Spiegel on January 17, outlines a secret program run by the intelligence agencies called BADASS. The German newsweekly did not write about the BADASS document, attaching it to a broader article on cyberwarfare. According to The Intercept‘s analysis of the document, intelligence agents applied BADASS software filters to streams of intercepted internet traffic, plucking from that traffic unencrypted uploads from smartphones to servers run by advertising and analytics companies.
-
Harper government plans to introduce new legislation increasing the powers of Canada’s security agencies.
-
Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents.
The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files.
-
It’s never been clear exactly how Communications Security Establishment Canada, or CSEC does its work. What kind of information does it gather? Who does it target? CBC’s Dave Seglins joins us to give us a rare glimpse into the operations of a part of the Canadian Government we know little about.
-
In North America, the Canadians have long had to play country mouse to the flashier city mouse of the U.S. It’s the latter that gets all the attention, while the former sits quietly in a corner.
But recent stories have shown just how big a player the Canadians are becoming—at least in the surveillance realm.
-
A new European commission counter-terror plan will require the blanket collection and storage for up to five years of personal data records of all passengers flying in and out of Europe, the Guardian can reveal.
Civil liberty campaigners say the revised European passenger name record plan – in the aftermath of the Paris attacks – breaches a recent European court of justice ruling that blanket collection of personal data without detailed safeguards is a severe incursion on personal privacy.
-
Privacy is a hot topic at the moment – it continues to dominate the headlines as news of new NSA incursions, celebrity phone hacks, and corporate breaches are being reported on an increasingly regular basis. In response to this, a number of products have been brought to market that attempt to provide consumers with a greater level of privacy than typical devices allow for. In the phone market, one of the premier products to be released in recent years is undoubtedly the BlackPhone (http://www.blackphone.ch), which has been cited numerous times in tech publications as being one of the best available defenses against mass surveillance, as it provides full end-to-end encryption facilities for voice calls and text/MMS messaging.
-
Several documents released by Der Spiegel and The Intercept in the last year demonstrate that the exploitation and infiltration of computers often complements the “passive” collection by providing entrance into systems and networks that would otherwise be invisible to the mass surveillance infrastructure. The separation between mass and targeted surveillance is becoming blurry as we learn of attacks against Internet Service Providers, of targeting of system administrators and systematic compromise of Internet routers.s
-
-
Earlier this month, SPIEGEL International published an article based on the trove of documents made available by whistleblower Edward Snowden describing the increasingly complex digital weapons being developed by intelligence services in the US and elsewhere. Concurrently, several documents were published as well as the source code of a sample malware program called QWERTY found in the Snowden archive.
For most readers, that source code was little more than 11 pages of impenetrable columns of seemingly random characters. But experts with the Russian IT security company Kaspersky compared the code with malware programs they have on file. What they found were clear similarities with an elaborate cyber-weapon that has been making international headlines since November of last year.
-
-
Google has fought all gag orders preventing it from telling customers that their e-mails and other data were sought by the U.S. government in a long-running investigation of the anti-secrecy group WikiLeaks, which published leaked diplomatic cables and military documents, an attorney representing the tech firm said this week.
-
A spokesman for the Justice Department claimed that the DEA’s data collection program was suspended in September 2013, has been terminated, and the data deleted. If true, that is rare good news in the field of civil liberties preservation; however, citizens should still be alert for other unconstitutional or illegal government behavior originating from bureaucratic incentives to exploit people’s excessive fear of being killed by the rare terrorist attack.
-
We begin at The New York Times, widely considered America’s most powerful newspaper. Its office near Manhattan’s Times Square is a symbol of the power of the influential media outlet, which often sets the political agenda and tells us what’s important.
-
In the context of an interview about a case in which a paid FBI informant is alleged to have offered destitute men a quarter of a million dollars to execute an attack, a former assistant director of the FBI admits it’s in the bureau’s best interest to inflate the supposed terror threat. That’s remarkably candid, and profoundly disturbing.
-
Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years.
The keylogger program, likely part of an attack framework used by the U.S. National Security Agency and its intelligence partners, is dubbed QWERTY and was among the files that former NSA contractor Edward Snowden leaked to journalists. It was released by German news magazine Der Spiegel on Jan. 17 along with a larger collection of secret documents about the malware capabilities of the NSA and the other Five Eyes partners—the intelligence agencies of the U.K., Canada, Australia and New Zealand.
-
Computer malware used in cyber attacks on European Commission and International Atomic Agency developed by the US National Security Agency, Germany’s Spiegel magazine claims
-
The US National Sheriffs’ Association wants Google to block its crowd-sourced traffic app Waze from being able to report the position of police officers, saying the information is putting officer’s lives at risk.
“The police community needs to coordinate an effort to have the owner, Google, act like the responsible corporate citizen they have always been and remove this feature from the application even before any litigation or statutory action,” AP reports Sheriff Mike Brown, the chairman of the NSA’s technology committee, told the association’s winter conference in Washington.
-
-
-
At a public event last week, Edward Snowden argued that the NSA has developed a “culture of impunity,” that its people “are not villains, but they think they can do anything because it is for a just cause.” John DeLong, an NSA Director, responded that “the idea that NSA activities were unauthorized is wrong, it’s wrong in a magnificent way.”
-
The Chinese government has adopted new regulations requiring companies that sell computer equipment to Chinese banks to turn over secret source code, submit to invasive audits and build so-called back doors into hardware and software, according to a copy of the rules obtained by foreign technology companies that do billions of dollars’ worth of business in China.
-
-
A federal judge ruled in 2007 that the U.S.A. Patriot Act empowered the National Security Agency to collect foreigners’ emails and phone calls from domestic networks without prior judicial approval, newly declassified documents show.
The documents — two rulings of the Foreign Intelligence Surveillance Court — fill in a chapter in the history of the N.S.A.’s warrantless surveillance program. They show the agency’s secret moves in the months before Congress authorized the spying by enacting the Protect America Act in August 2007.
The disclosure also brought into public view a previously unknown example of how the surveillance court, which hears arguments only from the government before issuing secret rulings, sometimes accepts novel interpretations of the law to bless government requests for spying powers.
-
“Tor obviously was created with good intentions, but it’s a huge problem for law enforcement,” Caldwell said in comments reported by Motherboard and confirmed to me by others who attended the conference. “We understand 80 percent of traffic on the Tor network involves child pornography.”
That statistic is horrifying. It’s also baloney.
In a series of tweets that followed Caldwell’s statement, a Department of Justice flack said Caldwell was citing a University of Portsmouth study WIRED covered in December. He included a link to our story. But I made clear at the time that the study claimed 80 percent of traffic to Tor hidden services related to child pornography, not 80 percent of all Tor traffic.
That is a huge, and important, distinction. The vast majority of Tor’s users run the free anonymity software while visiting conventional websites, using it to route their traffic through encrypted hops around the globe to avoid censorship and surveillance. But Tor also allows websites to run Tor, something known as a Tor hidden service. This collection of hidden sites, which comprise what’s often referred to as the “dark web,” use Tor to obscure the physical location of the servers that run them. Visits to those dark web sites account for only 1.5 percent of all Tor traffic, according to the software’s creators at the non-profit Tor Project.
-
Republican Rep. Justin Amash, in reference to this story, tweeted “disqualified.” His office would not clarify what the Michigan libertarian meant by the tweet.
-
Colorado Congressman: if Marco Rubio wants to declare permanent surveillance of Americans forever, he should be the first volunteer
-
Last week in Berlin the 2015 Sam Adams Award for Integrity in Intelligence was presented to the former Technical Director of the NSA, whistleblower and tireless privacy advocate, William Binney.
A 36-year intelligence agency veteran, Bill Binney resigned from the NSA in 2001 and became a whistleblower after discovering that elements of a data-monitoring programme he had helped develop were being used to spy on Americans. He explained that he “could not stay after the NSA began purposefully violating the Constitution”.
-
Civil Rights
-
Today—Jan. 27—marks five years since the death of the great historian and activist Howard Zinn. Not a day goes by that I don’t wonder what Howard would say about something—the growth of the climate justice movement, #BlackLivesMatter, the new Selma film, the killings at the Charlie Hebdo offices. No doubt, he would be encouraged by how many educators are engaging students in thinking critically about these and other issues.
Zinn is best known, of course, for his beloved A People’s History of the United States, arguably the most influential U.S. history textbook in print. “That book will knock you on your ass,” as Matt Damon’s character says in the film Good Will Hunting. But Zinn did not merely record history, he made it: as a professor at Spelman College in the 1950s and early 1960s, where he was ultimately fired for his outspoken support of students in the Civil Rights Movement, and specifically the Student Nonviolent Coordinating Committee (SNCC); as a critic of the U.S. war in Vietnam, and author of the first book calling for an immediate U.S. withdrawal; and as author of numerous books on war, peace, and popular struggle. Zinn was speaking and educating new generations of students and activists right up until the day he died.
-
Jose Castaneda, center, speaks about his cousin who was killed in an incident with Denver Police as activists Rev. Patrick Demmer, left, and Anthony Grimes lsten before heading into a meeting on Tuesday, Jan. 27, 2015, with officials from the office of the Denver District Attorney. The activists are calling for a special prosecutor to be appointed to investigate the fatal shooting of the 17-year-old girl who allegedly hit and injured a Denver Police Department officer while driving a stolen vehicle early Monday in a northeast Denver alleyway. Photo: David Zalubowski, AP
-
A now-former California Highway Patrol (CHP) officer who was charged with criminal felony charges after seizing and distributing racy photos copied from arrestees’ phones has pleaded no contest and will serve no jail time.
Sean Harrington’s plea deal, which was finalized on Tuesday, means that he receives a 180-day suspended sentence, three years of felony probation, and according to local media accounts “must also speak at a community violence solutions class to tell everyone what he did.” Harrington resigned from the CHP last year after the charges were filed.
-
Last month, dashcam video of a 23-year-old (Victoria) Texas cop throwing a 76-year-old man to the ground and tasing him emerged, leading to plenty of outrage across the web. The imagined “crime” was the lack of an inspection sticker on the vehicle the elderly man was driving. Of course, had the officer known the law, he would have known that inspection stickers aren’t needed on vehicles with dealer plates — something that could have been confirmed by anyone inside the car dealership where the incident occurred.
-
The Ecuadorian government recommended Sweden in the second cycle of the Universal Periodic Review (UPR) of Human Rights to advance in the defense and protection of human rights, particularly in the case of Australian computer expert Julian Assange, asylee over two years in his diplomatic mission in London.
-
Investigative journalist Marcy Wheeler says Sterling faces decades in prison for leaking details of a botched CIA operation against Iran’s nuclear program
-
The former chair of the Senate Intelligence committee excoriated a report on the CIA’s searches of computers used by her staff as riddled with “mistakes and omissions.”
In a statement Tuesday, Senator Dianne Feinstein rejected the CIA accountability board’s conclusions that five agency personnel shouldn’t be penalized for searching computers used by her staff to compile a scathing report on the torture of detainees.
“The bottom line is that the CIA accessed a Senate Intelligence Committee computer network without authorization, in clear violation of a signed agreement…,” said Feinstein, reiterating an assertion that the searches violated “the constitutional separation of powers between Congress and the executive branch.”
-
Monday’s guilty verdict in the trial of former CIA officer Jeffrey Sterling on espionage charges — for talking to a newspaper reporter — is the latest milepost on the dark and dismal path Barack Obama has traveled since his inaugural promises to usher in a “new era of openness.”
Far from rejecting the authoritarian bent of his presidential predecessor, Obama has simply adjusted it, adding his own personal touches, most notably an enthusiasm for criminally prosecuting the kinds of leaks that are essential to a free press.
The Sterling case – especially in light of Obama’s complicity in the cover-up of torture during the Bush administration – sends a clear message to people in government service: You won’t get in trouble as long as you do what you’re told (even torture people). But if you talk to a reporter and tell him something we want kept secret, we will spare no effort to destroy you.
