02.23.15
Posted in News Roundup at 6:37 am by Dr. Roy Schestowitz

Contents
-
Desktop
-
Eimi, my four year old daughter, has interacted with Linux-powered computers since she was born. I still remember those nights in which I would pace up and down in my office, holding her and rocking her on my arms while the Linux desktop played music.
Then, Eimi grew and started enjoying her own room and, rather precociously, discovered how to use desktops and laptops. I will never forget her first encounter with PicarOS, the Linux distro for children!
-
Kernel Space
-
Ben Hutchings, the maintainer of the Linux 3.2 kernel branch, had the pleasure of announcing the immediate availability for download and upgrade of a new maintenance release for Linux kernel 3.2, version 3.2.67, urging users to update to it as soon as possible. Linux 3.2.67 kernel is a long-term supported version mostly used on very stable environments or embedded systems.
-
It’s been talked about for years and is still an ongoing but very active endeavor: building the mainline Linux kernel with LLVM’s Clang compiler rather than GCC.
-
The pNFS block server support for the NFSD kernel code allow for an NFS client connected to a shared disk to do block I/O to that disk in place of NFS reads and writes. pNFS is short for Parallel NFS. By being able to do I/O directly to the shared disk, performance and its parallel abilities can be boosted.
-
Linus Torvalds has decided to go ahead and rename the Linux 3.20 kernel to Linux 4.0 per his polling last week.
-
-
A computer operating system called Linux powers most of the servers running the Internet, much of the world’s financial trading systems, nearly all of the world’s super computer and is the basis for Android, which runs on tens of millions of Android mobile phones and consumer devices.
Linux is everywhere and it was the invention of the colorful, brilliant and sometimes controversial Linus Torvalds.
Linux is an open-source operating system, meaning anyone can use it for free and change it for their own needs. And more than 12,000 developers from more than 1,200 companies have not only done that, but have gotten their work added back to the main Linux project (the “kernel” in geek-speak), according to a recent report from the Linux Foundation.
-
Graphics Stack
-
Rob Clark continues making great progress on his Freedreno Gallium3D graphics driver for providing open-source support for Qualcomm’s Adreno graphics hardware.
-
Applications
-
-
After my previous post, development went quicker than expected, so I’ve actually managed to get a real version out.
So without much ado… here’s Danbooru Client 0.2.0!
-
-
Internet Relay Chat has a history of over 25 years and it is still a widely used text-based protocol for chatting. In the Linux world, each distribution and major project has a chatting room, usually on Freenode, and here you can get online help, participate in collaborative projects, or just have a look at the latest discussions regarding the development of some project or application.
-
Instructionals/Technical
-
Wine or Emulation
-
With Wine 1.7.37 having been released on Friday, the Wine-Staging team spent this weekend readying their own spin of this new development version of Wine.
-
Two weeks passed by and it is time for another Wine release. Before talking too much about Wine staging 1.7.37, we are happy to announce that two important features, UTF-7 support (included since Wine Staging 1.7.29) and interface change notification support (included since first version of Wine Staging) got upstream.
-
Games
-
Oddworld: New ‘n’ Tasty is a side-scrolling game based on the original game Oddworld: Abe’s Oddysee, released back in 1997. The game has been rewritten from scratch, and comes with new, modern graphics, enhanced audio and revamped gameplay.
-
Victor Vran is a promising RPG in Early Access from the developers of the Tropico games. We have it confirmed from a developer that the game will be on Linux too.
-
Vendetta Online, a space MMORPG (massively multiplayer online role-playing game) developed and published by Guild Software Inc that is also available for the Linux platform, has been upgraded again, but this time is just a minor one.
-
I am showing my age by mentioning that my introduction to computing was a ZX81, a home computer produced by a UK developer (Sinclair Research) which had a whopping 1KB of RAM. The 1KB is not a typographical error, the home computer really shipped with a mere 1KB of onboard memory. But this memory limitation did not prevent enthusiasts producing a huge variety of software. In fact the machine sparked a generation of programming wizards who were forced to get to grips with its workings. The machine was upgradable with a 16KB RAM pack which offered so many more coding possibilities. But the unexpanded 1KB machine still inspired programmers to release remarkable software.
-
Thanks to the ever more awesome SteamDB, we have a possible list of games Valve will demo on Steam Machines at GDC, and the list is interesting.
-
Desktop Environments/WMs
-
According to this blog entry by Sean Davis, Xfce contributor and Xubuntu Technical Lead, Xfce 4.12 is to be released in about one week, this being quite an important announcement, since it comes after almost three years in which no new releases have occurred.
-
K Desktop Environment/KDE SC/Qt
-
-
As an aftermath of the discussion in Fedora, libinput maintainer Peter Hutter contacted KDE developers, including yours truly who is guilty of porting the kcm-touchpad to KDE Frameworks 5. As I know nothing about input stack or touchpads in general (phew), Peter was kind enough to step up, clone the kcm-touchpad and add support for libinput in addition to (existing) synaptics driver. All I had to do then, is to port it again to Frameworks 5.
-
With Libinput support being important not only for Wayland input but also is starting to be used for X11/X.Org input too, the KDE input configuration module now supports configuring libinput devices.
-
We want to get KInfoCenter out of this “nerdy corner” by augmenting it with rich and beautiful modules and encourage users to check it out. The energy information module is the first step in that direction, other developers have also expressed their interest for that, for instance, it could show much more detailed information about what Baloo is doing at the moment.
-
Kronometer 1.6 is now available for download. This new release brings an improved UI in the Settings dialog, as well as a couple of annoying bugs fixed.
-
TEA is a Qt-based text editor with support for tabs, syntax highlighting, spell-checking, editing support for Wikipedia or LaTex, as well as many configuration options. The latest release, 40.0.0, has been put out earlier today and it represents a major milestone.
-
GNOME Desktop/GTK
-
With the just-released GNOME 3.16 Beta there’s a switch to use Wayland by default for the GDM log-in screen. For those wondering what this means to those using binary blob graphics drivers on your systems or in cases where Wayland isn’t working, fear not.
-
The first beta of the upcoming GNOME Maps 3.16 app of the GNOME desktop environment has been announced as part of the GNOME 3.16 Beta 1 release of the controversial desktop environment. In this beta, GNOME Maps received several improvements and bug fixes that we’ve detailed below for your general information.
-
Matthias Clasen has announced the release of GNOME 3.15.90, the GNOME 3.16 Beta, that’s coming out slightly delayed but still in time for some weekend testing.
The saturday afternoon release of this first beta in the GNOME 3.15 series brings several more “big features” that have been a priority for the GNOME 3.16 development cycle.
-
Cinnamon, a Linux desktop environment developed by the same guys who are also responsible for Linux Mint, will be getting some very important new features with the next 2.6 version that will be out soon.
-
Cinnamon is one of my favorite open source projects because it actually listens to what users ‘need’ and then works on features to fulfill those needs.
Despite being a full time KDE Plasma user, Cinnamon is one DE that I would be very comfortable with. That doesn’t mean I don’t like Gnome or Unity; I do. It’s just that Plasma and Cinnamon are more suited for my needs – they both are extremely customization and allow me to give a personalized touch to my PC.
-
-
Reviews
-
Certain factors like systemd are polarizing the Linux community. It seems that either you like it or you hate it. Some of the Debian developers are getting nervous and so a fork of Debian called Devuan has been announced.
I’m always looking at other distros that emphasize compactness and the ability to run on old hardware. I was also intrigued by the Debian controversy with systemd so when I saw AntiX 13.2 was based on Debian Wheezy I had to give it a try. AntiX comes on a single CD so installing it was easy enough.
-
There are many reasons why people use Bodhi Linux. Some use it because they really like the Enlightenment desktop, and Bodhi has pioneered the integration of Enlightenment to create a distro that is both beautiful, elegant and functional. Others use it because they want an operating system that stays out of their way. Again, although Enlightenment offers plenty of whistles and bells for those who need or want them, it can also be configured to be highly minimalist and use a very small amount of system resources.
-
New Releases
-
Parsix GNU/Linux 7.5 (code name Rinaldo) brings the latest stable GNOME desktop environment, a new kernel built using our modernized kernel build system, updated installer, a new version of systemd and an upgraded X.Org Server. This version has been synchronized with Debian Wheezy repositories as of February 20, 2015. Thanks to the upgraded X.Org server, there is a noticable desktop performance improvement. Parsix Rinaldo ships with GNOME 3.14 and LibreOffice productivity suit by default. Highlights: GNOME Shell 3.14.3, X.Org 1.16.4, GRUB 2, GNU Iceweasel (Firefox) 35.0.1, GParted 0.12.1, Empathy 3.12.7, LibreOffice 3.5.4, VirtualBox 4.3.18 and a kernel based on Linux 3.14.32 with TuxOnIce 3.3, BFS and other extra patches. Live DVD has been compressed using SquashFS and XZ.
-
The main purpose of this release is to fix ‘unetbootin’ weighty issue. Some Q4OS USB installation media created with unetbootin utility didn’t correctly extract all the archives and packages. It is now fixed as well as several other bugs. Packages updates and fine tuning of Q4OS Setup utility has been made as well.
-
Screenshots
-
PCLinuxOS/Mageia/Mandriva Family
-
PCLinuxOS is one of the many distributions that exist in the world of Linux, but this caught my attention when I installed it on my computer. Let’s take a look at PCLinuxOS, a distro that is user friendly.
-
-
Red Hat Family
-
Red Hat, on Thursday announced the general availability of Red Hat Enterprise Linux OpenStack Platform 6, featuring updates designed to serve as the foundation for building OpenStack-powered clouds for enterprise businesses with advanced cloud users, telecommunications companies, Internet service providers (ISPs), and public cloud hosting providers.
-
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
While many open-source projects are still transitioning over to a C++11 code-base, Ubuntu’s Mir display server is already moving onto C++14.
C++14 was officially released last December as a small update over C++11. While it’s officially just a few months old, GCC and LLVM/Clang have been working on supporting the C++14 changes for some time.
-
After two alphas, one beta, and three RC (Release Candidate) versions, the final release of the anticipated Kadu 2.0 IM client is now available for download. Kadu is an open-source, user-friendly, flexible, and stable Instant Messenger client that supports the Jabber, XMPP, and Gadu-Gadu protocols. Kadu 2.0 is a major release that brings a number of new features and improvements over previous versions.
-
As before, all these apps are GPL 3 licensed and available on Launchpad. What’s new is now you can browse them online due to a great unofficial web appstore made by Brian Douglass. This solves one of my previous gripes about not being able to find new applications.
-
Robert Ancell of Canonical posted a new blog post this morning about writing some more apps for Ubuntu Phone. He shows off a simple dice roller app written in just over 400 lines of QML, a morse sender example in less than 600 lines of code, and a yatzy game in less than 1k lines of code all with QML. He’s put out the source to these example Ubuntu Phone apps under the GNU GPLv3.
-
Ubuntu 15.04 (Vivid Vervet) will implement Locally Integrated Menus by default, making this a very important change for Unity and the operating system.
-
The increase in hacking attacks that are aligned to geo-political issues is on the increase. Over the last decade, conflicts on the ground have often spilled over to groups of hackers, some state sponsored and some claiming to act independent of the state. The majority of these hackers have chosen to deface government websites or launch DDoS style attacks to force websites offline.
-
-
Flavours and Variants
-
Ubuntu Kylin 14.04.2 LTS, the Chinese Linux distribution developed in collaboration with Canonical, has been released and is now available for download.
-
-
For almost a year, the Raspberry Pi Compute Module has served the needs of professional embedded vendors looking to ship commercial devices based on the Raspberry Pi SBC. However, this computer-on-module (COM) version of the RPi Model B can be tricky for less experienced hardware developers. On Kickstarter, U.K.-based Wireless Things has successfully funded an “OpenPi” mini-PC based on the module designed primarily for software developers.
-
Phones
-
Android
-
If you have an unlocked Android device and want to use it on a different carrier network, you might have to add a new Access Point Name. Jack Wallen shows you how.
-
Samsung has made significant progress recently in rolling out the new Android 5.0 Lollipop OS update to phablets in its Galaxy Note series. Here’s a roundup of devices and carriers that have implemented the update so far, and which are expected.
-
-
Google has hinted that it could eventually make Android Wear work with iPhones, but as the wearables platform is getting close to its first birthday, we’re yet to see an official integration. The good news is, if you really want to use your Android Wear smartwatch with an iOS device, an unofficial solution may be coming.
-
-
In case you haven’t noticed, we love tiny details that make our everyday lives as Android users better. (And really, in case you didn’t notice that, I’ll show you the door — it’s that X button next to the tab title up there in your browser.) Our friendly Android 5.1 tipster Ramit Suri loves them too, so much in fact that he noticed a teeny tiny detail on the lockscreen.
-
Unfortunately, unlike the first four devices which had official renders, the Vibe Max did not come with any – so Lenovo and Android fans would have to wait a few more days before seeing the company’s latest flagship.
-
A new app for Android makes viewing torrents easier than ever before. After simply clicking on a magnet link, iFlix takes over, playing video and music in a clean interface. There’s no need to wait for a torrent to complete and skipping can be achieved in just a few moments.
-
We’re back — and by we, I mean our best bro in the world, Ramit Suri — with another Android 5.1 interface change. This one is all about the screen pinning feature that was introduced with Android 5.0, which receives a small but useful facelift and an interesting change to its settings.
-
Events
-
The day Saturday started with Monty Taylor’s Flying Circus. HP’s Monty Taylor, accompanied by his rubber duck, gave an insightful talk on the direction of Open Source and how media-fabricated one-liners — akin to the misconception that lemmings jump off cliffs — affect the tech industry and, more importantly, what can be done about it.
-
Openness/Sharing
-
-
Open Data
-
Somewhere between these two factors — what people really need and don’t have on one end, and what technologies can make a meaningful impact on the other — lies the sweet spot where the next breakthrough product is waiting. And as some leading companies have started to discover, open source data can lead you straight to it. Most recently I witnessed this play out with a company in medical device development — although the learnings from their experience are applicable across industries. Here’s why:
-
MIA may be the airport code for Miami International Airport, but it’s also the state of luggage for hundreds — if not thousands — of passengers flying on American Airlines out of Miami on Friday: missing in action.
An apparent “technical issue” with its baggage conveyor belts at Miami International Airport prevented American Airlines from loading any planes with checked luggage on Friday. For eight hours, the airline let its flights depart sans bags, but did not notify passengers of the issue. Instead, most passengers discovered when they reached their destinations that their luggage hadn’t.
-
Science
-
Humanity’s first steps into the digital world could be lost to future historians, Vint Cerf told the American Association for the Advancement of Science’s annual meeting in San Jose, California, warning that we faced a “forgotten generation, or even a forgotten century” through what he called “bit rot”, where old computer files become useless junk.
-
Health/Nutrition
-
An emotive press release hypes the visit to South Africa by the discredited former UK environment secretary Owen Paterson. The press release, sent from the right-wing think-tank that Paterson founded, UK2020, accuses the European Union and Greenpeace of “condemning millions of people in developing countries to starvation and death by their stubborn refusal to accept the benefits of genetically modified crops and other potentially life-saving advances in plant sciences.”
-
Security
-
As for me, I will not be buying a Lenovo computer, ever.
-
We’ve had a bunch of posts today (and yesterday) about the “Superfish” debacle, with a few of them focusing on Lenovo failing to recognize what a problem it was — first denying any serious security problem, and then calling it “theoretical.” It appears that Lenovo has now realized it totally screwed up and is finally saying so.
-
I’ve been a mostly happy Thinkpad owner for almost 15 years. My first Thinkpad was a 570, followed by an X40, an X61s, and an X220. There might have been one more in there, my archives only go back a decade. Although it’s lately gotten harder to buy Thinkpads at UNB as Dell gets better contracts with our purchasing people, I’ve persevered, mainly because I’m used to the Trackpoint, and I like the availability of hardware service manuals. Overall I’ve been pleased with the engineering of the X series.
-
Lenovo is all over the media recently, and not for a good reason. The revelation that it corrupted its computers with the vile Superfish adware has shocked many people in the computing world. It’s almost impossible to believe that a company could be so incredibly stupid and so unbelievably uncaring about the security of its customers.
-
Defence/Police/Secrecy/Aggression
-
FIFTY years ago today my father, Malcolm X, was assassinated…
-
Australia will not partner with Sweden to build its next-generation submarine fleet, Prime Minister Tony Abbott said on Friday, narrowing the list of potential partners for the A$50 billion ($39 billion) program to Germany, France and Japan.
Swedish defense firm Saab, France’s state-controlled naval contractor DCNS and Germany’s ThyssenKrupp Marine Systems have expressed interest in the project.
-
The Pakistan Army is once again cooperating with the US on drone strikes, a renowned expert on the country’s military tells the Bureau in the latest edition of Drone News.
-
Doctored blueprints for nuclear weapon components supplied to Iran by the CIA 15 years ago could force the IAEA to review its conclusions on Iran’s atomic program, which was potentially based on misleading intelligence, Bloomberg reports.
The details of the Central Intelligence Agency operation back in 2000 were made public as part of a judicial hearing into a case involving Jeffrey Sterling, an agent convicted of leaking classified information on CIA spying against Iran.
-
Details of a 15-year-old Central Intelligence Agency sting emerging from a court case in the U.S. may prompt United Nations monitors to reassess some evidence related to Iran’s alleged nuclear weapons work, two western diplomats said.
International Atomic Energy Agency inspectors in Vienna will probably review intelligence they received about Iran as a result of the revelations, said the two diplomats who are familiar with the IAEA’s Iran file and asked not to be named because the details are confidential. The CIA passed doctored blueprints for nuclear-weapon components to Iran in February 2000, trial documents have shown.
-
For ten years during the Cold War, the CIA conducted mind-control experiments on unsuspecting San Franciscans. Dubbed Operation Midnight Climax, the program was packed with salacious details: a power-mad narcotics agent, a brothel equipped with two-way mirrors, and gallons of LSD.
-
After destroying Hiroshima, President Truman offered thanks to God for the power to kill indiscriminately…
-
“The Israeli intelligence services paid me to complete certain missions, such as secret missions in Syria under the cover of a reporter. These missions were at times very dangerous, and I risked the worst, including death in the case of failure. I traveled to Damascus a number of time in order to make contact with the local elite, doctors, researchers and others – all of whom wanted to emigrate to the United States. Every time I would get the equivalent to a month’s wage.”
-
More broadly, Jeb pushed the idea that the Middle East is a disaster because it hasn’t been bombed enough, and that the U.S. is disliked because it hasn’t attacked enough countries. There are two problems with this. One, it’s a disgusting and ridiculous lie that has been getting people killed for many years. A Gallup poll early last year of 65 countries found the U.S. to be considered far and away the biggest threat to peace in the world. The nations in the worst shape are the ones the U.S. has bombed. U.S. ambassador to the UN Samantha Powers has actually argued that we should stop paying attention to what bombing Libya did to Libya in order to be sufficiently willing to bomb Iraq and Syria. ISIS actually produced a 60-minute movie begging the United States to go to war against it because recruitment would soar. The U.S. obliged. Recruitment soared. This is how disliked the United States has made itself: organizations are willing to be bombed if it will show them to be the leading opponents of the United States — a country that, by the way, puts over a trillion dollars a year into war when tens of billions could address world hunger, clean water, and other basic needs. For a fraction of war spending, the U.S. could address climate chaos, agriculture, education, etc., and become the most loved government on earth. But would that feel as good as screaming threats at ISIS?
-
They report nothing about Washington supplying Kiev with heavy weapons since the conflict began last year.
-
Seven of Bill O’Reilly’s former CBS News colleagues who were with the Fox host in Buenos Aires have challenged his account of the riot he has recently come under fire for describing as a “combat situation.” As contradictions to O’Reilly’s account of his 1982 reporting on the Falklands War build, O’Reilly has responded to critics with personal attacks.
-
-
-
-
Former US ambassador to Syria Robert Ford admits moderates don’t exist in numbers and motivation enough to matter.
-
The political crisis precipitated by the mysterious January 18 death of Alberto Nisman has continued to deepen after a mass march called by fellow prosecutors and backed by the government’s right-wing opponents drew large crowds into the streets of Buenos Aires Wednesday to mark one month since the Argentine federal prosecutor was found with a fatal bullet wound to his head.
-
For instance, Congress could investigate the role of Assistant Secretary of State Victoria Nuland and U.S. Ambassador Geoffrey Pyatt in orchestrating the political crisis that led to a violent coup overthrowing Ukraine’s constitutionally elected President Viktor Yanukovych a year ago.
-
He reminded us that in Nazi Germany, many people had to look the other way to allow for the horrendous atrocities while others risked their lives and paid a high price. He also pointed to the historical reality of the FBI illegally spying on both blacks and Peace Groups during the Vietnam era.
-
Gallup headlined on February 16th, “Americans Increasingly See Russia as Threat, Top U.S. Enemy,” and reported that whereas back in 2011 only 3% of Americans answered “Russia” when asked “What country anywhere in the world do you consider to be the United States’ greatest enemy?” 18% cite “Russia” today, which is 3% more than the #2-cited threat, “North Korea,” cited now by 15% (which had been 16% back in 2011, when the top-cited threat of all was then Iran, at 25%, which is now cited by only 9% of Americans, as being America’s “greatest enemy.”
-
Gallup headlined on February 16th, “Americans Increasingly See Russia as Threat, Top U.S. Enemy,” and reported that whereas back in 2011 only 3% of Americans answered “Russia” when asked “What country anywhere in the world do you consider to be the United States’ greatest enemy?” 18% cite “Russia” today, which is 3% more than the #2-cited threat, “North Korea,” cited now by 15% (which had been 16% back in 2011, when the top-cited threat of all was then Iran, at 25%, which is now cited by only 9% of Americans, as being America’s “greatest enemy.”
-
Sweden’s national job agency has sacked its whole network of immigrant resettlement assistants after suspicion that some of them may have tried to recruit newly arrived immigrants to jihadist-style militant groups, such as Isis.
-
The Guardian story cited the Pentagon in acknowledging that “a small group of US special forces and military planners had been to Jordan during the summer to help…train selected rebel fighters.”
-
In the age of the all-volunteer military and an endless stream of war zone losses and ties, it can be hard to keep Homeland enthusiasm up for perpetual war. After all, you don’t get a 9/11 every year to refresh those images of the barbarians at the airport departure gates. In the meantime, Americans are clearly finding it difficult to remain emotionally roiled up about our confusing wars in Syria and Iraq, the sputtering one in Afghanistan, and various raids, drone attacks, and minor conflicts elsewhere.
-
Transparency Reporting
-
MuckRock is an organization that charges people — journalists, researchers, citizens — to file information requests…
-
-
Environment/Energy/Wildlife
-
Last week, the World Bank Inspection Panel refused to consider a complaint from Haitian communities about the Bank’s support for development of the mining sector in Haiti. Communities affected by mining activity and the Justice in Mining Collective, a group of six Haitian civil society organizations, submitted the complaint in early January, alleging violations of their rights to information and participation and threats of human rights abuses and environmental harms. The Inspection Panel—an office established to address complaints from people affected by World Bank-sponsored projects—recognized that the complaint raised “serious and legitimate” concerns and that the mining industry presents significant risks. The office nevertheless denied the complaint on narrow, technical grounds. The complainants expect to receive a copy of the decision in French today.[1]
-
Finance
-
It has been years since he disclosed his assets, but Mr. Giuliani revealed as a presidential candidate that his personal wealth had ballooned from a modest sum when he left City Hall to more than $30 million in 2007.
-
Two former foreign secretaries have been secretly filmed apparently offering their services to a private company for thousands of pounds.
-
Two former foreign secretaries are facing accusations of being involved in a new “cash for access” scandal by offering to use their political influence in return for payment.
-
The Telegraph looks at how to buy a politician, including Jack Straw and Sir Malcolm Rifkind
-
Among recent secretaries of state, Hillary Clinton was one of the most aggressive global cheerleaders for American companies, pushing governments to sign deals and change policies to the advantage of corporate giants such as General Electric Co., Exxon Mobil Corp., Microsoft Corp. and Boeing Co.
-
This was on top of another $4 million that he reportedly netted the previous week in one evening alone at the Manhattan home of a private equity bigwig. After Manhattan came the Washington, D.C., area, where he racked up $1 million at two events, according to Politico. An atlas of cities, an avalanche of dough: It’s what successful campaigns are made of, and his is expected to raise between $50 million and $100 million over a span of three months.
-
PR/AstroTurf/Lobbying
-
The U.S.-Cuban negotiations were extensively discussed in the liberal German press. A closer reading of the news indicated a slant in coverage: Cuba was depicted as a terror state and a nefarious actor. The USA, on the other hand, was described as a benign actor with noble aims such as to bring democracy and reforms to Cuba.
-
Reel life is often significantly different than real life — even for Academy Award winners. Here are eight movies that got their facts wrong.
-
According to David Corn’s February 19, 2015 article “Bill O’Reilly Has His Own Brian Williams Problem” in Mother Jones–the Fox News host stands accused of making false claims of stolen valor, similar in nature to those made by NBC News anchor Brian Williams. This despite O’Reilly’s feigned outrage at the hypocrisy of Mr. Williams. The article cited several instances of O’Reilly’s own historic, documented duplicity, but there was another one which went unreported that came from his own words as written within one of O’Reilly’s own books.
-
Fox contributor Erick Erickson parroted Governor Scott Walker (R-WI) to cast doubt on President Obama’s Christianity, alleging he is not a Christian “in any meaningful way,” despite the fact that right-wing attempts to call Obama’s faith into question have long been discredited.
-
The National Review’s Ian Tuttle called the two women an incapable “hapless duo” with a “Lucy and Ethel routine” (Harf is blonde, Psaki a red head) who were trying to create a version of the comedy film Legally Blonde at the US Department of State. In a separate piece, the conservative journal of record’s Kevin Williamson called Harf “cretinous” and a “misfit who plays Messy Marvin to Jen Psaki’s feckless Pippi Longstocking.”
-
Censorship
-
Guardian facing series of allegations from insiders over its relationship with advertisers, including suggestions that it changed an article on Iraq amid concerns that Apple would object
-
Popular blogging platform Tumblr is hiding “torrent” related posts from public view. The term “torrent” has been added to the site’s adult filter, to prevent people from stumbling upon “offensive” content.
-
-
Zimbabweans going to the movies will have to watch a tame version of “Fifty Shades of Grey” after censors ordered an edit of the film adaption of the bestselling erotic novel.
The censors demanded that erotic scenes from the R-rated drama be deleted before it is shown in the southern African country.
-
Zimbabweans going to the movies had to watch a tame version of “Fifty Shades of Grey” after censors ordered an edit of the film adaption of the bestselling erotic novel. Now the film has been removed by movie distributors who say the edits hack away too much of the story.
-
When Mishka Henner, a 38-year-old artist and photographer, came across these “blurred” images of Dutch landscapes on Google Maps, he was similarly perplexed and amused.
-
According to a survey published by the EFJ affiliate, the Serbian Journalists Association (UNS), in December, about 40% of journalists reported being occasionally subjected to censorship.
-
“You try to oppress something, it comes to haunt with a vengeance,” Singh said.
-
In a place of elite commentary and closed exclusive media with no reader engagement, is there freedom of speech?
-
The censorship of books is and will probably always be a source of controversy. Everyone has a different opinion as to what is appropriate. And ultimately, it’s up to each individual to decide if they want to read the novel or not and if they are mature enough to. Below are the ten most frequently challenged works of 2013 according to the American Library Association.
-
How governments are reinventing censorship in the 21st century
-
A Kuwaiti appeals court on Sunday sentenced an opposition politician to two years in jail for insulting the country’s ruler, local media reported.
Defense lawyers said they intend to appeal the ruling against Musallam al-Barrak, an outspoken former member of parliament, to the highest court, news website alaan.cc said. Other news websites carried similar reports.
-
Privacy
-
CITIZENFOUR, Laura Poitras’ riveting documentary about Edward Snowden’s efforts to shed light on gross surveillance abuses by the United States government and its partners, just won the 2014 Academy Award for Best Documentary Feature. Tonight’s Oscar win recognizes not only the incredible cinematography of Poitras, but also her daring work with a high-stakes whistleblower and the journalism that kick-started a worldwide debate about surveillance and government transparency. We suspect this award was also, as the New York Times pointed out, “a way for Academy members to make something of a political statement, without having to put their own reputations on the line.”