There’s really no sign any more of the former community organizer who joyously declared on his first full day in office that “there’s been too much secrecy in this city… Starting today, every agency and department should know that this administration stands on the side not of those who seek to withhold information but those who seek to make it known.”
-
Head of civil service questioned about delays to Chilcot inquiry and accused of letting prime minister pressurise him
-
Noam Chomsky discussed the film “American Sniper” at an event held by the Baffler, last week in Cambridge, Mass. The noted linguist, philosopher and political commentator discussed the film, and drew comparisons with the mentality of Chris Kyle (the American sniper whose memoirs are the basis of the film), that of drone operators, and the American public for ignoring the drone war.
“In the memoirs he describes what the experience was like, so I’ll quote him,” Chomsky said. “His first kill was a woman, who walked into the street with a grenade in her hand as the Marines attacked her village. Chris Kyle killed her with a single shot, and he explains how he felt about it.”
-
The swamp of moral depravity in which America is sinking is illustrated by a movie glorifying the exploits of a racist killer, American Sniper, receiving six Oscar nominations, while a movie depicting the historic struggle against racism led by Martin Luther King, Selma, has been largely overlooked.
Directed by Clint Eastwood, American Sniper tells the story of Chris Kyle, a US Navy Seal who served four tours of duty in Iraq and was credited with 160 confirmed ‘kills’, earning him the honour of being lauded the most lethal sniper in US military history
-
Say what you like about the film American Sniper, and people have, you have to admire its clarity. It’s about killing. There is no moral arc; no anguish about whether the killing is necessary or whether those who are killed are guilty of anything. “I’m prepared to meet my maker and answer for every shot I took,” says Bradley Cooper, who plays the late Chris Kyle, a navy Seal who was reputedly the deadliest sniper in American history. There is certainly no discursive quandary about whether the Iraq war, in which the killing takes place, is either legal or justified. “I couldn’t give a flying fuck about the Iraqis,” wrote Kyle in his memoir, where he refers to the local people as “savages”.
-
Ventura also dismissed the movie as propaganda because it conveys the false idea that Iraq had something to do with the 9/11 attacks. “It’s as authentic as ‘Dirty Harry,’” he said, referring to fictional movie series starring Clint Eastwood, the director of “American Sniper.”
-
A pro-Islam group says that Clint Eastwood’s new film “American Sniper” is partially responsible for a recent rise in anti-Muslim rhetoric online since the film premiered.
Members of the Arab-American Anti-Discrimination Committee penned a letter to director Clint Eastwood and the film’s star Bradley Cooper to express their concern that the war film has lead to an increase in threats against Muslim people.
In the letter, members of the ADC claim that the “majority of the violent threats we have seen over the past few days are result of how Arab and Muslims are depicted in American Sniper.” The organization also says they’ve collected “hundreds of violent messages targeting Arab and Muslim Americans from movie-goers” on social media since the film’s release.
-
It is easy to understand how these movies were denied any support from the Pentagon. Besides showing the determination of the enemy, they also showed American soldiers committing suicide, fratricide and mass killings of civilians. Aeschylus said, “In war, truth is the first casualty.”
-
No more drones sent to slaughter whoever happens to be the target, and then some.
-
For years now we’ve heard about randy grandparents getting nasty in the old folks home. Yet studies of septuagenarian sex continue to make the news as if it’s weird, shocking or gross.
It’s blatant ageism against the canasta class.
Yet another study, reported on by the Huffington Post, confirms what we already know: The elderly continue to have sex. This particular study claims significance because it’s the “first piece of research of its kind to include people over the age of 80.”
-
Intellectual Monopolies
-
New leaks show how transatlantic regulatory bodies will undermine EU and national sovereignty
Permalink
Send this to a friend
Posted in Courtroom, Europe, Patents at 2:28 pm by Dr. Roy Schestowitz

Judge Marijan Bertalanič, photo from vecernji.hr
Summary: The EPO’s notorious Vice-President, whose appointment at the EPO is still raising some alarming questions, has just lost his case in Croatia (one of many cases), motivating us to accelerate coverage about the persona known as Željko Topić
“BREAKING NEWS FROM ZAGREB,” heralded a source of ours this afternoon (European time). Željko Topić, who faces many criminal charges in Croatia, is failing to silence those who pursue justice against him.
“We just got news from Zagreb,” said our source, “that judgment has been delivered in Topić’s defamation case against Vesna Stilin.” (see background in the many older articles of ours)
“The case was being heard before Judge Marijan Bertalanič of the Municipal Criminal Court of Zagreb. A photo of the judge can be found here” (along with related photographs)
“It seems that Mr. Bertalaničwas not too impressed by Mr. Topić and according to what we have heard he has dismissed the defamation claim against Ms. Stilin.
“This is a first instance judgment so it remains to be seen whether or not Topić will try to appeal it.
“We expect to get a copy of the judgment (in original Croatian) in the next day or two.”
Techrights and its supporters will try to organise an English translation so that people outside Croatia, including EPO staff, are better able to know what Topić is up to. More details are to follow as they become available, but in the mean time, as Topić likes to silence his critics, we wish to add material that needs preserving for future reference. We still have plenty of material to show which relates to the Topić vs. Vesna case, and vice versa, so this is crucial. It’s no secret that Topić is bullying his critics to silence them. Some more documents, other than the famed article from 45lines.com, need to be added to our server now. These documents are currently looking for a new “home”; The old documents, namely the following PDF documents relating to the Topić case at the EPO, were analysed here before. These are currently “housed” on the server of the Croatian NGO Juris Protecta, but they may not stay there for much longer. We request assistance from our readers who are able to mirror these documents in case we too feel pressured to remove these. The documents are as follows:
“We have been told by Juris Protecta,” said sources of ours, “that they are worried that if they publicise the links to these PDFs, their Croatian provider may be pressurised to shut down their website.
“The PDF documents in question are basically those cited in the letters sent to the Administrative Council in December 2013 by Juris Protecta and Vesna Stilin. Those letters have been reproduced in the Techrights article about Battistelli’s “Balkan standards”.
“Juris Protecta is currently planning to circulate something about its earlier letters to the Administrative Council and wants to include links to the PDFs.
However, it is afraid that if it uses the links to its jurpro.hr server, then the Croatian provider might be put under pressure to shut down its website.
“We don’t think that there is any problem with you publicly explaining that Juris Protecta is nervous about the risk of having its server in Croatia shut down.
“You might recall that there was a “hacking”/”cracking” attempt recently on the Croatian new portal dnevno.hr after they published an article with some comments about Topić.”
As a reminder, we too suffered DDOS attacks around the same time we published important articles about Topić, but we could never prove there was a correlation, only a coincidence in timing. There is also a huge amount of cracking attempts (dozens per minute) attempted against us since the DDOS attacks began half a year ago. When it all started (knocking our site offline at times) the only concurrence we could lay a finger at was EPO articles.
“Dnveno.hr was offline for quite a while (we estimate a couple of weeks),” said our sources, “and only seemed to become accessible again after the Croatian Presidential election was finished on 11 January. So the fears expressed by Juris Protecta are understandable and the issue can be mentioned publicly.”
We are going to write a lot more about Topić in the coming weeks if not months. Our multi-layered servers infrastructure is much better protected from DDOS attacks at the moment. █
Permalink
Send this to a friend
Posted in FUD, GNU/Linux, Google, Red Hat, Security, Ubuntu at 12:23 pm by Dr. Roy Schestowitz
Ghostwriting a Qualys horror story for maximal FUD (fear, uncertainty, and doubt)
Summary: Responding to the media blitz which paints GNU/Linux as insecure despite the fact that bugs were evidently found and fixed
THERE IS something to be said about the “top” news regarding GNU/Linux. It’s not really news. The so-called “GHOST” publicity stunt needn’t be repeated by FOSS sites. It is about a bug which was patched two years ago, but some sites overlook this important fact and stick lots of spooky logos, playing right into the hands of Qualys, an insecurity firm (making money from lack of security or perception of insecurity).
We have watches the ‘news’ unfolding over the past day and a half and now is a good time to explain what we deal with. The so-called “GHOST” (all capital letters!) bug is old. Qualys is going two years ago into bugfixes, giving a name to the bugfixes, then making plenty of noise (all over the news right now). Qualys does not look like a proxy of Microsoft or other GNU/Linux foes, but it is self-serving. Insecurity firms like Qualys probably learned that giving a name to a bug in GNU (SJVN mistakenly calls it “Linux”, but so do many others) would give more publicity and people will pay attention to brands and logos rather than to substance. Just before Christmas an insecurity firm tried to do that with "Grinch" and it turned out to be a farce. SJVN says that this old “vulnerability enables hackers to remotely take control of systems without even knowing any system IDs or passwords.”
Well, it was patched back in 2013. Use of names for marketing is what makes it “news”; the opportunists even prepared a PRESS RELEASE and pushed it into ‘big’ sites like CNN. It has marketing written all over it, just like “Heartbleed” that had strong Microsoft connections behind the disclosure. It is sad that Linux sites fall for this. Phoronix copies the press release as though it’s reliable rather than self-promotional. Michael Larabel writes: “The latest high-profile security vulnerability affecting Linux systems us within Glibc, the GNU C Library.”
It is not “latest”, it is 2 years old. Larabel says that “Qualys found that the bug had actually been patched with a minor bug fix released on May 21, 2013 between the releases of glibc-2.17 and glibc-2.18.”
OK, so it’s not news. FOSS Force cites SJVN to amplify the scare and other FOSS sites are playing along as though this is top news. It oughtn’t be. It is already widely patched (maybe requiring a reboot), so let’s patch and move on (unless it was already patched upstream/downstream years ago). IDG has already published at least three articles about it [1, 2], including one from Swapnil Bhartiya, who is not too alarmist to his credit. He noted that “there was a patch released back on May 21, 2013, between the releases of glibc-2.17 and glibc-2.18. However it was not considered to be a security risk and thus major Linux distributions that offer long term support and get security updates remained vulnerable, including Debian 7 (wheezy), Red Hat Enterprise Linux 6 & 7, CentOS 6 & 7 and Ubuntu 12.04.”
It affects very specific versions, mostly long-term support releases that already have reliable patches available. It should be clear that some headlines such as this or that clarify the limited scope of impact (not bad reporting) unlike the alarmist trolls.
What Techrights generally found was that early coverage came from so-called ‘security’ sites or blogs of insecurity firms that try to sell their services (e.g. [1, 2, 3]). These set the tone for many.
The response to this bug is proportional to the perceived danger (e.g. due to media hype), not the severity of the bug. Some security news sites [1, 2] focus on names and logos while facts remain only a side issue. This so-called “ghost” nonsense (some lines of code basically) was fixed 2 years ago and as the blog post “long term support considered harmful” explains it: “In theory, somebody at glibc should have noticed that fixing a buffer flow in a function that parses network data has security implications. That doesn’t always happen, however, for many reasons. Sometimes the assessment isn’t made; sometimes the assessment fails to consider all possible exploit strategies. Security bugs are “silently” fixed frequently enough (without evil intentions) that we should consider them a fact of life and deal with them accordingly.”
Some of the worst kind of coverage we found came from The Register with its flamebait headlines (scary headlines for maximum effect) and the troll Brian Fagioli. They are only some among many who are using the name to come up with puns and FUD. Jim Finkle is back to his GNU/Linux-hostile ‘reporting’, bringing this to the corporate media (there is some in the UK also) and LWN quickly cited the GNU/Linux-hostile Dan Goodin. He called “Highly critical” a bug that was patched two years ago.
Debunking some of the latest security FUD we had Fedora Magazine which stated “don’t be [worried], on supported Fedora versions.”
For unsupported version there is a lot more than this one bug that one needs to worry about.
Apple fans were quick to take advantage of the news, despite the fact that Apple is leaving systems vulnerable for many months, knowingly (like Microsoft does, until Google steps in).
See, with proprietary systems one knows for a fact that there is no security. With GNU/Linux is an open question and it depends on what measures one takes to keep it secure. For Apple and Microsoft security is not at all the goal; back doors and unpatched flaws are not really as “interesting” and important for them to patch as helping spying agencies. Google is not at fault here, Google just saw that Apple and Microsoft had no plans to plug serious holes — a patch evidently wasn’t going to be made ready before the public finds out about it, owing to Google. Apple chooses to blame Google; same as Microsoft. They should only blame themselves both for the bugs and for negligence after the bugs were highlighted to them. There is no room here for properly comparing GNU/Linux (Free/libre) to OS X or Windows (proprietary) because evidence clearly shows that the latter are not interested in security and not pursuing security when it is trivially possible.
What we find curious amid the latest FUD campaign is that Apple back/bug doors are not as widely publicised as a GNU bug that was patched 2 years ago and mostly affects LTS systems (which already have patches available). “Nothing I can think of,” said a reader of ours about this media hype, “but the LTS model followed by RHEL and Ubuntu have different goals and purposes than the short, fast development cycle like OpenBSD.”
Nobody is forced to use an LTS release and those who choose it must be aware of the potential risk.
Regarding the other FUD that flooded the press in recent weeks, targeting for the most part Google and Android, our reader XFaCE wrote the following:
I assume you want to write about that new Android vulnerability. Basically I can see the narrative being pushed through three points
- Microsoft supported Windows XP/7/etc. for years, why doesn’t Google support old Android versions
- Google told Microsoft about a very old bug in their software, so they are hypocritical
- Heartbleed bug was fixed way back for 4.1.1
For the last point, it’s a bullshit comparison because
a) 4.1.1 was one point release where upgrading to 4.1.2 fixed the issue (it was already fixed back when 4.1.2 was released)
b) The fix was one file, as evident by XDA members patched it themselves on phones manufacturers refused to upgrade to 4.1.2 SOURCE: http://forum.xda-developers.com/showthread.php?t=2712916
c) As shown by the link, a lot of manufacturers DIDN’T update certain 4.1.1 devices to 4.1.2, hence proving Google’s point. The fix there was SIMPLE, but the OEMs didn’t bother to do it
With Webview, not only is webview involved, but so is the webkit rendering engine, so the fix for all those previously releases is much more complicated
As for the second point, Google did catch it, with KitKat, and furthermore made KitKat supported on more low-end devices so theoretically older 512mb or less devices could be updated
For example, HTC said (when Jelly Bean 4.1 came out) that they would not update any device with 512 mb of RAM (SOURCE: http://www.cnet.com/news/htc-one-v-and-desire-c-will-never-get-jelly-bean/ ), so naturally when KitKat came out, they updated those devices because the OS officially was designed for such low ram devices
oh wait
http://www.androidpit.com/android-4-4-kitkat-update-plans
“Later this year, the entry-level smartphone the HTC Desire 500, should also be seeing the KitKat update. However, the One X, One X+, One S, and One V will be left in the dust and will be receiving no more official updates from HTC.”
So the OEMs are at fault for not upgrading the devices, not Google, which leads to point 1 – Google doesn’t control the Android OEMs like Microsoft does OEM pay Microsoft for the support whereby Microsoft controls all updates, Google doesn’t get paid or have the agreemeent in that way
OEMs like HTC could easily fix this by porting Kitkat to those devices, but they won’t cause they want you to buy a new HTC phone or whatever phone brand
Techrights did not cover that (except in daily links) because it should be self-evident that free-of-charge Android upgrades make it inhernetly different from proprietary software and keeping up to data typically ensures security. A lot of the analogies (Android and Windows) were inherently flawed and the FUD rather shallow. █
Permalink
Send this to a friend
Posted in Deception, Free/Libre Software, Microsoft at 11:27 am by Dr. Roy Schestowitz
“If you repeat a lie often enough, it becomes the truth.” ~Joseph Goebbels
Summary: More openwashing of Microsoft, including in the corporate media, shows just to what great an extent and how quickly the old “Microsoft Open Source” Big Lie grows feet
SEVERAL days ago we wrote about Condé Nast‘s attempt to paint as "open source" a Microsoft takeover which had nothing to do with FOSS (Free/Open Source software). Yesterday we saw Microsoft apologist Adrian Bridgwater doing the same thing. He has lots of conflicts from him are being disclosed this year, the latest being this article about Pentaho where he admits he “has worked on eBook materials for Pentaho.”
We are generally disturbed to see how Microsoft perturbs media coverage to lie so much on its behalf. Consider this latest nonsense article titled “Microsoft Slowly Easing Into Open-source” and the “Microsoft loves Linux” nonsense. This is a shotgun wedding from people whose attempt to paint Microsoft as an “Open Source company” has gone too far. It’s completely detached from facts as the company’s cash cows and crown jewels are all as proprietary as can be. The Microsoft propaganda sites that play along with the Microsoft-Linux angle would go quite far to convince us that Microsoft and GNU/Linux are now in more or less the same camp. It’s designed to confuse outsiders and it is proving quite effective so far. It’s often repeated without any fact-checking.
Black Duck, a Microsoft-connected firm that has worked hard to facilitate Microsoft’s infiltration into FOSS and dubbed Microsoft "Open Source Rookie of the Year" is now coming out with another such list. One article about it says that “Black Duck Open Source Rookies of the Year are selected irrespective of commercial motivations, according to Black Duck officials. Rather, they reflect projects that have demonstrated significant traction through developer contributions and involvement over the past year.”
Complete nonsense. They are saving face. IDG completely gives the company the platform as though it turned author (see author’s name). It says that “Each year sees the start of thousands of new open source projects. Only a handful gets real traction.”
Like Microsoft? Black Duck would have us believe that it is an authority in FOSS in its press release that it paid to spread and Microsoft-friendly (and funded by Microsoft) media rewriting is now the press release to make puff pieces. Black Duck, like Microsoft, is a proprietary software company.
The bottom line is, Microsoft and its allies spent a considerable amount of money and effort trying to push this illusion that Microsoft is now an “Open Source company” or something along those lines. If we don’t refute these lies, then perception may change and legislators for example, may find themselves unable to discern/tell apart Microsoft lock-in (e.g. OOXML) from Free software. That is perhaps the conflation that Microsoft strives to achieve. █
Permalink
Send this to a friend
01.27.15
Posted in News Roundup at 7:19 pm by Dr. Roy Schestowitz

Contents
-
The training which started Monday would avail the participants the opportunity to acquire basic knowledge on Linux operating system.
-
Next-gen GNU/Linux, what does that even mean? The FOSS world is so unlike the proprietary world. In that closed universe, new releases are considered so important that secrecy becomes paramount. So the next-gen release of Windows becomes so crucial. With FOSS and Linux development everything is laid bare. Sensible folk stick with the stable release but the brave-hearted can jump into an unstable, development branch and compile where angels fear to tread.
-
-
Desktop
-
Long story short, Windows 10 feels like a beta for an early version of Android, a consumer operating system that is designed to be on-line all the time. It does not feel like an operating system I would use to get work done. In fact, other than watching movies, browsing the web or listening to music, I don’t think I would find Windows 10 particularly useful. At least not without the on-line account stuff being removed and the package manager(s) fixed. Forcing users to sign up for an on-line account is a sure way to tell us privacy is not a concern and the alternative, downloading applications from the web, is a sure way to introduce malware.
-
However, Jesse Smith, of Distrowatch.com fame, said Microsoft isn’t making it easy to find the download, but it is possible and he did it. The installer was simple enough except for the partitioner, which was quite limited and almost scary. After finally getting into Windows 10, Smith said the layout was “sparce” without a lot of the distractions folks hated about 7. The menu is back and the start screen is gone. A new package manager looks a lot like Ubuntu’s and Android’s according to Smith, but requires an online Microsoft account to use. Smith concludes in part, “Windows 10 feels like a beta for an early version of Android, a consumer operating system that is designed to be on-line all the time. It does not feel like an operating system I would use to get work done.”
-
Now that everyone has had time to examine Windows 10, it seems like a good time to finally do a proper Windows vs. Linux showdown. After all, I waited until Windows caught up in turns of features and user interface. For the sake of common sense, I’ve decided to use Ubuntu as our default Linux release.
In this article, I’ll hammer out the features for both platforms and compare them accordingly. Each platform has its strengths and weaknesses, and this article will help to shed some light on each of them.
-
The icon theme of an operating system has more importance than people might imagine. Microsoft has updated the icons for the latest Windows 10 preview and they actually look terrible and they lack consistency. We listed a few Linux ones for a better comparison.
-
-
-
-
This morning, Dell has announced that their Developer Edition line of Linux-powered laptops is getting a pretty significant revamp. In addition to an upgraded XPS-13 Developer Edition based on Dell’s 2015 XPS-13 refresh, the line is adding a piece of workstation-class hardware: the Dell Precision M3800 mobile workstation, Developer Edition.
-
They said in working up hardware, they carefully designed the laptop “chip by chip” to work with open source software. The 4.4-pound laptop runs Linux. This is a GNU-based distribution, more specifically, the Trisquel GNU/Linux, “the strictest of distributions and strips all binary blobs from the Linux kernel.” At the same time, they said laptop owners, if they want, can easily install anything less strict, such as Debian and Ubuntu. The machine has a 15.6″ display in either 1920×1080 or 3840×2160 with a 60Hz refresh rate, 720p camera and HD Audio. It has a CD/DVD ROM drive. They used Intel Iris Pro Graphics 5200. It has a 48 Wh lithium polymer battery with about eight hours of usage.
-
Chromebooks, the lightweight, web-focused laptops from Google (GOOG) that ship with the mostly open source ChromeOS, have ironically not tended to play overly nicely with other Linux distributions. But now that’s changed, thanks to updates from Google that make it easier to boot and install any open source Linux operating system on the devices.
-
Server
-
A Finnish group of phone developers, hoping to get the world interested in modular smartphones, has proposed a nifty idea for re-using their phone motherboards: turn them into clusters.
-
Kernel Space
-
Linus Torvalds announced the release of Linux kernel version 3.18 in time for the holidays. In his mail, Linus noted that the previous RC, release candidate 7, had been “tiny” (in terms of changes and bugfixes), so it was time to get the final release out. The latest kernel includes support for storing AMD Radeon GPU buffers in regular application memory (building upon similar work done by Intel for kernel 3.16), and overlayfs (which we have covered previously), amongst a number of other less interesting new features. A full summary is provided at Kernel Newbies.
-
In the past few days when begining to deliver a number of initial Linux tests from Intel’s new Broadwell processors, a number of Phoronix readers have inquired about the OpenCL and VA-API support for the new hardware.
-
-
Benchmarks
-
Applications
-
-
Vivaldi is a new web browser based on Chromium / Blink, especially created for users who “have problems fitting all their open tabs on one screen”. The browser is developed by Vivaldi Technologies, whose chief executive and founder is John von Tetzchner, former Opera CEO and co-founder.
-
Pump.io is a “social server with an ActivityStreams API”. It’s from the same people that originally created StatusNet, which has now become GNU social. Pump.io servers are nodes in a federated social network: when you have an account on one, you can interact with others on that server, but also others with accounts on other pump.io servers. It’s free software, so you can host your own instance and connect to others, wherever their servers may be.
-
-
Proprietary
-
The Opera team has just released the first stable edition of the Opera browser in 2015 and the application is now at version 27 and change. A couple of new major features have been implemented and a ton of smaller fixes have been added.
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
Not everyone uses the Raspberry Pi while it’s hooked up to a monitor like a normal PC. Due to its size and portability, it can be located almost anywhere that it can be powered and it’s widely used as a file server, media centre and for other nontraditional applications. Some of these uses won’t easily allow access to a monitor for easy updates and maintenance. While you can always SSH in, it’s a bit slower than a full web interface that allows for custom commands and a view of the Pi’s performance. We’re using software called RaspCTL, which is still in development, but works just fine for now.