-
“At this stage I can offer nothing more than my word. I am a senior government employee in the intelligence community. I hope you understand that contacting you is extremely high risk … This will not be a waste of your time.” This was one of the first messages Edward Snowden wrote to filmmaker Laura Poitras beginning an exchange that helped expose the massive surveillance apparatus set up by the National Security Agency. Months later, Poitras would meet Snowden for the first time in a Hong Kong hotel room. Poitras filmed more than 20 hours of footage as Snowden debriefed reporters Glenn Greenwald and Ewen MacAskill. That footage — most unseen until now — forms the backbone of Poitras’ new film, “Citizenfour.” She joins us to talk about the film and her own experience with government surveillance. The film is the third installment of her 9/11 trilogy that also includes “My Country, My Country” about the Iraq War and “The Oath” about the U.S. military base at Guantánamo Bay, Cuba. Poitras’ NSA reporting contributed to a Pulitzer Prize for Public Service awarded to The Guardian and The Washington Post. We also speak with Jeremy Scahill, who appears in the film reporting on recent disclosures about NSA surveillance from a new, anonymous government source. Scahill, along with Poitras and Greenwald, founded The Intercept, a new media venture to continue investigating whistleblower leaks.
-
Laura Poitras, nominated for best documentary for “Citizenfour,” said she had seen some changes as a result of her film, about the whistleblower Edward Snowden and his revelations of government surveillance.
-
When we sit down in her New York office on the evening of February 14, I wish Laura Poitras a happy Valentine’s Day. “Oh, is that today?” she replies. The filmmaker has ample reasons to be unaware of ordinary reality. It has been two years since, while making a documentary about government surveillance of citizens, she received an encrypted email from a correspondent who identified himself only as “citizenfour.” The anonymous emailer turned out, of course, to be Edward Snowden. Since Citizenfour was released to great acclaim last October, she has been in constant motion, mostly outside the U.S. Two nights before we meet, she and Glenn Greenwald were joined, via satellite link from Moscow, by a smiling, relaxed Snowden for discussions at New York’s IFC Center and the New School. The current week contains two more milestones in the film’s remarkable career: It is the odds-on favorite to win Best Documentary at the Oscars this Sunday; the following night, it will have its first telecast on HBO.
-
The following is a statement from Edward Snowden provided to the American Civil Liberties Union, which represents him…
-
This means that the NSA likely had help from the corporations that build the hard drives and USB devices in question, because they’d have no access to the source code otherwise, according to Reuters. It opens up the possibility that the NSA used an American company’s cooperation with a foreign company on projects as an invitation to steal the American company’s proprietary information, too, even though U.S. law explicitly prohibits this type of covert operation.
-
Before her career in comedy, Sykes got, as she called it, “a good government job.” She worked for the NSA and, when prompted, confessed that “yes, she learned some things that were surprising.” She did not elaborate, maybe because it was long ago, or maybe because none of us had the proper clearance.
-
-
-
While it’s sadly likely that your communications have passed through an intelligence agency at some point, it’s usually difficult to know just who got your data. However, you now have a rare opportunity to find out.
-
Ealier this week, the Moscow-based internet security company published a report saying that spying software operated by a hacker group had infected over 500 computers in over 30 countries including Iran, Russia, China and Syria. The revelations triggered media reports about the US NSA being behind the espionage.
-
A powerful cyberspying tool can tap into millions of computers worldwide through secretly installed malware, security researchers say, with many signs pointing to a US-led effort.
-
The NSA’s spy programs can function in disk drives sold by more than a dozen companies, which means just about every computer on the market vulnerable to eavesdropping. Kaspersky Lab, a Moscow-based security software maker, discovered that implants could be placed by what it called the “Equation Group,” a reference to the NSA. The finding was confirmed by Reuters via a former NSA employee.
-
A bill filed in the Vermont House last week represents a transpartisan effort taking on the surveillance state. The legislation would not only support efforts to turn off NSA’s water in Utah, but would have practical effects on federal surveillance programs if passed.
Vermont Rep. Teo Zagar (D-Barnard) introduced H.204 on Feb. 12. His three cosponsors literally span the political spectrum, including a Republican, an Independent and a member of the Progressive Party.
-
-
The United States is planning to create a new agency dedicated to cybersecurity in light of the growing number of hacking attacks and identity theft in the past year.
-
It is widely known that the National Security Agency houses an impressive cyber force with the capacity to bypass the digital defenses of private individuals, enterprises, and even foreign governments – a force powerful enough to draw criticism from the American public and American allies. A recent report from Russian researchers has provided more specific information vis-à-vis the technical capabilities of NSA.
-
Last year, Attorney-General George Brandis introduced legislation to Parliament which, if passed, would require telecom companies to retain metadata for two years. Last week, in the 100-seat Parliament House theatre located just next door, politicians and journalists gathered to watch an advance screening of documentary Citizenfour. The film follows whistleblower Edward Snowden as he reveals the extent of the National Security Agency’s domestic surveillance program. It is a must-see: a poignant reminder of the dangers posed to individual privacy and security by data collection.
-
Apparently, the United States National Security Agency has been spying on computers used in several countries through software buried within hard drives manufactured by big companies such as Seagate, Toshiba and Western Digital.
Security researchers at Moscow-based Kaspersky Lab discovered personal computers in 30 countries infected with one or more of the spying programs. The most infections were found in Iran, along with computers in Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria.
-
The remark follows an announcement made on Monday by Kaspersky Lab, a Moscow-based Internet security software company, on a broad surveillance program that was tracking data on computer hard disks worldwide. The company said a cyberattack team known as the Equation Group had infected the computers of 500 organizations worldwide with spying software, most of them in Iran and Russia.
-
The US government has been irresponsible about cyber security for the past 25 years, essentially allowing the NSA to create a ‘hackers paradise’ through numerous infantile backdoors they planted, former US intelligence officer Robert Steele told RT.
-
Want to know if GCHQ spied on you? Now you can find out. Privacy International (PI) has just launched a website that lets anyone find out if their communications were intercepted by the NSA and then shared with GCHQ.
-
Oscar-winning director Oliver Stone’s big-screen dramatisation of Edward Snowden’s mass surveillance revelations will be released on 25 December, distributor Open Road Films said on Friday.
Snowden will star Joseph Gordon-Levitt as the NSA whistleblower who leaked details of US and British surveillance and electronic monitoring programs.
Filming has begun in Munich and will move to other locations before its expected completion in May.
Shailene Woodley, Melissa Leo, Zachary Quinto and Tom Wilkinson will also star in the film, adapted from two books, The Snowden Files, by Guardian journalist Luke Harding and Time of the Octopus by Anatoly Kucherena, Snowden’s lawyer.
-
-
Stone is also adapting the screenplay with Kieran Fitzgerald, from Luke Harding’s The Snowden Files: The Inside Story of the World’s Most Wanted Man and Anatoly Kucherena’s Time of the Octopus.
-
People from around the world can join a campaign to find out if British intelligence agency GCHQ illegally spied on them — and force it to delete the data.
The move follows a ruling by the UK’s Investigatory Powers Tribunal (IPT) that GCHQ’s use of data gathered by the National Security Agency (NSA) in the US was unlawful prior to December 2014.
-
The Ridenhour Prizes announced Friday its documentary prize will go to “Citizenfour,” the film about Edward Snowden’s leaks of classified NSA documents, directed by Laura Poitras.
-
-
Shortly after 9/11, the South African government introduced measures to fight terrorism in the country, including a bill allowing the monitoring and interception of communications. It became the Regulation of Interception of Communications and Provision of Communication-Related Information Act (Rica) of 2002. It replaced the Interception and Monitoring Prohibition Act of 1992, which did not deal adequately with technological advances.
-
Shortly after 9/11, the South African government introduced measures to fight terrorism in the country, including a Bill allowing the monitoring and interception of communications. It became the Regulation of Interception of Communications and Provision of Communication-Related Information Act (Rica) of 2002. It replaced the Interception and Monitoring Prohibition Act of 1992, which did not deal adequately with technological advances.
-
A digital leak to Al Jazeera of hundreds of secret intelligence documents from the world’s spy agencies has offered an unprecedented insight into operational dealings of the shadowy and highly politicised realm of global espionage.
Over the coming days, Al Jazeera’s Investigative Unit is publishing The Spy Cables, in collaboration with The Guardian newspaper.
Spanning a period from 2006 until December 2014, they include detailed briefings and internal analyses written by operatives of South Africa’s State Security Agency (SSA). They also reveal the South Africans’ secret correspondence with the US intelligence agency, the CIA, Britain’s MI6, Israel’s Mossad, Russia’s FSB and Iran’s operatives, as well as dozens of other services from Asia to the Middle East and Africa.
The files unveil details of how, as the post-apartheid South African state grappled with the challenges of forging new security services, the country became vulnerable to foreign espionage and inundated with warnings related to the US “War on Terror”.
-
When a friend posted a photograph of charity worker Lindsey Stone on Facebook, she never dreamed she would lose her job and her reputation. Two years on, could she get her life back?
-
The U.S. government views cyberspace as just another theater of war akin to air, land and sea…
-
A former CIA and State Department counterterrorism expert says a report by Russia-based Kaspersky Lab that the NSA could have infiltrated computer hardware to spy on foreign entities is not surprising.
-
A new report from Russian cybersecurity firm Kaspersky Lab said its researchers identified a new family of malicious programs or worms that infected computers in multiple countries, primarily overseas. Targets appeared to be specifically selected and included military, Islamic activists, energy companies and other businesses, as well as government personnel.
-
Civil Rights
-
Can we all just agree on that point? I’m not saying we owe Michael Moore an apology for the way he was derided for his speech after winning the Academy Award for Bowling for Columbine, 10 years ago, but on this momentous anniversary, I think we can at least acknowledge that much.
On March 23, 2003, Moore made the Oscar speech heard around the world, in which he condemned George Bush for going to war in Iraq, which had just begun four days prior. And Moore was booed, stalked and threatened for it. He had to get a security detail to protect him from the death threats (some of which were encouraged by the media), and he claims that Homeland Security scratched up his Oscar at the airport on the way home.
-
THE General Body’s website shows they are connecting with other anti-corporatization student groups, such as those at Colgate University and the University of California.
-
-
Poland will be the first country to pay damages for participating in the US Central Intelligence Agency’s secret rendition programme after its was found to have hosted a facility used for illegal rendition and interrogation.
-
Poland will pay $262,000 in compensation to two terror suspects who say they were tortured at a CIA secret prison that Poland hosted from 2002-2003, a government minister said Wednesday.
Foreign Minister Grzegorz Schetyna spoke after the European Court of Human Rights in France rejected Poland’s appeal of its earlier ruling.
-
The European Court of Human Rights refused on Tuesday to reconsider its ruling that Poland hosted a secret CIA jail, a decision that will now oblige Warsaw to swiftly hold to account Polish officials who allowed the jail to operate.
The court’s decision will add to pressure on other European countries to end years of secrecy about their involvement in the CIA’s global programme of secret detention after the Sept. 11, 2001, attacks on the United States.
-
-
When America Tonight approached the Justice Department for this report, its press office responded in an email in bold type: “We are not doing interviews.” But in a statement, the agency said that it reviewed the cases of several detainees “alleged to have been mistreated” back in 2009. In the two criminal investigations that resulted, it said it did not find sufficient evidence to “obtain and sustain” convictions.
-
IN December, when the Senate Intelligence Committee issued its long-awaited report on the C.I.A.’s detention and interrogation program, it seemed to confirm what I and many human-rights advocates had argued for a decade: The C.I.A. had started and run a fundamentally abusive and counterproductive torture program. What’s more, the report found that the C.I.A. had lied repeatedly about the program’s efficacy, and that it had neither disrupted terror plots nor saved lives.
-
A former CIA officer who operated under shadowy “non-official cover” status is suing the spy agency in federal court, claiming he was wrongly fired after a senior manager fabricated allegations of misconduct.
The officer filed the lawsuit in U.S. District Court for the District of Columbia under a pseudonym, Mack L. Charles. The CIA declined to comment, but did not dispute the plaintiff’s former association with the agency.
-
A former CIA operations officer with narcolepsy cannot pursue discrimination charges against the agency because his claims violate state secrets privilege, a federal judge ruled.
The plaintiff, under the pseudonym Jacob Abilt, claims he divulged his disability to the CIA upon employment when he was hired by the agency in 2008.
“The parties agreed that as an accommodation of Plaintiff’s disability he could take brief naps at his desk, provided that he make-up the time either by foregoing a lunch break and/or working beyond his scheduled tour of duty,” the complaint says.
-
The inside, untold story of CIA’s efforts to mislead Congress — and the people — about torture will horrify you
-
After serving almost two years in a federal prison in Pennsylvania, former CIA officer John Kiriakou, the first agency official to publicly confirm and detail the agency’s use of waterboarding, is back at home in Virginia to complete the rest of his sentence under house arrest.
-
Out of prison and living at home under house arrest for the remainder of a suspended prison sentence, former CIA operative John Kiriakou, convicted and sent to jail for blowing the whistle on agency torture under the Bush administration, has been speaking to major medi outlets this week about the brutal tactics and depraved abuse administered by the U.S. government in the name fighting terrorism as well as his prosecution and conviction under the Espionage Act for speaking out against such crimes.
-
Nevertheless, civic duty spurred me and a lawyer colleague to write the preface. So I read the report — all 500 or so pages of it — first in English and then in French. To my great surprise I learned that the Senate Intelligence Committee Report on Torture moves right along, with an authorial voice, lots of irony and plenty of gruesome detail that wasn’t in the newspapers. The principal writer, a former FBI analyst named Daniel Jones, renders the story of the CIA’s gratuitous brutality with a rhythmic repetition that approaches literature. Again and again, we’re told, detainees were grabbed by the CIA or its proxies, transported to secret prisons, subjected to ‘enhanced interrogation techniques’, and eventually dropped because they didn’t reveal anything useful, or they invented stories, or, as in the case of the suspected Afghan militant Gul Rahman, died. Then, after ploughing through many pages of CIA boasting about success in foiling terrorist plots, we find out that the agency’s ‘representations were almost entirely inaccurate’ and that torture foiled not a single plot. The former FBI man has fun hanging his CIA rivals with their own words, such as when then CIA director Porter Goss briefs senators about how ‘professionally operated’ CIA detention techniques are compared with the Abu Ghraib variety: ‘We are not talking military, and I’m not talking about anything that a contractor might have done… in a prison somewhere or beat somebody or hit somebody with a stick or something.’ No, we’re talking about chaining a prisoner to the ceiling, making him wear a nappy, and letting him soil himself. After slamming him into a wall.
-
When Amal Clooney flies into Belfast shortly to meet a group of former Irish prisoners known as ‘The Hooded Men’ it will be the latest chapter of an extraordinary story concerning a quest for justice that has lasted almost half a century.
-
One man held a sign reading “Torture Is a War Crime.”
-
Director Adeara Maurice said Why Torture is Wrong highlights the “fear-based culture” surrounding terrorism and homeland security in post-9/11 America.
-
Today we spend the hour with Ava DuVernay, the director of the acclaimed new civil rights film “Selma,” which tells the story of the campaign led by Dr. Martin Luther King Jr. to draw the nation’s attention to the struggle for equal voting rights by marching from Selma to Montgomery, Alabama, in March of 1965. While the film has been nominated for an Oscar for best picture, to the shock of many, DuVernay was not nominated. She would have made history as the first African-American woman nominated for best director. At the Sundance Film Festival, DuVernay joins us to discuss the making of the film and the Academy Award nominations. “The question is why was ‘Selma’ the only film that was in the running with people of color for the award?” she asks.
-
An Egyptian court is expected to issue a verdict on Monday in a case which leading activist Alaa Abdel-Fattah and 24 others stand a retrial on a variety of charges, including taking part in an unauthorised protest in 2013.
-
Here, Cole misrepresents the conclusion of the Torture Report, which leads him to a conclusion of limited value. It is not just that CIA lied about whether torture worked.
-
The brutal confrontations were among 62 cases identified by The New York Times in which inmates were seriously injured by correction officers between last August and January, a period when city and federal officials had become increasingly focused on reining in violence at Rikers.
-
Intellectual Monopolies
-
Copyrights
-
If you can bear to read it the full notice can be found here. Worryingly Total Wipes Music are currently filing notices almost every day. Google rejects many of them but it’s only a matter of time before some sneak through.
Permalink
Send this to a friend
02.21.15
Posted in News Roundup at 8:23 pm by Dr. Roy Schestowitz

Contents
-
Desktop
-
Right now, you get most of your Linux software from your distribution’s software repositories. Those applications have to be packaged specifically for your Linux distribution, and you have to trust them with full access to your Linux user account and all its files.
But imagine if developers could distribute applications in a standard way so you could install and run them on any Linux distribution, and if those applications ran in a “sandbox” so you could quickly download and run them without the security and privacy risks.
That’s not just a dream. It’s the goal of the GNOME desktop-affiliated Sandboxed Applications project, and the first fully sandboxed application is already here. A preliminary version of this project is planned to be released in GNOME 3.16, which should be in the next release of Fedora—Fedora 22.
-
Kernel Space
-
It’s a brave endeavour to dive into the source code for any project you didn’t program yourself, another entirely when that project happens to be the guts of Linux. Considering the impact the open source operating system has had on the IT world, having some familiarity with its internals is going to take you places — a sentiment Linux creator Linus Torvalds agrees with.
-
While Coreboot support for systems with newer Intel CPUs is tough, Coreboot gained yesterday support for some new AMD CPUs.
-
Graphics Stack
-
Nouveau (NVC0) Gallium3D now supports the GL_ARB_gpu_shader_fp64 extension. What’s exciting about this enablement is that it’s a feature for OpenGL 4.0 / GLSL 4.00 compliance and this Nouveau driver support is beating out the Intel and Radeon drivers in providing this OpenGL capability.
-
Applications
-
I can see the usefulness of genstats almost immediately. Given a text file, you can pull out a frequency report with very little effort.
-
I’ve released man-pages-3.80. The release tarball is available on kernel.org. The browsable online pages can be found on man7.org. The Git repository for man-pages is available on kernel.org.
-
Instructionals/Technical
-
Games
-
Victor Vran is a promising RPG in Early Access from the developers of the Tropico games. We have it confirmed from a developer that the game will be on Linux too.
-
A Good Snowman Is Hard To Build looks absolutely charming, and not just because of the name. It will see a day 1 Linux release, and it’s due out this month!
-
Desktop Environments/WMs
-
Speaking of Larry, back in December he helped quash a rumor that the popular Xfce desktop had been abandoned. Now we have further evidence that he wasn’t just talking through his hat — as if there was ever any doubt.
-
GNOME Desktop/GTK
-
As we’ve reported in several GNOME related articles this week, the GNOME development team is hard at work to bring you the anticipated GNOME 3.16 desktop environment, due for release on March 25, 2015. As expected, GNOME Shell will be part of this release and it is the most important component, providing the actual user interface.
-
This is the first beta release of the 3.15 development…
-
-
New Releases
-
ClearFoundation had the pleasure of announcing the other day, February 19, 2015, the immediate availability for download of the final and stable release of its ClearOS Community 6.6.0 computer operating system based on Red Hat Enterprise Linux. The new version introduces a number of attractive features and new apps, as detailed below.
-
Ballnux/SUSE
-
On the heels of SuSE announcing their new storage solution, Jack Wallen offers you reasons why enterprise customers should take notice.
-
SUSE, one of the largest open source company, have finally released their own Storage solution for enterprise customers. It’s a software-based solution powered by the Firefly version of the Ceph open source project.
-
Red Hat Family
-
I have 2 usb ports on the front of my Dell 1950 server, as the internal cd-rom drive on it doesn’t work, I’m having to use an external one, that leaves the other port for the keyboard. That means that unless I have a really long cable and reach round to the back of the server, which let me tell you is a pain in the ass, I have to use the mouse in the front usb port.
-
Fedora
-
Matthias Clasen at Red Hat has landed some of the exciting Fedora 22 Workstation improvements this week that relate to the GNOME Shell environment.
-
-
Debian Family
-
-
Derivatives
-
Canonical/Ubuntu
-
Canonical has finally released the online Ubuntu Phone porting guide that should enable developers to get the Ubuntu Touch running on more devices out there that can easily support it.
-
-
-
The two companies are to publish their IoT developer APIs on Ubuntu Core so they can be used by Snappy developers in services and apps. The aim is to avoid a market fragmentation, and the new partnerships lay the groundwork to help Ubuntu Core’s development deeper into the IoT.
-
-
LinkSprite launched a gig-Ethernet version of its PCDuino3 SBC, featuring the same dual-core Allwinner A20 SoC, plus SATA, WiFi, and Arduino compatible I/O.
Like Hardkernel’s Odroid project and a few others, LinkSprite’s pcDuino community has been churning out ARM hacker boards over the last year with generally lower prices and improved features. The newly shipping pcDuino3B barely qualifies for the above description, but it should please pcDuino fans looking for a faster Ethernet connection.
-
Phones
-
Tizen
-
Samsung Electronics has introduced several of its products to the African market at the sixth annual Africa Forum in Antalya, Turkey which is a three-day forum. The main Interest for us here at Tizen Experts is the Samsung SUHD TVs that is being showcased there, as from 2015 onwards all Samsung TVs will run Tizen which is a HTML5 web standards open source platform.
-
Android
-
The two consumers who filed the suit failed to show that Google’s allegedly illegal restrictive contracts on manufacturers of Android devices resulted in higher prices on phones, U.S. District Judge Beth Labson Freeman said in a Feb. 20 ruling.
-
A federal judge on Friday dismissed a lawsuit accusing Google Inc of harming smartphone buyers by forcing handset makers that use its Android operating system to make the search engine company’s own applications the default option.
Consumers claimed that Google required companies such as Samsung Electronics Co to favor Google apps such as YouTube on Android-powered phones, and restrict rival apps such as Microsoft Corp’s Bing.
They said this illegally drove smartphone prices higher because rivals could not compete for the “prime screen real estate” that Google’s apps enjoyed.
-
Taking a look back at the week’s news across the Android world, this week’s Android Circuit highlights a number of stories including Samsung’s battery issues and the potential of wireless charging, the story J.K. Shin could tell the press at MWC, Sony abandons Android and its Xperia smartphones, Microsoft invests in Cyanogen, Xiaomi overtakes Samsung, designing for the South Korean company, Pebble picks up Android Wear support, and LoopPay’s Galaxy potential for payments.
-
-
Don’t panic, though. So far the outbreak in small and localized: around 10,000 cases have cropped up almost exclusively in China, none of which work on Android 5.0. But code spreads so fast these days and something so useful is bound to be popping in malicious apps from dodgy online stores in the near future.
-
The good news is that this creepy spyware isn’t something that has been, or probably ever will be, found in Google Play apps. Android has gone to great lengths to clamp down on fraudulent and malicious apps in its market, now scanning them both before and after you’ve installed them to your Galaxy, HTC One, Moto X, or whatever. So if you stick with the official Google app store, you should be safe from any of the above scariness.
-
Forget third-party widgets, Google’s Search app will now let you use your voice to toggle several settings on Android Lollipop devices.
-
Android users, update (or download) the Des Moines Register app for a new, improved reading experience.
-
After testing the feature with select users, it appears mobile messaging service WhatsApp is now rolling out the much awaited internet calling functionality to a wider set of people.
-
Launched on Thursday, BlackBerry 10 OS 10.3.1 provides the usual access to the BlackBerry World app store but also adds entry to the Amazon Appstore, where users can download a variety of Android apps. The latest update has started to roll out for several BlackBerry 10 devices, including the Passport, Z30, Z3, Z10, Q10 and Q5, along with the Porsche Design P’9983 and P’9982 smartphones.
-
set top box has been around for quite a while now, but it has never been as much of a priority for Apple as the iPhone, iPad or even Macs. Apple long regarded it as a hobby, and that attitude might have finally caught up with Apple TV. A prominent Apple blog has come out in favor of as a better option than the Apple TV. Yes, a writer at a well known Apple blog has actually opted for the Fire TV instead of the Apple TV.
-
Similarly, if a patch fixes a difficult and elusive bug, the maintainer might be willing to apply the patch by hand, fix build errors and warnings, fix a few bugs in the patch itself, run a full set of tests, fix and style problems, and even accept the risk that the bug might have unexpected side effects, some of which might result in some sleepless nights. This in fact is one of the reasons for the common advice given to open-source newbies: start by fixing bugs.
-
It was a little over four years that I was bitten by the bug for the Enlightenment desktop. It was fast, it was customizable, it was beautiful, but one thing it was not was easily accessible. There were countless directions on the internet of how to manually compile the latest version of the desktop from source repositories, but not only was this process complex – it was tedious.
-
-
-
Events
-
Attendance for SCALE looks like it may break previous records. Steve Bibayoff, who works the Free Software Foundation booth, asked me Friday evening if his badge number was any indication of how many people have registered so far.
-
Web Browsers
-
Mozilla
-
The second alpha release of the forthcoming Rust 1.0 is now available and it marks the landing of all major API revisions for this programming language’s major milestone.
-
We’ve managed to land almost all of the features previously expected for this cycle. The big headline here is that all major API revisions are finished: path and IO reform have landed. At this point, all modules shipping for 1.0 are in what we expect to be their final form, modulo minor tweaks during the alpha2 cycle. See the previous post for more details.
-
Oracle/Java/LibreOffice
-
The Document Foundation today announced the release of LibreOffice 3.4.6, the latest update for the conservative user and supported deployments. This release brings over 100 bug and security fixes as the foundation celebrates three years. TDF released a video as “a testimonial of the activity of many members of the LibreOffice community.”
-
Project Releases
-
Over the last few days I put together a new package RcppAPT which interfaces the C++ library behind the awesome apt, apt-get, apt-cache, … commands and their GUI-based brethren.
-
Openness/Sharing
-
Science
-
Recently I visited Whisk, a Manhattan store that sells kitchen goods, and next to the cash register was a strange, newfangled device: a 3-D printer. The store bought the device—which creates objects by carefully and slowly extruding layers of hot plastic—to print cookie cutters. Any shape you can think of, it can produce from a digital blueprint. There was a cutter in the shape of a thunderbolt, a coat of arms, a racing car.
-
Security
-
News roundup: Amid hidden add-ons, discontinued services and walled gardens, vendor trust proves elusive for several high-profile tech firms. Plus: Evidence ties North Korea to Sony Pictures hack; card brands boost cybersecurity; and cookies that last 8,000 years.
-
What do you do when you are facing scrutiny in the media? Damage control. You see it all the time with celebrities. A famous actor or musician does something wacky or stupid and ends up crying to Oprah, or going to rehab.
If you are a respected computer manufacturer, what do you do to fix a tarnished image? Open source. Nothing makes computer nerds more giddy than hearing that software is open source and the source code is available to investigate. Today, Lenovo releases an official open source Superfish removal tool under the Mozilla Public License.
-
Let’s say that you are looking for a watch and you visit Fred’s Fine Watches. Every time you want to look at a watch, someone grabs the key to the cabinet from Fred, uses a magic key creator to create a new key, opens the cabinet, grabs the watch from Fred, studies the watch, looks for “similar” watches, and jams advertising fliers for these other watches in your face – right in the middle of Fred’s Fine Watches! Even worse, they leave the key in the lock, raising the possibility that others could use it. Further, if you decide to buy a watch from Fred, they grab your credit card, read it, and then hand it to Fred.
After leaving Fred’s Fine Watches you visit your bank. You stop by your doctor’s office. You visit the DMV for a drivers license renewal. And, since this article is written in February, you visit your accountant about taxes. Someone now has all this information. They claim they aren’t doing anything with it, but there is no particular reason to trust them.
-
Defence/Police/Secrecy/Aggression
-
On March 17, 2011, the UN Security Council passed Resolution 1973, spearheaded by the administration of U.S. President Barack Obama, authorizing military intervention in Libya. The goal, Obama explained, was to save the lives of peaceful, pro-democracy protesters who found themselves the target of a crackdown by Libyan dictator Muammar al-Qaddafi. Not only did Qaddafi endanger the momentum of the nascent Arab Spring, which had recently swept away authoritarian regimes in Tunisia and Egypt, but he also was poised to commit a bloodbath in the Libyan city where the uprising had started, said the president. “We knew that if we waited one more day, Benghazi—a city nearly the size of Charlotte—could suffer a massacre that would have reverberated across the region and stained the conscience of the world,” Obama declared. Two days after the UN authorization, the United States and other NATO countries established a no-fly zone throughout Libya and started bombing Qaddafi’s forces. Seven months later, in October 2011, after an extended military campaign with sustained Western support, rebel forces conquered the country and shot Qaddafi dead.
-
Three people were killed Friday in a drone strike on southern Yemen, local residents say.
-
As an example last October an airdrop of weapons that was purported to go to the Kurds in the besieged town of Kobani in Syria to fight the Islamic State forces ended up in the wrong hands. As recently as last month it was discovered and reported that the US was regularly air dropping arms and supplies to the waiting Islamic State on the ground below in Iraq. Obama’s huff and puff rhetoric about hunting down the Islamic State in Syria in reality is merely another effectively deceptive ploy to commit air strikes on Assad’s Syria that he couldn’t get away with the year before right after the false flag chemical weapons attack committed by US backed rebels (that were later renamed ISIS). So now both Israeli and US military air strikes are taking out infrastructure inside Syria that hurts the Syrian people, destroying oil refineries and food storage silos.
-
The Obama administration is opening the door for US military drone makers to sell their unmanned killing machines overseas.
“The new export policy is part of a broader United States UAS [unmanned aircraft system] policy review which includes plans to work with other countries to shape international standards for the sale, transfer, and subsequent use of military UAS,” the State Department said in a statement.
-
Instro is owned by Israeli arms company Elbit Systems, who make drones that are used to kill Palestinian civilians in Gaza. Optical and camera systems like those made at the Instro factory are also supplied by Elbit for use in drones flown over Afghanistan, as well as in Israel’s apartheid wall.
-
This past weekend, 700 British artists had a letter published in the Guardian in which they called on others to boycott Israel until what they term the “colonial occupation” ends. As an Israeli politician who supports the creation of a Palestinian state, it has been a long time since I saw a letter so shallow and lacking in coherence.
-
I was born in Israel and it was many years before I realized that Israel was Palestine. I was relatively patriotic. I was looking forward to serving in the army and then I grasped that there was little truth in the Jewish historical narrative. I then gathered that I was living on someone else’s land. At the same time I discovered the saxophone. By the age of 30, I left Israel and never went back.
-
When U.S. media and U.S. government officials ask, “who are the murderers,” the default answer is enemy soldiers.
-
Dick Cheney and George Bush have no regrets about war. No regrets about torture. They defend waterboarding, mock execution, and rectal feeding. Bush referred to the men and women who conducted this savagery as “patriots”. Commander-in-Chief Obama, with his Kill List, drones, incinerating civilians, inspiring even more hatred of the USA.
-
Many Americans would find it strange to think of their local Cineplex as propaganda sites. But more than six and a half decade ago, the notion of US movies as tools of propaganda was hardly debatable for right-wing McCarthyites determined to eliminate leftists from Hollywood. As US Court of Appeals Justice Bennett C. Clark explained in upholding the conviction of ten Hollywood screenwriters and directors who refused to “confess” current or past Communist Party membership in 1949, US motion pictures play “a critically important role” as “a potent medium of propaganda dissemination” (quoted in Ellen Schrecker, Many Are the Crimes: McCarthyism in America [Boston, 1998], 328).
-
When she took a look at the script for George Brant’s “Grounded,” a one-woman play about an Air Force fighter pilot coping with the changing landscape of 21st-century warfare, actress Celeste Oliva wasn’t sure it was for her. But director Lee Mikeska Gardner was insistent.
-
Military action works only if we target weapon caches and the actual terrorists who commit these atrocities. We also need to understand that killing ISIS members will not stop the fanatical ideology. Only until the people of those nations fully reject the fanatical and distorted version of Islam ISIS has manufactured to suit their violent agendas, military action will do very little to stop them.
-
I have been a minister in the United Church of Christ for more than 40 years. My religious convictions have led to my activism in seeking a more just and peaceful world. Right now, that activism centers on American use of drone warfare as one of the greatest threats to global peace.
-
At least eight Taliban rebels were killed in a United States-led drone strike in eastern Nangarhar province of Afghanistan on Wednesday, said officials.
-
President Barack Obama’s decision to sell missile-carrying drones like the Predator and Reaper to U.S. allies has raised questions over whether this marks another step in the evolution of robo-warfare, or is just a boon to U.S. military contractors already making them.
-
The US is to export armed drones to sell to its military allies around the world, a move that has been welcomed by the arms industry but provoked outrage among human rights campaigners.
-
The State Department said Tuesday the new policy would allow foreign governments that meet certain requirements — and pledge not to use the unmanned aircraft illegally — to buy the vehicles that have played a critical but controversial role in combating terrorism and are increasingly used for other purposes. Recipient countries would be required to sign end-use statements certifying that the drones would not be used for unlawful surveillance or force against domestic populations and would only be used in internationally sanctioned military operations, such as self-defense.
-
Six people were arrested at Beale Air Force Base in protest of people killed by government drones.
Protest organizers said six men and women were taken into custody during an Ash Wednesday service at the Beale gate.
The participants are accused of trespassing onto federal land, and they were arrested by military police as they spread ashes memorializing those killed by U.S. drones overseas.
-
Six people were arrested at a Northern California air force base in protest of people killed by government drones.
Protest organizers said six men and women were arrested during an Ash Wednesday service at the gate of Beale Air Force Base.
-
Six people were arrested at a Northern California air force base in protest of people killed by government drones.
Protest organizers said six men and women were arrested during an Ash Wednesday service at the gate of Beale Air Force Base.
-
Yemen’s former president Abd-Rabbu Mansour Hadi escaped weeks of house arrest by the Houthi militia at his official residence on Saturday and fled to his home town of Aden, sources close to him said.
-
The former president of Yemen wore a disguise to escape from house arrest today to fly to his home town of Aden, an official has said.
Abd-Rabbu Mansour Hadi fled his official residence in Yemeni capital Sanaa after weeks of house arrest by the Shia Houthi militia, who looted the property soon after his departure.
-
-
American foreign policy is controlled by fools. What else can one conclude from the bipartisan demand that the U.S. intervene everywhere all the time, irrespective of consequence? No matter how disastrous the outcome, the War Lobby insists that the idea was sound. Any problems obviously result from execution, a matter of doing too little: too few troops engaged, too few foreigners killed, too few nations bombed, too few societies transformed, too few countries occupied, too few years involved, too few dollars spent.
-
The challenge of jihadism in Iraq, Syria, Libya and elsewhere is reinforcing the United States’s embrace of “remote control” warfare.
[...]
American arms companies engaged in armed-drone development and production have often complained at the US government’s restrictions on their exports, which leaves competitors such as Israeli arms companies in a good place to benefit. That official policy may now be coming to an end.
-
As President Barack Obama presented his proposed Authorization for Use of Military Force (AUMF) to Congress, he declared, “I do not believe America’s interests are served by endless war, or by remaining on a perpetual war footing.” Yet Obama’s proposal asks Congress to rubber-stamp his endless war against anyone he wants, wherever he wants. Obama has launched 2,300 airstrikes in Iraq and Syria since August 8, 2014. In his six years as president, he has killed more people than died on 9/11 with drones and other forms of targeted killing in Pakistan, Yemen and Somalia – countries with which the United States is not at war.
-
In his speech this week to his anti-extremism conclave in Washington, President Obama declared that “former extremists have the opportunity to speak out, speak the truth about terrorist groups, and oftentimes they can be powerful messengers in debunking these terrorist ideologies.”
-
The shooting of three American Muslim students in Chapel Hill, North Carolina, this month has focused attention on anti-Muslim hatred in the US.
There are strong reasons for thinking the suspect, Craig Stephen Hicks, was motivated by anti-Muslim animosity to murder Deah Barakat, 23, Yusor Abu-Salha, 21, and Razan Abu-Salha, 19. The FBI is now investigating the case as a possible hate crime, although initial reports stated the murder may have been about a dispute over parking.
-
Insurgents, government forces and international troops all contribute to highest total in five years since records began
-
Yemen is grabbing international attention – the government ousted, the president under house arrest and rebels in power. Will the country slide into Syria-style civil war? And with Al-Qaeda in Yemen growing stronger, who will be there to stop it? We ask a leading Yemeni politician, state minister, and former mayor of the capital, Sanaa, Ahmed Al-Kohlani on Sophie&Co.
-
“From all indications, the special operation in Mamasapano, Magindanao is a U.S. operation from the start. Of course the Aquino government won’t admit that because if they do, they would inadvertently confirm the US direct intervention.” This is the conclusion Prof. Roland Simbulan of UP Manila shared with the media at Thursday’s press conference of Save the Nation: Aquino Resign Movement.
Based on Simbulan’s study of what have been revealed by SAF survivors of the incident, the fact that it was a US operation, that it was illegal and the Aquino government and the US are trying to cover it up resulted in the high number of casualties.
-
-
Environment/Energy/Wildlife
-
After a massive oil tanker derailed in West Virginia, several members of Fox News claimed that the accident demonstrates the need to build the Keystone XL pipeline because it is supposedly “safer” to transport oil by pipeline than by train. However, pipelines spill even more oil than trains, and when a major pipeline spill recently occurred near Keystone XL’s proposed route, Fox News barely mentioned the spill and didn’t once connect it to legitimate safety concerns about Keystone XL.
-
It may have felt too cold on Friday in much of the East to even think of walking outside. But since drones don’t feel cold, why not fly one over a mostly frozen Niagara Falls? That’s exactly what Canadian videographer Brent Foster did on Friday. The results were spectacular.
-
-
New Yorkers like to complain about the weather, especially in the summer when it can get hot and muggy. Well, they ain’t seen nothing yet. A new report envisions a wet, overheated future for New York City, saying temperatures and sea levels will rise as climate change settles in over the coming decades. The report for 2015 released by the New York City Panel on Climate Change on Tuesday says average temperatures could increase by as much as 5.3 to 8.8 degrees by the 2080s — with sea levels rising a full 18 to 39 inches. At worst, seawaters could rise 6 feet by 2100, researchers project. “These changing climate hazards increase the risks for the people, economy, and infrastructure of New York City,” the report states. The city is also likely to see its annual rainfall increase about 5 to 13 percent by the 2080s. These changes could add up to flood damage beyond what was seen during Hurricane Sandy, affecting wide portions of Queens, Brooklyn, and the Bronx, according to the report.
-
PR/AstroTurf/Lobbying
-
Wisconsin Republicans have called a special session to take up a “right to work” measure attacking private sector unions–and the text of the bill, the Center for Media and Democracy has discovered, is taken word-for-word from American Legislative Exchange Council (ALEC) model legislation.
-
One of the most deceptive and disturbing aspects of America’s political culture is the assumption that by having a free press and a democratic government, our country has erected a bulwark that restrains our leaders from committing the type of atrocities committed by our nation’s enemies.
-
Most prominently, Mother Jones’ David Corn (2/19/15) pointed out that despite O’Reilly’s claim (in his book The No-Spin Zone) that “I’ve reported on the ground in active war zones from El Salvador to the Falklands,” in reality he was never on the islands that Argentina and Britain fought a war over in 1982. Nevertheless, O’Reilly has repeatedly boasted of his exploits on the remote South Atlantic islands–telling a detailed anecdote in 2013, for example, of saving his injured photographer “in a war zone in Argentina, in the Falklands.”
-
Censorship
-
“Charlie Hebdo,” a French satirical newspaper, was used to making headlines for its provocative cartoons – especially those featuring the prophet Mohammad. But that changed in January when two brothers stormed the newspaper and killed the publication’s editor and cartoonists.
-
Privacy
-
In the latest leaks from The Intercept leaked documents show that the NSA and GCHQ used the previously talked about X-KEYSCORE program to stalk employees of SIM maker Gemalto. The agents managed to break in to the email and Facebook accounts of the employees to steal information secretly which they’d go on to use to collect encryption keys for the SIM cards.
-
On his blog, Matthew Green gives an update on the plans to audit the TrueCrypt disk encryption tool. Green led an effort in 2013 to raise money for an audit of the TrueCrypt source code, which sort of ran aground when TrueCrypt abruptly shut down in May 2014.
-
There’s a story on Hacker News asking what the hell is going on with the Truecrypt audit. I think that’s a fair question, since we have been awfully quiet lately. To everyone who donated to the project, first accept my apologies for the slow pace. I want to promise you that we’re not spending your money on tropical vacations (as appealing as that would be). In this post I’d like to offer you some news, including an explanation of why this has moved slowly.
-
UK intelligence agencies’ policies on handling communications between lawyers and clients breached European human rights law, the government has said.
-
An alleged British hacker who has criminal charges pending in three American federal districts is preparing to petition a Suffolk County, United Kingdom court to compel the National Crime Agency (NCA) to return his encrypted seized computers and storage devices.
The BBC reported Friday that Lauri Love “will petition Bury St Edmunds magistrates for the return of his property,” adding that “the BBC understands that the NCA has been unable to decrypt some of the files and does not want to return the computers and media devices until Mr Love helps them to decrypt them.”
-
Police in the UK, who arrested a man accused of hacking FBI computers in the US, are refusing to return his computer because they cannot decrypt its files.
Lauri Love, 30, of Stradishall, Suffolk, who is accused of hacking offences in the US, was arrested in Britain in October 2013.
-
Today The Ridenhour Prizes announced that Academy Award–nominated documentary CITIZENFOUR, directed by Laura Poitras, will receive the 2015 Documentary Film Prize. The Ridenhour Documentary Film Prize is conferred to films of exemplary merit to “encourage those who persevere in acts of truth-telling that protect the public interest, promote social justice, or illuminate a more just vision of society.”
[...]
“We’re honored to receive this award, which recognizes a legacy of whistleblowers and adversarial journalism,” said Laura Poitras. “This film and our NSA reporting would not have been possible without the work of the Free Software community that builds free tools to communicate privately. The prize money for the award will be given to the TAILS Free Software project.”
-
Yesterday, The Intercept reported that the US National Security Agency (NSA) and the British Government Communications Headquarters (GCHQ) collaborated to hack the network of the world’s largest SIM card manufacturer and obtained the encryption keys that protect the privacy of cell phone communications. The Center for Technology & Democracy (CDT) released the following statement in response:
-
The four of us most certainly know the enormity of the responsibility of keeping Canada safe, something always front of mind for a prime minister. We have come together with 18 other Canadians who have served as Supreme Court of Canada justices, ministers of justice and of public safety, solicitors-general, members of the Security and Intelligence Review Committee and commissioners responsible for overseeing the RCMP and upholding privacy laws.
-
As four former prime ministers called for renewed efforts to enhance the oversight of national-security agencies, Prime Minister Stephen Harper said on Thursday that he prefers the status quo.
-
-
U.S. and British spies hacked into the world’s biggest maker of phone SIM cards, allowing them to potentially monitor the calls, texts and emails of billions of mobile users around the world, an investigative news website reported.
-
Gemalto, the Dutch security firm, has opened an investigation looking into the claims that the company’s network was hacked, resulting in leakage of millions of communications worldwide.
-
Former National Security Agency contractor Edward Snowden has revealed so much information about government spying in the past two years that little seems shocking. But allegations in his latest leak, published by the Intercept, could upend any chance the White House has of mending relations with Silicon Valley in the near future.
-
European officials are demanding answers and investigations into a joint U.S. and U.K. hack of the world’s largest manufacturer of mobile SIM cards, following a report published by The Intercept Thursday.
The report, based on leaked documents provided by NSA whistleblower Edward Snowden, revealed the U.S. spy agency and its British counterpart Government Communications Headquarters, GCHQ, hacked the Franco-Dutch digital security giant Gemalto in a sophisticated heist of encrypted cell-phone keys.
-
The world’s biggest SIM card manufacturer, Gemalto, revealed yesterday to have been hacked by the NSA and GCHQ, has taken a $470m hit in its stock price.
-
Email servers still compromised after THREE months
-
Former Florida governor Jeb Bush delivered a full-throated defense of government surveillance programs on Wednesday, expressing a resounding faith in techniques pioneered by his brother, George W Bush, and staking out a position in sharp contrast with other prospective 2016 presidential candidates.
-
Former Florida Gov. Jeb Bush, who is seriously considering a run for the White House in 2016, said Wednesday that the National Security Agency’s program that collects bulk telephone records was “hugely important,” throwing his support behind the practice as Congress debates whether to reauthorize or limit it.
-
The NSA backs FBI conclusion that North Korea was responsible for the damaging hack of Sony Pictures
-
-
The world’s largest maker of Sim cards, Gemalto, says it cannot verify a report that it was hacked by UK and US spy agencies to steal encryption keys used to protect the privacy of mobile phone communications.
-
It’s been almost five years since the discovery of Stuxnet disabused the world of its naivety about nation state malware but since then more attention has been paid to Edward Snowden’s NSA hacking revelations than the occasional technical insights into old-style spying software.
Kaspersky Lab’s Equation group report, then, has been a bit of a body shaker while helpfully moving the story on a bit. We can now see that Stuxnet was, as everyone suspected, the business end of a far large platform containing eight or nine modules whose genesis goes back as far as 2001, the defining year for so many things that have been going on behind everyone’s backs.
-
British and US securities services have hacked into the world’s biggest SIM-card maker and stolen billions of encryption keys, according to the latest leaks from whistleblower Edward Snowden.
-
Following a report yesterday that US and UK spies hacked Dutch security firm Gemalto to track mobile phone users across the globe, the company says it has opened an investigation into the claims.
Allegations of the hack came from the latest documents leaked by former National Security Agency (NSA) contractor Edward Snowden and published by The Intercept yesterday.
According to the documents, the UK’s surveillance agency GCHQ and the US’ NSA teamed up in 2010 and 2011 to penetrate Gemalto’s internal network and steal encryption keys that would allow the organisations to monitor mobile communications without the assistance of telecoms companies.
-
Gemalto, a French-Dutch digital security company, said on Friday that it was investigating a possible hacking by United States and British intelligence agencies that may have given them access to worldwide mobile phone communications.
-
-
Britain’s electronic spying agency and the US National Security Agency stole codes from a Dutch company allowing them to eavesdrop on mobile phones, documents suggest.
-
NSA and GCHQ told to stop pretending that law doesn’t apply to them after revelations that they gained access to Dutch manufacturer Gemalto’s encryption keys
-
It would be another powerful tool in the arsenal of US and British spy services: the encryption keys for a large share of the SIM cards used for mobile phones.
A report by the investigative news website The Intercept, citing leaked documents from former National Security Agency contractor Edward Snowden, said the US and British agencies “hacked into” the European manufacturer Gemalto to gain these keys.
-
Initially Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs. Naming the attacking group “The Equation Group”, it targeted Government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said. However it declined to mention who the Equation Group was.
-
Just a week ago, President Obama assured the public that he understood the importance of securing the privacy of mobile phone networks.
“Ultimately, everybody — and certainly this is true for me and my family — we all want to know that if we’re using a smartphone for transactions, sending messages, having private conversations, that we don’t have a bunch of people compromising that process,” Obama told technology site re/code in an interview. “So there’s no scenario in which we don’t want really strong encryption.”
-
Sqrrl, the big data startup whose founders used to work for the NSA, plans to announce Thursday that it is shifting its focus to cyber security with a new release of its enterprise service. The startup is also taking in a $7 million Series B investment round, bringing its total funding to $14.2 million, said Ely Kahn, a Sqrrl co-founder and vice president of business development.
-
There are numerous potential threats to Internet security: lone-wolf hackers, state-sponsored cyber attacks, or identity and data theft, for example. But one of the most difficult cybersecurity challenges to identify and prevent are the Edward Snowdens — the players already inside an organization who are looking to steal or share sensitive information.
-
In the second major big-data analytics deal in Boston in two days, Cambridge startup Sqrrl has raised $7 million in Series B funding. The deal comes a day after Cambridge analytics technology startup RapidMiner announced raising a Series B of its own, at $15 million.
-
There is strong speculation that the so-called Equation Group – which infected the hard drive firmware of Seagate, Maxtor, Toshiba and others, and hit political and commercial targets in over 30 countries in the last 15 to 20 years – is America’s NSA.
-
The Week’s Washington correspondent Ryan Cooper rarely has a nice thing to say about the NSA, which is understandable because the NSA is an almost-categorically distrusted agency. If it were a baby, it’d be one of those really ugly babies that would cause people to say, “Darn, only a mother would love that.” Whether the NSA’s shrouded parentage actually approves of it is up for debate. What’s not up for debate is Cooper’s categorical dislike for the government’s surveillance goons.
-
The NSA may be attacking foreign governments with a virus that can only be removed by putting a sledgehammer through the hard drive.
The U.S. National Security Agency has created a trove of spyware that is difficult to detect and almost impossible to remove, cyber security experts warned Monday.
-
If privacy conscious folk aren’t already using encrypted mobile communications apps (I can personally vouch for WhatsApp or TextSecure for texts, and RedPhone or Signal for calls), they should be convinced to do so by the latest Edward Snowden revelations in The Intercept. They outline GCHQ’s “DAPINO GAMMA” attack on the world’s biggest provider of SIM cards, Gemalto , as well as widespread targeting of telecoms industry employees the world over. With the NSA, GCHQ has effectively destroyed any remaining shred of trust people had in use of everyday telecoms services.
-
It’s not just the National Security Agency that’s using hackers to do some scary snooping this time. The U.K.’s Government Communications Headquarters and the NSA worked together to hack Gemalto, a Dutch SIM card manufacturer.
The story originally came from The Intercept, a site that publishes NSA documents originally leaked by Edward Snowden.
-
None of us are perfect. All of us bend the rules occasionally. Even before the age of overcriminalization, when the most upstanding citizen could be counted on to break at least three laws a day without knowing it, most of us have knowingly flouted the law from time to time.
-
Drones, which will begin to take to the skies en masse this year, will be the converging point for all of the weapons and technology already available to law enforcement agencies. This means drones that can listen in on your phone calls, see through the walls of your home, scan your biometrics, photograph you and track your movements, and even corral you with sophisticated weaponry.
-
Civil Rights
-
Attorney General Eric Holder delivered a luncheon speech on sentencing reform at the National Press Club on February 17. He then answered questions after his speech. One of the questions involved President Barack Obama and his administration’s unprecedented crackdown on leaks.
“The Obama administration has prosecuted eight alleged whistleblowers under the Espionage Act, more than all previous presidential administrations combined. What justifies this more aggressive posture toward leakers?” a person attending the speech asked.
-
It has been appalling. The result is that a particular type of incarcerated figure has come into being: the Guantanamo inmate, one who is neither guilty nor innocent, yet too ‘dangerous’ to release. The result is, effectively, indefinite detention. (The point is also to be found in other countries, for instance, Australia, whose domestic intelligence agency has used assessments to prevent unconvicted, uncharged detainees from being released.)
-
If President Obama’s nominee for attorney general, Loretta Lynch, gets appointed, she will continue the practice of her predecessor by expanding presidential power and the federal government, ultimately threatening the liberty of American citizens and the stability of the nation. It is the Senate’s constitutional duty to make sure that doesn’t happen.
-
He found himself sent for secondary inspection at American airports, where he was asked if he had ever received combat training. As America prepared to attack Afghanistan, he wrote a piece for an American newspaper about how scared his family were of the coming war.
-
Critics of President Obama’s proposed Authorization for Use of Military Force AUMF) against ISIS have been focused upon its deliberately obfuscatory and ambiguous language, which they rightly note would make it essentially a carte blanche from Congress allowing the president to go to war almost anywhere some would-be terrorist or terrorist copycat could be found who claims affinity with ISIS.
-
Today, our commonwealth and the country at large are being poisoned by a toxic brew of extremism, gridlock and cynicism about leadership itself. Congress is both historically unpopular and unproductive. President Barack Obama has been stymied in his quest to bring hope and unity to a country divided between red and blue. And here in Richmond, many leaders of both parties can barely speak to each other, let alone compromise, on issues ranging from Medicaid expansion to nonpartisan redistricting.
-
As the White House prepares for a major summit discussing how the root causes of terrorism and violent extremism, the Daily Lobo talked with Nakhleh about why people become terrorists, and what governments and communities can do to deal with the problem.
What are the main factors that contribute to a person turning into a terrorist?
-
Internet/Net Neutrality
-
The Times blog cited research from the Progressive Policy Institute (PPI) to claim that implementing the stricter net neutrality rules proposed by FCC chairman Tom Wheeler to protect consumers from paid prioritization of Internet access would cost “$15 billion a year,” and the recently presented bipartisan legislation would lower the cost to $11 billion.
Permalink
Send this to a friend
02.20.15
Posted in News Roundup at 8:23 pm by Dr. Roy Schestowitz

Contents
-
With so many devices already based on Linux — Android devices and Chromebooks, to name a few — it makes sense for some companies to consider virtual and cloud-hosted Linux desktops. Windows applications are a hurdle, however.
-
Desktop
-
Now that we’ve pretty well figured out that the huge “Unkown” thing in StatCounter‘s “desktop” OS category is closely related to Android/Linux, this graph makes sense. Some people in Canada are hooking up Android/Linux systems to big screens. GNU/Linux is growing pretty well, not explosively, but definitely breaking out of the ~1% doldrums. ChromeOS is on a plateau, probably because schools just buy once or twice per annum. It’s all good. The grand total? 2.6%. It’s not wonderful but a far sight better than a year ago and this time GNU/Linux seems to be going places steadily. We have product/salesmen/promoters doing the job, finally. The growth in share is small, but this is a measure of a considerable rate of change of shipments/units/migrations on top of a huge installed base of PCs.
-
With all the licensing troubles that can come with hosting Windows desktops in the cloud, some companies — and vendors — are looking to Linux operating systems instead.
VMware plans to offer a Horizon View client for Linux, and Horizon DaaS, formerly Desktone, has had a hosted Linux option for years. Citrix is planning a similar strategy for XenDesktop and XenApp with Linux Virtual Apps and Desktops. These two big-name virtualization vendors putting attention on Linux shines a spotlight on the OS.
-
Server
-
-
Every summer, I board a charter boat out of Captree State Park in New York to go fishing. Why do I do this? I love to fish and I cannot afford my own boat, so it is a great way to experience the Long Island nautical life for the afternoon (not to mention catch a tasty dinner). It is also a great way to have a technology-free day, leaving the smartphone at home and replacing it with a rod in my hand.
-
-
acebook recently released as an open source project its design for a networking device that it says will coordinates the actions of hundreds of thousands of servers in Facebook’s data centers.
-
Hewlett-Packard said on Thursday that it would sell a new line of networking switches that are manufactured by a Taiwanese company and depend on Linux-based, open-source software from another company.
-
Kernel Space
-
The demand for Linux developers has jumped seven percent in comparison to last year, a study has shown.
The 2014 Linux Jobs Report shows that hiring managers at tech-powered companies are focusing more attention on Linux talent, and that’s reverberating in the market, with stronger than average salary increases to those working with the OS.
Dice and The Linux Foundation surveyed both hiring managers and Linux talent to gain a 360-degree view of the thriving jobs landscape, and here’s what they found.
-
Ingo Molnar has asked Linus Torvalds to pull the x86 platform support for Intel Quark SoC systems for the Linux 3.20/4.0 kernel.
-
Last weekend I covered the changes so far for the next kernel release, which will be called either Linux 3.20 or Linux 4.0 depending upon Linus Torvalds’ end decision. This week more exciting code has landed.
-
Zemlin quoted the oft-repeated Linus’ law, which states that given enough eyes all bugs are shallow. That “law” essentially promises that many eyes provide a measure of quality and control and security to open source code. So if Linus’ law is true, Zemlin asked, why are damaging security issues being found now in open source code?
-
The year 2038 is still more than two decades away, but LWN.net editor and longtime Linux kernel chronicler Jon Corbet believes software developers should be thinking about that date now, particularly in the Linux world.
Corbet raised the issue at his annual “Kernel Report” talk at the Linux Foundation Collaboration Summit in Santa Rosa, California this week. “Time to start worrying,” he said.