-
Wine or Emulation
-
Wine-Staging is the initiative to serve as a staging area for new Wine code not yet ready for proper mainline acceptance, inspired in part by the Linux kernel’s staging area. Wine-Staging has already landed the Direct3D CSMT patches for improving performance along with NVIDIA CUDA and GPU PhysX support, among other experimental functionality.
-
Games
-
-
-
Grim Fandango Remastered, a remake of the original Grim Fandango game developed by LucasArts, has been released for the Linux platform.
-
It was brought up today in the forums that it’s been three years of having a new LGP CEO while Linux Game Publishing’s website remains down for the better part of the year, their web presence is disappearing, and it simply doesn’t look like there’s a bright 2015 ahead for this one leading provider of games to Linux.
-
There wasn’t anything like Grim Fandango when it first came out in 1998. Nearly two decades later, there’s still nothing that comes close.
-
Homeworld Remastered is a collection of games that contains Homeworld Remastered Edition and Homeworld 2 Remastered Edition that have been released by Gearbox. Linux users are now trying to make enough waves so that the studio hears their plea for a port.
-
It’s quite hard to contain my excitement about this game, but as always we will give it a fair look and tell you what we think about Dying Light. This is not a full review, but a look at what you can expect with the game right now on Linux.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
-
-
The KDE Community announced that Plasma, the desktop for the KDE project, is now at version 5.2 and the developers have made a number of important changes and improvements.
-
The ever-amazing Plasma team from KDE just put out a new release of Plasma. I won’t spend much describing how big of an improvement it is – the release announcement at KDE has all the details needed to whet your appetite.
And of course, now it’s the turn of distributions to get out packages for the users at large.
-
-
Version 0.21 of the widely-used, GUI-based GNOME Partition Editor is now available.
GParted 0.21 key changes according to its developers include a fix for a off by one sector error with GParted’s internal block copy, support for EXT4 file-systems on RHEL/CentOS 5.x, and removing unnecessary duplicate actions when resizing a partition.
-
Reviews
-
The latest snapshot of this rolling release distribution includes initial support for UEFI, the KDE 4.14 desktop, systemd version 218 and the Qupzilla web browser. I mention Qupzilla because I feel it is a rare gem in the open source world, a quick capable browser that perhaps does not get the attention it deserves. KaOS is available in just one edition, a 64-bit x86 build. The ISO we download for KaOS is 1.6GB in size. x
-
New Releases
-
4MLinux is not your average Linux distribution, in fact it’s not really even a ‘single’ distribution in the usual sense either. There is an allinone edition and until this past week there were media, game, rescue, server and multiboot editions.
-
4MLinux Allinone Edition, a Linux distro that encompasses multiple tools for Maintenance (system rescue Live CD), Multimedia (e.g. playing video DVDs), Miniserver (using the inetd daemon), and Mystery (Linux games), is finally out of the Beta stages and has reached version 11.0.
-
Screenshots
-
Red Hat Family
-
Fedora
-
Hold on to your (red) hats. Fedora 22, the next iteration of the “move fast and break things” version of Linux sponsored by Red Hat, is set to arrive on May 19. After the multiple editions introduced in the previous Fedora, what’s in store this time?
The answer lies with the proposals received by the Fedora Engineering and Steering Committee (FESCo), whose deadline for proposed changes passed last week. Here are some of the more notable and head-turning proposals for Fedora 22 that seem most likely to make it to the final product.
-
For those experienced with Linux kernel development and looking for new employment, Red Hat is soliciting offers for a job working on maintaining Fedora’s kernel.
-
Fedimg’s EC2 service has matured quite nicely, and I’m confident that it will be quite helpful as we get closer to the Fedora 22 release date. Still, there’s more to do. After speaking with gholms in #fedora-cloud, I’ve realized that there will need to be at least six different AMI types created for each image. These six types can be seen in this section in the docs. This was a big reason for all the refactoring I did to the EC2 service for this new release — I needed to pave the way for registering each image as many different kinds of AMIs. The added multithreading will help with that, too. Because of the important role of EC2, adding support for these AMI types is probably higher priority than finally adding OpenStack support (a task I’ve been holding off on for some time now).
-
-
As you might have seen Paul blog about, Red Hat has an immediate opening for a Fedora kernel maintainer position on my team. This is actually a fairly rare thing, as we don’t have a lot of churn in our department and most of the engineering positions we hire for are primarily RHEL roles. If you have kernel experience and love working on fast-paced and frequently updated kernels, then this might be a good role for you.
-
Debian Family
-
It is hard to see the direction Devuan will take, given that the project is still in its early days. The new community could create a shallow derivative, or it could fork the entire Debian archive. Another option is to try replacing Debian entirely and become a new gateway between upstream projects and users of all packages, which would require a lot more manpower and infrastructure.
-
Unity 8 for Ubuntu is coming along and Mir is also making good progress. One of the byproduct of all these improvements is that some of the apps that are designed for the Ubuntu Touch are also working on the Ubuntu desktop, with very little help.
-
About a year and a half after I started writing the openstack-debian-images package, I’m very happy to announce to everyone that, thanks to Steve McIntyre’s help, the official OpenStack Debian image is now generated at the same time as the official Debian CD ISO images. If you are a cloud user, if you use OpenStack on a private cloud, or if you are a public cloud operator, then you may want to download the weekly build of the OpenStack image from here:
-
Derivatives
-
Canonical/Ubuntu
-
In the meantime, even if Meizu was the first company to confirm the release of an Ubuntu phone, it looks like Bq beat them to the punch, although they are aiming at different users. The specs detailed by Canonical show that Aquarius E4.5 is an affordable device with medium hardware specs. It doesn’t seem like much, but it’s addressed at people who don’t want to spend too much on a high-end phone, but still want to own a smartphone.
-
-
Mobie is a new kind of 2-in-1 tablet developed in Finland that is capable to dual-boot Ubuntu 14.04 LTS and Windows 8.1. It’s being launched in a couple of months and it already looks very good, at least on paper.
-
-
Eurotech’s “CPU-351-13″ SBC runs Linux on Freescale’s i.MX6 SoC, and offers ZigBee, GPS, extended temperature operation, remote IoT management, and more.
-
Axiomtek announced a rugged, Linux-friendly box PC based on a quad-core 2GHz Celeron SoC, and featuring multiple display outputs, serial ports, and PCI slots.
-
Smart Electronics is prepping a tiny $26 open-source “Black Swift” SBC that runs OpenWRT on an Atheros AR9331 and offers WiFi, dual micro-USB, and header I/O.
-
Variscite unveiled a Linux-friendly, SODIMM-style COM based on TI’s Sitara AM437x, supporting the updated SoC’s quad-core Programmable Real-time Unit (PRU).
The VAR-SOM-AM43 is the first computer-on-module we’ve seen to use the Texas Instruments Sitara AM437x, a single-core Cortex-A9 system-on-chip that clocks to 1GHz. Last month, Adeneo announced an Android 4.4 BSP for TI’s Sitara AM437x development platform. Variscite is supporting its VAR-SOM-AM43 with a Yocto Linux, and soon, Android-ready hardware/software development kit of its own, which includes a VAR-AM43 CustomBoard development board, touchscreens, cables, and more
-
Android continued, in the Q3 2014, to dominate the market according to IDC, having gained 84.4% of the market by the end of the quarter, compared to 81.2% for the same period in 2013.
-
Phones
-
Android
-
The Australian video on demand market kicked things up a notch over the Australia Day long weekend, with both the official launch of StreamCo’s Stan service and Foxtel turning on Android tablet support for Presto.
-
-
-
-
-
Cyanogen Chief Executive Kirt McMaster is taking the first shot in a revolt against Google.
The startup wants to make Android a completely open platform, according to Android Authority.
“We’re attempting to take Android away from Google,” said McMaster, during The Information’s “Next Phase of Android” event in San Francisco on Thursday evening.
-
The iPhone has always been, the consensus goes, the rich man’s phone. iOS customers earn more than Android users. They spend more on apps and on in-app purchases. And advertising rates are higher.
-
Google and Core Security are at odds over the severity of a vulnerability affecting a number of Android mobile devices, details of which were released by the security vendor today.
-
The first modular smartphone kit to arrive under the Project Ara banner should be launched later this year. While we wait on the big occasion, we thought you’d like to know that developers are working on the modules that will actually let you achieve device customization.
-
Android and iOS will forever be a battle in the mobile industry. As long as Apple keeps making devices and Google maintains Android, there will be battle to have. But there are some key features that Android 5.0 Lollipop has that iOS wishes it had. Welcome to our 7 Reasons why Android 5.0 Lollipop is better than iOS 8!
-
A bundled microSD card arrives preinserted into the rear of the CuBox-i, and it’s loaded with a version of Google’s Android operating system. Interestingly, SolidRun has gone to the effort of seeking the certifications required to load the Google Apps suite onto the card, meaning users receive Google Mail, YouTube, Google Maps and full access to Google Play straight out of the box. An even newer build, based on the latest Android 4.4 KitKat branch, can be downloaded from SolidRun’s website and provides an entirely useable desktop Android experience.
-
APUS Group, a seven-month-old Chinese company that develops Android utility apps for the global market, has confirmed that it has raised $100 million in new funding. The company’s Series B round, word of which got out in China earlier this month, will be used to develop new services and grow its reach in global markets like the U.S., Brazil, India and Russia.
-
We spend a lot of time talking about Lollipop and OS-level issues with Android — but you know what’s just as important as the operating system on your phone or tablet? The apps that surround it.
The right apps can make your device easier and more enjoyable to use. They can give it powers you didn’t know were possible. They can make it feel like your own custom-tailored gadget — whether you’ve been using it for two minutes or for two years.
-
As concerns for privacy and data security accompany the use of free cloud services, users and small businesses might be better served by installing the open source package ownCloud.
-
IT professionals are expected to move away from proprietary to open source software in 2015, according to new research.
A survey by Ponemon Institute and Zimbra shows 67 per cent of EMEA IT professionals agree that commercial open source software offers better business continuity.
74 per cent in the US also agree open source is better for business continuity, compared to propriety software.
-
NIST has partnered with the private sector to develop the next-generation open source control software for quantum information systems.
-
-
-
Online torrent repository IsoHunt has launched a $100,000 (£66,000) competition to encourage open-source development of The Old Pirate Bay, the popular torrent site set up in the wake of The Pirate Bay’s shutdown.
The unprecedented move to offer prize money will mean that an open-source community will be responsible for developing the site rather than a closed team, therefore making the site more difficult to take down.
-
One of the Achilles heels of administrators of Big Data and cloud computing deployments is that disk/server failure rates occur on up to 10 percent of systems annually. That failure rate calls for data replication strategies and use of services for replication.
-
Inkscape similar to Adobe Illustrator, Corel Draw, Freehand, or Xara X is an Open Source, free and uses the W3C SVG file-format as its native file format. The latest stable version is 0.48.5 that was released last year. The app is very nice and easy to use.
-
Events
-
When I look back at my years working in open source, I realize how much conferences have helped my career. Back when I was an editor at Linux Pro Magazine, I met dozens of writers in person at conferences, which almost always improved our working relationships, and I recruited countless new and first-time authors. Watching other speakers and then meeting them after their sessions helped inspire me to get past my stage fright (with a dash of imposter syndrome) and start speaking at events. I’ve also forged friendships at conferences that are now almost as old as my career. And I’ve met more than one person who ended up being a future employer.
-
Guix will be present at FOSDEM in Brussels, Belgium, with a talk entitled “The Emacs of Distros” this Saturday, at 3PM, in room H.1302.
-
-
SaaS/Big Data
-
Networking is an important part of any modern datacenter. As open source continues to grow in virtualization solutions, virtualized networking is an important part of the picture. MidoNet, an open source network virtualization platform for Infrastructure-as-a-serivice (IaaS) clouds like OpenStack cloud software, is gaining traction as a way to implement networking solutions.
-
Oracle/Java/LibreOffice
-
Two companies have started working on a full-featured version of the free office suite LibreOffice for Android. They hope to have a beta version available in March.