The issue is similar to the dreaded Y2K bug, in that a longstanding deficiency in the way some computers record time values is due to wreak havoc in all manner of software, this time in 2038.
-
Graphics Stack
-
While the Tamil driver is moving along for open-source ARM Mali T-Series graphics support, it could be a while before seeing the actual source code.
Luc Verhaegen presented at FOSDEM a few weeks back about his work on Tamil, the Lima driver project’s work on supporting the newer ARM Mali T-Series GPUs found on various SoCs. While Luc showed off some demos and is working towards a Tamil Mesa driver, the code hasn’t yet been opened up.
-
Applications
-
Calibre, an application that can be used to view, convert, and edit eBooks, has been upgraded and it has advanced to version 2.20. It comes with a quite a few new features and is now ready for download.
-
The Ubuntu Touch platform is about to received a new messaging client called Tox that aims to provide the most secure environment possible for its users.
-
-
I recently started using a text editor called Vim. For the uninitiated, Vim is a lightweight text editor often used for writing code that it comes pre-loaded on some if not all remote servers. Since it’s designed to be used without a mouse, there are tons of keyboard shortcuts to learn. This part isn’t a huge deal—for now just know that Vim is a text editor, like Notepad or Sublime Text or Word. (And note that I am still pretty shitty at using it.)
-
Instructionals/Technical
-
Wine or Emulation
-
Wine 1.7.37 was released today with various changes that have built up in the Wine community over the past two weeks.
-
Wine 1.7.37 has just been released today, February 20, and it brings interface change notifications, support for the UTF-7 character encoding, various graphical fixes for themed controls, support for multi-channel audio, a new implementation of Wininet on top of the Win32 sockets, as well as several bugfixes.
-
-
Games
-
Bleed is an indie bullet hell shootem-up platformer by Bootdisk Revolution. Originally released in 2013, the developer had stated low hopes of a native port release, but the wait for that day is now over! After showing up silently in my library, I decided to finally check it out and am very pleased to play this game!
-
The game is a 3D, third-person, arcade-style, action-game that combines the tactical and skill-based combat of a Fighter with the progression, overwhelming odds, and awesome boss battles of an old-school Brawler!
-
Let’s get this straight, the Streaming feature of Steam and SteamOS is not the main aim of Steam Machines, but it is a complementary feature designed to help Windows gamers who can’t get their entire catalogue on SteamOS right away. I’ve seen some writers mention the Streaming feature as if that is what SteamOS was mainly designed for, but it’s the tip of the iceberg. It’s certainly a nice feature, but there’s a lot more to Steam Machines.
-
Bleed is a new 2D action platformer developed and published by Ian Campbell on Steam for Linux. The developer has released a patch for the game and made it compatible with the Linux platform.
-
Desktop Environments/WMs
-
After several emails between Xfce developers and numerous delays, it appears that the highly anticipated Xfce 4.12 desktop environment will finally be released at the end of February 2015, in the last weekend, most probably on March 1, if nothing goes wrong.
-
Earlier this week we wrote about plans for Xfce 4.12 to finally be released and that it was being targeted for the end of February. Unlike failed Xfce 4.12 plans of the past few years, it looks like this release will actually pan out in one week’s time.
-
GNOME Desktop/GTK
-
I wrote a post last summer about preventing Chrome from stealing the media buttons (like play, pause, previous track and next track) from OS X. Now that I’m using Linux regularly and I fell in love with Google Play Music All Access, I found that GNOME was stealing the media keys from Chrome.
The fix is quite simple. Press the SUPER key (Windows key or Mac Command key), type settings, and press enter. Click on Keyboard and then on the Shortcuts tab. You should now see something like this.
-
-
Reviews
-
Bodhi GNU/Linux is a Ubuntu-based distribution designed especially for Desktop computing and is best known for its elegant and lightweight nature. The Distribution philosophy is to provide a minimal base system that can be populated with the applications as per user’s choice. The base System only include those applications which are essentially required viz., ‘Etecad‘ File Manager, ‘Midori‘ web browser, ‘Terminology‘ terminal emulator, ePhoto and ePad. Apt or AppCenter can be used to download and install lightweight applications in one go.
-
New Releases
-
Cecil Watson, the developer of the LinHES (formerly KnoppMyth) GNU/Linux Live operating system designed especially to be used as a home entertainment system, proudly announced the immediate availability for download of LinHES 8.3 (Lorne Malvo), a release that introduces a new Linux kernel, as well as updated Nvidia drivers and core components.
-
Red Hat Family
-
Red Hat’s (RHT) investment in ARM hardware is heating up. This week, the company announced that more than 35 hardware and software companies have joined its ARM Partner Early Access Program, and that it expects its partners to begin delivering ARM software and drivers to the open source community starting now.
-
Fedora
-
Matthias Clasen recently posted some updates on the Fedora development list about new features in Fedora 22 Workstation. As you may know, we’re getting ready to issue an Alpha, so it’s a great time to try out these changes.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Canonical announced that Ubuntu 14.04.2 LTS (Trusty Tahr), the second point release for the latest LTS branch, has been released and is now available for download.
-
After getting an option to always show the menus as well as global menu (Appmenu) support for Java Swing applications, yet another menu-related change has landed in Ubuntu 15.04 Vivid Vervet: locally integrated menu (LIM) is now the default menu.
-
While Canonical remains committed to Mir as the future display server technology for Ubuntu Linux both on the desktop and for mobile devices, the upcoming Ubuntu 15.04 release does have the latest Wayland/Weston 1.7 support too.
-
Flavours and Variants
-
The second update to our LTS release 14.04 is out now. This contains all the bug fixes added to 14.04 since its first release in April. Users of 14.04 can run the normal update procedure to get these bug fixes.
-
Kubuntu 14.04.2 LTS (Trusty Tahr), a Linux distribution based on Ubuntu that uses the KDE desktop environment, has been released and is now available for download.
-
Along with the release of Ubuntu 14.04.2 LTS (Trusty Tahr) GNU/Linux computer operating system, as announced by Adam Conrad on behalf of Canonical, the Edubuntu team was also proud to announce earlier today, February 20, the immediate availability for download of Edubuntu 14.04.2 LTS, a release that includes new kernel and graphics stacks.
-
Elementary OS 0.3 Freya Beta 2 has been released by Elementary OS Team, based on Ubuntu 14.04 LTS and featuring with pantheon desktop environment, it comes with various User Interface improvements, UEFI/SecureBoot support, better and more discoverable multitasking, updated 3rd party apps (including Geary, Simple Scan, Document Viewer & more), Updated development libraries (including Gtk 3.14), Security and Stability improvements, tons of stylesheet and icon changes and fixes along with other interesting changes as well as almost 600 bug fixes.
-
-
Well, this is starting to look sort of like “Jamie’s Mostly Raspberry Pi Stuff”, but that’s not intentional. There are just a lot of interesting things going on with the RPi at the moment, so that’s where I seem to be spending a lot of my time right now.
The big news, of course, was the announcement and immediate availability of the Raspberry Pi 2 hardware two weeks ago. The new hardware needs updated software to really make the most of its capabilities, so there was also a new Raspbian and NOOBS release (1.3.12) made at the same time.
-
Release 7.9 of GDB, the GNU Debugger, is now available via anonymous FTP. GDB is a source-level debugger for Ada, C, C++, Objective-C, Pascal and many other languages. GDB can target (i.e., debug programs running on) more than a dozen different processor architectures, and GDB itself can run on most popular GNU/Linux, Unix and Microsoft Windows variants.
-
Phones
-
Android
-
Gauging what a smartphone is going to look like before its released is sort of like solving one of those toss-up puzzles on Wheel of Fortune – the answer gets clearer the longer you wait.
-
The T-Mobile variant of the Galaxy S5 is the latest to jump on board the Lollipop train. It’s been refreshing to see Samsung’s flagship score the latest Android build so quickly in comparison to previous versions of Android, especially with a new Galaxy S6 just around the corner.
However, there are other updates to consider. Each week we gather up all the major software updates for the biggest devices; phones and tablets on U.S. carriers (and unlocked phones, of course), wearables, and round them all up so you don’t miss a thing.
-
During Google I/O 2013 we were first introduced to Android Studio, though it would be two years before it would leave beta. Android Studio 1.0 arrived last December, but Google is wasting no time in pushing the platform forward now that it is out of beta. With that in mind, Android Studio 1.1 is now hitting the stable channel after two months of cooking in the background.
-
The malware requires an Android device to be “rooted,” or modified to allow deep access to its software. That may eliminate a lot of Android owners who don’t modify their phones.
-
-
-
The Android 5.0.2 Lollipop update and Android 5.0.1 Lollipop update no longer serve as the company’s most current version of its new operating system. That distinction belongs to Android 5.1 Lollipop, a mysterious new update that is currently available on select Android One smartphones. Today, we want to set the table and take a look at what we expect from Google, its Android 5.1 update and the Android 5.1 release.
-
YouTube will release a new app designed for kids on Monday, the Google-owned video service has confirmed to The Verge. The app — called YouTube Kids — will reportedly offer original episodes of TV shows aimed at youngsters, in addition to videos from child-centric channels on YouTube, and will let parents set timers to stop their spawn from watching too long.
-
Some devices have already been rumored to be running on Android 5.1 Lollipop, but when will it be issued to Motorola devices?
At the start of February, Tech Radar said that owners of the second generation Motorola Moto G (2014) may receive the Lollipop update soon.
-
Google’s forthcoming Android 5.1 Lollipop update returns to the spotlight, as a HTC official has confirmed its release date for March on a spate of devices including the HTC One M7 Google Play Edition (GPE).
-
Facebook is now contributing more to external open source projects and keeping closer tabs on its own open source efforts
-
-
Canonical has announced that a Bind vulnerability has been found and fixed for Ubuntu 14.10, Ubuntu 14.04 LTS, Ubuntu 12.04 LTS operating systems.
-
A few days ago Pivotal made three major announcements: the creation of a Big Data Product Suite, a partnership with Hortonworks and the launch of an ‘Open Data Platform’.
-
There are many memorable quotes attributed to Tim O’Reilly. Which isn’t surprising. He’s been talking for decades about open data, the internet and the direction technology is taking us. Like Arthur C Clarke, much of what he’s predicted, talked about and written has proven incredibly judicious. He popularised the ideas behind ‘Web 2.0’, as well as the incoming wave and impact of social media. He believes in an open government and that the internet will become a global brain of networks and things.
-
A decade ago now, I was recruited by ZDNet to launch a blog about open source software.
At the time, the concept was controversial. Proprietary giants like Microsoft (NASDAQ:MSFT) and IBM (NYSE:IBM) argued that open source was insecure, that the business model would not work, that it would destroy the enterprise software space, that they couldn’t make money with it.
One decade on and it’s clear what has happened. Google’s (NASDAQ:GOOG) (NASDAQ:GOOGL) Android dominates the consumer space, and those who advocate proprietary models would claim it proves their point. Android OEMs don’t make money, while Apple (NASDAQ:AAPL), with its proprietary model, is making a fortune.
-
-
The news that broke at the Node Summit last week — that Joyent and others are proposing to create a Node.js Foundation — came as no surprise to anyone who has been watching the controversy around everyone’s favorite server-side JavaScript platform. It’s been clear for a while that Node.js has outgrown its roots and become an important structural tool for the software industry.
Node.js’s hosts at Joyent didn’t plan for this — the code had been an employee project rather than a strategic investment. While Node.js is an important part of Joyent’s operations, it’s not a key product for the company, which has certainly spent far more to host it than it has received in business value as a pioneer of container-based cloud deployment. Joyent deserves credit for acting responsibly and maintaining its commitment as steward, despite the intense interest — and fierce political intrigue — in which it found itself.
-
With all the noise surrounding the Io.js variant of Node.js, it’s easy to forget about another Node fork that’s been quietly percolating: JXcore. Last year it added multithreading (sort of) and the ability to turn Node apps into stand-alone executables — but at the cost of JXcore being a closed source project.
-
The Open Networking Foundation (ONF) has announced the launch of an open source software community and code repository aimed at consolidating and accelerating development efforts around software and solutions that take advantage of software defined networking.
-
Web Browsers
-
Mozilla
-
This just got in: Mozilla Firefox 36.0 will bring support for the brand-new HTTP/2 protocol, according to the official release notes from the last Beta version of the web browser. HTTP/2 will enable a faster, more responsive, and more scalable Web.
-
SaaS/Big Data
-
There are lots of IT adminstrators out there wrestling with sticky issues as they pursue OpenStack deployments, and many of them say that they simply need to experiment with security and stabiity before rolling out mission-critical applications. Enterprises simply don’t want to trust a cloud platform and move apps and data to the cloud without having full platform confidence.
-
Recently, MapR Technologies, focused on Hadoop and Big Data analytics, has been out with some interesting announcements that we covered. We wrote about Myriad, an open source project focused on consolidating big data with other workloads in the datacenter, in this post. And we covered the latest release of the MapR Distribution including Hadoop in this post.
-
Oracle/Java/LibreOffice
-
The Document Foundation announced the release of LibreOffice 4.3.6, which is a new maintenance version in this branch of the famous office suite.
-
The LibreOffice suite of tools includes a very powerful database application ─ one that happens to be incredibly user-friendly. These databases can be managed/edited by any user and data can be entered by anyone using a LibreOffice-generated form. These forms are very simple to create and can be attached to existing databases or you can create both a database and a form in one fell swoop.
-
Business
-
Enabling customers to ride the waves of tech trends is a big part of Pentaho Corporation’s business approach, said the tech company’s Vice President of Product and Solutions Marketing, Donna Prlich, during a live interview on theCUBE. With a new technology emerging every day, Prlich explained, it’s essential for customers to be flexible without sacrificing their ability to “get value from Big Data.”
-
FSF/FSFE/GNU/SFLC
-
Today’s release of GDB 7.9 brings many improvements to the Python scripting API, compilation and injection of source code into the inferior with GCC 5.0+, resume improvements, hardware watchpoint support on GNU Hurd x86, MIPS SDE target, and a number of new commands.
-
Security experts have discovered a highly threatening vulnerability in software preinstalled on some Windows computers manufactured by Lenovo through January 2015. Extreme negligence on the part of Lenovo and unscrupulous programming by its adware partner Superfish seem to have caused the vulnerability.
-
Public Services/Government
-
Best practices in the implementation of eGovernment services by public administrations in Bulgaria will be compared with those in the Visegrad countries – the Czech Republic, Hungary, Poland and Slovakia, at a workshop in Sofia on 26 February. According to a press announcement, Bulgaria’s coalition government is making the modernisation and increase of eGovernment services one of its priorities.
-
Openness/Sharing
-
That’s what Amanda DelCore learned through the work of Dr. Laura Stachel, who designed a portable light kit when she saw that doctors and nurses in developing countries had to postpone treatment when their lights would go out. The doctors and nurses were especially excited about the headlamps included in Stachel’s kit because they were hands-free.
-
March of 2015 marks the beginning of a new era in genetically modified foods. It’s the first year farmers can plant a generic version of glyphosate-resistant soybeans—the first GMO to be patented by Monsanto in 1996. There are some caveats to this, but it’s also a case that no longer fits the anti-GMO meme denouncing large agribusiness for holding intellectual property rights over seeds.
-
Open Data
-
ODP, much like UnitedLinux before it, is an effort by the also-ran vendors in a market to prop themselves up against more successful competitors. It’s bad strategy, and bad for Hadoop. Fortunately, like United Linux, ODP will fail.
-
Programming
-
The so-called GHOST (glibc gethostbyname buffer overflow) vulnerability that was first disclosed in January isn’t just about glibc apparently. On February 19, PHP developers released PHP 5.6.6 providing a mitigation for CVE-2015-0235 – aka – GHOST.
-
-
Today we are excited to announce the availability of the initial specification for the Hack programming language.
-
-
On the 25th anniversary of the launch of Adobe Photoshop, Sophie Curtis examines why the software program has become a cultural phenomenon
-
Since November 25, at least 12 drivers have ended up on the tram tracks – half of those on the new Manchester Airport line.
-
Security
-
Defence/Police/Secrecy/Aggression
-
ISIS’s violent bona fides are not in doubt to anyone paying attention. They’ve targeted religious minorities, beheaded aid workers, sold women into sex slavery and have been all-around devastating for those under their rule. But as America debates the possibility of a full-scale ground invasion of ISIS-controlled territory, it’s important to note that much of the ISIS threat — namely that which targets the West — has been habitually overstated by an uncritical media.
-
Revelations that Bill O’Reilly may have misled viewers about his reporting from the Falklands War back in 1982 are drawing fire from veteran war correspondents who contend apparent embellishments like O’Reilly’s hurt the credibility of all combat journalists.
-
Fox News has gone to war with Mother Jones after the liberal magazine published a story raising questions about the credibility of host Bill O’Reilly’s past statements about his experience as a war correspondent.
-
As many as 400,000 people marched through the pouring rain in the Argentine capital of Buenos Aires on Wednesday demanding an independent judiciary. The march came one month after the mysterious death of special prosecutor Alberto Nisman, who had accused Argentina’s president, Cristina Fernández de Kirchner, of helping to cover up Iran’s role in the deadly 1994 bombing of a Jewish community center that killed 85 people and injured hundreds in Buenos Aires. On January 18, Nisman was found dead in his apartment of a gunshot wound to the head. His body was discovered just a day before he was due to testify before lawmakers on his findings on the 1994 attack. Just four days before his death, Nisman appeared on television and outlined his allegations against the president and Foreign Minister Héctor Timerman. Investigators initially said Nisman’s death appeared to be a suicide, but no gunpowder residue was found on his hands. If it was not a suicide, who killed him? That question has gripped Argentina for the past month. We make sense of this unfolding story with Sebastian Rotella, senior reporter for the investigative news website ProPublica. He first covered the investigation into the 1994 bombing as a reporter for the Los Angeles Times based in Buenos Aires.
-
Environment/Energy/Wildlife
-
As the world’s oil glut continues to build, wiping out hopes of a price recovery, the head of one of Canada’s largest oilsands operators is warning the industry faces a “death spiral” if it doesn’t figure out how to cut costs.
Speaking before the Chamber of Commerce in Fort McMurray, Steve Laut, president of Canadian Natural Resources Ltd. (CNRL), said oilsands companies can still return to health, but only if they aggressively begin to cut costs.
Costs have risen so far, so fast that oil producers were making three times as much profit in 2004, when oil was at $40 a barrel, than they were a few years ago when oil was at $100 a barrel, Laut said, as quoted at the Globe and Mail.
-
Privacy
-
It’s one of the longest, most-detailed stories that The Intercept has published so far, and is well-worth reading in its entirety. What it shows is that GCHQ and the NSA really do want access to everything, and that they are prepared to do more or less anything to get that. Put together with all the other Snowden revelations, plus the news from earlier this week about infected hard drive firmware – almost certainly another NSA project – and things might seem utterly desperate.
And yet there are some glimmers of hope. A couple of weeks ago, the Investigatory Powers Tribunal (IPT), which reviews complaints about surveillance in the UK, decided that British intelligence services acted unlawfully in accessing millions of people’s personal communications collected by the NSA – the first time it has ever ruled against the intelligence and security services in its 15-year history. It’s true that the ruling was unsatisfactory in many ways, but it still sets an important precedent. And then just this week, the UK government was forced to make a humiliating admission that it was unlawful for intelligence agencies to have monitored privileged conversations between lawyers and their clients for the past five years.
-
Over the last few months, ever since both Apple and Google announced plans to encrypt data on iOS and Android devices by default, there’s been a ridiculous amount of hand-wringing from the law enforcement community about requiring backdoors, golden keys and magic fairy dust that will allow law enforcement to decrypt the information on your phone… or children will die, even though they actually won’t.
[...]
It would be nice to see that the revelation of the NSA undermining one use of encryption led people to realize the stupidity of undermining other forms of encryption, but somehow, it seems likely that our law enforcement community won’t quite comprehend that message.
Permalink
Send this to a friend
Posted in News Roundup at 12:22 pm by Dr. Roy Schestowitz

Contents
-
Server
-
The vendor is building systems with Accton that will run Cumulus’ network OS as part of an industry push to disaggregate hardware and software.
-
-
-
-
-
-
Kernel Space
-
Chris Mason has sent in his pull request of the Btrfs file-system changes for the Linux 3.20 (4.0?) kernel.
Btrfs in Linux 3.19 brought RAID 5 / 6 support improvements and for this next kernel release the RAID level 5 and 6 support is still baking. Chris shared that there’s some RAID 5/6 clean-ups to fix some long-standing issues in the code and to improve the work on top of Linux 3.19.
-
-
While we are already a big supporter of open innovation and open source initiatives – including our membership in the Core Infrastructure Initiative – today The Linux Foundation introduced Bloomberg as their newest Gold member.
-
When some folks think about who is responsible for writing Linux, they probably have visions of basement dwelling outcasts from society toiling away on their computers day after day. But the truth is far from that stereotypical delusion. It turns out that most of the people writing Linux are a different breed altogether.
-
LINUX AFICIONADOS across the world have been flocking to San Rosa for the Linux Foundation Collaboration Summit, a shadowy, clandestine conference available to the open source elite.
-
Applications
-
Instructionals/Technical
-
Games
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
In this post, we have introduced the FrameGraph and the node types that compose it. We then went on to discuss a few examples to illustrate the Framegraph building rules and how the Qt3D engine uses the Framegraph behind the scenes. By now you should have a pretty good overview of the FrameGraph and how it can be used (perhaps to add an early z-fill pass to a forward renderer). Also you should always keep in mind that the FrameGraph is a tool for you to use so that you are not tied down to the provided renderer and materials that Qt3D provides out of the box.
-
GNOME Desktop/GTK
-
We’ve reported the other day that the GNOME development team is working hard these days on the forthcoming GNOME 3.16 desktop environment, due for release on March 25, 2015. This will be a major update to the controversial desktop, bringing a number of new features, updated components, as well a bugfixes. GNOME Photos will be part of GNOME 3.16 as the default application for viewing and organizing photos, with the ability to upload them to social networks.
-
-
New Releases
-
LinHES R8.3 brings updates to the kernel, system libraries, nvidia drivers, the latest MythTV 0.27.4-fixes, and many other parts of LinHES. LinHES R8.3 now includes the option to install Plex Home Theater. Additionally XBMC has been updated to Kodi.
-
Red Hat Family
-
ClearOS Community 6.6.0 Final has arrived! Along with the usual round of bug fixes and enhancements, this release introduces WPAD, QoS, YouTube School ID support, an upgrade to the Intrusion Detection engine, and ISO-to-USB key support.
-
Red Hat announced this week that its ARM Partner Early Access Programme, launched six months ago with the aim of facilitating partner system designs based on the 64-bit capable ARMv8-A architecture, has completed a critical hardware enablement phase.
-
Debian Family
-
Proxmox Server Solutions GmbH proudly announced on February 19, 2015, the immediate availability of version 3.4 of its powerful, open-source, and reliable server virtualization management computer operating system, Proxmox Virtual Environment (VE). The release brings a number of new features and improvements, including NUMA support (non-uniform memory access), ZFS storage plug-in, hotplug support, as well as the latest and greatest ZFS file system.
-
Derivatives
-
Canonical/Ubuntu
-
Ubuntu developer Adam Conrad announced the release of Ubuntu 12.04.2 LTS. This new Ubuntu 12.04 LTS release includes an updated kernel and X stack for better supporting new hardware across all of Ubuntu’s supported architectures. The Ubuntu 14.04.2 LTS release also contains various stable bug/security fixes relevant to the platform.
-
The Ubuntu team is pleased to announce the release of Ubuntu 14.04.2 LTS (Long-Term Support) for its Desktop, Server, Cloud, and Core products, as well as other flavours of Ubuntu with long-term support.
-
Are you doing multi-tasking on your Linux machine and suddenly there is a power cut? Is you Laptop battery low or have any problem with you PC’s UPS? Then Hibernate is a good option for you! You can save all your work and resume where you left after switching on computer.
-
Ubuntu 15.04 (Vivid Vervet) is getting closer to the official release in April and the developers have announced that feature freeze is now in effect for this distro.
-
Flavours and Variants
-
Canonical, through Adam Conrad, announced a few hours ago, February 20, the immediate availability of the Ubuntu 14.04.2 maintenance release for its current LTS (Long Term Support) operating system, the Trusty Tahr, which includes Xubuntu 14.04.2 LTS, Kubuntu 14.04.2 LTS, Ubuntu GNOME 14.04.2 LTS, Ubuntu Kylin 14.04.2 LTS, Edubuntu 14.04.2 LTS, Mythbuntu 14.04.2 LTS, Ubuntu Studio 14.04.2 LTS, and Lubuntu 14.04.2 LTS.
-
-
-
-
THE RASPBERRY PI 2 has shifted 500,000 units in just two weeks, as total sales of the pint-sized computer hit the five million mark.
Eben Upton, head of the UK computing success story that is the Raspberry Pi Foundation, has told The INQUIRER that the new Raspberry Pi 2 has sold around half a million units.
The figure means that, within just two week of launching, the new model is already accounting for one in 10 of the five million sales made so far.
-
Well, this is starting to look sort of like “Jamie’s Mostly Raspberry Pi Stuff”, but that’s not intentional, there’s just a lot of interesting things going on with the RPi at the moment, so that’s where I seem to be spending a lot of my time right now.
The big news, of course, was the announcement and immediate availability of the Raspberry Pi 2 hardware two weeks ago. The new hardware needs updated software to really make the most of its capabilities, so there was also a new Raspbian and NOOBS release (1.3.12) made at the same time.
-
Phones
-
With that, we have a very VERY accurate estimate of two of the four regions in how I divided the world, China and Western Europe which accounted for 46% (either IDC’s or my math) of the total planet’s smartphone sales. With the US stats we have rather solid Kantar and ComScore numbers and obviously my regional analysis of the US market is totally consistent with those. That means by simple subtraction math, the ‘Rest of the World’ region analysis is also very close to the mark. So for those who want to see those again, from my blog a week ago:
-
Android
-
Many businesses routinely employ “ethical” hackers as a means of testing whether their systems are secure, paying the tech-savvy to break into their computers in what is known as penetration testing, or pen testing.
-
-
HOUSTON — Graylog, Inc., the company behind the popular Graylog open source log analysis platform, today announced that it has released v1.0 of its Open Source Graylog product. This enterprise-grade platform enables organizations to store, search and analyze machine data collected from their IT infrastructures to quickly pinpoint and address the root cause of operational problems. Graylog is providing paid services/support to make it even easier for enterprises to deploy this affordable alternative to expensive log analysis tools such as Splunk.
-
Events
-
It was a first for the Southern California Linux Expo — a midweek start on Thursday for SCALE 13x, and those of us on the SCALE Team did not know what to expect. The day was composed of a variety of sessions — an all-day Intro to Chef, Puppet Labs held its separate-registration Puppet Camp LA, openSUSE held its mini-summit, PostgreSQL held the first of its two-day PostgreSQL days, Fedora held its Fedora Activity Day, and an all-day Apache session.
-
The Linux Foundation Collaboration Summit 2015 took place Feb. 18-20 in Santa Rosa, Calif.
-
CMS
-
Well, to jump from your current CMS (or lack thereof) and make the transition to Drupal, you want to know much it costs and exacting what that migration entails. First, there are several factors that have to be taken into an account before any Drupal development company can give you a quote. But, while there isn’t an exact price range for migrating to Drupal, you can do some in-house work to keep your migration costs down and prepare your team for the migration, keeping headaches down too.
-
Openness/Sharing
-
-
Open Access/Content
-
Imagine a world where scientists and inventors had no access to the accomplishments of the generations which came before us. The wheel would, quite literally, need to be reinvented by everyone who came along and wanted to move forward.
[....]
To learn more about open access, we’re proud to present a new resource, which helps to answer many of the fundamental questions around open access and scholarly sharing.
-
Open Hardware
-
Programming
-
Last year Facebook launched Hack, a new programming language derived from PHP and powered by their HHVM software. The Hack specification serves as official documentation for those wanting to come out with their own Hack implementation rather than relying upon HHVM. The Hack specification complements the existing Hack programming documentation.
-
Standards/Consortia
-
A new version of the HTTP standard that promises to deliver Web pages to browsers faster has been formally approved, the Internet protocol’s first revision in 16 years.
-
The political arm of the Internet Engineering Task Force (IETF), the Internet Society, has posted its approved slate of candidates for two board positions – and invited everyone else in the world to parachute into the process.
-
Could getting off Twitter be a religious experience?
-
Defence/Police/Secrecy/Aggression
-
The Obama administration on Wednesday accused the Israeli government of misleading the public over the Iran nuclear negotiations, using unusually blunt and terse language that once again highlighted the rift between the two sides.
In briefings with reporters, State Department spokeswoman Jen Psaki and White House spokesman Josh Earnest suggested Israeli officials were not being truthful about how the United States is handling the secretive talks.
-
Transparency Reporting
-
Since spiriting NSA leaker Edward Snowden to safety in Russia two years ago, activist and WikiLeaks editor Sarah Harrison has lived quietly in Berlin. Sara Corbett meets the woman some regard as a political heroine—others as an accomplice to treason.
Moscow’s Sheremetyevo Airport is, like so many international airports, a sprawling and bland place. It has six terminals, four Burger Kings, a sweep of shops selling duty-free caviar, and a rivering flow of anonymous travelers—all of them headed out or headed in or, in any event, never planning to stay long. But for nearly six weeks in the summer of 2013, the airport also housed two fugitives: Edward Snowden, the NSA contractor who had just off-loaded an explosive trove of top-secret U.S. government documents to journalists, and a 31-year-old British woman named Sarah Harrison, described as a legal researcher who worked for the online organization WikiLeaks.
-
Congress came tantalizingly close last year to passing a bill to strengthen the Freedom of Information Act, which allows journalists and the public to access federal government records. The legislation, which would have brought more transparency, was blocked in December when the House speaker, John Boehner, refused to hold a vote on the Senate bill with no explanation. Two months later, lawmakers have a second chance.
-
Finance
-
There aren’t a lot of numbers in the Times piece, so it’s useful to pause here and note that according to the IMF database, China’s per capita GDP (measured in terms of purchasing power) grew by 8.6 percent last year, vs. 6.0 percent for India. So any stumbling, slowing or faltering seen in China’s economy is based on forecasts of future growth–which are notoriously unreliable, though often given great credence in articles like these.
-
PR/AstroTurf/Lobbying
-
Krauze begins by claiming that the Venezuelan government, first under President Hugo Chávez and then his successor Nicolás Maduro, has taken control over the media. Chávez “accumulated control over the organs of government and over much of the information media: radio, television and the press,” we are told, and then Maduro “took over the rest of Venezuelan television.”
A simple factcheck shows this to be false. The majority of media outlets in Venezuela–including television–continue to be privately owned; further, the private TV audience dwarfs the number of viewers watching state TV.
-
Censorship
-
Laurence Brass says he had been ‘bursting to criticize the Israeli administration’ for six years and took the board to task for preventing honorary officers from expressing personal opinions.
-
Privacy
-
It looks like Lenovo has been installing adware onto new consumer computers from the company that activates when taken out of the box for the first time.
-
State and local law enforcement agencies that use StingRays must weigh their obligations under public records statutes against nondisclosure agreements with the FBI and the device’s manufacturer. While some police departments have ruled that they cannot share any documents whatsoever, a handful of key disclosures in recent weeks — including the cleanest version of the NDA released to date — together shed new light on the FBI’s involvement in cell-site simulator deployments nationwide.
-
We recently learned that PC manufacturer Lenovo is selling computers preinstalled with a dangerous piece of software, called Superfish, that uses a man-in-the-middle attack to break Windows’ encrypted Web connections for the sake of advertising. (Here’s a list of affected products.) Research from EFF’s Decentralized SSL Observatory has seen many thousands of Superfish certificates that have all been signed with the same root certificate, showing that HTTPS security for at least Internet Explorer, Chrome, and Safari for Windows, on all of these Lenovo laptops, is now broken. Firefox users also have the problem, because Superfish also inserts its certificate into the Firefox root store.
-
Late last night, people started buzzing on Twitter about the fact that Lenovo, makers of the famous Thinkpad laptops, had been installing a really nasty form of adware on those machines called Superfish. Many news stories started popping up about this, again, focusing on the adware. But putting adware on a computer, while ethically questionable and a general pain in the ass, is not the real problem here. The problem is that the adware in question, Superfish, has an astoundingly stupid way of working that effectively allows for a very easy man in the middle attack on any computer with the software installed, making it a massive security hole that is insanely dangerous.
-
The information extracted by Graham can now be used to break the security on every compromised Lenovo computer. This leaves infected users essentially open to any eavesdropping if they are using the net on a public Wi-Fi account, and also enables future malware authors to convince Lenovo owners that their software is produced by a trusted vendor, such as Microsoft.
-
Over the weekend Russian IT security vendor Kaspersky Lab released a report about a new family of malware dubbed “The Equation Family”. The software appears, from Kaspersky’s description, to be some of the most advanced malware ever seen. It is composed of several different pieces of software, which Kaspersky Lab reports work together and have been infecting computer users around the world for over a decade. It appears that specific techniques and exploits developed by the Equation Group were later used by the authors of Stuxnet, Flame, and Regin. The report alleges that the malware has significant commonalities with other programs that have been attributed to Western intelligence agencies; Reuters subsequently released an article about the report in which an anonymous former NSA employee claims that the malware was directly developed by the NSA.
-
US and British intelligence agencies illegally hacked into a major manufacturer of Sim cards to steal codes and facilitate eavesdropping on mobiles, a US news website says.
-
A giant cellphone surveillance program is just one of the dark NSA secrets being dragged out into the light, thanks to a certain whistleblower and a Russian cybersecurity firm.
-
Digital security company Gemalto NV was hacked by American and British spies to steal encryption keys used to protect the privacy of cellphone communications, news website Intercept reported, citing documents provided by whistleblower Edward Snowden.
-
International row likely after revelations of breach that could have given NSA and GCHQ the power to monitor a large portion of world’s cellular communications
-
British and American spies stole the encryption keys from the largest SIM card manufacturer in the world, according to a government document handed to The Intercept by National Security Agency whistleblower Edward Snowden.
-
-
Superfish, a little-known “visual search” and ad tech provider from Palo Alto whose CEO was once part of the surveillance industrial complex, is about to learn what it feels like to face the unwavering wrath of the privacy and security industries. Lenovo will take much of the blame for potentially placing users at risk by contracting Superfish to effectively carry out man-in-the-middle attacks on users to intercept their traffic just to get the firm’s “visual” ads up during customers’ web searches.
-
One of the “biggest Snowden stories yet” has arrived today, according to journalist Glenn Greenwald.
Spies from the United States’ National Security Agency (NSA) and the United Kingdom’s Government Communication Headquarters (GCHQ) “hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe.” The information was obtained from top-secret documents leaked by Edward Snowden.
-
Civil Rights
-
Florida’s legislators are pushing through bills mandating body camera use by the state’s law enforcement officers. So far, so good, except for the fact that law enforcement officers aren’t really looking for greater transparency or accountability, at least not according to Florida Police Benevolent Association chief Gary Bradford.
-
Mr. Risen, an investigative reporter for The Times, was writing in response to Mr. Holder’s statements in a National Press Club speech Tuesday defending the Obama administration’s record on press rights. Mr. Risen, who narrowly escaped jail time as he insisted on protecting a confidential source, begged to differ – in no uncertain terms.
Referring to the Obama administration as “the greatest enemy of press freedom in a generation,” Mr. Risen called the attorney general “the nation’s top censorship officer.”
Although the wording of the Risen tweets was outside the tacitly accepted norm for Times reporters on social media, The Times declined to criticize them and issued a statement in his support.
I followed up in a conversation with the standards editor, Philip Corbett, and some email correspondence with Mr. Risen.
-
Louisiana — a state whose motto is Union, Justice and Confidence — is known for many things. The Bayou State is the birthplace of jazz, Creole, and Cajun food, and New Orleans is the site of the country’s largest annual Mardi Gras Carnival. But as the Times-Picayune found in a major series years ago, Louisiana is also “the world’s prison capital,” with an incarceration rate that is “nearly five times Iran’s, 13 times China’s and 20 times Germany’s.”
-
Despite the post-Snowden spotlight on mass surveillance, the intelligence community’s easiest end-run around the Fourth Amendment since 2001 has been something called a National Security Letter.
-
The second-to-last witness in the government’s case against Jeffrey Sterling, FBI Special Agent Ashley Hunt, introduced a number of things she had collected over the course of her 7.5 year investigation into James Risen’s chapter on Operation Merlin. That included a few things — most notably two lines from Risen’s credit card records from 2004 — that in no conceivable way incriminated Sterling.
-
A year ago, the Department of Justice threatened to put Fidel Salinas in prison for the rest of his life for hacking crimes. But before the federal government brought those charges against him, Salinas now says, it tried a different tactic: recruiting him.
-
Internet/Net Neutrality
-
THE HOUSE OF LORDS IS BACKING the idea of a free and gloriously open internet that is available to all, and is – rather less exciting sounding – reclassified as a utility.
The plans come on the heels of similar noises from the US where Title II reclassification is a hot and contentious topic.
Here we have the Lords releasing a report advocating that the government takes the internet and makes it a ;utility service’ much like it is in Estonia where it is considered a human right, and much as people like Tim Berners-Lee would appreciate.
-
You might recall that top cable industry lobbyist Michael Powell, formerly head of the FCC, got much of the current Title II debate rolling back in 2002 when he reclassified cable broadband as an “information service.” This effectively opened the door to a massive era of broadband deregulation Powell and friends at the time insisted would usher forth an immense new wave of broadband competition. If you’ve checked your broadband bill or oh, stepped outside lately, you may have noticed that this utopian broadband landscape never materialized.
-
Intellectual Monopolies
-
The main obstacles to creating software that can run old programs, read old file formats, or preserve old webpages, are patents and copyright. Patents stop people creating emulators, because clean-room implementations that avoid legal problems are just too difficult and expensive to carry out for academic archives to contemplate. At least patents expire relatively quickly, freeing up obsolete technology for reimplementation. Copyright, by contrast, keeps getting extended around the world, which means that libraries would probably be unwilling to make backup copies of digital artefacts unless the law was quite clear that they could — and in many countries, it isn’t.
Permalink
Send this to a friend
02.19.15
Posted in News Roundup at 8:22 pm by Dr. Roy Schestowitz

Contents
-
Server
-
HP has become the latest “legacy” IT vendor to announce it would ship commodity switches for web-scale data centers that support network management software other than its own.
-
Hewlett-Packard said on Thursday that it would sell a new line of networking switches that are manufactured by a Taiwanese company and depend on Linux-based, open-source software from another company.
HP, once at the center of high-tech manufacturing, will not make the new networking equipment but will act as a reseller, providing both online ordering and worldwide support for the product.
-
-
Kernel Space
-
The demand for Linux developers has jumped seven per cent in comparison to last year, a study has shown.
The 2014 Linux Jobs Report shows that hiring managers at tech-powered companies are focusing more attention on Linux talent, and that’s reverberating in the market, with stronger than average salary increases to those working with the OS.
-
Linux is now 24 years old, and its community of developers, contributors and users shows no signs of shrinking. The annual “Who Writes Linux” report from the Linux Foundation was released today, and it includes many interesting nuggets about the people and companies who build Linux. Perhaps most interesting was the fact that the 3.15 kernel release cycle was said by the report to have been the busiest such cycle in the history of Linux.
-
The platform-drivers-x86 pull request has been filed for the Linux 3.20 kernel and it includes some prominent additions.
First up, the Toshiba ACPI driver (toshiba_acpi) is closer to feature-parity with its Windows counterpart. The Linux Toshiba ACPI driver now supports USB Sleep & Charge functions, USB Sleep functions under battery, USB Rapid Charge, USB Sleep & Music, support for keyboard functions mode, support for Panel Power On, support to enable/disable USB 3, etc. There’s also driver clean-ups and other improvements for this ACPI laptop driver specifically for Toshiba hardware.
-
The Linux kernel sits at the core of all Linux-based operating systems and is produced in an open-source, multi-stakeholder process. It’s a process that has evolved over the last two decades, with a steady flow of new developers pouring into the community and contributing code. In a new report released by The Linux Foundation Feb. 18, the pace of Linux code contribution is detailed with data looking at eight Linux kernel releases in 15 months—beginning with the Linux 3.11 kernel, released in September 2013, and ending with Linux 3.18, which debuted Dec. 8, 2014. The Linux development report finds that more than 80 percent of code contributed to the Linux kernel comes from developers who are paid for their work. The overall number of developers is also growing, with 1,458 contributing code for the Linux 3.18 release. Looking at the companies that contribute to Linux, Intel continues to lead the way, with 10.5 percent of code contributions during the development period covered in the report. In this slide show, eWEEK examines key data points on the state of Linux development.
-
-
The number of unpaid contributions to the Linux kernel has fallen again since the last major update, as work on the open source operating system (OS) is increasingly borne by corporations.
The annual report from the Linux Foundation, which runs the project, showed that unaffiliated developers accounted for 12.4% of all patches during the fifteen months leading to December 2014, more than any single company.
-
Graphics Stack
-
While Intel’s implemented ETC2 support in their driver and is supported by their latest hardware, Gallium3D is finally getting some ETC2 support.
-
Applications
-
-
Proprietary
-
Enpass is a multi-platform password manager which received a massive update recently and with it, the application is now available for Linux (64bit only for now).
-
Instructionals/Technical
-
Games
-
Chainsaw Warrior: Lords of the Night is a new title based on 1987 Games Workshop classic board game with the same name. A Linux port of this title has been made available.
-
A puzzle platformer with surreal imagery, Tulpa, was released late last month and almost flew completely under our radar. The game mixes highly contrasting colours, strange environments and moody music to an interesting effect which you can appreciate in the trailer below:
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
So all plasmoids are gathered in Blue Systems office in beautiful city of Barcelona, Spain for Plasma Sprint 2015. One of the points I wanted to discuss was future of Plasma Media Center. Plasma Media Center got ported to KDE frameworks 5 and Plasma 5 library during last GSoC and with the help of our great Visual Design Group we also revamped the user interface fro Plasma media center. We also have integrated it as Plasma Shell package so plasmashell can load it as shell package and also can switch to mediacenter shell pacage.
-
One of the things I’ve been sorely missing when doing UI design and development was a good way to preview icons. The icon picker which is shipped with KDE Frameworks is quite nice, but for development purposes it lacks a couple of handy features that allow previewing and picking icons based on how they’re rendered.
-
-
-
Qt 5.5 is expected to ship in about two months and with this release will come a number of new and exciting features.
Qt 5.5 is in the process of being branched and an alpha release issued, prior to a beta in March, and the release candidate in April followed by the official Qt 5.5.0 release.
-
GNOME Desktop/GTK
-
The GNOME developers announced that Nautilus (now known as Files) is now at version 3.16 Beta 1 and is ready for download and testing.
-
David King, the developer of the default webcam viewer of the GNOME desktop environment, Cheese, has announced the immediate availability for testing of the first beta version of the upcoming Cheese 3.16 update, which will be distributed as part of the forthcoming GNOME 3.16 desktop, due for release on March 25, 2015.
-
As we’ve reported earlier today, the GNOME development team is hard at work to bring you the latest GNOME 3.16 desktop environment, due for release on March 25, 2015. GNOME Boxes, the default virtualization software of GNOME based on QEMU, will also be part of the forthcoming release of the graphical environment, bringing a number of enhancements and new features. The first Beta version of GNOME Boxes 3.16 is now available for testing.
-
-
-
Red Hat Family
-
Red Hat has updated its infrastructure-as-a-service offering for enterprise businesses with a new iteration of the Linux OpenStack platform intended to help clients deploy cloud services.
-
Fedora
-
Fedora is a big project, and it’s hard to keep up with everything. This series highlights interesting happenings in five different areas every week. It isn’t comprehensive news coverage — just quick summaries with links to each. Here are the five things for February 18th, 2015…
-
Debian Family
-
-
Derivatives
-
The time has come to introduce you guys to a new Linux kernel-based operating system, designed for creative people who were searching for a good-looking, reliable, and modern distribution for all of their multimedia creation needs. Future Studio OS is based on a mix between Debian GNU/Linux Jessie and Sid, using a low-latency Linux kernel and the KDE4 desktop environment.
-
Canonical/Ubuntu
-
Meizu, the second Ubuntu phone manufacturer, has kept the details of their Ubuntu Touch phone hidden, the rumors saying that Meizu is holding the details to reveal them at the Mobile World Congress 2015 in Barcelona.
-
-
Canonical, creator of the Ubuntu operating system, has been aggressively pitching itself as the enabler for a world of Internet of Things (IoT) devices. This enablement has occurred via its “Snappy” Ubuntu core, the most recent rendition of Ubuntu which is a cut down operating system. Snappy shares the same libraries as today’s Ubuntu but via a simpler mechanism. Canonical points to Snappy’s upgradeability and core security as differentiators that will help it succeed in this space.
-
The entry-level dual-SIM Aquaris E4.5 Ubuntu Edition is available for sale if you’re in the European Union. The first of its kind Ubuntu powered smartphone features a 1.3.GHz Quad Core Cortex A7 processor, 1GB of RAM and a 2150 mAh battery. Basic specs to be sure, but what is interesting is that Ubuntu seems to run on hardware designed for Android phones. which means that it shouldn’t be too hard to see this OS running on other devices.
-
It seems, as well as the variety of different smartphone manufacturers in the android world, there is also an increasing number of operating systems becoming available. While all, fork off of android in one capacity or another, there was one particular OS which has (for a long time) been gaining attention, that is Ubuntu OS. However, in spite of the increased attention and seemingly fervor for an Ubuntu OS running device, the actuality of bringing one of these devices to the market has proved difficult.
-
Ninja Blocks, a new kind of smart home controller that got funded through Kickstarter already, has announced that it will provide support for Ubuntu Snappy Core and it will make it feel right at home in the “Internet of Things.”
-
Ubuntu developers are working on the 15.04 version of their operating system and they have made some interesting changes so far, but they also entertained the possibility of adopting GTK+ 3.16. Unfortunately, that wasn’t meant to be.
-
We have to admit that today’s flash sale of Ubuntu phones was a successful one, especially because we managed to get one too and because we saw a lot of happy people posting tweets about purchasing the first-ever Ubuntu-powered smartphone. The Ubuntu Phone flash sale is now over, as announced by BQ on their Twitter account, and confirmed by Canonical.
-
Canonical revealed that Ubuntu 14.10, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS operating systems have been updated in order to couple X.Org X server vulnerabilities that have been found by devs.
-
Besides Canonical developers having released a new version of Mir, they’ve also continued concurrently advancing the Unity 8 UI.
-
-
The arrival last week of Linaro’s open source 96Boards specification — ARM’s first pseudo-official SBC form factor standard — shows that ARM is serious about bringing order to the chaotic ARM hacker board scene. 96Boards is a preemptive attempt to consolidate Linux and Android development before a new wave of ARMv8 hacker boards hits the scene later this year.
Linaro’s 96Boards.org developer community and standards organization has defined a 96Boards Consumer Edition (CE) spec for ARM single board computers running Debian, Android, and other Linux-based distros. The spec defines either an 85 x 54mm or 85 x 100mm footprint, as well as standardized 40- and 60-pin expansion connectors for stackable boards. A higher-end Enterprise Edition (EE) spec will follow in the second quarter.
-
-
It’s only been two weeks since the Raspberry Pi 2 Model B was released but the foundation that designs them says it’s already shipped 500,000 units.
The Raspberry Pi Foundation confirmed to ZDNet that it has already sold half a million units of its latest computer, the fifth model it has released since its modest launch in 2012. As well as the Raspberry Pi 2 Model B, the foundation has also released the 2.1 revision last year, as well as the model B+, model A+, and the compute module.
The 500,000 milestone for the Raspberry Pi 2 means the latest version now accounts for roughly 10 percent of the five million Raspberry Pi units shipped overall. The Pi hit its five million sales high-water mark this week, massively dwarfing the 10,000 units that Raspberry Pi co-founder Eben Upton expected the foundation would sell in total, but which instead it reached within hours on the first day of sales in February 2012.
-
Adlink is prepping a rugged, compact “MXE-200i” box-PC preloaded with Wind River’s Linux-based IDP XT IoT gateway stack running on quad- or dual-core Atoms.
-
Phones
-
Android
-
-
BlackBerry rolled out a major software update Thursday, allowing users of its entire suite of BlackBerry 10 devices such as the Z10, Q10 and Z30 to access Android applications and a host of other features, including Blend.
-
Owners of several Android Wear watches (Sony Smartwatch 3, LG G Watch, and Moto 360 so far) have reported seeing an update hit their devices to bring it up to Android 5.0.2. The corresponding build number is LWX49K for the G Watch and Smartwatch 3, LWX49L for the Moto 360.
-
The email application of Samsung Galaxy 4 Minis can be made to repeatedly crash with a simple email that need not even be opened, according to researcher Hector Marco.
A crafted email gobbled up by the native email client running on Android 4.2.2.0400, a superseded operating system that was the latest stock offering for the S4 Mini.
Marco did not specify if the bug also bites earlier Android versions, but if that is the case this flaw will impact a great many more users. Google estimates 52.4 percent of users operate Android version 4.2 and earlier, while 19.8 percent run 4.2.x.
-
-
-
Even though Apple is baked into my past, I can’t help but think that writing an Android guide is a little like writing a guide to the future. Every operating system aspires to create a universal experience, yet Android may do the best job of actualizing and implementing it for a consumer market. The Google OS offers unprecedented compatibility thanks to its line of next-gen wearable technology, including the experiment-gone-mainstream, Google Glass, and a slew of recently-announced smartwatches. Everything seems to be going Android’s way.
-
Android Wear feels like it’s nowhere near its full potential and that the only thing holding it back is Google. You could say there’s a kind of courage in doggedly sticking with simplicity, in refusing to rush out functionality that would give it feature parity with the as-yet unreleased Apple Watch. I’d love to know if the developers inside Google are standing on that principle or just waiting to see how people react to what Apple has made.
In the meantime, we have unassuming watches like Sony’s SmartWatch 3. Even if you’re part of the tiny sliver of users to whom it’s designed to appeal, you have to admit that there’s nothing really special about it.
-
BlackBerry rolled out a major software update on Thursday, allowing users of its entire suite of BlackBerry 10 devices such as the Z10, Q10 and Z30 to access Android applications, and a host of other features, including Blend.
The company said the BlackBerry 10 OS 10.3.1 gives users the ability to access both the BlackBerry World appstore and the Amazon Appstore that provides access to a host of Android applications previously unavailable on the BlackBerry platform.
-
Want to contribute to an open source project, but don’t know where to start? Finding the first problem to fix in an unfamiliar codebase can seem pretty difficult—and even more so if it counts millions of lines of code—but it’s usually much easier than it looks. This article should give you a few tips and ideas on how to get started.
-
Splunk, the log analysis system that’s evolved into a full-blown, machine-generated data processing platform (also described as “Google for visual analytics”), faces competition from a rising wave of open source competitors. One of the most prominent, Graylog, has unveiled its formal 1.0 release. Graylog’s success won’t be in meeting or exceeding Splunk’s feature set or performance, though; it’ll be in capturing or re-creating Splunk’s existing ecosystem of users and applications.
-
Events
-
As midnight Wednesday becomes Thursday morning, SCALE Team members continue to put in hours, doing everything from wiring the rooms to stuffing swag bags, getting ready for 8 a.m. Thursday morning, when registration opens. Once that happens, the show is on the clock and all the work that those on the SCALE Team have put in so far — the long hours of work prior to, and leading up to, the show — and the work that the team puts in during the course of the show becomes the cornucopia enjoyed by the attendees.
Reunions are quick — those who keep in touch through emails or social media over the course of the year meet face-to-face for the first time since last February. Security is called at times (just kidding, right Phillip Ballew?) and quick hellos give way to pitching in with what’s left to be done before the show opens in around eight hours.
-
A panel of Platform as a Service and container experts at Collaboration Summit Monday didn’t agree on many things – including the relative importance of PaaS and containers, which is more useful for developers, and how the ecosystem will evolve. But they all agreed that the PaaS ecosystem relies on open source to remain relevant and useful.
-
SaaS/Big Data
-
Pivotal has taken a giant leap by open sourcing its big data platform. So what’s to stop companies from downloading the software and managing it in-house? Is Pivotal drying up its own revenue stream? Not really. Large enterprises will need the company’s support, as well as commercial licensing for some features. “We don’t feel that we are at risk in any way,” said Pivotal’s Michael Cucchi.
-
RightScale is out with its 2015 State of the Cloud report, always one of the more definitive barometers for the state of cloud computing. The findings show that private clouds may be waning in momentum, hybrid clouds are the favorite solution for most enterprises, and Docker and container adoption are absolutely on fire.
-
-
Centrify, in conjunction with big data companies MapR, Hortonworks and Cloudera, hopes to bring major changes to the way enterprises handle Hadoop security, data privacy and user authentication. This week, it introduced what it is billing as the channel’s first comprehensive identity management solution for Hadoop.
-
Oracle/Java/LibreOffice
-
The administration of the Italian region Emilia-Romagna will complete its switch to Apache OpenOffice next month, says Giovanni Grazia, an IT project manager for the region. Emilia-Romagna is making the Open Document Format ODF the default on all 4200 workstations, across 10 departments and 5 agencies.
Emilia-Romagna is adding several tools to the OpenOffice suite, “improving the user experience”, says Grazia. Three of these are publicly available OpenOffice extensions, but others are being developed especially for the region. The latter will be made available as open source within the next few weeks, Grazia says.
The first of the official OpenOffice extensions used in the region is Alba, which makes it easy to insert in a document one or more pages with a different orientation. The second is Pagination, which improves the insertion of page numbers. Third is PDFImport, which allows the import of PDFs into OpenOffice.
-
CMS
-
WordPress 4.1.1 is now available. This maintenance release fixes 21 bugs in version 4.1.
Some of you may have been waiting to update to the latest version until now, but there just wasn’t much to address. WordPress 4.1 was a smooth-sailing release and has seen more than 14 million downloads in the last two months.
-
BSD
-
The next version of the Lumina desktop environment has just been released! Version 0.8.2 is mainly a “spit-and-polish” release: focusing on bugfixes, overall appearances, and interface layout/design. The FreeBSD port has already been updated to the new version, and the PC-BSD “Edge” repository will be making the new version available within the next day or two (packages building now). If you are creating/distributing your own packages, you can find the source code for this release in the “qt5/0.8.2″ branch in the Lumina repository on GitHub.
The major difference that people will notice is that the themes/colors distributed with the desktop have been greatly improved, and I have included a few examples below. The full details about the changes in this release are listed at the bottom of the announcement.
Reminder: The Lumina desktop environment is still considered to be “beta-quality”, so if you find things that either don’t work or don’t work well, please report them on the PC-BSD bug tracker so that they can get fixed as soon as possible.
-
The PC-BSD developers behind the original Lumina Desktop Environment have put out a new “spit and polish” release of Lumina.
-
Openness/Sharing
-
Open Hardware
-
The last part is in place, you can still smell the solder in the room. Your open hardware project is complete. So, what comes next? The hard part: do you need a license?
The first step is to determine if you have anything to license. For those of us coming from the software world, this step may seem odd.
Michael Weinberg, Vice President at Public Knowledge and a board member of the Open Source Hardware Association, tells us, “Software is protected by copyright (and protected automatically), so you can safely assume that you have something to license when you write software.”
-
Standards/Consortia
-
The web is about to get faster thanks to a new version of HTTP – the biggest change since 1999 to the protocol that underpins the world wide web as we know it today.
Hypertext Transfer Protocol is familiar to most as the http:// at the beginning of a web address. It governs the connections between a user’s browser and the server hosting a website, invented by the father of the web Sir Tim Berners-Lee.
-
Ad blockers have always been controversial among publishers. Many web publishers resent the use of ad blockers and feel that they are being cheated out of their rightful ad revenue. Some have even started to block access to their content when they detect an ad blocker in a reader’s browser.
[...]
Readers don’t use ad blockers because they want to cheat publishers out of revenue or act in an otherwise aggressive or nasty way. They use them because some web advertising has become incredibly obnoxious or intrusive.