-
Business
-
BSD
-
Project Releases
-
Subsonic is a nice free, multi-platform web based media streamer, make large collection of music handling easy. You can share music with your frineds or stream your favorite music anywhere. You can stream to multiple players simultaneously.
-
Public Services/Government
-
While Smith’s characterization of Washington as “incredibly entrepreneurial” may be a tad optimistic, she did appear sincere in her support for promoting the use of open source development, and introducing a culture of “APIs, not RFPs.”
Echoing a mantra of executives at Google X, Smith also expressed a desire to find ways for the government to exhibit the sort of technological prowess that normally occurs only in wartime. She also emphasized that she and her deputy, former Twitter lawyer Alex Macgillivray, want to reduce the sort of regulatory morass that can inhibit innovation.
-
Openness/Sharing
-
Open Access/Content
-
Open Hardware
-
LaChappelle, from Colorado, taught himself robotics after meeting a 7-year-old girl at the state science fair who had a prosthetic arm that she told him cost $80,000. He’s refined his technique since he built his first prosthetic arm (with LEGOs, no less), combining 3D printing and open-source software to allow others to download and work with his designs.
-
Makers, developers and hobbyists that have considered adding advanced machine vision to their project may be interested in a new small affordable and expandable development board called the OpenMV Cam.
-
Boom Boom personal home speaker adds 3D recording capabilities, ups its long-term value
-
-
Programming
-
We’ve all heard about big data; over the past few years, many companies have invested in Hadoop, NoSQL, and data warehouses, to collect and store massive volumes of new data. Even when based on open source platforms like Hadoop, these investments can easily measure in the millions of dollars for large companies with new hardware, new staff, and untold person-hours spent implementing new systems and procedures.
-
As a result, Finland’s government has invested heavily in the country’s startup scene, resulting in some major post-Nokia success stories such as billion dollar startups Rovio and Supercell.
-
Security
-
The Lizard Squad hackers’ group has claimed responsibility for Tuesday’s outage on Facebook and Instagram. Facebook officials, however, denied it was a hack attack, saying it occurred after they introduced a change affecting configuration systems.
-
Today we released Plasma 5.2 and this new release comes with two fixes for security vulnerabilities in our screen locker implementation. As I found, exploited, reported and fixed these vulnerabilities I decided to put them a little bit into context.
The first vulnerability concerns our QtQuick user interface for the lock screen. Through the Look and Feel package it was possible to send the login information to a remote location. That’s pretty bad but luckily also only a theoretical problem: we have not yet implemented a way to install new Look and Feel packages from the Internet. So we found the issue before any harm was done.
-
-
-
Transparency Reporting
-
Incident happened almost three years ago but gag order on Google kept the search giant silent
Google handed over data belonging to WikiLeaks to the US Government, but was not allowed to tell the group for almost three years.
-
Environment/Energy/Wildlife
-
Finance
-
A “profiteering” care agency took hundreds of pounds from low-paid carers who were desperate for work, a BBC London investigation has found.
HCA Professionals, based in Barking, east London, promised carers jobs if they paid for unnecessary and “highly unprofessional” training.
Criminal record checks were charged for but not submitted and work did not materialise, but cash was not returned.
The company, run by Chris Rigland, denies all wrongdoing.
-
Witte ends his article with Greek economist George Pagoulatos warning that Syriza’s voters “are not ready to accept the kind of compromise that the situation requires.” Witte describes Pagoulatos as “a former government adviser,” but doesn’t note that the governments he advised presided over some of the worst economic performance in Greece’s history, from November 2011 to June 2012. Perhaps voters might be forgiven for being skeptical of the benefits of the kind of compromises that Pagoulatos thinks are required (Beat the Press, 1/25/15).
-
PR/AstroTurf/Lobbying
-
The race for Rupert Murdoch’s endorsement is on as potential presidential candidates line up to seek political support from the owner of Fox News and The Wall Street Journal.
Murdoch has long been a major political player whose media companies play a substantial role shaping the debate. Last year he declared that Fox News had “absolutely saved” the Republican Party by giving “voice and hope to people who didn’t like all that liberal championing thrown at them on CNN.” Prominent politicians on the national and international stage regularly seek out Murdoch’s opinion and approval.
-
The political network organized by Charles and David Koch plans to spend an incredible $889 million to capture the White House in 2016 and deepen the Koch party’s bench in Congress. But that’s not what they’ll tell federal regulators.
-
Censorship
-
The BBC has learned that Facebook has complied with a Turkish court order demanding the blocking of a page it said offended the Prophet Muhammad.
If the social media platform had refused, the court had threatened to block access to the entire site.
The site is believed to have around 40 million members in Turkey.
-
TalkTalk says customers who have not yet chosen whether to activate net filters must opt out of its safety system if they wish to continue viewing adult material online.
-
Privacy
-
The Drug Enforcement Administration has initiated a massive national license plate reader program with major civil liberties concerns but disclosed very few details, according to new DEA documents obtained by the ACLU through the Freedom of Information Act.
The DEA is currently operating a National License Plate Recognition initiative that connects DEA license plate readers with those of other law enforcement agencies around the country. A Washington Post headline proclaimed in February 2014 that the Department of Homeland Security had cancelled its “national license-plate tracking plan,” but all that was ended was one Immigrations and Customs Enforcement solicitation for proposals. In fact, a government-run national license plate tracking program already exists, housed within the DEA. (That’s in addition to the corporate license plate tracking database run by Vigilant Solutions, holding billions of records about our movements.) Since its inception in 2008, the DEA has provided limited information to the public on the program’s goals, capabilities and policies. Information has trickled out over the years, in testimony here or there. But far too little is still known about this program.
-
WikiLeaks is fighting back in an escalating war with both Google and the US government, threatening legal action the day after demanding answers for the tech giant’s wholesale handover of its staffers’ Gmail contents to US law enforcement.
The targets of the investigation were not notified until two and a half years after secret search warrants were issued and served by the FBI, legal representatives for WikiLeaks said in a press conference on Monday.
-
President Cristina Fernandez plans to disband Argentina’s intelligence agency amid suspicions that rogue agents were behind the mysterious death of a state prosecutor investigating the 1994 bombing of a Jewish community center.
In her first televised address since Alberto Nisman was found dead with a single bullet to the head, Fernandez said on Monday night she would send Congress a bill creating a new security body that would be more transparent.
-
The TSA is disappointed that so few Americans have opted out of its bottle-tossing, package-groping screenings by signing up for its PreCheck program. For a few years now, the TSA has been selling travelers’ civil liberties back to them, most recently for $85 a head, but it’s now making a serious push to increase participation. The TSA can’t do it alone, so it’s accepting bids on its PreCheck expansion proposal.
-
Here is a very short summary of the surveillance discussion in Finland.
Ministry of Defence of Finland published a report that proposes internet intelligence activities. The problem is that they also propose (Swedish FRA style) MITM to cross-border communication.
-
The government released two new FISC opinions this evening, both of which concern the transition of NSA surveillance to the oversight of the FISC in 2007. Neither of the two documents, available here and here, is the Raw Take order or the 2008 FAA order. The government has one additional production deadline in this case on March 2, 2015.
-
Yesterday’s Lords debate ended up with the future of the Snooper’s Charter amendments uncertain, after considerable criticism of both the process and the principle of reintroducing the Communications Data Bill into the Counter Terrorism and Security Bill. Further debate on the amendments may come back at the report stage of the Bill.
-
We have a problem when it comes to stopping mass surveillance.
The entity that’s conducting the most extreme and far-reaching surveillance against most of the world’s communications—the National Security Agency—is bound by United States law.
-
Europe’s top rights body has said mass surveillance practices are a fundamental threat to human rights and violate the right to privacy enshrined in European law.
The parliamentary assembly of the Council of Europe says in a report that it is “deeply concerned” by the “far-reaching, technologically advanced systems” used by the US and UK to collect, store and analyse the data of private citizens. It describes the scale of spying by the US National Security Agency, revealed by Edward Snowden, as “stunning”.
-
The Justice Department has been building a national database to track in real time the movement of vehicles around the U.S., a secret domestic intelligence-gathering program that scans and stores hundreds of millions of records about motorists, according to current and former officials and government documents.
-
Civil Rights
-
A decade ago, 1,500 Holocaust survivors traveled to Auschwitz to mark the 60th anniversary of the death camp’s liberation. On Tuesday, for the 70th anniversary, organizers are expecting 300, the youngest in their 70s.
-
About 300 Auschwitz survivors have gathered at the site of the former Nazi death camp to mark the 70th anniversary of its liberation.
The commemoration will be held at the site in southern Poland where 1.1 million people, the vast majority Jews, were killed between 1940 and 1945.
It is expected to be the last major anniversary event that survivors are able to attend in considerable numbers.
[...]
On the eve of the anniversary, German Chancellor Angela Merkel drew attention to discrimination against Jews in contemporary Europe, saying it was a “disgrace” that Jews faced insults, threats and violence in Germany.
“We’ve got to fight anti-Semitism and all racism from the outset,” she said at a memorial event in Berlin.
“We’ve got to constantly be on guard to protect our freedom, democracy and rule of law.”
-
Jesselyn Radack, a Justice Department whistleblower, attorney and director of the Government Accountability Project’s National Security and Human Rights Division, reacted, “It is a new low in the war in whistleblowers and government hypocrisy that CIA whistleblower Jeffrey Sterling was convicted in a purely circumstantial case of ‘leaking.’ It shows how far an embarrassed government will go to punish those who dare to commit the truth.”
-
The conviction is a significant victory for the Obama administration, which has conducted an unprecedented crackdown on officials who speak to journalists about security matters without the administration’s approval. Prosecutors prevailed after a yearslong fight in which the reporter, James Risen, refused to identify his sources.
-
A former CIA officer was convicted Monday of leaking classified details of an operation to thwart Iran’s nuclear ambitions to a New York Times reporter.
Read more: http://www.washingtontimes.com/news/2015/jan/26/deliberation-to-reach-third-day-in-cia-leak-case/#ixzz3Q1X5Pwhm
Follow us: @washtimes on Twitter
-
I’m not surprised the jury found Sterling guilty of some of the charges: of leaking Risen information on Merlin and the operation he was involved in, and of retaining and then leaking Risen a document involved in that. The government multiplied the charges for both the 2003 New York Times story (at which point, Sterling and Risen had only spoken for two minutes and 40 seconds) and the 2006 book (by which point they had had more lengthy discussions), such that each leak amounted to multiple charges. In addition, the jury convicted Sterling of passing government property worth over $1,000, and of obstruction of justice.
-
Also this week, reports emerged showing that a Mexican mayor ordered a cop to kill a journalist he didn’t like; the “officer said they decapitated the journalist, mutilated his body and abandoned it in a ravine.” The journalist and social justice activist had been reporting about government corruption and killings. Now he’s dead and so cannot report on his own death at the hands of his government.
-
British citizen and investigations editor of Wikileaks, Sarah Harrison, has had all her emails and digital data handed over to the US government by Google. It took two and a half years to provide the details and the delay has potentially limited her ability to challenge the communications data grab.
-
Google’s willingness to surrender the private emails of WikiLeaks staffers to the United States government amounts to an “attack on journalism,” a representative for the whistleblower group says.
Kristinn Hrafnsson, an Icelandic journalist who joined WikiLeaks as the group’s spokesman in 2010, said he’s “appalled” that Google gave up his personal correspondence and other sensitive details to the US government in compliance with a search warrant served to the tech giant, apparently in an effort to bring charges against the anti-secrecy organization and its editor, Julian Assange.
-
A single rose was left in front of the Longview police station on Cotton Street in memory of the teenager shot Thursday night.
Investigators say the woman, identified as Kristiana Cognard, 17, of Longview, walked in the front doors of the empty lobby and made her way to the after-hours assistance phone.
“We don’t know how she got here,” said Longview police officer Kristie Brian.
After hours the police lobby is closed and all the windows are shut down. Police say Coignard came up to the courtesy phone and was connected to dispatch who then sent officers out to her.