-
Hardware
-
Qualcomm announced yesterday the introduction of four new Snapdragon processors that the company says will “take 4G LTE and multimedia to new heights”. These new processors are the Snapdragon 620, 618, 425, and 415.
-
Health/Nutrition
-
Abu Bakr Mohammad Ibn Zakariya al-Razi – the great Persian physician often described as the grandfather of pediatric medicine – was a meticulous man. Before the age of 30, he discovered ethanol, thanks to the careful application of the then new art of distillation.
When overseeing the building of a new hospital in Baghdad, al-Razi hung raw meat around the city and broke ground where the meat putrefied most slowly. And, in one of the 200 or so books that he wrote, he created the first and most extraordinarily detailed account of one of the most infectious diseases ever known.
-
Security
-
Privacy
-
Together with FFDN, a federation of community-driven non-profit ISPs, La Quadrature du Net is bringing a legal action before the French Council of State against a decree on administrative access to online communications metadata. Through this decree, it is a whole pillar of the legal basis for Internet surveillance that is being challenged. This appeal, which builds on the European Union Court of Justice’s recent decision on data retention, comes as the French government is instrumentalizing last month’s tragic events to further its securitarian agenda, with an upcoming bill on intelligence services.
-
We reported earlier today on Lenovo bundling adware with some of its newer computers, but over the last few hours it’s emerged that the situation is worse than originally thought.
The software, named Superfish, was pre-installed by Lenovo on some consumer computers. The software injects unwanted advertising into users’ browsers in search results and on third-party websites.
-
News broke last night that Lenovo has been shipping laptops with a horrifically dangerous piece of software called Superfish, which tampers with Windows’ cryptographic security to perform man-in-the-middle attacks against the user’s browsing. This is done in order to inject advertising into secure HTTPS pages, a feature most users don’t want implemented in the most insecure possible way.1
-
Imagine that you are a major global seller of laptop computers and that you were just caught preloading those machines with ultra-invasive adware that hijacks even fully encrypted Web sessions by using a self-signed root HTTPS certificate from a company called Superfish. How do you explain why you did it?
-
-
Lenovo deserve criticism. The level of incompetence involved here is so staggering that it wouldn’t be a gross injustice for the company to go under as a result[1]. But let’s not pretend that this is some sort of isolated incident. As an industry, we don’t care about user security. We will gladly ship products with known security failings and no plans to update them. We will produce devices that are locked down such that it’s impossible for anybody else to fix our failures. We will hide behind vague denials, we will obfuscate the impact of flaws and we will deflect criticisms with announcements of new and shinier products that will make everything better.
-
AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.
The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data.
-
With reference to writing to the Commission (dated 9/9/2013) on alleged hacks into the Dutch based SWIFT-server and Written Questions on the alleged infiltration of the Belgium based Belgacom servers and the Commission systems with the use of REGIN-malware (E-010269-14 of 5/12/2014);
Permalink
Send this to a friend
Posted in News Roundup at 6:25 am by Dr. Roy Schestowitz

Contents
-
Server
-
If you try to boot FreeBSD with its zfsloader you will likely need to apply a workaround patch, because the BIOS seems to do something odd. Linux works as expected.
-
Kernel Space
-
Here are 10 highlights:
1. 3.15 was the biggest kernel release ever with 13,722 patches merged. “I imagine we will surpass that again,” Corbet said. “The amount of changes to the kernel is just going up over time.”
2. The number of developers participating is going up over time while the amount of time it takes us to create a kernel is actually dropping over time. It started at 80 days between kernel releases some time ago, and it’s now down to about 63 days. “I don’t know how much shorter we can get,” het said.
3. Developers added seven new system calls to the kernel over the past year, along with new features such as deadline scheduling, control group reworking, multiqueue block layer, and lots of networking improvmenets. That’s in addition to hundreds of new hardware drivers and thousands of bug fixes.
-
Over the past year or so various people have been automating kernel builds with the aim of both setting the standard that things should build reliably and using the resulting builds for automated testing. This has been having good results, it’s especially nice to compare the results for older stable kernel builds with current ones and notice how much happier everything is.
-
The Linux kernel is the biggest collaborative software project on the planet, but sometimes it might be difficult for people to understand that. The Linux Foundation has released its annual development report and we can get a glimpse of just how much work is being done.
-
Applications
-
A new development release of Evince, the document viewer application of the modern GNOME desktop environment, was made available to testers worldwide on February 17, 2015, version 3.16.0 Beta 1, which brings a number of new features, improvements, bug fixes, better documentation, as well as updated translations.
-
Instructionals/Technical
-
Games
-
Solo: Gaze into Madness is a good looking first person horror that looks really quite good. The developer emailed it in directly, so Linux support is a go.
-
Crytek announced a while ago that it was working on the CryEngine for the Linux platform, but little information has been made available since then. Now, it looks like they are finally ready to share some news about the engine during the upcoming GDC 2015 event.
-
Act of Aggression, a new RTS developed by the famous Eugen Systems studio, will be out in May, 2015, and it’s likely that we’ll also get a Linux version.
-
Desktop Environments/WMs
-
There is no shortage of desktop environments for Linux, which means you can customize your PC the way you want it.
I have used almost all major desktop environments — not just to test the waters but to actually find the one that works for me — because, you know, the best DE is the one that fits your needs.
-
GNOME Desktop/GTK
-
The GNOME development team is working hard on the next major version of their controversial and modern GNOME desktop environment, release 3.16, which will bring a number of improvements in performance, stability, and updated components, each one having its own major features. This is the case of GNOME Control Center, which is now available to testers worldwide in a beta form.
-
-
Red Hat Family
-
Networking improvements, better Ceph distributed storage support and enhanced I/O virtualization are the headline features in the latest version of Red Hat (RHT) Enterprise Linux OpenStack Platform, the enterprise cloud computing product that the company released this week.
-
Red Hat started putting its weight behind 64-bit ARM architecture in data-center last year by launching ARM Partner Early Access Program for Partner Ecosystem.
The idea behind the program was to develop an operating system which was capable of supporting multiple partner-initiated system designs based on the 64-bit ARMv8-A architecture.
-
RED HAT has announced the arrival of Red Hat Enterprise OpenStack Platform 6 (RHOP6).
The infrastructure-as-a-service offering has been modelled in part on Red Hat Enterprise Linux 7, aiming to push forward the firm’s commitment to Ceph storage along with a host of other enhancements.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
A new flash sale for BQ’s Aquaris E4.5 Ubuntu Edition will take place in less than an hour, at 9 AM CET (Central European Time), so get your wallets ready.
-
Even if Mir and Unity 8 still have some time until they reach the desktop in a default capacity, it doesn’t mean that the developers don’t make important updates to them. A new progress report has been made available, showing off the improvements for both Mir and Unity 8.
-
-
Phones
-
Android
-
Facebook said today that it’s giving away a tool it built to spot errors in Android application code.
-
According to Google’s own Android version distribution data, Android 5.0 Lollipop is only on 1.6% of Android devices that are currently in use. The actual figure is undoubtedly much smaller, as it doesn’t take into account the millions upon millions of off-brand Android devices that don’t ship with Google’s apps and services installed.
-
Using Android Wear isn’t always easy, but it’s beginning to catch on. Google has been busy packing new functionality into Android Wear, and though smartwatches (like any new tech) have a steep learning curve, they’re quickly becoming more practical. Here are some essential tips to get the most out of your Android Wear smartwatch.
-
A couple of readers just got in touch with us to inform us that the long-awaited Android 5.0 Lollipop update has landed for the T-Mobile Galaxy S5. And by the looks of things, it’s a fairly hefty update weighing in at almost 1GB in size. It’s available to download over the air, so if you haven’t received a notification yet, check your settings and update manually. If that fails, give Samsung Kies a try.
-
Google released Android 5.0 ‘Lollipop’ last November, a major milestone in the life of today’s most popular mobile operating system. Like with most Android revisions, the update was pushed over-the-air to Nexus devices and all was well in the vanilla Android camp. Google took the opportunity to launch new devices, too, the Nexus 6 smartphone and Nexus 9 tablet, complete with Android 5.0 support out of the box.
-
Let’s face it: most projectors aren’t very useful outside of home theaters or boardrooms, even if they’re packing some smarts. Beam may get you to change your mind, though. Its namesake Android-powered projector runs apps, streams media from your mobile gear (through AirPlay or Miracast) and starts tasks based on the time or what you’re doing. You can play a video message when someone gets home, for instance, or load Netflix as soon as you turn on Bluetooth speakers. However, the design is the real party trick. While the 854 x 480 resolution and 100 lumen brightness are no great shakes, you can screw Beam into any standard light socket — you don’t have to hunt for a free wall outlet (or even a wall) if you’re just looking to show off some vacation photos.
-
A core tenet of the free software movement is to enable every computer user to cooperate and contribute as equals. Improving the accessibility standards at which open source software is developed not only progresses the fundamental concepts behind this philosophy, it further legitimizes open source developers’ place in the software development community.
-
Thanks to some applied discipline, Facebook is reaping greater benefits from its efforts around open source software.
-
Web Browsers
-
Mozilla
-
Next month, Johnathan Nightingale will step down as a full time Mozillian after 8 years of distinguished service. We’d like to thank him for his countless contributions to the Mozilla project and leading Firefox through periods of intense competition and change.
-
SaaS/Big Data
-
It’s been said that sometimes the only thing worse than no choices is too many choices. If that is the case, the enterprise could be in a jam when it comes to cloud architectures.
The number of OpenStack distributions is getting larger every day, and they are starting to incorporate wildly divergent ancillary feature that will make it difficult to identify the right solution for the task at hand.
-
Business
-
Semi-Open Source
-
SiteSupra Open Source Edition is a PHP-based free, GPL-licensed CMS that is available to download from www.sitesupra.org via GitHub. The product contributes to a hosted version of the product available under the same name at www.sitesupra.com. You can find out more about the original platform via our SiteSupra Review.
-
Openness/Sharing
-
We’ve written a few times about Elon Musk and Tesla’s decision to open up all of Tesla’s patents, with a promise not to sue anyone for using them. We also found it funny when some reacted to it by complaining that it wasn’t done for “altruistic” reasons, but to help Tesla, because of course: that’s the whole point. Musk recognized that patents frequently hold back and limit innovation, especially around core infrastructure. Since then, Musk has said that, in fact, rivals are making use of his patents, even as GM insists it’s not.
-
Programming
-
The world’s largest annual human migration is now well underway as 2.8 billion trips are made across China in what is known as chun yun, when students, migrant workers and office employees living away from home will make the journey back to celebrate with their families.
-
Security
-
Transparency Reporting
-
This is the age of the whistleblower. From Chelsea Manning to Edward Snowden to the latest cloak-and-dagger lifter of files, ex-HSBC employee Hervé Falciani, whistleblowers are becoming to this decade what rock stars were to the Sixties — pop culture icons, global countercultural heroes.
-
When information becomes a weapon – whether in geopolitics or domestic politics – the democratic principle of an informed electorate is sacrificed, as is now the case in modern America, where some leaders pander to parts of the electorate that are disdainful of science, as ex-CIA analyst Paul R. Pillar observes.
-
Environment/Energy/Wildlife
-
Fox News’ Special Report used a story about a train derailment and oil spill in West Virginia to push for the passing of the Keystone XL pipeline, a common pattern for Fox, which has a long history of exploiting tragedies to push for the pipeline’s construction.
-
PR/AstroTurf/Lobbying
-
Conservatives have spent much of Obama’s presidency laying out ludicrous theories for how Obama is secretly Muslim.
-
Privacy
-
As of today, the Real ID Act—which will require all US IDs to meet minimum federal security standards—enter the first stage of its multi-year enforcement. That has a lot of people pretty nervous; whether legislators use the term or not, it smells an awful lot like a national ID card. But what is Real ID, exactly?
-
Samsung does not encrypt voice recordings that are collected and transmitted by its smart TVs to a third party service, even though the company has claimed that it uses encryption to secure consumers’ personal information.
A week ago, the revelation that Samsung collects words spoken by consumers when they use the voice recognition feature in their smart TVs enraged privacy advocates, since according to Samsung’s own privacy policy those words can in some cases include personal or sensitive information. The incident even drew comparisons to Big Brother behavior from George Orwell’s dystopian novel 1984.
-
A new report released by Tru Optik shows that there are hundreds of millions of active BitTorrent users who together shared 18 billion files last year. The data is being used to show media companies the scale of the “unmonetized” demand for their products while offering a tool to target pirates with the right offerings.
-
Google says increasing the FBI’s powers set out in search warrants would raise ‘monumental’ legal concerns that should be decided by Congress
-
BEIJING is an enormous city, sprawling over an area 10 times larger than Greater London. To get around China’s capital, many residents rely on the metro, swiping a smartcard each time they jump on or off. Could their swiping patterns reveal their class?
At the Beijing Institute of City Planning, researchers led by urban planner Ying Long have been poring over the smartcard records of millions of riders to see what their travel patterns reveal.
They explored two separate, week-long snapshots of public transportation activity taken two years apart, each including the movements of more than 8 million riders along the city’s bus and subway lines.
-
As companies expand the amount of data hoovered up via their subscribers, a common refrain to try and ease public worry is that consumers shouldn’t worry because this data is “anonymized.” However, time and time again studies have highlighted how it’s not particularly difficult to tie these data sets to consumer identities — usually with only the use of a few additional contextual clues. It doesn’t really matter whether we’re talking about cellular location data, GPS data, taxi data or NSA metadata, the basic fact is these anonymous data sets aren’t really anonymous.
-
China has been trying for some time to clamp down on the Internet, in an attempt to prevent it from being used in ways that threaten the authorities’ control. Since the appointment of China’s new leader, Xi Jinping, the situation has deteriorated — China Digital Times speaks of the “new normal” of sharpened control.
-
The question of whether law enforcement’s warrantless (and subpoena-less) access to hotel records falls outside the confines of the Constitution will be answered by the Supreme Court. An en banc hearing by the Ninth Circuit Court found that Los Angeles’ ordinance granting local law enforcement this power was unconstitutional. Not content with this finding, the city of Los Angeles has managed to bump it up to the highest judicial level.
-
Civil Rights
-
We’ve discussed for years how broken the CFAA (Computer Fraud and Abuse Act) is. The law, which was written many years ago, is problematically vague in certain areas, allowing prosecutors to claim that merely breaking a terms of service you didn’t read is a form of felony hacking — as they define it as “unauthorized access.” While there have been many egregious CFAA cases, one of the most high-profile, of course, was that of activist Aaron Swartz, who was arrested for downloading too many research papers from JSTOR from the computer network on the MIT campus. The MIT campus network gave anyone — even guests — full access to the JSTOR archives if you were on the university network. Swartz took advantage of that to download many files — leading to his arrest, and a whole bunch of charges against him. After the arrest, the DOJ proudly talked about how Swartz faced 35 years in prison. Of course, if you bring that up now, the DOJ and its defenders get angry, saying he never really would have faced that much time in prison — even though the number comes from the DOJ’s (since removed) press release.
-
Police in Michigan have determined that a mishap involving a bra holster led to the death of a local politician and pageant champion.
Christina Bond, a 55-year-old mother of two, fatally shot herself in the eye while attempting to secure her handgun.
“She was having trouble adjusting her bra holster, couldn’t get it to fit the way she wanted it to,” said St. Joseph Public Safety Director Mark Clapp. “She was looking down at it and accidentally discharged the weapon.”
Bond was rushed from her home on Lake Michigan after the incident, but succumbed to her injuries at a local hospital.
Permalink
Send this to a friend
02.18.15
Posted in News Roundup at 8:47 pm by Dr. Roy Schestowitz

Contents
-
Sony is developing self-driving car technologies with ZMP, which sells autonomous RoboCar development platforms with Linux-based control and sensor systems.
-
Desktop
-
Until Christmas or shortly before, GNU/Linux was kind of flat with just a small daily variation and little real growth. At Christmas there was obviously a huge influx of consumers’ PCs with GNU/Linux.
-
Russia responded to the first sanctions over Ukraine by announcing a move to GNU/Linux, FLOSS and Postgresql in the Ministry of Health back in 2014, just when “Unknown” took off… Who needs salesmen when you have tyrants? It’s a small world and one action over here gives another reaction over there. It’s all good, I hope.
-
Server
-
Sarah Novotny is a technology evangelist and community leader for NGINX. I first met her at OSCON, where she’s one of the program chairs. She makes it look easy on stage, but it’s a tough job to help organize one of the largest open source events held each year.
-
Kernel Space
-
Linux 3.19 was released, to be followed by either a version 3.20 or 4.0. Also, the 2015 Linux Kernel Report reveals a growing rate of kernel contributions.
Linux kernel 3.19 was released on Feb. 8 (see farther below). Meanwhile, the next release has a good chance of being renamed from Linux 3.20 to Linux 4.0. As reported by LinuxPlanet, Linus Torvalds posted an entry on Google+ saying he is opening up the question of naming to the community before he makes a decision.
-
For those unfamiliar with the VirtIO 1.0 implementation see the OASIS specification, “This document describes the specifications of the ‘virtio’ family of devices. These devices are found in virtual environments, yet by design they are not all that different from physical devices, and this document treats them as such. This allows the guest to use standard drivers and discovery mechanisms. The purpose of virtio and this specification is that virtual environments and guests should have a straightforward, efficient, standard and extensible mechanism for virtual devices, rather than boutique per-environment or per-OS mechanisms.”
-
The Linux kernel is growing and changing faster than ever, but its development is increasingly being supported by a select group of companies, rather than by volunteer developers.
That’s according to the latest survey of Linux kernel of development by the Linux Foundation, which it published to coincide with the kickoff of this year’s Linux Foundation Collaboration Summit on Wednesday.
The survey found that coders who claimed no company affiliation, or for whom an affiliation could not be determined, accounted for just 16.4 per cent of the total number of contributions to the kernel. Independent consultants made up another 2.5 per cent.
The rest all came from coders working on behalf of companies large and small. And while individual contributors seldom made a huge impact on the kernel – most made ten or few changes to the kernel over the last three years – their combined efforts made a huge difference.
The latest version of the Linux kernel to be released before the report was compiled, version 3.18, comprised some 18,997,848 lines of code.
-
Linux recently saw “busiest development cycle” in its history.
-
If there’s anyone left on the planet who thinks Linux is written by undateable guys in their parents basement, the latest Linux Foundation report, Linux Kernel Development: How Fast It is Going, Who is Doing It, What They Are Doing and Who is Sponsoring It, should put an end to that delusion.
-
Working with Jon Corbet and Greg Kroah-Hartman to produce the ‘Who Writes Linux’ report is one of the most important research projects we do, as it surfaces important data and trends that offer some insight into how the Linux kernel development process is going and informs collaborative development practices across the industry. As the world’s largest collaborative development project, Linux can teach us much.
-
-
Linux, without any doubts, is the most used technology in the world which is powering the modern IT infrastructure. From drones to space stations; from massive super computers to tiny smart-watches, from mission critical stock exchanges to your printers and routers everything is powered by Linux.
-
-
Drone technology has also reached a maturity level that the embedded Linux, ROS (Robot Operating System) and drone communities are converging, Anderson said. Dronecode, a Linux Foundation Collaborative Project, is designed to bring these various communities together to work on a common open source platform for Unmanned Aerial Vehicle (UAV) technology.
-
-
-
Bloomberg, the global business and financial information company, has joined the Linux Foundation as a Gold member.
-
The newest addition to systemd just a day after landing its new EFI boot manager is systemd-fsckd. This new addition was done by Ubuntu developers.
-
With the next kernel — regardless of whether it be known as Linux 3.20 or Linux 4.0 — it will contain support for new ARM platforms.
-
Intel, one of the world’s largest computer hardware companies, is now also among the biggest contributors to open-source software.
-
The Linux Foundation has released their annual Linux kernel development report from the Linux Foundation Collaboration Summit taking place in Santa Rosa, California.
-
A few weeks ago I wrote how systemd developers were planning to add Gummiboot as a UEFI boot manager to systemd. Now, following the just-released systemd 219, they’ve gone ahead and added their initial code for providing systemd with a EFI boot manager.
-
Now more than ever, the development of the Linux kernel is a matter for the professionals, as unpaid volunteer contributions to the project reached their lowest recorded levels in the latest “Who Writes Linux” report, which was released today.
-
Linux Foundation Executive Director Jim Zemlin thinks the information security world needs fewer surgeons and more personal trainers, and he’s putting his organization’s money where his mouth is.
Speaking at this year’s Linux Foundation Collaboration Summit, an invite-only event taking place this week in Santa Rosa, California, Zemlin took a break from his customary Linux and open source cheerleading to stress that the open source community needs to do more to address security.
-
Graphics Stack
-
Support for the GL_AMD_pinned_memory OpenGL extension has landed within Mesa and is implemented for the R600g and RadeonSI Gallium3D drivers. This patch series also lands the Userptr support for the open-source AMD graphics drivers on the user-space side.
-
The candidates running for the open seats for the X.Org Foundation Board if Directors has been released.
-
A few weeks back at FOSDEM was a presentation by Luc Verhaegen on the Tamil Driver, which is focused on bringing open-source graphics driver support to ARM’s Mali T-Series and is the successor to his former Lima driver for older Mali graphics hardware.
-
The latest OpenGL extension being implemented within Mesa Git for Mesa 10.6 is the ARB_pipeline_statistics_query extension.
-
In getting Wayland’s input support ready for prime-time usage and with Fedora 22 switching its X.Org input stack to libinput, Red Hat developers have been very busy getting libinput to reach feature parity with the conventional X.Org input code.
-
Benchmarks
-
For those looking for a very economically priced SSD that’s still reliable and from a well known vendor, the OCZ ARC 100 series might be the most tempting drive line-up yet. With the OCZ ARC 100 series, a 256GB SSD costs only $90 USD or a 480GB SSD for $197. Though in this article the OCZ ARC 100 120GB SSD is being tested and it retails for less than $70 USD.
-
Applications
-
For some time now I’ve been using Atom as a replacement for Kate, KWrite and GEdit, depending on the desktop environment I’m using.
-
The first beta of version 14.2 “Helix” of the software formerly known as XBMC is now available.
-
Kodi is a powerful media player and entertainment hub that you might know better under the name of the XBMC. The name change occurred a few months ago and this is the first major upgrade for the 14.x branch.
-
-
Proprietary
-
Having a modern graphical interface, Vivaldi tries to bring the quality of Opera 12.
-
-
Adobe’s Flash has gotten a bad rap for quite a long time now. One redditor asked how people deal with Flash on their Linux computers, and his fellow redditors pulled no punches in their responses.
-
Instructionals/Technical
-
In this article we are going to have look into the installation and basic usage of node.js application. Node is a set of libraries for JavaScript which allows it to be used outside of the browser. It is primarily focused on creating simple, easy to build network clients and servers.
-
-
Games
-
The 2D adventure game Shipwreck is now available on Steam. It’s been covered previously before when it was only available for Linux gamers via Desura and the Humble Store.
-
OpenMW, an open source implementation of The Elder Scrolls 3: Morrowind game engine and functionality that is still under development, has just been upgraded to version 0.35.0 and is now ready for download.
-
Hey Linux gamers, we are happy to inform you that a Trinity Bundle game sale is taking place these days, which includes no more than 10 awesome games for GNU/Linux operating systems. Of course, all games will also work on Microsoft Windows and Mac OS X computer operating systems.
-
Even if Valentine’s Day has already passed, gamers can still get the Humble Weekly Bundle: For Lovers (of games), which contains quite a few Linux titles and even a couple of pillowcases.
-
-
Crytek announced a while ago that it was working on the CryEngine for the Linux platform, but little information has been made available since then. Now, it looks like they are finally ready to share some news about the engine during the upcoming GDC 2015 event.
-
FlightGear 3.4 brings improved frame-rates, reduced memory occupancy for scenery titles, AI model improvements, SVG-based panel support, improving rendering of the runway and other lights under ALS, landing and spotlight support for ALS, and various other improvements to this open-source cross-platform flight simulator.
-
The FlightGear devs had the pleasure of announcing earlier today, February 17, the immediate availability for download of the FlightGear 3.4 open-source and cross-platform cooperative flight simulator. The new release introduces a number of improvements and new features in various areas, such as aircraft, graphics, scenery, and JSBSim.
-
FlightGear features more than 400 aircraft, a worldwide scenery database, a multi-player environment, detailed sky modelling, a flexible and open aircraft modelling system, varied networking options, multiple display support, a powerful scripting language and an open architecture. Best of all, being open-source, the simulator is owned by the community and everyone is encouraged to contribute.
-
Gallium Nine is a Direct3D 9 implementation for the Open Source Mesa drivers that use Gallium. Used with Wine, it enables you to play Direct3D 9 games with solid performance on Linux.
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
The porting of KDE software from Qt4 to Qt5 is in full progress. The KDE core libraries were splitted to multiple manageable frameworks, ready to be used with any Qt5 application.
-
One of the important design cornerstones of Plasma is that we want to reduce the amount of “hidden features” as much as possible. We do not want to have to rely on the user knowing where to right-click in case she wants to find a certain, desktop-related option, say adding widgets, opening the desktop settings dialog, the activity switcher, etc.. For this, Plasma 4.0 introduced the toolbox, a small icon that when clicked opens a small dialog with actions related to the desktop. To many users, this is an important lifeline when they’re looking for a specific option.
-
GNOME Desktop/GTK
-
For those wishing to experiment with the latest Wayland technologies, short of running the Weston compositor, the bleeding-edge development GNOME stack continues to serve as an excellent alternative with quickly adopting support for new functionality.
-
-
It looks like that Google’s Material Design guidelines are making quite an impression, and developers have started to pay closer attention to them. Now we have a new theme that tries to respect the new guidelines and it’s probably just the first of many.
-
Ozon OS “Hydrogen” is a new Linux distribution based on Fedora 21 developed by a team from Nitrux and Numix. It’s been in the works for quite some time and it looks like a new Beta release is almost here.
-
Reviews
-
Nvidia followed that device up this past summer with what it calls the “Shield Tablet,” an 8-inch device built to be a solid tablet, but with a clear focus on gaming. I’ve had one here for the last week, kicking the tires. And, let me tell you, it makes both an incredible tablet and an astoundingly good game console.
-
Arch Family
-
Arch is one of my favorite GNU/Linux distributions, along with openSUSE and Kubuntu. However, unlike openSUSE or Kubuntu it’s not easy to install Arch Linux. I have created a little guide of my own which I follow whenever I install Arch on any system – and I have done it dozens of times since 2011. I would suggest that you should also open the official wiki of Arch Linux, while you follow this tutorial so you can better understand the wiki.
-
Slackware Family
-
The KDE 5_15.02 increment contains the KDE Frameworks 5.7.0, Plasma 5.2.0 and Applications 14.12.2. Also present is a bunch of the “good old” KDE 4: most of kdebase, kdebindings and all those “extragear” packages like k3b and kdevelop which were missing in my 5_15.01 release.
-
Red Hat Family
-
Red Hat is making lots of noise. The firm is bullishly ebullient about containers; the firm has this year partnered with 3scale for its API management platform; and the firm has just announced its Red Hat Enterprise Linux OpenStack Platform 6 offering. In less product branded terms then, this is software to serve as the foundation for building OpenStack-powered clouds for businesses that we can label as “advanced cloud users” today.
-
Last year, Red Hat decided that the 64-bit ARM architecture was ready for the data center and cloud. This year, Red Hat announced that its Red Hat ARM Partner Early Access Program has expanded to include more than 35 companies. It also expects them to contribute open-source system-specific software and drivers to the upstream Linux ARM community.
-
Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced that the Red Hat ARM Partner Early Access Program has expanded to include more than 35 member companies, ranging from silicon vendors and original equipment manufacturers (OEMs) to independent software vendors (ISVs).
-
ARM is not yet a primary target for Red Hat’s Enterprise Linux server, but it will be at some point in the near future. Red Hat has grown its ARM Partner Early Access program to 35 members, including both software and silicon vendors.
-
Fedora
-
The GNOME desktop is well integrated into the Korora distro. Korora 21 also is available with the Cinnamon, KDE and Xfce desktops. Korora developers did an awesome job tweaking the integration of each desktop into the distro’s performance. You must download each ISO file separately. Like most full-service Linux distros, Korora no longer includes all of the desktop options in one humongous ISO.
-
Debian Family
-
-
Derivatives
-
Here’s the rest of the story regarding successors, spins or forks of CrunchBang. The tech media is falling over itself reporting that the “successor” to CrunchBang is something called #!++ which, to many CrunchBang insiders, is nothing more than one — but not “the resurrection” — project based on CrunchBang. It’s a project that appears, in the opinion of many CrunchBang contributors, as one that is trying to capitalize on the name, now that it’s “available,” in a manner of speaking.
-
Canonical/Ubuntu
-
I recorded and posted a video with a detailed review of the bq Aquaris E4.5 Ubuntu phone, complete with wider commentary on the scopes and convergence strategy and the likelihood of success.
-
People tend to think about Ubuntu for Phones like a separate platform, but the truth is that it’s a lot closer to the PC than most users think. The fact that an app like GCompris can be made to run on phones is good proof of that.
-
On the 11th of February, over 12.000 BQ Aquaris E4.5 have been sold in two flash sales. The next flash sale will take place tomorrow, at 9 AM CET (Central European Time). The Ubuntu phone from BQ will be available for ordering via the bq website, for €169.90.
-
For those of you who didn’t have the chance to buy the Ubuntu Phone last week, BQ announced a few minutes ago on Twitter that a new flash sale for its Aquaris E4.5 Ubuntu Edition smartphone device, which uses the Ubuntu Phone (Ubuntu Touch) operating system, would take place tomorrow morning starting at 9 AM CET (Central European Time).
-
Mark Shuttleworth clearly feels that what consumers and developers need, they will in time learn to want.
-
A new arrival into an extremely competitive market, the first Ubuntu-powered phone has finally gone on sale in Europe – two years after a failed attempt to generate crowdfunding nevertheless raised US$12m. A sleek, polished rectangle, it appears much like other smartphones, but promises a different experience.
-
In case you didn’t know, BQ, the Spanish phone manufacturer that produces the Aquaris E4.5 Ubuntu Edition smartphone, has a YouTube channel, called Canal bq. There, you will find all sorts of instructive videos, some of which are about the brand-new Ubuntu Phone device.
-
Meet the $89 Remanufactured Ubuntu Linux web workstation. Encased in 12.5×12.5×6.25 of 1/8th inch black recycled ABS plastic and shipped in 100% non-virgin fiber packaging, this little marvel is the culmination of years of hard work, dedication and focus. Averaging only 50% of the shipping weight of a standard desktop tower, and offering at least 2GB of RAM, 2.8Ghz of desktop-class processing power and at least a 80GB SATA hard drive, the Symple PC gives classroom labs, non-profits and call centers a planet-friendly, privacy-conscious choice for computing at an outstanding value. Complete with an available 1 Year Advanced Replacement Warranty, provided you ship the unit back to be planet-conscious, Symple PCs arrive at your organization with Ubuntu Linux 14.04 LTS pre-installed. They handle local document processing, web work, and are completely private and stand-alone, not requiring any 3rd party accounts to login and be productive.
-
Flavours and Variants
-
Jeff Hoogland today announced Bodhi Linux 3.0.0. This is the first release after the scare of losing founder and lead developer; a release many thought may never come just a short while ago. Over at Linux.com Swapnil Bhartiya penned an article describing the best Linux contenders in a variety of categories for the coming year. Elsewhere, five developers say Linux should be used for making music.
-
-
Version 3.0 of Bodhi Linux is now available, the distribution based on Ubuntu 14.04 LTS that features a customized Enlightenment E19 desktop.
-
-
Enea (STO:ENEA), a leading operating system solution vendor within the communication domain announces Enea Linux support for the 64-bit AMD embedded R-Series system-on-chip (SoC) processor, codenamed “Hierofalcon”.
-
It is hard to believe that the Raspberry Pi has been around for three years already. Launched back in 2012, the credit card-sized PC attracted quite a bit of attention due to its $35 price and potential ability to encourage programming with children. Today, it was revealed that over 5 million units of Raspberry Pi have been sold to date.
-
Phones
-
Tizen
-
Terminology version 0.8 has been released and is available for immediate download. Terminology is a terminal emulator program that is written with Enlightenment Foundation Libraries (EFL), and has some extra features when compared to standard Terminal apps.
-
Android
-
-
When it comes to Android, there is never a dearth of messaging apps. From WhatsApp to Line, you can switch to pretty much any messaging service, whenever you want. However, if you are running a company, there are many factors involved before you add a messaging app in the mix. The same solutions that teenagers use to keep up with their buddies won’t work amongst your employees. Can be quite frustrating, don’t you think?
-
The Android 5.0 Lollipop is now being seeded to various Samsung smartphones like the Galaxy S5, Galaxy S4, Galaxy Note Edge, Galaxy Note 4, Galaxy Note 3 and Galaxy Note 2. The update is being rolled out in phases which mean that all the others will not receive the Lollipop update simultaneously. This report talks about the status update of the latest Android build for the aforementioned smartphones.
-
-
We’ll explain 15 reasons why Android is better than the iPhone with a new for 2015 Android vs iPhone comparison. In the last six months Apple’s iOS 8, iPhone 6 and iPhone 6 Plus changed the playing field and removed some of the advantages Android offered, but the Android 5.0 Lollipop release and excellent phones still set Android apart in several important areas.
-
Sub-notebooks/Tablets
-
Android 5.0 Lollipop has been out and about for almost four months now and during this time it has slowly been making its way to phones and tablets. More phones than tablets, to be precise.
-
The information jobs for the remainder of the 21st century will not be managed by operating systems. Today, we perceive Twitter as one of a very few examples of services that run at “Internet scale” — at a scale so large that the size of its domain is meaningless. Yet Twitter is actually an example of what one day, within most of our lifetimes, will be considered an everyday job, the sort of thing you expect networks of clustered servers numbering in the tens of thousands to do.
-
At least that’s how Dmitry Pushkarev sees it. His new company, ClusterK, is releasing its genomics pipeline to illustrate how complex workflows like the Broad Institute’s GATK can be run efficiently—and much faster—on the cloud. The pipeline breaks the GATK pipeline into thousands of different tasks, each taking 10-20 minutes, which can be run in parallel. “It allows the entire workflow to be distributed across dozens of compute nodes,” Pushkarev says, and results are returned much faster.
-
HP has released a product that checks off many of the boxes on the hot-technology list for 2015: big data, business intelligence, predictive analytics, and open source.
-
HFOSS organizers need to make is easier to help people get involved. One recommendation that I have is a simple navigator that asks people what they want to do or what they want to give. The aggregator would then help match them to tasks and communities. Think of it as a global Match.com for giving. We would give love to open source organizations, corporations, nonprofits, community-based organizations, and citizens. Truly, this is all hands on deck to make it possible for anyone and any organization to connect. We could tailor it with the code to help people choose their own adventure based on topic, time, location, and their learning/doing/giving path. Really, we need to dream big more and build it.
-
Zack Urlocker was just named COO of Duo Security, a Benchmark and Google Ventures-backed security company that aims to make two-factor authentication omnipresent and painless. Is this Urlocker’s next unicorn? After all, as SVP of products and marketing at MySQL, he helped to drive a $1 billion sale by Sun. Later, he went on to run operations at pre-IPO Zendesk (now worth $2 billion).
-
From the corporate world I frequently hear how hard it is to predict and track what upstream developers do. On the other side, developers that work part or full time upstream frequently underestimate the need for communicating what they do in a way that enable others (or themselves) to provide deadlines and effort estimations. Upstream and product “time lines” and cultures often differ too much to be compatible under the same environment.
-
Events
-
The Linux Foundation describes its annual Collaboration Summit as a gathering of its corporate members along with invited participants including core kernel developers, distribution maintainers, ISVs, end users, system vendors, and representatives of community organizations. This year’s Summit takes place Feb. 18-20 in Santa Rosa, Calif., and is expected to draw more than 450 participants.
-
-
Web Browsers
-
Mozilla
-
Every so often, a bug shows up in an open-source application that just make me go ..huH? That’s the case with Mozilla firefox bug 949446 which has the ominous title of: “Source Code Disclosure of every possible project”
-
SaaS/Big Data
-
IBM, GE, Teradata, Infosys, VMware, Pivotal, SAS and others will develop on and test out Apache Hadoop open source tools
-
MapR has a new release today that provides some perspectives on the influences that are shaping new data-centric architectures. In particular, it shows the importance of Yarn, Mesos and the continued value that Docker plays as the need increases for developing new patterns that reflect the forces of data gravity and container density.
-
All the way back in 2013, the folks at Cloudscaling were adamant that the future of OpenStack depended on embracing Amazon Web Services (AWS), and there has continued to be much debate on the topic. Eucalyptus Systems, among other open cloud players, proved that by integrating Amazon’s command interfaces exactly, many users would react positively.
-
This week, there are a lot of interesting big data announcements coming out of Strata + Hadoop World. MapR Technologies, Inc. has announced at Strata + Hadoop World the latest release of the MapR Distribution including Hadoop, which, the company notes, “has new features that accelerate the data-centric enterprise by supporting applications on globally-distributed, big data.” The company’s new MapR Distribution including Hadoop, version 4.1, features interesting table replication features and more.
-
Bowing to customer pressure, enterprise software and services vendor Pivotal will release as open source the remainder of its software suite for analyzing data.
-
Oracle/Java/LibreOffice
-
LibreOffice is the flagship office suite for Linux. It’s also quite popular with Windows users. As a free, open-source and cross-platform solution, LibreOffice allows people to enjoy the world of writing, spreadsheets, presentations and alike without having to spend hefty sums of money. The only problem till now was that it didn’t quite work as advertised. Microsoft Office support was, for the lack of a better word, lacking.
Version 4.4 is out, and it promises a great deal. A simplified interface, new looks, much improved proprietary file format support. Sounds exciting, and as someone who has lambasted LibreOffice for this very reason in the past, I felt compelled to give this new edition its due rightful try. On top of Plasma 5 no less. So let’s see.
-
Funding
-
I wrote a column a while back called “Distro developers need dollars” where I included links to distro donation pages. My thought then was that it was a good idea for distro developers to get financial support from users whenever possible. I still feel that way, however, there’s a flip side to that idea too.
-
BSD
-
Anyhow, some comments in my recent posts (“Has modern Linux lost its way?” and Reactions to that, and the value of simplicity), plus a latent desire to see how ZFS fares in FreeBSD, caused me to try it out. I installed it both in VirtualBox under Debian, and in an old 64-bit Thinkpad sitting in my basement that previously ran Debian.
-
If you are running a current kernel r273872 or later, please upgrade your kernel to r278907 or later immediately and regenerate keys.
-
It was fixed and subsequently reported yesterday that the FreeBSD kernel has been subject to a faulty random number generator for the past four months.
[...]
Update: To clarify, this issue is/was only in the FreeBSD -CURRENT kernel and not the 10.x releases.
-
Coming soon is the HHVM 3.6 release for making PHP even faster and Facebook’s Hack derivative even better, but further out into 2015 are even more exciting improvements.
-
Openness/Sharing
-
The Open Networking Foundation (ONF) has announced the launch of a new open source software community and code repository at OpenSourceSDN.org. The foundation said the new site is designed to be a resource for those looking to commercially deploy open SDN (Software-Defined Networking) solutions, free from vendor lock-in.
-
-
-
Open Data
-
OpenStreetMap has been for almost 11 years and at long last routing has arrived on the main website. The functionality is actually provided by 3rd parties including OSRM, MapQuest and GraphHopper. One shortcoming of the new map implementation is that you cannot add multiple destinations to your journey. Nonetheless the new update is a huge one for the open source map software.
-
The OpenGov platform has been gaining traction as a tool for governments to demonstrate their transparency by providing better access to government spending data in a user-friendly, digital format.
-
Open Access/Content
-
Subha Panigrahi is an educator and open source activist based in Bangalore, India. He is currently works at the Centre for Internet and Society’s Access To Knowledge program where he builds partnership with universities, language researchers, and GLAM organizations. Their goal is to bring more scholarly and encyclopedic content under free licenses. During his work at the Wikimedia Foundation’s India Program, Subha was involved in designing community sustaining and new contributor cultivation models.
-
Open Hardware
-
VR ecosystem is now supported by 38 members; Academia Support Program announced to support developers worldwide
-
Standards/Consortia
-
On February 11 at the State Council Executive Meeting in Beijing, Premier Li Keqiang confirmed the final framework agenda for China’s standardization reform. According to a report on the State Council website, the key target of reform is improving China’s economic performance and enhancing the overall competitiveness of China’s products and services.
-
The HTTP/2 and HPACK specifications have been formally approved by the IESG.
-
The ‘90s rapper known as Vanilla Ice has been arrested and charged with burglary and grand theft for allegedly stealing an array of items from a vacant Florida home.
Lantana police told TMZ that furniture, a pool heater, bicycles and other items were stolen from the property in the 100 block of N. Atlantic Drive.
-
Health/Nutrition
-
The numbers are startling. According to the US Centers for Disease Control and Prevention, about 1.8 million more children in the US were diagnosed with developmental disabilities between 2006 and 2008 than a decade earlier. During this time, the prevalence of autism climbed nearly 300%, while that of attention deficit hyperactivity disorder increased 33%. CDC figures also show that 10 to 15% of all babies born in the US have some type of neurobehavorial development disorder. Still more are affected by neurological disorders that don’t rise to the level of clinical diagnosis.
-
Defence/Police/Secrecy/Aggression
-
There was a great power that was worried about its longtime rival’s efforts to undermine it. Its leaders thought the rival power was stronger and trying to throw its weight around all over the world. In fact, this longtime rival was now interfering in places the declining state had long regarded as its own backyard. To protect this traditional sphere of influence, the worried great power had long maintained one-sided relationships with its neighbors, many of them led by corrupt and brutal oligarchs who stayed in power because they were subservient to the powerful neighbor’s whims.
-
Further, Bush misrepresented the strength of ISIS, saying they have some 200,000 men, which is far greater than U.S. intelligence community’s estimates. Last week National Counterterrorism Center Director Nicholas Rasmussen pegged the fighting strength of ISIS at between 20,000 and 31,500.
-
Transparency Reporting
-
Last month, WikiLeaks wrote an open letter to former Google CEO Eric Schmidt admonishing the tech giant for waiting over two and a half years to reveal that it gave the Department of Justice the emails and other data of three Wikileaks staffers. Google was finally successful in overturning the gag order in December, which was when the staffers in question – Sarah Harrison, Kristinn Hrafnsson and Joseph Farrell – were made aware of the investigation into their activities.
-
Adrian Humphreys of the National Post, who last year wrote an award-winning 5 part investigative piece on Matt DeHart’s case, reports: “The decision by the Immigration and Refugee Board (IRB) offered him a moral victory — finding no ‘credible or trustworthy evidence’ he committed the child pornography offences alleged by the government — but extended him no protection, denying him refugee status, which would have allowed him to remain in Canada.” — See full story here.
-
The sea is rising and our remaining hills are few and far between. This is not a discussion of climate change despite its perils. This a discussion of the anonymous archipelago in the global sea of surveillance and our loss of collective privacy. While our individual privacy is in grave danger today, there are still countermeasures to protect our thoughts and words from hostile eyes and ears. It cannot listen to yet the voice in our heads nor can they follow everyone at all times. It cannot yet steal the ideas from our minds nor can they accurately predict our intentions short of our overt behavior. They do not yet have this power, but they will try. They will try because we have ceded to them our right to collective privacy.
-
When Private Chelsea Manning – the former soldier currently serving a 35-year prison term for leaking thousands of classified documents – came out as transgender in August 2013, major media outlets proved just how ill-prepared they were to cover transgender stories. Both Fox News and CNN repeatedly misgendered Manning, disregarding GLAAD’s Media Reference Guide, which calls on news organizations to refer to transgender people by their preferred gender pronouns.
-
Environment/Energy/Wildlife
-
You don’t have to look 85 years into the future to see what a sinking world looks like—you only need to look as far as Miami.
-
Finance
-
Or maybe people think inequality hasn’t stopped rising because it hasn’t. The problem with Leonardt’s argument is that it’s cherry-picking: If you start from 2007, which was the height of a financial and real-estate bubble that mostly benefited the wealthy, then of course the income of the wealthy won’t return to where it was; a bubble is by definition unsustainable. (If the recovery amounts to reinflating the bubble, as some observers fear, that would be bad news for the elite as well as for the rest of us.)
[...]
Leonhardt can sometimes be an effective debunker of conservative spin, but the trick of starting your measurement of inequality from an unrepresentative peak is reminiscent of the chicanery of Wall Street Journal editorial page editor Robert Barkley, who wrote an entire book, The Seven Fat Years, based on manipulating the timeframe of economic comparisons.
-
Of course, income inequality is still at historically troubling rates, and could potential even worsen, as the Times repeatedly noted.
-
Geneva’s public prosecutor searched the premises of HSBC Holdings PLC in Geneva on Wednesday and said it had opened a criminal inquiry into allegations of aggravated money laundering.
“A search is currently underway in the premises of the bank, led by Attorney General Olivier Jornot and the prosecutor Yves Bertossa,” Geneva’s prosecutor said in a statement.
HSBC, Europe’s biggest bank, apologised to customers and investors on Sunday for past practices at its Swiss private bank following allegations that it helped hundreds of clients dodge taxes.
-
Investigation into suspected ‘aggravated money laundering’ comes after Belgium and France begin scrutinising tax affairs of Europe’s biggest bank
-
The Swiss subsidiary of HSBC was searched on Wednesday by officials after prosecutors in Geneva said they are opening a money laundering investigation into the bank’s alleged illegal tax activity.
The premises of HSBC Private Bank (Suisse) were searched by authorities, AP reported, and the investigation could possibly extend beyond the bank to any clients participating in money laundering.
-
PR/AstroTurf/Lobbying
-
Conservative media figures criticized the Obama administration for suggesting terrorism is tied to poverty, ignoring the fact that former President George W. Bush also explicitly cited alleviating poverty as a fundamental tool to fighting terrorism.
-
The Wall Street Journal is celebrating a ruling from a lower-court judge who has temporarily blocked President Obama’s exercise of prosecutorial discretion over undocumented immigrants by repeating a litany of right wing-media myths, some of which were repeated in the legal decision itself.
-
You can see propaganda being manufactured before your eyes: “According to one new poll” becomes “Poll Shows”; “more support it than object” becomes “Americans Want.” Any subtleties are ironed out to create an assertion that the American people are calling for Netanyahu to speak.
-
-
Censorship
-
The First 100 Days featured actress Priyanga Burford as the party’s only Asian woman MP, who is elected for Romford in an imagined landslide making Mr Farage Prime Minister.
-
Former Telegraph journalist Peter Oborne has said that “poor editorial judgement” has been exercised at the newspaper he stepped down from.
Following his announcement that he had resigned from his position as The Telegraph’s chief political commentator, Oborne appeared in a strongly-worded interview on BBC Radio 4, where he repeated his comments that the paper had “failed” its readers in its alleged underreporting of the HSBC scandal.
-
The Daily Telegraph’s former chief political commentator, Peter Oborne, has called for an independent inquiry into the paper’s editorial guidelines over its lack of coverage of the HSBC tax story, which he described as a “fraud on its readers”.
-
In September 2013, Peter Oborne wrote a piece in the Daily Telegraph in praise of Ed Miliband, calling him a brave and adroit leader. I remarked at the time that he was a columnist renowned for going against the grain of the newspaper for which he writes.
It is to his credit that he did so and was to the Telegraph’s credit that it hired him and published him for five years. He never subscribed to the paper’s large-C Conservative line on many subjects.
-
THE report released on Thursday by Reporters Sans Frontières reminds us that politics around the world today has inevitably taken a heavy toll on media freedoms, squeezing both the public’s right to know and journalists’ duty to inform.
“Press freedom … is in retreat in all five continents,” said the RSF 2015 World Press Freedom Index.
The head of the RSF told the media that the deterioration is linked to a range of factors, “with information wars and actions by non-state groups acting as news despots”.
-
Privacy
-
New research done by Russian cyber-security firm, Kaspersky, suggests that the NSA (although not confirmed by Kaspersky) has spyware deeply embedded into hard drives from manufacturers including Western Digital, Seagate, Toshiba and others, covering much of what’s on the market. The software embedded in the hard drives is part of a group of spyware which Kaspersky found out about.
-
The UK already has a pretty awful reputation when it comes to surveillance, what with millions of CCTV cameras, DRIPA and two recent attempts to shove the Snooper’s Charter through Parliament without scrutiny. So perhaps it should come as no surprise to discover that UK police forces have created a giant facial recognition database that includes hundreds of thousands of innocent people….
-
Police forces in England and Wales have uploaded up to 18 million “mugshots” to a facial recognition database – despite a court ruling it could be unlawful.
They include photos of people never charged, or others cleared of an offence, and were uploaded without Home Office approval, Newsnight has learned.
-
Security researchers have uncovered highly sophisticated malware that is linked to a secret National Security Agency hacking operation exposed by The Intercept last year.
Russian security firm Kaspersky published a report Monday documenting the malware, which it said had been used to infect thousands of computer systems and steal data in 30 countries around the world. Among the targets were a series of unnamed governments; telecom, energy and aerospace companies; as well as Islamic scholars and media organizations.
Kaspersky did not name the NSA as the author of the malware. However, Reuters reported later on Monday that the agency had created the technology, citing anonymous former U.S. intelligence officials.
Kaspersky’s researchers noted that the newly found malware is similar to Stuxnet, a covert tool reportedly created by the U.S. government to sabotage Iranian nuclear systems. The researchers also identified a series of code names that they found contained within the samples of malware, including STRAIGHTACID, STRAITSHOOTER and GROK.
-
On Monday, London-based human rights group Privacy International launched an initiative enabling anyone across the world to challenge covert spying operations involving Government Communications Headquarters, or GCHQ, the National Security Agency’s British counterpart.
The campaign was made possible following a historic court ruling earlier this month that deemed intelligence sharing between GCHQ and the NSA to have been unlawful because of the extreme secrecy shrouding it.
-
As the Snowden leaks continue to dribble out, it has become increasingly obvious that most nations planning for “cyber-war” have been merely sharpening knives for what looks like an almighty gunfight.
-
Edward Snowden, the NSA whistleblower on the run, spoke at ACLU Hawaii’s First Amendment Conference live Saturday, via a video link from Moscow, Russia.
-
Google is warning that the government’s quiet plan to expand the FBI’s authority to remotely access computer files amounts to a “monumental” constitutional concern.
The search giant submitted public comments earlier this week opposing a Justice Department proposal that would grant judges more leeway in how they can approve search warrants for electronic data.
-
The UK Government has today conceded that its policies governing the ability of intelligence agencies to spy on lawyer-client communications were unlawful, in response to a case brought by two victims of an MI6-orchestrated ‘rendition’ operation.
Abdul-hakim Belhaj and Fatima Boudchar were tortured and rendered to Libya in 2004 in a joint MI6-CIA operation. They filed a case in 2013 with the Investigatory Powers Tribunal (IPT) concerning alleged eavesdropping by UK intelligence services on their confidential communications with their lawyers.
-
The regime under which UK intelligence agencies, including MI5 and MI6, have been monitoring conversations between lawyers and their clients for the past five years is unlawful, the British government has admitted.
The admission that the activities of the security services have failed to comply fully with human rights laws in a second major area – this time highly sensitive legally privileged communications – is a severe embarrassment for the government.
-
Civil Rights
-
No country on the planet is untouched by the United States government. In fact, the US has the most powerful military on Earth and arguably the most powerful military in the history of the world. There is no more important “affair of the state” during the life of a nation than its participation in war. Yet instead of defending the country, the United States government often uses the military, the CIA, and a variety of international organizations to intervene in foreign affairs on behalf of powerful US based multinational corporations often to the detriment of the great majority of the people in the United States and billions of people around the world.
-
This is the third article (see PART 1 & PART 2) in a five part series examining the US legal system. The series collectively argues that corporate media and political rhetoric have made Americans acquiescent toward corruption in the US legal system. This piece examines how public ambivalence toward a justice system which operates for profit not public good has created a breeding ground for corruption.
-
French police have opened an investigation after Ffans of Chelsea football club were filmed repeatedly pushing a black man off a Paris Metro train, before chanting “We’re racist and that’s the way we like it”.
-
The University of Massachusetts Amherst today announced that it will accept Iranian students into science and engineering programs, developing individualized study plans to meet the requirements of federal sanctions law and address the impact on students. The decision to revise the university’s approach follows consultation with the State Department and outside counsel.
-
In August 2010, Stephen Kim, a highly-regarded intelligence analyst in the State Department, was indicted under the Espionage Act for divulging classified information to Fox News reporter James Rosen. If convicted at trial, he faced 10 to 15 years in prison.
Kim allowed me to film his life in intimate detail from the period after his guilty plea early last year — he accepted a sentence of 13 months — until his surrender at a federal prison this past July. I watched him simultaneously disassemble the physical components of his life while he retraced the journey that brought him from speaking zero English as a young Korean immigrant, to the nation’s top universities, to the State Department and ultimately to the courtroom where he faced federal prosecution.
-
Stephen Kim Spoke to a Reporter. Now He’s in Jail. This Is His Story.
-
New York Times reporter James Risen slammed Attorney General Eric Holder in a series of tweets Tuesday evening, calling the Obama administration “The greatest enemy of press freedom in a generation.”
“Eric Holder has been the nation’s top censorship officer, not the top law enforcement officer,” Risen tweeted. “Eric Holder has done the bidding of the intelligence community and the White House to damage press freedom in the United States.”
Risen was tweeting in response to a speech Holder gave earlier on Tuesday at the National Press Club, where he defended the administration’s record on prosecuting leakers, saying they could have prosecuted far more than they actually did.
-
At almost the same time, lawyers for Jeffrey Sterling moved for acquittal on all charges. As part of that, they made an argument very similar to the one I made: Jeffrey Sterling was convicted on three charges relating to the possession of a copy of a letter that appeared in Risen’s State of War that not only did the FBI admit they never found, but which Sterling had no possible way of possessing.
-
Director of National Intelligence James R. Clapper issued guidance this month on polygraph testing for screening of intelligence community personnel. His instructions give particular emphasis to the use of the polygraph for combating unauthorized disclosures of classified information.
-
Speaking at a luncheon at the National Press Club in Washington, D.C., Holder, noting that he was speaking in a personal capacity and not as a member of the administration, said the “inevitable” possibility of executing an innocent individual is what makes him oppose capital punishment.
-
The human rights abuses revealed in the executive summary of the Senate Intelligence Committee’s torture report released in December sparked global outrage, leaving some begging for senior officials from the George W. Bush administration to be held accountable. But CIA whistleblower John Kiriakou is certain the U.S. government will do nothing of the sort.
Just two weeks after Kiriakou was released from prison after agreeing to a plea deal in which he admitted to violating one count of the Intelligence Identities Protection Act, he spoke with HuffPost Live’s Alyona Minkovski on Tuesday about where the accountability should lie.
-
Members of the Zambrano family began arriving here three decades ago, picking apples in nearby orchards. Over time they have become part of the fabric of this harvesting town, growing to more than 50 and settling in tiny candy-colored homes, some ringed by white picket fences.
-
For the record, I believe our country needs some kind of program to divert wayward young men — of whatever race, religion, and ideology — rather than ensnaring them in stings that will result in a wasted life.
Mind you, the government is going about it with the Muslim community badly. In part, that’s because the US doesn’t have much positive ideology to offer anymore, especially to those who identify in whatever way with those we’ve spent millions villainizing. In part, that’s because we’d have to revamp FBI before we started this CVE stuff, starting with the emphasis on terrorist conviction numbers as the prime measure of success. You’ll never succeed with a program if people’s primary job measure is the opposite.
Finally, and most obviously, you have to start by building trust, which will necessarily require a transition time between when you primarily rely on dragnets and informants to that time when you can rely on community partners (it will also require an acceptance that you won’t stop all attacks, regardless of which method you use).