-
Internet/Net Neutrality
-
We Are Social report shows 20 percent increase in broadband Internet users throughout 2014
-
If you’ve been a Techdirt reader since the days of SOPA/PIPA, you probably know that Namecheap is a big supporter of a free and open internet, and was one of the first registrars to speak out against the bills. More recently, they’ve been big supporters of Techdirt directly, providing matching funds to our crowdfunding campaign for net neutrality reporting and sponsoring our sitewide switch to HTTPS. In October, they were one of only two companies that got a perfect score on the EFF’s ranking of service providers that stand up to copyright and trademark bullies, and many of us here at Techdirt use them for all our personal domain registration needs.
-
Intellectual Monopolies
-
Copyrights
-
Say goodbye to the musical hits of the 50s and 60s, if you like that sort of thing and listen via online services. Chances are they may start to disappear, as the places where you now get your streaming music realize they need to protect themselves against a possible massive liability. As we’ve covered for some time, there have been a few lawsuits filed recently over the licensing status of pre-1972 sound recordings. There’s a lot of history here, but a short explanation is that in 1909, when Congress redid copyright law, it didn’t think that sound recordings (then a relatively new concept) were copyrightable subject matter. Of course, in the years following that, as the “music business” turned into the “recording industry” pressure mounted by that industry led to a bunch of state regulations and common law creating copyright or copyright-like rights for sound recordings.
Permalink
Send this to a friend
01.26.15
Posted in Deception, Free/Libre Software, Microsoft at 6:04 pm by Dr. Roy Schestowitz
Summary: Brainwash war is still being waged by Microsoft and its friends to convince people that Windows is universally dominant and that Microsoft is now part of the Free software world
ALONG with the measurable decline of Windows (GNU/Linux is rapidly gaining) comes the "Vista 10" publicity stunt -- an attempt to bury bad news. Microsoft tries to scare and distract the competition, bamboozling the whole world with what is essentially vapourware. It’s just a PR campaign and Microsoft enlisted many boosters to play along. Microsoft even got them to deceive the public into thinking that Vista 10 is ‘free’, but as this new rebuttal puts it, “I had to laugh aloud at Microsoft’s announcement that Windows 10 would be offered as a free upgrade for users of both Windows 7 and Windows 8.”
Vista 10 is not ‘free’ (we already explained why) and it is moreover proprietary. It seems as though even some FOSS bloggers (including FOSS Force above) fell for the lies. There are things even worse than these lies which were perpetrated by Microsoft and propagated by Microsoft-friendly media. Pogson’s “Some Twits Just Are Too Funny To Ignore” and Lynch’s “Windows 10 doesn’t matter to desktop Linux” are basically feeding the latest troll (with a history doing this type of flamebait against Free software). Elsewhere on the Web, Steven J. Vaughan-Nichols is playing Chamberlain by going along with the latest openwashing of Microsoft and Sam Dean doing some more Microsoft promotion (of proprietary software) in an Open Source news site.
Whatever is happening right now comes to show that Microsoft’s propaganda is so far-reaching that even FOSS people are confused by it and they are eager to sometimes repeat the lies from Microsoft (nonsense like “Microsoft loves Linux”). If Microsoft is allowed to take over the media like this, then we are in serious trouble and Microsoft will be able to infiltrate the competition with Mono, OOXML, etc.
In recent years we have shown many examples where Microsoft and Gates essentially bribed many news sites in order to achieve mind control, revisionism, and demonisation of competing ideologies or companies. To give one new example of this disturbing trend, The Verge makes Bill Gates its editor next month (direct influence with no need to bribe them like the rest of the news outlets). This helps explain why site has become somewhat of a Microsoft mouthpiece.
If people do not stand up for what’s true, the perceived truth will become a reality in the minds of the prey. █
“Mind Control: To control mental output you have to control mental input. Take control of the channels by which developers receive information, then they can only think about the things you tell them. Thus, you control mindshare!”
–Microsoft, internal document [PDF]
Permalink
Send this to a friend
Posted in Finance, Microsoft at 5:41 pm by Dr. Roy Schestowitz
Summary: After the infamous IRS brawl comes another confrontation between Microsoft and the SEC, which is unhappy with Microsoft for seemingly cooking the books again
AS OUR longtime readers may know, Microsoft’s financial fraud is a good example of how certain companies with strong government connections essentially exist above the law. According to this new SEC correspondence (regarding filings), Microsoft tricks — same ones as those we have covered here for years — upset the regulators. Robert Pogson has already written about it and it comes at a time when Microsoft is under investigation by the IRS too. “I’ve been reporting that for years now and the SEC is concerned that investors may not be getting the full story because of the layout and detail of Microsoft’s filings,” he wrote.
Microsoft got caught by the SEC even in the 1990s, whereupon it bribed the whistleblower to escape true accountability. It’s a “too big to jail” scenario. Microsoft’s financial practices have historically reaffirmed its status as a criminal, corrupt entity. Perhaps we are going to see more of that in months or years to come. Perhaps not, assuming Microsoft can pull some strings inside the government (with moles or nepotism, like those who help the Microsoft dodge tax). █
Permalink
Send this to a friend
Posted in News Roundup at 4:54 pm by Dr. Roy Schestowitz

Contents
-
Desktop
-
ACER, for instance, is even diversifying ChromeBooks, cranking out small, medium and large sizes.
Meanwhile, Qualcomm is rumoured to be shipping a 14nm, 8-cored, LPDDR4 RAMed monster “for mobiles”, and other processors with clocks in the 2-2.5gHz range, in late 2015. If you don’t think desktops/notebooks/tablets/smartphones will all shine with such power, you are living in a deep hole. OEMs will find a way to integrate ARM into every aspect of IT. We are no longer living in a time when */Linux or ARM were just “barely good enough”. They are perfect for many purposes. Consumers want them. OEMs will supply them. Shipped by the millions, these new solutions will cost much less than Wintel’s monopolistic prices.
-
It’s been a long time since Canonical’s Ubuntu Linux has made big headlines in the education market. Thanks to Intel (INTC), however, the open source operating system may soon have a new presence in classrooms as part of the Intel Education Content Access Point.
-
-
Server
-
NI (Nasdaq: NATI), the provider of solutions that enable engineers and scientists to solve the world’s greatest engineering challenges, announced a collaboration with CERN, an intergovernmental research organization building the world’s largest and most advanced scientific instruments. The objective is to push the standardization of all CERN control systems to Linux 64-bit OSs, with goals to boost system performance, design cost-effective distributed control systems and enlarge opportunities for small and medium enterprises with expertise in NI and open-source technologies.
-
Kernel Space
-
One more rc released today shortening time period for the final release. Each release sees a new changes and fixes and this one is slightly smaller but as always better.
-
-
The shortlog gives kind of a detailed summary for people who want to get a flavor of what was going on. Nothing really particularly stands out.
-
A new Release Candidate for Linux kernel 3.19 has been released by Linus Torvalds and the branch moves a little bit toward stable version. It’s still a few weeks off, but everything should go according to plan.
-
The latest 3.18-trunk kernel fixes essentially all the above problems, which is just great.
-
Graphics Stack
-
The election process is beginning for selecting new X.Org Foundation board members and for allowing X.Org members to vote on whether they would like to proceed with joining SPI to become a sub-project of that organization so that they’ll take care of the business and administrative tasks.
-
While the Nouveau pull request has yet to be issued for the DRM-Next merge window that will ultimately target the Linux 3.20 kernel, a look at the changes so far appear to mostly indicate this open-source NVIDIA driver is just going through a period of code cleaning and reorganization.
-
Benchmarks
-
Back in September AMD announced new FX CPUs that included the FX-8370, FX-8370E, and FX-8320E. Back then we reviewed the FX-8370/FX-8370E CPUs under Linux but at the time didn’t have our hands on the more affordable FX-8320E processor. In December AMD sent over the FX-8320E and so for the past few weeks I’ve been happily using this new Vishera CPU.
-
The third-generation Lenovo ThinkPad X1 Carbon continues running well under Linux with its new Intel Core i7 5600U “Broadwell” processor sporting HD Graphics 5500. I’m enjoying this new ultrabook a lot and have been pushing it very hard for days with various Linux benchmarks.
-
-
Applications
-
Image speaks itself. gimp-paint-studio package just got an metainfo needed for Gnome Software Center as add-on for Gimp based on related Richard Hughes’ blog. The updated package will be shortly available in Rawhide and also in Fedora 21 updates-testing repository. It will not be included for Fedora 20 due to the preview release of Gnome Software lacking addons support. Next step will be contacting upstream adding that metainfo. Hopefully other add-ons maintainers for applications such as Inkscape and Blender will do the same to bring a richful experiences to users.
-
CD audio grabbers are designed to extract (“rip”) the raw digital audio (in a format commonly called CDDA) from a compact disc to a file or other output. This type of software enables a user to encode the digital audio into a variety of formats, and download and upload disc info from freedb, an internet compact disc database.
-
-
Instructionals/Technical
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
In loosely related news, this old status is still valid. UMTS is stable-ish now but even though I saved the SIM’s PIN, KDE always displays a “SIM PIN unlock request” prompt after booting or hibernating. Once I enter that PIN, systemd tells me that a system policy prevents the change and wants my user password. If anyone knows how to get rid of that, I would also appreciate any pointers.
-
I have built RPM packages of some KDE applications frameworks branch, such as Konsole, Dolphin which are available in my copr. It is based on the Plasma-5.2 beta copr from Dan Vratil, you’d need to enable it first to pull dependencies. Packages are available for Fedora 20 and 21, i686 and x86_64 architectures.
-
-
Evolve OS, a new Linux distribution built from scratch that’s using a fresh desktop environment called Budgie, has been upgraded to version Beta 1 and is now ready for testing.
-
New Releases
-
MakuluLinux Xfce 7.1 has been released, please click here to read the updated release notes and download links, or head to the Xfce section in menu above.
-
IPFire 2.15 Core 86, a new version of the popular Linux-based firewall distribution, has been announced by Michael Tremer and users have been advised to upgrade their systems as soon as possible.
-
Arch Family
-
Manjaro Xfce, a Linux distribution based on well-tested snapshots of the Arch Linux repositories and 100% compatible with Arch, has been upgraded 0.8.12 RC1 and is now ready for testing and download.
-
Red Hat Family
-
Red Hat Inc (NYSE:RHT) traded on a positive note gaining 0.14 points or 0.21% to be valued at $66.06 per share. Intraday, the counter aggregated $13.56 million in upticks but saw an exodus of $21.56 million in downticks. The net money flow was calculated to be $(-7.99) million with the final up/down ratio coming in at 0.63. The share price has seen a change of 1.33% in value during the week. Short-term market participants should take the above data into consideration before taking a call in the counter.Block trade of up/down ratio of 0 was also registered with $0 million in upticks and $6.85 million in downticks. The net money flow for the block exchange was disappointing at $(-6.85) Million.
-
Debian Family
-
The Debian 7.8 “Wheezy” Live CD has been released by the developers and it arrives just a couple of weeks after the installable version was made available.
-
The first release candidate for the Debian Jessie Installer in leading up to the Debian 8.0 “Jessie” release.
While some Debian developers were hoping to release Debian 8.0 before February, it doesn’t look like that will pan out given that the first release candidate of the installer surfaced today.
-
-
Derivatives
-
Canonical/Ubuntu
-
The latest big feature landing in Ubuntu’s Mir display server by Canonical is server-side platform probing support, which landed just before the weekend.
-
Compiz was implemented by default in Ubuntu MATE 15.04 Alpha 2 and the developers have decided to put in some extra effort and make it available for Ubuntu MATE 14.10 and Ubuntu MATE 14.04 LTS, albeit it’s still under testing.
-
-
Chromecast has largely caught on as a way to easily use services like Netflix on your computer. MatchStick is an open source HDMI stick for everyone who wants to use there TV for more than just watching movies.
-
Phones
-
Tizen
-
A few months ago our US Senior Editor Andrew Grush offered his praise of the Moto 360, having spent a month with it. Despite the quality of the writing itself, I took issue with the core of the content: that Android Wear is a suitable platform for wearables. I have to disagree, at least as things now stand. Android Wear seems fundamentally broken due to its being chained to Google Now and a smartphone, something not so true of Samsung’s Gear products, which run on Tizen.
-
Android
-
A while ago we talked about the BLOCKS modular smartwatch platform, which is built according to rules similar to Google’s Project Ara, an initiative that aims to build a smartphone made out of swappable modules.
-
-
Cyanogen is one of the most popular open source Android variants, running on the OnePlus One and and available for all to tinker with on their own phone.
But CEO Kirt McMaster has bigger plans. He hopes to build it into a full-fledged Android rival with its own app store and a more “open” structure that recalls the early days of Android.
-
Sony is both early to the smartwatch game, and late at the same time. The SmartWatch 3 puts aside some of the lessons of Sony’s previous wearables, but manages to learn some valuable lessons from the competition.
-
GOOGLE’S LATEST ANDROID mobile operating system is incredibly powerful. Many of us don’t come close to touching its potential capabilities.
-
Google’s compatibility definition document (CDD) is meant to provide guidelines, requirements, and recommendations to Android device manufacturers who want their devices to be “compatible” with the latest release of Android, allowing them to pass Google’s Compatibility Test Suite.
-
When will your phone get Android Lollipop? The final version of Android 5.0 Lollipop was unveiled only in October, yet Android 5.1 Lollipop is rumoured to be on its way. Here’s what you need to know about Android Lollipop’s release date, design and new features – plus when your phone will get the upgrade. Also see: When will my phone get Android Lollipop?
-
Proud (or otherwise) owners of the Samsung Galaxy S5 are lucky enough to be among the first ones with Samsung phones to get Android 5.0 Lollipop on a carrier device. The update has started rolling out about a week ago, and people all over the world, except in America, are reporting that the OTA is hitting their phones. Good for you! It seems that only European and some Asian countries are getting the Galaxy S5 Android Lollipop update as of yet, but that means that the U.S. should follow soon.
-
Android is the most popular operating system in the world, but can it be freed from Google’s clutches? Android Authority reports that Cyanogen CEO Kirt McMaster last week spoke at a special event dedicated to the “Next Phase of Android” and he revealed that his company has a plan to decouple Android from Google and make it the truly open-source mobile platform the world has been waiting for.
-
NIST is a world leader in quantum information research, harnessing the strange properties of quantum mechanics (nature’s instruction book for atoms, photons, and other microscopic systems) to vastly improve computational power, make secure communications systems, and affect many other applications. Quantum information products are already coming to market, with much greater impacts expected in the future.
-
Our team celebrated during an afternoon last week that focused on the growth our readership has seen since 2010, but most importantly, an afternoon that recognized the tremendous work of the publication’s Project Lead and Community Manager, Jason Hibbets.
-
Here, I’ve compiled a list of 30 community managers in open source you should follow on Twitter. All of them have tremendous experience. And there’s a good chance, if you’re going to this year’s Community Leadership Summit, you’ll get to meet many of them in person.
-
By my observation, the demand for people in open source is at an all-time high. Open source technologies such as programming languages, libraries, and tools are now mainstream. Participating in an open source community can help you learn those tools, and when you go on job interviews you can not only discuss your shiny new degree, but you can point to things you’ve actually done that made a difference.
-
Events
-
Coreboot now has support for the “Tegra132″ 64-bit Denver NVIDIA Tegra SoC as well as a new Google Chromebook that’s codenamed “Rush” and using this NVIDIA ARMv8 platform.
-
Web Browsers
-
Mozilla
-
Two weeks after the release of Firefox 35, the Mozilla devs have pushed the first update out the door and they have fixed a number of important crashes and various other problems.
-
SaaS/Big Data
-
Still. the competition going on between the remaining players is fierce, and it is becoming increasingly clear that security may be a giant differentiator in the OpenStack race. In fact, Red Hat’s Vice President of Customer Engagement and Experience, Marco Bill-Peter, recently made that issue plain in a blog post.
-
Public Services/Government
-
Open source should win. This type of software is more reliable, more stable and provides more flexibility than proprietary software, says João Marcelino, an engineer working for Laboratório Nacional de Engenharia Civil (National Laboratory for Civil Engineering, LNEC), a state-owned research and development institution. On top of that, the software lets organisations inspect and audit the code without restriction.
-
Openness/Sharing
-
-
Open Hardware
-
Learn basic principles in electronics design with the Arduino Beginner Course. Dubbed as the world’s greatest open-source electronics platform, Arduinos are microcontrollers that make the creation of interactive electronic devices accessible to everyone. This course is so easy to understand, you don’t even need to have any prior experience with electronic design or building to excel at it.
-
With women accounting for only a fraction of people studying computer science, there have been calls for gender-related quotas for IT roles.
-
U.S. technology professionals earned an average salary of $89,450 last year, up two percent from 2013, according to IT jobs portal Dice’s annual salary survey.
-
Security
-
David Cameron has said a hoax call he received from someone claiming to be taking part in a high level conference call, did not “breach security”.
-
-
It is a sign of the times that the Speaker of the House of Commons – not the first person that comes to mind as being part of the digital age – has established a Digital Democracy Commission to look into ways to re-imagine democracy for the connected world. With one important exception – that concerning online voting – its recommendations are sensible and to be welcomed. What follows is a selection of some of the more relevant areas for the world of openness.
[...]
For what it is worth, this is my view too, and I regard it as deeply regrettable that an otherwise welcome report should choose to ignore such a clear and strongly-worded warning to avoid online voting completely until its many problems are sorted out. In particularly, setting a specific and imminent date for its introduction is premature and extremely foolish. I hope others join me in urging the authorities to ignore this particular recommendation, while accepting the others.
-
Transparency Reporting
-
The alleged offences are:
Espionage: 18 U.S.C. § 793(d) – imprisonment up to 10 years
Conspiracy to commit espionage: 18 U.S.C. § 793(g) – imprisonment up to 10 years
The theft or conversion of property belonging to the United States government: 18 U.S.C. § 641 – imprisonment up to 10 years
Violation of the Computer Fraud and Abuse Act: 18 U.S.C. § 1030 – imprisonment up to 10 years
(general) Conspiracy: 18 U.S.C. § 371 – imprisonment up to 5 years
-
The outrageous legal attack on WikiLeaks and its staffers, who are exercising their First Amendment rights to publish classified information in the public interest—just like virtually every other major news organization in this country—is an attack on freedom of the press itself, and it’s shocking that more people aren’t raising their voices (and pens, and keyboards) in protest.
-
The United States government served search warrants on Google in March 2012 and demanded that the company hand over data from WikiLeaks staff members for the purpose of an investigation into violations of the Espionage Act, Computer Fraud and Abuse Act (CFAA), a larceny statute and a “conspiracy to commit offense or to defraud the United States” statute.
Sarah Harrison, investigations editor, Kristin Hrafnsson, spokesperson and Joseph Farrell, section editor, each had their accounts targeted.
The warrants required the disclosure of: all contents of emails associated, “including stored or preserved copies of emails sent to and from the account, draft emails and deleted emails; all records or other information related to the identity of the account (associated phone numbers, IP addresses, types of services utilized, account status, log files, any credit or bank account numbers associated); all records or other information “stored at any time by an individual using the account; any communications the person had with Google.
-
-
Last week, following the terrorist attacks in Paris, British Prime Minister David Cameron said—surprise!—that his government needed more power to monitor online communications. He went so far as to imply that encryption itself was a problem, and later said that American tech firms “have a social responsibility to fight the battle against terrorism.”
There was an immediate backlash from tech commentators, who pointed out that Cameron’s “snoopers’ charter” makes little sense in light of recent high-profile data breaches. But the tech industry itself was noticeably quiet. Silicon Valley appears to be at a kind of crossroads: will it continue to be a silent (and occasionally paid-up) partner in government dragnet surveillance? Or will some of the people helping to facilitate this surveillance finally speak up?
-
Environment/Energy/Wildlife
-
George Osborne has requested that ministers make dozens of interventions to fast-track fracking as a “personal priority”, including the delivery of numerous “asks” from shale gas company Cuadrilla.
-
Finance
-
China’s 2015 GDP growth forecast has been maintained at 6.8 percent, as further policy support and export recovery is expected to help bolster the sluggish economy, said UBS on Monday.
-
The citizens of the United Kingdom gave 45,000 pounds each, every man woman and child of them, direct to the bankers in bailouts. We will be paying off that money in taxes – with vast sums in interest to the same bankers, from whom we borrowed virtual money they did not have, to give to them as real money – for generations to come. Quantitive easing gives yet more money to the bankers, cash in place of risky bonds they wish to dump.
-
PR/AstroTurf/Lobbying
-
As Murtaza Hussain of The Intercept (1/23/15) observed, in addition to fomenting religious extremism and sectarianism, King Abdullah participated in various US crimes throughout the Middle East and encouraged the United States to commit more. George W. Bush’s war of aggression against Iraq relied upon secret, extensive Saudi military assistance (AP, 4/24/04). And a classified cable from the US embassy in Riyadh (Wikileaks, 4/20/08) noted “the king’s frequent exhortations to the US to attack Iran.”
-
Censorship
-
The adult content filters being rolled out by some internet providers under a scheme championed by David Cameron are blocking the websites of businesses and charities and are a “distraction” for parents seeking to protect children from online pornography, claim campaigners.
TalkTalk announced this weekend that it would follow Sky and become the second of the UK’s four major internet providers to roll out automatic filters for all its customers unless they specifically ask for them to be turned off. It plans to begin applying the blocks to all users’ accounts next month.
-
Privacy
-
The UK legislators, law enforcement agencies and intelligence services looking to expand the government’s surveillance programs got a big boost from the attack on Charlie Hebdo. This violent attempt to place extremist religious ideology ahead of free speech was twisted by many into justification for expanded government powers. Prime Minister David Cameron even went so far as to suggest that no citizen’s communications should be beyond the government’s reach.
-
After the attacks of 7 and 9 January, French Prime Minister Valls announced this morning a series of measures to “fight against terrorism”. Given this long speech evoking increased information retention and surveillance, La Quadrature du Net recalls that many recent announcements prepare a further decline of civil liberties on the Internet, and calls for greater political and citizen alertness on the measures to be implemented.
-
WikiLeaks has accused Internet giant Google of handing over emails of the whistleblowing website’s senior staff to the US authorities – and keeping the release silent. DW talked to one of those staff about the release.
-
The leading German computer club has rejected EU anti-terror plans to tap online chatter, instead calling for all online communication to be encrypted. Politicians, meanwhile, are seeking ways to read encoded messages.
-
People think that catching terrorists is just a matter of finding them – but, just as often, terrorists are created by the people doing the chase.
While making our film (T)ERROR, which tracks a single counter-terrorism sting operation over seven months, we realized that most people have serious misconceptions about FBI counter-terrorism efforts. They assume that informants infiltrate terrorist networks and then provide the FBI with information about those networks in order to stop terrorist plots from being carried out. That’s not true in the vast majority of domestic terrorism cases.
-
Their eighteen pages of amendments to the Counter-Terrorism and Security Bill would grant the UK government sweeping new powers to compel telecommunications companies to harvest and store data collected on their users, and for police and intelligence companies to obtain and analyze that data without warrants or effective oversight.
The Lords’ proposals were introduced at short notice, without the usual explanatory notes that would let other peers decide for themselves whether they are appropriate. Britain’s House of Lords are expected to consider the new amendments on Monday, leaving them only this weekend to find out just how bad these amendments are.
-
Civil Rights
-
Leon Brittan was photographed entering an underage sex den during a police investigation, it has been claimed.
The Tory Lord, who died on Wednesday, is said to have been snapped by officers on a 1986 surveillance operation focusing on rent boy orgies run in North London buildings.
-
Murdoch’s great fear was that the hacking scandal would lead to a corporate prosecution of News International. As the journalists who hacked the phone of Milly Dowler and made Sienna Miller’s life a misery worked for News International, and as the executives of News International justified their princely incomes by saying that they were responsible for the organisation, a corporate prosecution was indeed essential. It would show that the Crown Prosecution Service wanted to punish the powerful, not just the hired help.
At the trial of six Sun journalists, which ended last week with the jury acquitting two and failing to reach a verdict on the other four, defence lawyers quoted Gerson Zweifach, News Corp’s general counsel. He feared a corporate prosecution of News International in the UK would destroy its American interests. (The US authorities are a little more willing to punish wrongdoing than the indolent Brits.) He had emergency talks with the Met in 2012. According to Scotland Yard, he told the police: “The downstream effects of a prosecution would be apocalyptic. The US authorities’ reaction would put the whole business at risk.” If you can get past his atrocious jargon – why can’t the managers of communications business communicate? – you will hear the panic in his voice.
He need not have worried. Murdoch cut a deal to save his wizened hide. The police had no more right to go into his offices on a fishing expedition than they have to come into your home. They would have needed a reasonable suspicion and a search warrant. Murdoch spared them the inconvenience. The team behind his clean-up campaign went through company records and threw out journalists and journalist sources to keep the cops happy.
-
It was October 2012. Roei Elkabetz, a brigadier general for the Israel Defense Forces (IDF), was explaining his country’s border policing strategies. In his PowerPoint presentation, a photo of the enclosure wall that isolates the Gaza Strip from Israel clicked onscreen. “We have learned lots from Gaza,” he told the audience. “It’s a great laboratory.”
-
Leaders of Jewish communities and Holocaust memorial groups in Britain and the Netherlands have reacted with rage and despair at the arrival in Rotterdam of the world’s biggest ship, the Pieter Schelte, named after a Dutch officer in the Waffen-SS.
The vice-president of the Board of Deputies of British Jews, Jonathan Arkush, said: “Naming such a ship after an SS officer who was convicted of war crimes is an insult to the millions who suffered and died at the hands of the Nazis. We urge the ship’s owners to reconsider and rename the ship after someone more appropriate.”
Esther Voet, director of the Centre for Information and Documentation on Israel (Cidi), based in The Hague, said that the timing of the ship’s arrival, shortly before Jews were targeted and killed in Paris and the 70th anniversary of the liberation of Auschwitz, was “a coincidence, I’m sure, but a sign of the times. We lost our battle to have the ship’s name changed, and we are left eating dust.”
-
“Five years ago, the Philadelphia police thought that carrying Arabic-language flashcards was enough to warrant the arrest of an innocent traveler,” writes that traveler, Nick George.
With help from the American Civil Liberties Union, he reached a settlement today in a lawsuit brought against the Philadelphia police department. America is safe once again for people who like to study foreign languages and read books on foreign policy in airports.
-
The rhetoric around the debunked right wing media meme about the existence of “no-go zones” throughout France, the United Kingdom, and the rest of Europe, ratcheted up last week. Driven by politics, viewers, listeners, and page views, even the multiple mea culpas from Fox News just last weekend haven’t stopped the myth.
By the conservative telling, in these supposed “Muslim only” enclaves the population has “take[n] over parts of the country, entire portions, towns,” (allegedly more than 700 in France alone!), and outside police are forbidden as extremism and Sharia Law flourish. And now, they present an active threat to the United States and our American values.
-
Jerry Maynard is reported to have been assaulted by a responding officer after calling paramedics. Maynard had called the paramedics after experiencing some chest pains while consuming liquor. The responding paramedics checked him over and determined that he was fine, so they left. A short time later the chest pains returned to Maynard causing him to call for a second dispatch of paramedics. This time, two county sheriffs accompanied the ambulance. The two deputies proceeded to yell at Maynard telling him that if he called again, they were going to kill him. One of the deputies then is seen by a neighbor’s surveillance camera shoving Maynard onto to the ground. The officer was put on administrative leave while the incident was investigated, but there has been no comment on whether actions or reprimands will be taken against him.
-
A pastor named Albert Young, who had been a minister for nine years in Philadelphia, was accused of fondling his 15-year-old, mentally challenged niece, all during his time in his office while running the ministry. This reverend who is a wolf clothed in a sheep disguise at Total Deliverance Ministries, was charged with using his leadership as the pastor of the church to be able to sexually abuse his niece. Allegedly, Young was placed into custody a week prior after being accused of enticing this young girl into his lap while in his office. On that night, once the girl was on top of him, young touched her, putting his hands inside the girl’s pants, kissing her neck, and fondling her buttocks as well as pressing his genitals against her and guiding her hands to his penis. As officials reported, the minor did report him and even stated to the police that he threatened her and ordered her to keep silent. Young eventually was arrested on the following Thursday afternoon, and was charged with unlawful sexual contact with a minor, corruption of minors, and indecent assault of a child. Yet he was released on $50,000 bail on Friday and his next court issue was on November nineteenth.
-
Open source has modernised the archive of the Catalan city of Hospitalet de Llobregat (Spain). The software helps manage the administrative records, but also allows easy access to historical records. This facilitates research and education, and enables public information dissemination. For its historical records, the Hospitalet city archive implements ICA-Atom, a web-based and open source archive solution.
-
Intellectual Monopolies
-
Copyrights
-
Yesterday, MEP Julia Reda presented in the Committee on Legal Affairs (JURI) of the European Parliament a report on the harmonization of copyright in Europe. She tables modest but welcome proposals for a reform of copyright, several of which have been supported by La Quadrature du Net.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »
Further Recent Posts
- Links 3/1/2017: Microsoft Imposing TPM2 on Linux, ASUS Bringing Out Android Phones
Links for the day
- Links 2/1/2017: Neptune 4.5.3 Release, Netrunner Desktop 17.01 Released
Links for the day
- Teaser: Corruption Indictments Brought Against Vice-President of the European Patent Office (EPO)
New trouble for Željko Topić in Strasbourg, making it yet another EPO Vice-President who is on shaky grounds and paving the way to managerial collapse/avalanche at the EPO
- 365 Days Later, German Justice Minister Heiko Maas Remains Silent and Thus Complicit in EPO Abuses on German Soil
The utter lack of participation, involvement or even intervention by German authorities serve to confirm that the government of Germany is very much complicit in the EPO's abuses, by refusing to do anything to stop them
- Battistelli's Idea of 'Independent' 'External' 'Social' 'Study' is Something to BUY From Notorious Firm PwC
The sham which is the so-called 'social' 'study' as explained by the Central Staff Committee last year, well before the results came out
- Europe Should Listen to SMEs Regarding the UPC, as Battistelli, Team UPC and the Select Committee Lie About It
Another example of UPC promotion from within the EPO (a committee dedicated to UPC promotion), in spite of everything we know about opposition to the UPC from small businesses (not the imaginary ones which Team UPC claims to speak 'on behalf' of)
- Video: French State Secretary for Digital Economy Speaks Out Against Benoît Battistelli at Battistelli's PR Event
Uploaded by SUEPO earlier today was the above video, which shows how last year's party (actually 2015) was spoiled for Battistelli by the French State Secretary for Digital Economy, Axelle Lemaire, echoing the French government's concern about union busting etc. at the EPO (only to be rudely censored by Battistelli's 'media partner')
- When EPO Vice-President, Who Will Resign Soon, Made a Mockery of the EPO
Leaked letter from Willy Minnoye/management to the people who are supposed to oversee EPO management
- No Separation of Powers or Justice at the EPO: Reign of Terror by Battistelli Explained in Letter to the Administrative Council
In violation of international labour laws, Team Battistelli marches on and engages in a union-busting race against the clock, relying on immunity to keep this gravy train rolling before an inevitable crash
- FFPE-EPO is a Zombie (if Not Dead) Yellow Union Whose Only de Facto Purpose Has Been Attacking the EPO's Staff Union
A new year's reminder that the EPO has only one legitimate union, the Staff Union of the EPO (SUEPO), whereas FFPE-EPO serves virtually no purpose other than to attack SUEPO, more so after signing a deal with the devil (Battistelli)
- EPO Select Committee is Wrong About the Unitary Patent (UPC)
The UPC is neither desirable nor practical, especially now that the EPO lowers patent quality; but does the Select Committee understand that?
- Links 1/1/2017: KDE Plasma 5.9 Coming, PelicanHPC 4.1
Links for the day
- 2016: The Year EPO Staff Went on Strike, Possibly “Biggest Ever Strike in the History of the EPO.”
A look back at a key event inside the EPO, which marked somewhat of a breaking point for Team Battistelli
- Open EPO Letter Bemoans Battistelli's Antisocial Autocracy Disguised/Camouflaged Under the Misleading Term “Social Democracy”
Orwellian misuse of terms by the EPO, which keeps using the term "social democracy" whilst actually pushing further and further towards a totalitarian regime led by 'King' Battistelli
- EPO's Central Staff Committee Complains About Battistelli's Bodyguards Fetish and Corruption of the Media
Even the EPO's Central Staff Committee (not SUEPO) understands that Battistelli brings waste and disgrace to the Office
- Translation of French Texts About Battistelli and His Awful Perception of Omnipotence
The paradigm of totalitarian control, inability to admit mistakes and tendency to lie all the time is backfiring on the EPO rather than making it stronger
- 2016 in Review and Plans for 2017
A look back and a quick look at the road ahead, as 2016 comes to an end
- Links 31/12/2016: Firefox 52 Improves Privacy, Tizen Comes to Middle East
Links for the day
- Korea's Challenge of Abusive Patents, China's Race to the Bottom, and the United States' Gradual Improvement
An outline of recent stories about patents, where patent quality is key, reflecting upon the population's interests rather than the interests of few very powerful corporations
- German Justice Minister Heiko Maas, Who Flagrantly Ignores Serious EPO Abuses, Helps Battistelli's Agenda ('Reform') With the UPC
The role played by Heiko Maas in the UPC, which would harm businesses and people all across Europe, is becoming clearer and hence his motivation/desire to keep Team Battistelli in tact, in spite of endless abuses on German soil
- Links 30/12/2016: KDE for FreeBSD, Automotive Grade Linux UCB 3.0
Links for the day
- Software Patents Continue to Collapse, But IBM, Watchtroll and David Kappos Continue to Deny and Antagonise It
The latest facts and figures about software patents, compared to the spinmeisters' creed which they profit from (because they are in the litigation business)
- 2016 Was a Terrible Year for Patent Trolls and 2017 Will Probably be a Lot Worse for Them
The US Supreme Court (SCOTUS) is planning to weigh in on a case which will quite likely drive patent trolls out of the Eastern District of Texas, where all the courts that are notoriously friendly towards them reside
- Fitbit’s Decision to Drop Patent Case Against Jawbone Shows Decreased Potency of Abstract Patents, Not Jawbone’s Weakness
The scope of patents in the United States is rapidly tightening (meaning, fewer patents are deemed acceptable by the courts) and Fitbit’s patent case is the latest case to bite the dust
- The EPO Under Benoît Battistelli Makes the Mafia Look Like Rookies
Pretending there is a violent, physical threat that is imminent, Paranoid in Chief Benoît Battistelli is alleged to have pursued weapons on EPO premises
- Links 29/12/2016: OpenELEC 7.0, Android Wear 2.0 Smartwatches Coming
Links for the day
- Links 28/12/2016: OpenVPN 2.4, SeaMonkey 2.46
Links for the day
- Bad Service at the European Patent Office (EPO) Escalated in the Form of Complaints to European Authorities/Politicians
A look at actions taken at a political level against the EPO in spite of the EPO's truly awkward exemption from lawfulness or even minimal accountability
- No “New Life to Software Patents” in the US; That's Just Fiction Perpetuated by the Patent Microcosm
Selective emphasis on very few cases and neglect of various other dimensions help create a parallel reality (or so-called 'fake news') where software patents are on the rebound
- Links 27/12/2016: Chakra GNU/Linux Updated, Preview of Fedora 26
Links for the day