-
This is for the courageous whistleblower John Kiriakou. He was the first U.S. government official to confirm in December 2007 that waterboarding was used to interrogate Al Qaeda prisoners, which he described as torture. On October 22, 2012, Kiriakou pleaded guilty to disclosing classified information about a fellow CIA officer that connected the covert operative to a specific operation. He was the first person to pass classified information to a reporter, although the reporter did not publish the name of the operative.[6] He was sentenced to 30 months in prison on January 25, 2013, and served his term from February 28, 2013 until 3 February 2015 at the low-security Federal correctional facility in Loretto, Pennsylvania.[7]
-
-
Internet/Net Neutrality
-
In countries where Internet access is widespread there’s active conversations going on regarding net neutrality as more and more users tax ISP’s infrastructures thanks to heavy data usage. The fear surrounding a tiered Internet is that people will lose access to some sites and therefore lose out on information. Facebook’s attempt to provide some sites for free in India also raises net neutrality issues, rather than included sites being democratically chosen by it’s users, they’ve been pre-selected by Facebook.
-
More antitrust woe for Google on the international front. Search giant Yandex, often described as the “Google of Russia”, has filed a request with Russia’s antimonopoly regulator to investigate Google over possible violations of Russia’s antitrust laws.
-
Intellectual Monopolies
-
London’s Conway Hall was the venue for a Guardian Membership event held this week to debate the pros and cons of TTIP. The discussion was chaired by Guardian economics editor Larry Elliott and the panel comprised Claude Moraes, Labour MEP; Owen Tudor, head of European Union and International Relations, TUC; John Hilary, executive director of charity War on Want; and Vicky Pryce, chief economic adviser at the Centre for Economics and Business Research. There was also a room full of impassioned Guardian members. So what did we learn?
-
Copyrights
-
The Pirate Bay has been back online for more than two weeks but thus far it’s been rough sailing. The notorious torrent site has had to jump from hosting service to hosting service just to stay online and is still looking for a safe haven. At the same time, scammers keep hounding the site with fake files and malicious links.
Permalink
Send this to a friend
02.17.15
Posted in News Roundup at 7:59 pm by Dr. Roy Schestowitz

Contents
-
Desktop
-
-
Vivaldi, a new web browser based on Chromium, built by an Opera founder and his team, has just received an upgrade and 32-bit versions for the application, among other things.
-
Its not a secret that I’ve been working on sandboxed desktop applications recently. In fact, I recently gave a talk at devconf.cz about it. However, up until now I’ve mainly been focusing on the bundling and deployment aspects of the problem. I’ve been running applications in their own environment, but having pretty open access to the system.
Now that the basics are working it’s time to start looking at how to create a real sandbox. This is going to require a lot of changes to the Linux stack. For instance, we have to use Wayland instead of X11, because X11 is impossible to secure. We also need to use kdbus to allow desktop integration that is properly filtered at the kernel level.
-
Clearly, GNU/Linux is growing as rapidly at work as at home. Thanks to Dell, Canonical, the government of India and others who laid the groundwork for this growth. May it continue for years to come and accelerate.
-
Kernel Space
-
Of course, the other option, if Linus wanted to be truly trendy, is to just call the next version Linux 10—and then perhaps thereafter give each new version the name of a large animal or an interesting location from Torvalds’ home country of Finland.
-
Applications
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
It’s clear the current KRecipes gardening effort is not having much traction, but before moving on to different applications, let’s try a different format, the Gardening Day.
-
Last spring, Pivotal unveiled its Pivotal Big Data Suite, a subscription-based software, support and maintenance package that bundled its big data components into a single, simple licensing structure. The Big Data Suite was responsible for $40 million of the $100 million in total business Pivotal did in 2014. Today, the company took the unprecedented step of open sourcing all those components.
-
Linux has a reputation for being geeky, esoteric, hard to get into and limited in terms of available software. But does the increasingly popular free OS and its ecosystem deserve such criticism, or are musicians missing out by not considering making the switch from Windows or OS X?
-
-
Linux is omnipresent, even if you don’t realize it. I have been using Linux as my only OS since 2005 and with every passing year I come to realize that it has much more to offer than I initially, back in 2005, understood. There is something for everyone. In this article, I have picked some of the best Linux distros to help you get the job done.
-
New Releases
-
The first update pack has been released for Manjaro 0.8.12, the latest version of the distribution released only a couple of weeks ago. Numerous components have been upgraded, including some of the core ones.
-
Bodhi Linux, a fast, minimalistic Linux distribution which uses Enlightenment (E19) by default, has reached version 3.0.0.
-
Ballnux/SUSE
-
Open source vendor SUSE jumped into the distributed storage market this week with the launch of SUSE Enterprise Storage. Based on Ceph, the new offering positions the company to compete more strongly in the software-defined, scale-out storage market.
-
Red Hat Family
-
Red Hat Feb. 17 announced the general availability of release 6.0 of its Red Hat Enterprise Linux OpenStack Platform (OSP), providing an enterprise-grade cloud platform based on the OpenStack Juno milestone release. Red Hat is also going a step beyond what was in the OpenStack Juno release by providing its users with a technology preview of the TripleO OpenStack-on-OpenStack project. Red Hat is one of the leading code contributors to the open-source OpenStack cloud platform, and has both a community distribution called RDO and an enterprise-supported release with OSP that it makes available to users. RDO, much like Red Hat’s community Fedora project, closely tracks and follows the upstream open-source community, while OSP is a more stable release that benefits from additional enterprise hardening. The Red Hat Enterprise Linux OpenStack Platform 6.0 release follows the upstream OpenStack Juno release, which debuted on Oct. 16, 2014.
-
Red Hat remains very focused on advancing its OpenStack-focused cloud business initiatives. The company has now released an update of its OpenStack distribution, marrying its Red Hat Enterprise Linux 6 (RHEL) platform with the latest OpenStack release: Juno. “Red Hat Enterprise Linux OpenStack Platform sets a new standard for OpenStack deployments, with customers in production in every region, spanning industry verticals and enterprises of various sizes in education, financial services, government, healthcare, retail, and telecommunications,” claims the company’s announcement.
-
-
I’ve had my lovely new Raspberry Pi 2 for a few days now – it was shipped from the Swiss Pi-Shop less than a week after the announcement, so thanks once again to them for their prompt and courteous service. I’ve been trying it out since then, mostly comparing it to my original Models B and B+. The results have been interesting, generally what I expected, but with one or two surprises.
-
Phones
-
Tizen
-
Samsung unveiled their new 2015 Smart TV Lineup at CES 2015, which are Smart TVs that run Tizen, as well as offering Sony’s PlayStation Now service combined with Samsung’s latest screen technologies. The SUHD Re-Mastering Engine uses a colour grading tool to offer a high dynamic range and wider colour gamut, which is 64 times the colour expression thanks to quantum technology and 2.5 times the brightness when compared to conventional TVs.
-
Android
-
Contrary to initial reports last week that it would be Motorola devices which shall be first receiving the Android 5.1 Lollipop, the major update to the problematic Android 5.0 Lollipop, it seems that Google Nexus devices will beat everyone else to the draw.
-
Are you a Sony Xperia Z1 Compact owner? If you are, you have reason to rejoice: the Android 5.0.2 Lollipop update is now available for your smartphone, according to reports.
-
-
-
Sometimes companies do the stupidest things, and Sony is one of the latest examples. The company has decided to take on Google Glass with its own version of ugly glasses that no one will want to wear.
-
Google has extended its Android One push to the Philippines, offering low-cost devices running the latest version of Android out of the box.
Google has partnered with local operators Cherry Mobile and MyPhone for Android One’s launch into the Philippines, following the scheme’s debut in India last year. Both operators will release one Android One handset each.
-
If you’re getting bored with your phone’s lock screen, maybe it’s time to try another. This is Android after all, so you’re not locked in to what came with your device—there are a ton of options to put impressive images, better notification controls, and a steady stream of news and updates right in front of you.
-
One of the slick, new features touted by Google about Android Lollipop before its release in November is Project Volta, a collection of optimization settings that promise to offer better battery consumption for devices upgrading to Android Lollipop. Aside from a power-saving mode native to the platform, Project Volta allows developers to specify when their apps need to connect to data or Wi-Fi in order to save up on juice.
-
It’s been splashing around in beta for a little while, but now your Pebble can respond to notifications directly from that monochrome screen — kind of like Android Wear, sans touchscreen. You’ll need to update your Pebble smartwatch firmware as well as download the very latest edition of of the companion Android app to get rolling. But given Pebble’s popularity and price, it should mean far more people are making wrist-based responses to messages. Aside from the ability to set multiple custom notification responses (available to you whenever a compatible app offers a reply option), you can toss money around with Square Cash. The update also adds support for Android 4.0 and over devices, as well as automatic app and watch face updates, even when your Kickstarted smartwatch is idle. Oh and you can reply with emoji. Hopefully, that will be enough to keep the Pebble on your wrist on until that fancy new interface arrives in the near future.
-
Within the past six months, the mobile phone operating system battle seems to have come to a head with the release of Apple’s iOS 8 and Android’s 5.0 Lollipop. A report on Mashable on how both operating systems fare when compared with each other says that “iOS 8 has as many features as Android” while on the design side, which was historically Apple’s edge, the Android 5.0 Lollipop “has an almost iOS-level of fit polish and finish.”
-
Facebook is among the most recognizable and advanced social media enterprises today. A major part of its success story is its professed love for open source software, which the company uses as means of augmenting innovation across multiple projects. In fact, open source is a key resource among Facebook’s web developers due to its flexibility in providing immediate security patches and collaboration across platforms.
-
A growing number of educational institutions are adding classes or programs that focus on open source. There are some channel executives, however, who worry these initiatives are inadequate to meet business needs and are concerned their companies will continue to carry most of the technology’s training burden.
-
Events
-
Politik has announced their third Subculture event to be held the evening before their flagship Interzone conference on March 10, 2015.
-
SaaS/Big Data
-
Pivotal—the rather ambitious business software outfit spun off from big-name tech companies EMC and VMware—is open sourcing three of its key products, sharing the underlying software code with the world at large.
-
Pivotal, the big data and software division of storage and IT giant EMC, will today announce plans to release open source versions of its big data and analytics software.
-
-
-
-
Pivotal will make the majority of its big data suite open source, drawing inspiration from the Linux concept.
-
Cloudera’s total ISV application and tools partners, companies that build applications that run on the platform, increased more than 60 percent to 267. System Integrators (SI) and solutions partners jumped 50 percent to 851. Cloudera says that it is working with SI partners on 18 industry solutions built on Cloudera, with more than 20 others in development. OEM application partners grew during the past year to 29–delivering full product solutions in verticals such as financial services, telecommunications, manufacturing, healthcare, retail, and technology.
-
Only three years ago, Oracle wanted to do the cloud it own way, and ignore open-source cloud efforts in general and OpenStack in particular. After reflection, Larry Ellison thought better of that idea. By May 2014, Oracle announced OpenStack support for its Linux and the Xen hypervisor. On February 18, Oracle partner and DataBase as a Service (DBaaS) company Tesora is bringing the Oracle database management service (DBMS) and OpenStack together.
-
BSD
-
A couple of weeks ago I described the host key rotation support forthcoming in OpenSSH 6.8. Almost immediately after smugly declaring “mission accomplished”, the bug reports started rolling in. First Mike Larkin noticed an interaction with ssh’s CheckHostIP option that would cause host key warnings, then Theo de Raadt complained about the new code unnecessarily rewriting known_hosts when no changes needed to be made, finally Philipp Kern and Jann Horn pointed out a way for a hostile server to abuse the extension.
-
Public Services/Government
-
If you have the right to use, examine, modify and distribute the software, your costs go down, just as they go down for everyone who uses FLOSS. It’s about sharing. If everyone shares in the cost of producing and distributing software, everyone pays less because folks like M$ are not siphoning off $billions and imposing software slavery to keep you coming back for more abuse.
-
Openness/Sharing
-
Open Data
-
Good news for OpenStreetMap: the main website now has A-to-B routing (directions) built in to the homepage! This will be huge for the OSM project. Kudos to Richard Fairhurst and everyone who helped get this up and running.
-
Open Hardware
-
At $5,995, the printer isn’t exactly a steal. Autodesk more so built it to be the perfect exhibitor for its open-source Spark 3D printing software, which is currently in beta.
-
Programming
-
HP says that while R is an open-source language used by millions of data scientists, it has been, up to this point, inherently limited. It’s that increased scale that HP stresses as providing a new level of predictive analytics capabilities.
-
Security
-
Defence/Police/Secrecy/Aggression
-
I told them that I thought we could, because if a cloud in the stratosphere were created (the most commonly proposed method of control) that was thick enough, large enough, and long-lasting enough to change the amount of energy reaching Earth, we could certainly see it with the same ground-based and satellite instruments we use to measure stratospheric clouds from volcanic eruptions. If, on the other hand, low clouds were being brightened over the ocean (another suggested means of cooling the climate), we could see telltale patterns in the tops of the clouds with satellite photos. And it would also be easy to observe aeroplanes or ships injecting gases or particles into the atmosphere.
-
A leading climate-change scientist has warned that the US secret service’s interest in geoengineering technology may not be benign. But it’s not the first time a government has tried to control weather patterns
-
Weaponising the weather is nothing new. U.K. government documents showed that, 99 years ago, one of six trials at the experimental military station of Orford Ness in Suffolk sought to produce artificial clouds, which, it was hoped would bamboozle German flying machines during the first world war. Like so many military experiments, these trials failed but cloud seeding became a reality in 1967/8 when the U.S.’s Operation Popeye increased rainfall by an estimated 30 per cent over parts of Vietnam in an attempt to reduce the movement of soldiers and resources into South Vietnam.
-
Decades-old weapons long past their expiration date, most of the chemical arms recovered in Iraq were not close to usable in the traditional sense. Officials did say they were surprised, however, at the potency of some of the chemicals despite many years in storage.
-
Mohammed Saleh Tauiman was just 13 years old in 2014 when the Guardian newspaper gave him a camera so he could record life under the drones that flew over Marib province, Yemen.
His father and teenage brother had been killed in a US drone attack in 2011 while they were herding the family’s camels. Afterward, he lived in constant fear of what he called the “death machines” that circled above him in the sky.
-
The Obama administration will permit the widespread export of armed drones for the first time, a step toward providing allied nations with weapons that have become a cornerstone of U.S. counterterrorism strategy but whose remotely controlled power to kill is intensely controversial.
-
-
-
-
-
-
As drone warfare proliferates, the stings of the drone become more lethal and terrifying.
-
The conference was informed that 364 of the 415 drone strikes (until early February 2015) on targets inside Pakistani territory had killed nearly 4,000, including over 1000 civilians, mostly women and children. A case study of 24 such strikes by the Centre for Research and Security Studies, too, had exposed the extremely disproportionate civilian harm caused by these attacks which increased seven-fold under the Obama Administration.
-
-
An alliance of militant organizations has called for the expulsion of United States Ambassador to the Philippines Philip Goldberg in light of reports that the US government was heavily involved in the planning and implementation of the Jan. 25 covert police operation in Mamasapano, Maguindanao.
In a statement issued Monday, Bagong Alyansang Makabayan (Bayan) secretary general Renato Reyes Jr. accused the US government of “blatantly interven[ing]” in the Philippines’ domestic affairs in pursuit of high-profile terrorists Zulkifli bin Hir alias Marwan and Abdul Basit Usman.
-
Eight Americans were monitoring from the Special Action Force (SAF) command post the operation against a Malaysian terrorist in the marshland 11.8 kilometers away that went wrong and left 44 police commandos dead on Jan. 25, the Inquirer has learned.
A US drone located trapped SAF commandos as they were battling their way out after killing their target, Zulkifli bin Hir, alias “Marwan,” according to three sources who spoke on condition of anonymity.
-
U.S. bombings and drone attacks have killed thousands of innocent people. This has resulted in hatred toward America. How about making a serious effort at diplomacy instead?
-
The Islamic State group is expanding beyond its base in Syria and Iraq to establish militant affiliates in Afghanistan, Algeria, Egypt and Libya, U.S. intelligence officials assert, raising the prospect of a new global war on terror.
-
The collapse of the American-backed government in Yemen took the U.S. intelligence community by surprise, the Obama administration’s senior counterterrorism official admitted on Thursday as he testified before Congress, according to The Associated Press.
-
The international airport in Donetsk was opened to facilitate the thousand of football fans flooding the country for the 2012 European Championships – a $1 billion dollar symbol of Ukraine’s modernity. It now sits as rubble, destroyed by the conflict in which Russian-backed separatists have waged a bloody civil war with forces loyal to Kiev.
-
Finance
-
The new governor of Illinois, Bruce Rauner, is a hedge fund manager whose salary last year was $60 million. He spent $65.9 million—including $27.6 million of his own money—buying his last election, and he’s about to introduce an austerity program that will make most folks in Illinois think they are living in austerity-wracked Greece, with less idyllic weather. While he’s generating national headlines by trash talking unions, he is quietly taking a scalpel to every important social program in the state, starting with an Illinois program that subsidizes high-quality childcare for 160,000 low-income kids. Instead of extending a small tax increase that passed the Illinois legislature in 2011, staving off a crisis, he’s letting the increases expire. Rauner is methodically manufacturing an economic crisis for his state, one that will let him do what he has long been set on doing: shrink the government and squeeze the 99 percent.
-
The Supreme Court of Iceland today upheld prison sentences issued by Reykjavík District Court in December 2013 on four former key executives and majority owners of Kaupþing Bank in the so-called Al-Thani case in what is the heaviest sentence ever given in Iceland for economic fraud, ruv.is reports. The four were charged with market manipulation in relation to Sheik Mohammed Bin Khalifa Al-Thani of Qatar’s acquisition of more than five percent of shares (worth ISK 25.7 billion) in Kaupþing Bank shortly before it collapsed in autumn 2008.
-
PR/AstroTurf/Lobbying
-
The coverage of HSBC in Britain’s Daily Telegraph is a fraud on its readers. If major newspapers allow corporations to influence their content for fear of losing advertising revenue, democracy itself is in peril.
[...]
No one has ever expressed quite as well as Utley the quiet decency and pragmatism of British conservatism. The Mail is raucous and populist, while the Times is proud to swing with the wind as the voice of the official class. The Telegraph stood in a different tradition. It is read by the nation as a whole, not just by the City and Westminster. It is confident of its own values. It has long been famous for the accuracy of its news reporting. I imagine its readers to be country solicitors, struggling small businessmen, harassed second secretaries in foreign embassies, schoolteachers, military folk, farmers—decent people with a stake in the country.
[...]
With the collapse in standards has come a most sinister development. It has long been axiomatic in quality British journalism that the advertising department and editorial should be kept rigorously apart. There is a great deal of evidence that, at the Telegraph, this distinction has collapsed.
Late last year I set to work on a story about the international banking giant HSBC. Well-known British Muslims had received letters out of the blue from HSBC informing them that their accounts had been closed. No reason was given, and it was made plain that there was no possibility of appeal. “It’s like having your water cut off,” one victim told me.
When I submitted it for publication on the Telegraph website, I was at first told there would be no problem. When it was not published I made enquiries. I was fobbed off with excuses, then told there was a legal problem. When I asked the legal department, the lawyers were unaware of any difficulty. When I pushed the point, an executive took me aside and said that “there is a bit of an issue” with HSBC. Eventually I gave up in despair and offered the article to openDemocracy.
-
Censorship
-
Media outlets and Middle East analysts have expended considerable energy assessing whether and how Jordan’s war on ISIS in the aftermath of the Kassasbeh capture and death represents a game changer. It is difficult to find a sustained critique of this war on ISIS in the local Jordanian media, whether in the mainstream or the more critical online venues. This is not surprising. After all, Jordan is an authoritarian state. Both historically and in the contemporary moment, the regime has carefully drawn red lines around public speech and political opposition.
-
Tumblr users say they are witnessing a tougher response to music piracy by the blogging platform. A wave of complaints suggest that increased anti-piracy activity by the music industry is resulting in Tumblr more readily banning users as part of a “three strikes” policy.
-
Privacy
-
The US National Security Agency (NSA) has infected hard disk firmware with spyware in a campaign valued as highly as Stuxnet that dates back at least 14 years and possibly up to two decades, according to an analysis by Kaspersky Labs.
-
In a new report, Kaspersky revealed the existence of a group dubbed The Equation Group capable of directly accessing the firmware of hard drives from Western Digital, Seagate, Toshiba, IBM, Micron, Samsung and other drive makers. As such, the group has been able to implant spyware on hard drives to conduct surveillance on computers around the world.
-
-
A few weeks back, the Investigatory Powers Tribunal ruled that GCHQ had been spying unlawfully on British citizens, using the NSA’s Prism and Upstream tools to gain access to private communications. Anyone may have fallen foul of GCHQ’s secret snooping. But it doesn’t have to remain secret. Here’s how to go about finding out if you’ve been spied on by the GCHQ and, hopefully, have the data acquired destroyed.
-
Once the UK Investigatory Powers Tribunal has determined whom was affected, it has to inform them. Though participants should find out whether their data were unlawfully obtained by GCHQ from the millions of private communications hoovered up by the NSA up until December 2014, it won’t be anytime soon. Privacy International warned in its FAQs: “Count on it being many months, and likely years before this action is completed.”
-
Security researchers have uncovered a trove of highly-sophisticated hacking tools used over the last 15 to 20 years to break into thousands of targets’ computers. There’s little doubt the malware and exploits used belonged to the National Security Agency, according to security experts.
[...]
The GRAYFISH tool, which works with almost all versions of Windows, including 8, was another of the more impressive malware types. It sat in the Microsoft MSFT -1.13% Windows registry, which stores information on most activities and settings on a PC. GRAYFISH used a bootkit, a malware that resides at a low level of the operation system so it can execute every time a computer starts up. That was the most complex bootkit Kaspersky had ever seen. GRAYFISH also stole files and stored them in its own encrypted Virtual File System (VFS).
-
Russian security experts say that an advanced persistent threat team has infected thousands of computers in more than 30 countries using tools and tactics not unlike what’s already been attributed to the National Security Agency.
Kaspersky Labs of Moscow declined to specifically implicate the United States and its spy office in a report published by the security firm on Monday this week. The researchers, however, say that it’s been monitoring a group of computer hackers that have waged attacks since 2001 and that share similarities with operations of the NSA.
-
A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it’s infected your PC.
Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency.
The tools, exploits and malware used by the group—named after its penchant for encryption—have strong similarities with NSA techniques described in top-secret documents leaked in 2013.
-
President Barack Obama has signed an executive order that will attempt to protect America’s crucial computer networks by sharing knowhow between g-men and techies.
-
License plate readers can record up to 1,800 license plates per minute. However, it seems these surveillance cameras can also photograph those inside a moving car. The Drug Enforcement Agency has been using the cameras in conjunction with facial recognition software to build a “vehicle surveillance database” of the nation’s cars, drivers and passengers.
-
Just as it did when launching its “GigaPower” service in Austin, Texas in late 2013, AT&T offers different prices based on how jealously users guard their privacy. AT&T’s $70 per-month pricing for gigabit service is the same price as Google Fiber, but AT&T charges an additional $29 a month to customers who opt out of AT&T’s “Internet Preferences” program.
-
To counter the PR hit from Google Fiber, AT&T has recently been proclaiming that it too is now offering 1 Gbps services under the company’s “Gigapower” brand — but pretending that Google has nothing to do with it. On the surface, it looks like AT&T is taking on Google blow for blow, and that this is a wonderful example of how competition works. And while that’s true up to a point, as we’ve discussed previously, AT&T’s offering is highly theatrical in nature. AT&T’s actually been slashing its fixed-line CAPEX each quarter, but is offering 1 Gbps speeds to a few, scattered high-end developments where fiber is already in the ground.
-
Civil Rights
-
The European Court of Human Rights today confirmed that the Polish government was complicit in the CIA’s secretive programme of rendition, detention and interrogation.
The Court in Strasbourg today rejected a challenge from the Polish government to a landmark ruling from last July, a decision which now makes that original judgement final.
-
The European Court of Human Rights refused on Tuesday to reconsider its ruling that Poland hosted a secret CIA jail, a decision that will now oblige Warsaw to swiftly hold to account Polish officials who allowed the jail to operate.
The court’s decision will add to pressure on other European countries to end years of secrecy about their involvement in the CIA’s global programme of secret detention after the Sept. 11, 2001, attacks on the United States.
-
John Kiriakou, the former CIA agent who helped reveal the agency’s use of waterboarding in a 2007 interview, was released from prison on February 3 after serving a two-year sentence.
-
“Hypocritical” is how CIA whistleblower John Kiriakou describes his arrest and imprisonment for exposing the spy agency’s use of torture while those who actually committed the heinous acts go unpunished.
-
North Korea’s mission to the United Nations has criticized the upcoming human rights conference to be held in Washington, pointing to torture crimes committed by the US Central Intelligence Agency (CIA).
“The United States and South Korea are going to convene so-called ‘Conference on North Korean Human Rights: the Road Ahead’ on 17 February in Washington…The Permanent Mission of the Democratic People’s Republic of Korea [DPRK] to the United Nations condemns the convening of such human rights gathering as a political human rights plot against the DPRK,” the mission said in a statement on Sunday.
-
That’s right, America. While the resolution makes some fair points about crowded U.S. prison systems and the questionable ethics of using drones to kill suspected enemies, lumping the U.S. – and Israel – in with nations that routinely violate fundamental rights, while failing to mention far more egregious violators, like much of the Arab world, is certainly a sophomoric stretch.
-
Machine Guns, MRAPs, Surveillance, Drones, Permanent War, and a Permanent Election Campaign
[...]
Keep in mind that New York City already has a police force of more than 34,000 — bigger, that is, than the active militaries of Austria, Bulgaria, Chad, the Czech Republic, Hungary, Kenya, Laos, Switzerland, or Zimbabwe — as well as its own “navy,” including six submersible drones.
-
All the pillars of the earth would shake if a Christian or a Jew is killed or if a Buddhist statue is destroyed or comes to any harm. International forces wherever they may be join together to condemn the killing of an individual so long as he or she is not of Arab or Muslim background. These same leaders do not hesitate to condemn any infliction that comes to a Buddhist statue in Afghanistan.
-
Police and Canadian Justice Minister Peter MacKay said the plot was not related to terrorism.
-
We have heard of no measures taken to protect the beleaguered Muslim communities—the “banlieues” that surround Paris, largely populated by impoverished African and Middle Eastern immigrants—where unemployment ranks highest in the nation and social services rank lowest. Unemployment among Muslim youth approaches 40 percent. Close to half of the residents of Muslim communities lack a high school diploma. As in the U.S., police harassment and profiling—stop and frisk, French style—are taken for granted. There has been little mention of the 50 recorded post-Charlie Hebdo fire bombings or of the racist graffiti-tagged and bullet-ridden mosques; such atrocities meant to terrorize the Muslim population are ongoing and proceed with impunity. France’s Central Council of Muslims reported 21 shootings that targeted Muslim buildings.
-
The bill, titled “An Act to provide for the resumption of rail service operations,” will be presented by Labour Minister Kellie Leitch, who took part in the talks. In a statement issued Saturday night after negotiations broke down, Leitch made it clear that the government was prepared to act quickly.
-
Virginia House Bill 2144 (HB2144) expands on the state’s current anti-indefinite detention law by setting the stage for ending some state-federal partnerships. (read about the bill here). It passed successfully through the state house on Feb. 10 by a 96-4 vote. The bill now must pass successfully through the Senate Committee for Courts of Justice before it can receive a full vote in the state senate. Follow the action steps below to support this important bill.
-
As video cameras begin to sweep post-Ferguson policing — and policymakers grapple with whether to bar the public from watching the images — one such recording sits at the heart of a new lawsuit.
It shows St. Louis police making an arrest that would later be called abusive, and catches an apparently surprised officer yelling, in part, “Everybody hold up. We’re red right now!” before she abruptly shuts off the camera.
-
Internet/Net Neutrality
-
Attorney Matt Wood, the policy director for advocacy group Free Press, told the FCC last week that it faces “legal obstacles” in how it intends to regulate Internet service providers. FCC Chairman Tom Wheeler proposes to reclassify Internet service providers as common carriers in two parts. ISPs will be common carriers in their relationships with home Internet consumers. They will also be common carriers in their business relationships with “edge providers,” companies that offer services, applications, and content over the Internet.
-
Intellectual Monopolies
-
Copyrights
-
City of London ‘police’ have not yet arrested a single #hsbc banker or tax evader; instead they go after poor people for petty things.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »