02.13.15
Posted in News Roundup at 6:35 pm by Dr. Roy Schestowitz

Contents
-
Desktop
-
A new version of Dell’s Kace K1000 Systems Management Appliance adds support for a wider array of devices, including Chromebooks, so enterprises and other organizations can better control these Chrome OS computers.
-
Chromebooks are laptops running Chrome OS that are good fits for many situations. The light OS doesn’t require heavy hardware, and that makes them cheaper than many laptops. Those on a tight budget can find a couple of good Chromebooks from Acer for just $199.
-
Server
-
To learn more about Rocket, and the Application Container spec which underlies is, we caught up with Jonathan Boulle. Boulle is an engineer at CoreOS who is leading the development of Rocket and doing a lot of the coordination work around the App Container spec. Before working at CoreOS, Boulle worked on a similar project at Twitter that never quite saw the light of day, but was able to apply some of the ideas and experiences to his current work on Rocket.
-
The company’s new tool is itself a Docker container. Using Docker’s Stats API, the software collects and logs data on the Docker environment, as well as specific containers. It can keep track of things like how much CPU time, memory and network bandwidth a Docker app is using.
-
There has been a lot of action on the container front recently. Version 1.5 of Docker rolled out with new features and upgrades. Survey results from StackEngine also arrived, shown in a detailed infographic, that describe some of the major trends going on in the container space, including Docker trends. And Rocket, a competitor to Docker that we’ve covered, reached new milestones.
-
Kernel Space
-
Linus Torvalds, the father of the Linux kernel, posted a message on Google+ asking users to vote if they want the version numbering scheme of Linux kernel to change from 3.xx to 4.x. This is a very good opportunity for those of you who want the Linux kernel 4.0 to happen sooner to speak your mind.
-
-
While Coreboot has been ported to a number of older ThinkPads and other outdated Intel motherboards and laptops, you don’t see many modern Intel systems supporting Coreboot. The reason for the lack of Coreboot support is due to a “feature” introduced with Haswell.
-
OverlayFS was added to the Linux 3.18 kernel and for Linux 3.19 this file-system popular to live Linux distributions gained multi-layer support. For Linux 3.20 this file-system is now having support for multiple read-only layers.
-
PulseAudio, the powerful and controversial sound system used in numerous GNU/Linux and UNIX-like computer and mobile operating systems, including Microsoft Windows, Mac OS X, Solaris, and BSD (FreeBSD, NetBSD), reached version 6.0, a release that introduces several new features and fixes numerous annoying bugs reported by users from previous versions.
-
Live patching is the hottest trend when we’re talking about Linux kernel-based operating systems. It was created by SUSE, based on KGraft, and distributed in the SUSE Linux Enterprise Server distribution at the end of 2014. Everyone knows that Linux systems don’t require a reboot every time some packages have been updated, except for the kernel. Well, this is not the case anymore with live patching.
-
When Microsoft launched Windows 10 Technical Preview, the name came as something of a surprise; everyone had been, understandably, expecting Windows 9. Over in the world of Linux, as we know, things work a little differently.
The world of Linux-based operating systems is a fragmented one, but Linus Torvalds — whose loins were partly responsible for giving birth to Linux — is asking the community how version numbering should be handled moving forward. Should things be kept simple, or should version numbers just keep getting longer, and longer, and longer, and longer?
-
Paolo Bonzini has sent in the KVM pull request for the Linux 3.20 kernel and it includes some interesting changes and features for this important piece of the open-source Linux virtualization stack.
Highlights of the Kernel-based Virtual Machine (KVM) updates for Linux 3.20 include:
- A new optional feature to add a small amount of polling on each executed HLT instruction in the guest, for improving latency by up to 50% for some scenarios. Right now this is a feature that needs to be manually toggled but in the future could be auto-tuned.
-
Graphics Stack
-
With Wayland’s Weston compositor having the presentation feedback support, Pekka Paalanen of Collabora has written about Weston’s repaint scheduling.
-
Back in 2012 there was a call for deprecating FBDEV within the Linux kernel considering that DRM and V4L2 drivers are much better options. Sadly there hasn’t been any formal deprecation of FBDEV in the mainline kernel yet, but its still receiving a few changes each kernel cycle.
-
-
Benchmarks
-
While I don’t yet have my hands on a quad-core Cortex-A7 Raspberry Pi 2 board, there’s already many running benchmarks with it using our open-source automated testing software. Some of the shared RPi2 benchmarks done by the community include:
-
Applications
-
As of today my ePad source is nearing a 1.0.0 release and the goal of this post is to let folks outside of Bodhi know it exists and that it is ready for them to give it a try. ePad in its current form supports most all of the features you would expect from a text editor: Cut, Copy, Paste, Undo, Redo, Find, Replace, and displaying Line Numbers. On top of these it also supports opening multiple files in the same application window.
-
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
Data is the crucial bit in our personal and professional existence. Without data we would be lost in a vast expanse of nothingness. Spreadsheets, email, documents, contacts, databases, files, folders … the list goes on and on. In a perfect world, every byte of local storage would be backed up to an external hard drive or cloud storage service.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
We’re getting so close to the release now! (Check the count-down counter on krita.org!) Sure, there are still a bunch of bugs to fix, but we’re down to very nearly no release blockers now. And we fixed an awful lot of bugs since the last beta release, too!
The 2.9.0 release is scheduled for February 26th, with monthly bug fix releases planned until we release Krita 3.1.
-
We’re pleased to announce the last Calligra 2.9 beta release for you to test. We are as good at fixing issues as your reports are so please keep up the good work.
-
GNOME Desktop/GTK
-
New APIs must be fully documented
-
With GNOME 3.16 the developers are working hard at making their native Wayland support be rock-solid and reliable for day-to-day use for those wishing to abandon running their GNOME desktop on an X.Org Server. An important feature has finally landed for GTK+ applications in the Wayland world: the ability to minimize windows.
-
…and while I was playing with GNOME’s new Bugzilla instance trying to get rid of some upstream feature bloat, I looked at upstream’s Bugzilla front page and spend the next hours wondering where to add eight more Search buttons/links/forms so it’ll become a full dozen.
-
-
Utkarsh Sevekar has announced today, February 13, that his Debian-based Rebellin Linux 2.5 computer operating system is available for download for free. The distribution was previously only available for purchase for the sum of $9.99 (€8.8).
-
Arch Family
-
Manjaro Linux Cinnamon 0.8.12 is the second Community Edition of Manjaro that gets a new stable release after the announcement of the Arch Linux-based Manjaro Linux 0.8.12, a point release that introduced out-of-the-box support for Microsoft’s exFAT file system, as well as the Pacman 4.2 package manager.
-
Ballnux/SUSE
-
February 14 is a day to express your love for others and in keeping with that theme, openSUSE extends its gratitude toward the organizations and people who make Free and Open Source Software a reality.
Every year, the Free Software Foundation Europe asks all FOSS users to think about the hard-working people in the Free Software community and to show them their appreciation individually on this “I love Free Software”-Day.
-
Red Hat Family
-
It took a long time after Red Hat’s IPO in 1999 to see other significant open source exits. But things have been accelerating lately, with large funding rounds, acquisitions, and an IPO. Open source vendors are maturing, and making a deeper and deeper impact
[...]
The good news is that both options — industrial exit or IPO — open new possibilities for open source vendors. Gone are the days where the only possible outcome would be to get picked up by a proprietary competitor, annoyed by the market shares lost to this alternative. Competitors don’t spend hundreds of millions to remove an option from the market — but they do so to acquire a mature technology, a large installed base, and a synergy with their existing product portfolio. Jaspersoft’s acquisition by TIBCO is a great example — there was little overlap between Jaspersoft’s products and TIBCO Spotfire, and their successful cloud innovations and expertise have been beneficial to TIBCO’s entire BI offerings. We will have to see how Pentaho gets rolled into Hitachi’s “Social Innovation” group once the acquisition is completed but I am pretty sure this will be a tremendous value creator.
-
-
-
-
-
-
Red Hat Enterprise Virtualization 3.5 delivers standardised services for mission critical workloads, and offers IT organisations greater visibility into provisioning, configuring and monitoring of their virtualisation infrastructure, all based on open standards.
-
Debian Family
-
The first Release Candidate (RC) version of the forthcoming Tails 1.3 amnesic incognito live system has been officially released for testing, bringing three major new features and four minor improvements that are described for your reading pleasure in the next paragraphs.
-
VLANd is a simple (hah!) python program intended to make it easy to manage port-based VLAN setups across multiple switches in a network. It is designed to be vendor-agnostic, with a clean pluggable driver API to allow for a wide range of different switches to be controlled together.
-
After the OpenTAC session at Linaro Connect, we do now have a mailing list to support any and all discussions related to OpenTAC. Thanks to Daniel Silverstone for the list.
-
Derivatives
-
Canonical/Ubuntu
-
Canonical seems to be set to release a smartphone that is based on Ubuntu OS platform in partnership with BQ of Spain, which is renowned for making tablets, smartphones and ebook readers in Europe. The BQ Aquaris E4.5 Ubuntu Edition was launched in Europe on Feb 9.
-
Ubuntu 15.04 is using the Linux 3.18 kernel right now but with Linux 3.19 having just been released and it bringing new features and improvements, the Vivid Vervet archive will soon land Linux 3.19. As Ubuntu 15.04 is shipping in April, it will almost definitely finalize on Linux 3.19 given that Linux 3.20 would be too close of a call for shipping in time.
-
Erle Robotics, a Spanish company that creates all sorts of Linux-powered robots, such as Erle-brain, an open hardware Linux kernel-based autopilot for drones, Erle-plane, a Linux-based plane, and Erle-rover, a Linux-based rover, has announced Erle-copter, the world’s first Ubuntu-powered drone, which can be used to capture amazing scenes (if you have a great camera).
-
-
On Kickstarter, Zyro is pitching a “DroneBall” quadcopter that runs Linux on Gumstix COMs and acts like a smart aerial ball for multi-player games.
The Zyro DroneBall doesn’t look like a ball — nor does it act like any ball you’ve ever seen that isn’t made of Flubber. The quadcopter can hover, zig, and zag within a virtual aerial arena, mimicking a hockey puck, soccer ball, or an Ultimate Frisbee disc, says Zyro. It can even take the role of an extra player on the field interacting with another DroneBall.
-
Phones
-
Tizen
-
The Samsung Z1 was the first Tizen phone to be released with Spreadtrum’s SC7727S WCDMA chipsets running with the Tizen 2.3 Operating System. Today Spreadtrum Communications, a fabless semiconductor company based in China, have announced the successfully completion of the integration of the Tizen operating system (OS) with their WCDMA power-efficient chipsets.
-
Android
-
Obsessed with mobile growth? Join us February 23-24 when we reveal the best technologies and strategies to help your company grow on mobile. It all takes place at our 5th annual Mobile Summit at the scenic Cavallo Point Resort in Sausalito, CA. See if you qualify here.
-
Using an Android device comes with a number of quirks and feelings that only Android users can understand. iPhone users lead a boring existence where everything is sliver and has perfectly rounded corners. Our world is full of color and unique shapes and sizes, but it’s not without #AndroidProblems. That’s exactly what makes Android users different, and why we can safely say no one else understands what it’s like.
-
“Be Together. Not the Same.” Android’s new motto is pretty much perfect. It describes the dual nature of Android and it’s a great reminder that, at the end of the day, we’re all just tech fans no matter the brands or models we prefer.
Google’s last Android ad had cute animals, lots of them. But for this newest project, Google’s getting back to the funky Androidified characters first introduced in the days before Lollipop’s arrival.
-
Google today launched the Android WebView beta channel. To participate, developers are asked to join the Google+ community and sign up for the testing program before they can download the beta from Google Play.
-
Are you a techie but also have a soft spot for classical music? Then you’ll probably love this video we’re about to share with you.
Google Japan has just posted a video showing an Android orchestra made up of 300 phones and tablets that sync together to play Beethoven’s “Ode to Joy” sonata.
-
OnePlus will launch its custom Android ROM OxygenOS next month – with a little help from the developers of Paranoid Android.
OnePlus is saying goodbye to CyanogenMod, the Android ROM that it had previously using for its OnePlus One devices globally, and is preparing to release a new alternative, OxygenOS, that it’s developed in-house.
-
-
-
-
iOS 8 and Lollipop are the best versions to date of Apple and Google’s mobile operating systems, yet that doesn’t mean either one is free of flaws. Both iOS 8 and Android 5.0 crash, and a new study from Crittercism reveals that it’s Google’s OS that is more stable than Apple’s.
-
Google’s new Android 5.0 Lollipop update is slowly but surely making its way to more and more devices from the Moto X and Moto E, to the Galaxy S5 and HTC One M8, and now today we have more good news for Motorola smartphone owners.
-
OnePlus One will receive a major CyanogenMod 11S system update (O5Q release) for Android 4.4.4 KitKat. The latest over-the-air (OTA) update is designed to offer a number of major fixes for the “Flagship Killer” smartphone.
-
With the arrival of products such as Motorola’s hotly anticipated Moto 360, the smartwatch market was expected to take off. But the data from market research company Canalys shows that consumers are still far from convinced that they need buy one.
-
-
Tourists who visit my home country of Croatia soon notice that a hallmark (besides beautiful beaches, fortified cities and wondrous sites of ancient Roman architecture) is how widespread smartphone use is. According to the Legatum Prosperity Index data for 2013, there were 114.5 mobile phones for every 100 Croatians — that’s a lot of phones!
-
One of the tasks of a digital team in any major news organisation is to make the newsroom more efficient. We leverage new technologies in ways that haven’t been done before, and at a pace that’s challenging to keep up with. At The Times and Sunday Times, our team is constantly on the lookout for ways of improving our editorial workflow, and ensuring we get the very best from our great quality journalism.
-
A foundation can do a lot for an open source project. Just look at The OpenStack Foundation or The Linux Foundation. This week, Node.js, the very popular server-side JavaScript framework that is used for building and running websites and online applications, got its own foundation. Among other things, that means that Joyent will no longer solely govern Node.js. The foundation should help the project gain more contributions and develop more quickly.
-
The economy is looking up mean that business budgets will likely see healthy growth in the new year. Forrester is predicting 4 to 6 percent growth for 2015 global IT budgets, reaching $620 billion. Much of the growth in spending will go towards technology like analytics, mobile, as-a-service, and enterprise applications like ERP and CRM. The US will lead IT spending, followed by India and the UK.
-
Free software is particularly well-suite to Greece because it is a small market compared to those for the anglophone or francophone worlds, say. That means software is unlikely to be produced in regional versions as a priority. Open source, of course, can be modified by anyone, allowing localised versions of existing free software to be produced easily. All of these considerations apply elsewhere, especially among smaller countries, and it has always been something of a mystery to me why they don’t embrace open source more readily.
-
-
-
What he means is that companies will no longer have to run Hadoop on one set of resources, while running the web servers, Spark and any other number of workloads on other resources managed by Mesos. Essentially, all of these things will now be available as data center services residing on the same set of machines. Mesos has always supported Hadoop as a workload type — and companies including Twitter and Airbnb have taken advantage of this — but YARN has appeal as the default resource manager for newer distributions of Hadoop because it’s designed specifically for that platform and, well, is one of the foundations of those newer distributions.
-
MapR and Mesosphere are announcing a new open source big data framework (called Myriad) that allows Apache YARN jobs to run alongside other applications and services in enterprise and cloud datacentres.
-
-
The Open Networking Forum (ONF), a non-profit organisation dedicated to accelerating the adoption of open Software-Defined Networking (SDN), has announced the appointment of Saurav Das as principal system architect, and the establishment of a new project to build upon the OpenFlow Configuration and Management Protocol (OF-CONFIG) to support Open vSwitch (OVS). Saurav’s contributions to ONF and the announcement of this project build on the organisation’s open-source software efforts that began with the OpenFlow Driver competition, followed by ONF SampleTap and the Segment Routing project SPRING-OPEN, all of which were completed in 2014. Open-source software is a key route to developing de factor standards and fostering interoperability, both of which are ONF goals.
-
This week Google announced it would provide a cloud computing performance evaluator called PerKit Benchmarker. The evaluation tool is hosted on the open-source collaboration site Github, and will allow users of the Google Cloud Platform, Amazon’s AWS, and Microsoft’s Azure to measure their current provider’s performance against industry-established benchmarks.
-
Node.js, the popular open-source, server-side JavaScript runtime project, will soon be governed by an independent foundation, its chief commercial sponsor announced this week.
-
SaaS/Big Data
-
HDS will offer open-source data muncher Hadoop to the enterprise after doing a deal with Hortonworks.
Hadoop distributor Hortonworks has signed an agreement with HDS to jointly promote and support the software. HDS can now deliver Hortonworks’ Data Platform (HDP), Hadoop in other words, to its enterprise customers.
Hortonworks strategic marketing veep John Kreisa offered this canned quote: “The strategic agreement also provides a joint engineering commitment for the two companies on current and future projects that will help make Hadoop enterprise-ready.”
-
Databases
-
Hadoop has made lots of big data headlines by now. But in a reminder that it is only part of the open source big data story, Sisense and Simba partnered this week to deliver data analytics via MongoDB, the open source NoSQL platform, which is increasingly importance in production big data use.
-
Oracle/Java/LibreOffice
-
That was pretty fast! It looks like Oracle knows what it is doing and just updated its awesome VirtualBox virtualization software, which we have to admit that we use every day here on Softpedia to test all sorts of distributions of GNU/Linux and many other Linux-related applications, to version 4.3.22, bringing initial support for the recently released Linux kernel 3.19.
-
Funding
-
Hitachi is making a major play for the big data and Internet of Things markets with the acquisition, which is expected to close in June
-
Public Services/Government
-
Amid the well-deserved hype around the impact of cloud technology and big data analytics, it is possible that casual industry watchers may have missed the real story behind the recent wave of IT re-architecting.
Enabling many of these recent, powerful trends is a newly validated embrace of open source software technology. The movement to OSS solutions is empowering system designers and solution architects to re-examine methodologies that evolved out of the legacy proprietary, closed source software license model. Put simply, OSS allows developers of IT systems to create better results and cut costs.
-
Licensing
-
The Creative Commons Attribution 4.0 International and Attribution-ShareAlike 4.0 International licenses are now on our list of free licenses for works of practical use besides software and documentation.
We have updated our list of Various Licenses and Comments about Them to include the Creative Commons Attribution 4.0 International license (CC BY 4.0) and the Creative Commons Attribution-ShareAlike 4.0 International license (CC BY-SA 4.0). Both of these licenses are free licenses for works of practical use besides software and documentation.
CC BY 4.0 is a noncopyleft license that is compatible with the GNU General Public License version 3.0 (GPLv3), meaning you can combine a CC BY 4.0 licensed work with a GPLv3 licensed work a larger work that is then released under the terms of GPLv3.
-
Openness/Sharing
-
-
Facebook isn’t likely making many new friends among the big established networking vendors with its announcement today of the new 6-pack open hardware modular switch. The new 6-pack modular switch builds on Facebook’s existing top-of-rack Wedge switch and its Linux-based network operating system FBOSS.
-
-
Open Hardware
-
OSVR announced its creation at CES this year, and as a direct result 12 members have signed up their support, which includes Jaunt, a pioneering company in cinematic VR.
-
An open source virtual reality platform reports 13 new partners. This is the Open Source Virtual Reality (OSVR) ecosystem, envisioned as the platform that can bring together companies doing work in a number of areas of virtual reality. OSVR aims to set an open standard for virtual reality input devices, games and output. Its framework offers the potential to unite developers and gamers under a single platform.
-
The white Fiat drove on to the line at Baguley this afternoon, causing delays to services between Cornbrook and Manchester Airport.
-
Security
-
Defence/Police/Secrecy/Aggression
-
In response to Matthews’ call for “bombing the hell out of them,” Sheehan does make an important point about ISIS’s well-publicized display of violence, which is “they did this for a purpose.” The purpose he proposes–”They’re doing this to try to intimidate us so that we go home”–is implausible, since ISIS surely knows that the United States, like most countries, generally responds to violence with more violence. It’s much more likely that ISIS, like the Al-Qaeda movement it springs from, believes spectacular acts of terror will draw a military response from the United States that will help it to build its movement (Extra!, 7/11). But at least Sheehan is thinking of violence as being part of a political strategy rather than as a form of emotional release, as Matthews seems to see it:
-
Questions persist over the true role of the United States in the events leading up to the deadly encounter in Mamasapano and in the immediate aftermath.
Did the US provide all or part of the intelligence that formed the basis for the ill-fated Special Action Force operation?
Were its operatives involved in the planning of the mission and in its execution?
-
“The blood debt of the US which include the genocide of 1.5 million Filipinos in the Filipino-American war remain unpaid and their atrocities continue to spiral up. They’re even using Filipino troops as pawns in their interventionist terror war such as what happened the covert SAF operation Mamasapano,” said Charisse Bañez, national spokesperson of the League of Filipino Students.
Vencer Crisostomo, Anakbayan National Chair, said that Aquino “sacrificed his own troops in the name of the US war on terror.”
“This disastrous collaboration between Aquino and the US is a disrespect to all the victims of the Filipino genocide during Filipino-American War,” said Crisostomo.
-
PR/AstroTurf/Lobbying
-
Common sense tells you, of course, that when people say someone is “in another world,” they don’t generally mean that they are actually psychotic. For what it’s worth, Merkel’s office said she hadn’t meant to imply any such thing, clarifying that her point was that “Putin has a different perception on Crimea.”
-
Rush Limbaugh: If Young People Listen To Liberal Professors “It Stands To Reason People Are Going To Sign Up With ISIS”
-
Privacy
-
Recent Paris attacks have triggered a wave of securitarian discourse and dangerous upcoming legislative measures that are spreading way beyond France. Increased control of communications online, surveillance, attacks against anonymous speech and encryption are already on the table, under the pretence of fighting an invisible enemy in a perpetual war.
-
Fahwad Al-Khadoumi (nsnbc) : Facebook teamed up with several corporate “friends” to adapt Facebook’s in-house software to identify cyber threats and their source with other corporations. Countering cyber threats sounds positive while there are serious questions about transparency when smaller, independent media fall victim to major corporation’s unwillingness to reveal the source of attacks resulted in websites being closed for hours or days. Transparency, yes, but for whom?
-
The challenge against the controversial Upstream program was tossed out because additional defense from the government would have required “impermissible disclosure of state secret information,” Judge Jeffrey White wrote in his decision.
-
David Carr, the 58-year-old media columnist for the New York Times, collapsed suddenly at the newspaper’s office this evening and died after being rushed to the hospital.
Carr was previously the editor-in-chief of Washington City Paper and the author of a memoir, Year of the Gun, about his recovery from drug addiction and cancer while raising two young daughters.
-
Technology companies can enact all sorts of political agendas, and right now the dominant agendas enforce neoliberalism and austerity, using centralized data to identify immigrants to be deported, or poor people likely to default on their debts. Yet I believe there is a huge positive potential in the accumulation of more data, in a good institutional—and by that I mean political—setup. Once you monitor one part of my activity and offer me some proposals or predictions about it, it’s reasonable to suppose your service would be better if you also monitored my other activities. The fact that Google monitors my Web searches, my email, my location, makes its predictions in each of these categories much more accurate than if it were to monitor only one of them. If you take this logic to its ultimate conclusion, it becomes clear you don’t want two hundred different providers of information services—you want just one, because the scale-effects make things much easier for users. The big question, of course, is whether that player has to be a private capitalist corporation, or some federated, publicly-run set of services that could reach a data-sharing agreement free of monitoring by intelligence agencies.
-
New York Times columnist David Carr, one of the most incisive and influential writers on the media business, died Thursday night after collapsing in the paper’s midtown Manhattan newsroom. He was 58.
Times executive editor Dean Baquet informed staff of the death of their “wonderful, esteemed colleague” in a newsroom memo.
[...]
Earlier Thursday, Carr moderated a TimesTalk on the National Security Agency leaks with Edward Snowden, and journalists Glenn Greenwald and Laura Poitras. Within hours, he was dead.
-
Civil Rights
-
This is the second article (Part 1) in a five part series examining the US legal system. The series collectively argues that corporate media and political rhetoric have made Americans acquiescent toward corruption in the US legal system. This piece examines how public ambivalence toward an expansion of the legal system has been capitalized upon by the prison industrial complex.
-
Rush: “It Seems Like Any Man That Goes To College Could Randomly Be Accused Of Committing Rape”
-
DRM
-
Who would’ve thought it possible that digital rights management (DRM) would come to the coffee business? Well, it has. Believe it or not, Keurig now includes DRM on their coffee makers. Why? To keep users from using anything but Keurig coffee pods on their machines, of course. You know, just like the DRM used by some printer manufacturers to keep you coming back (and coming back) for their branded replacement ink cartridges instead of opting for the much cheaper store brand.
-
Intellectual Monopolies
-
Despite its extensive implications, TTIP has generated relatively little coverage, not least because negotiations are shrouded in secrecy and conducted primarily with corporate lobbyists, who have minimal obligations to the public interest. So clandestine are the talks that the few MEPs that are granted access can only view the plans in their original documentation, in a secure location, with the threat of espionage charges if they try to make copies or share the details with the public.
Permalink
Send this to a friend
02.12.15
Posted in News Roundup at 9:11 pm by Dr. Roy Schestowitz

Contents
-
I’ve looked at specialty distributions that were created for engineers and biologists in previous articles, but these aren’t the only scientific disciplines that have their own distributions. So in this article, I introduce a distribution created specifically for astronomers, called Distro Astro. This distribution bundles together astronomy software to help users with tasks like running observatories or planetariums, doing professional research or outreach.
From the very first moment of booting up Distro Astro, you will notice that this distribution is aimed at astronomers. The look and feel of items, from the boot splash screen to wallpapers and screensavers, have all been given an astronomical theme. Even the default
-
Desktop
-
Dell’s education-focused Chromebook 11 was surprisingly one of the best Chromebooks we’ve ever used, even though it was notoriously difficult to actually purchase for much of last year. Now, Dell is taking what it learned from last year’s launch and releasing a new, upgraded Chromebook 11 that feels just as solid as last year’s model at first glance. The first Chromebook Dell produced was a well-built, well-rounded machine with no glaring defects — and it appears the new model offers the same solid combo.
-
Server
-
The open-source Docker application virtualization container project has become a defacto standard for applications containers over the course of the last year. But it’s a defacto standard that isn’t a real specification and is one that is being challenged by Linux distribution vendor CoreOS.
-
The first major milestone release from the open-source Docker project in 2015 debuts with new features that will pave the way for the year ahead.
The open-source Docker project rolled out its 1.5 release on Feb. 10, providing users of the application virtualization container technology with new networking and visibility capabilities.
-
Kernel Space
-
Linux Kernel 3.18 is still used in numerous distributions of GNU/Linux, despite that fact that Linus Torvalds announced the final release of Linux 3.19 kernel on February 8, 2015, so it is time to update it to version 3.18.7, which was announced by Greg Kroah-Hartman a few hours ago, on February 11.
-
The PowerPC architecture updates for the Linux 3.20 kernel, including some improvements for the Sony PlayStation 3 game console.
While Sony long ago removed the “Other OS” functionality from the PlayStation 3, it seems some open-source developers are still working on the PS3 support for Linux.
Geoff Levand landed a few PS3 kernel patches for mainline Linux kernel integration via the 3.20 POWER pull request.
-
Over the last year SUSE and Red Hat have released live kernel patching solutions named kGraft and Kpatch respectively. Although the two companies didn’t realise it, they were actually developing the software at the same time, after they were both released they decided to work together to bring a combined system to the upstream Linux Kernel, now it’s foundations will be released in the Linux 3.20 kernel.
-
-
Linux 3.19 was just released and my usual overview of what the next merge window will bring is more than overdue. The big thing overall is certainly all the work around atomic display updates, but read on for what else all has been done.
-
-
Automotive Grade Linux (AGL), a collaborative open source project developing a common, Linux-based software stack for the connected car, today announced that Eureka Inc., Mcloudware, Microchip, Moscow Design Bureau and Wind River are joining The Linux Foundation and AGL to advance the creation of an open source reference platform to help the industry rapidly innovate and build the cars of the future.
-
Following yesterday’s release of the Linux 3.19 kernel is the newest version of the GNU Linux-libre kernel that strips out kernel functionality dependent on binary-only microcode/firmware images.
-
Originally, there was kSplice as a standalone project that implemented stop_machine()-based patching for the linux kernel. This project got later acquired, and the current owner is providing live patching as a proprietary service, without any intentions to have their implementation merged.
-
The XFS changes targeting the Linux 3.20 kernel have been published, but this time around the file-system work isn’t particularly exciting.
The changes queued by Dave Chinner for the XFS file-system in Linux 3.20 include…
-
Last month IBM announced the z13 micro-processor for their z13 mainframe computers. IBM claims the z13 is the “world’s fastest microprocessor” and now with Linux 3.20 there’s full support.
-
There’s new input drivers for Linux 3.20 and improvements to the existing input drivers with this next kernel version.
-
As usual, the next version of the Linux kernel will bring a number of prominent changes to Intel’s open-source DRM graphics driver.
-
Trusted Platform Module 2.0 (TPM 2.0) is to be supported by the Linux 3.20 kernel.
While many Linux users and free software advocates are opposed to TPM, TPM 2.0 is going to be supported by the next version of the mainline Linux kernel. Trusted Platform Module technology has already been supported by the mainline Linux kernel but TPM 2.0 breaks backward compatibility with TPM 1.2. TPM 2.0 supports many more alogirhtms, crypto primitives, root keys, and authorization differences. For those learning about TPM for the first time or are just unfamiliar with the differences to TPM 2.0, see the Wikipedia page for a basic overview and the Trusted Computing Group’s TPM 2.0 FAQs.
-
Graphics Stack
-
Mesa Git master was branched into Mesa 10.5 this weekend and the latest Git code then bumped to Mesa 10.6-devel. While Mesa 10.5 is a step closer to being released, officially it still only supports OpenGL 3.3.
-
X.Org and Mesa developers have begun thinking about interesting projects for student developers to get involved in for this year’s Google Summer of Code while prospective students should also begin to think about getting involved with X.Org/Mesa development.
-
Days after branching Mesa 10.5, Emil Velikov went ahead today and put out the first release candidate for the upcoming Mesa 10.5.
-
NVIDIA today finally mainlined their Video Decode and Presentation API for Unix (VDPAU) support for handling video decode of H.265 / HEVC.
-
-
-
X.Org members will soon be voting on whether the X.Org Foundation should dissolve its 501(c)3 state and become a project of SPI.
-
Applications
-
A couple of days ago, we found some detailed information regarding the new features and improvements that will be implemented into the forthcoming VLC Media Player 3.0.0 release while we were digging through the Internet, and decided to share it with you on this space, so that you have an idea on what to expect from the upcoming release of VLC.
-
For those not closely following the development of the VLC open-source, cross-platform media player, the VLC 2.2.0 release is coming soon while further out is VLC 3.0 and it will be even more magical.
-
-
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Containers are the hottest topic in the data center. Here are the essentials that every well-informed IT pro should know and be able to explain.
-
I’m not too fond of terminals. This guide is for new GNOME contributors like me whose brain capacity for terminal commands is only so-so big. I will introduce you to 8 git commands worth remembering. I assume only vague familiarity with git: pulling, pushing and committing.
-
Games
-
Albino Lullaby is a really freaky looking horror adventure that should be coming to Linux, and it’s using Unreal Engine 4.
-
Nightside is a recent discovery on Steam Greenlight that immediately attracted my attention, and the developers replies to me have been very encouraging.
-
Apotheon is a heroic action game set within the vibrant world of Ancient Greek Mythology. Ascend Mount Olympus, wrestle the divine powers from the Pantheon of Gods, and save mankind.
-
Feral Interactive have been great for Linux with their ports, and it’s time we took a proper look at XCOM: Enemy Unknown. This has been played through with the expansion Enemy Within which I feel is an essential extra.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
KDAB has been working very hard on Qt3D after it fell apart for Qt 5.0 back in the day during Nokia’s Qt shafting. The new version of the Qt3D module is nearly ready but not fully-baked, which is why Sean Harmer of KDAB proposed today that this be a “tech preview” feature of the next Qt tool-kit update.
-
Last night was a sleepless night in all the good ways; I’m excited for the upcoming Plasma Sprint, and knowing I’ll be packing myself into a cigar tube and flinging myself across the North Atlantic Ocean is too much for me to sleep over. I had promised a commenter (too long ago) I would make green cursors, so I decided to make good on my word. After it took 5 minutes I needed more; and the wafting smell of my bread maker inspired me to make a Bread cursor theme. Once that was done, sufficiently delirious, I sent my weird bready message to the VDG. They appear to have ignored it – a wise decision. They’re busy people doing actual work.
-
The Akonadi-Qt5 release isn’t quite ready now. So we’re directly creating our own IMAP connection. This is not ideal, as writing an IMAP client is not trivial, but as a starting point, this seems to work well.
-
GNOME Desktop/GTK
-
We can bet that many of you are eagerly awaiting for the forthcoming GNOME 3.16 open-source graphical desktop environment, which is used with great success on numerous Linux kernel-based operating systems, including Fedora, openSUSE, and Ubuntu GNOME.
-
-
After finding plenty of top 5 to top 50 distro lists, one name really stuck out. Just the name. Zorin OS. Its was a freaky cool name. I installed it quick and… Updates. I was dealing done with Windows updates so I won’t lie that I was erked. Then I found out what the 500MB of downloads were for. All of the preloaded software and I flipped.
-
After releasing the first GNU/Linux distribution with Linux 3.18 kernel a couple of days after its launch back in December 2014, Arne Exton did it again, as he just announced today on Twitter that the his Exton|OS with MATE has been updated to version 150211 and includes a custom 3.19.0-5-exton kernel package based on the upstream Linux kernel 3.19.
-
The Robolinux developers had the pleasure of announcing the immediate availability for download and testing of a brand-new edition of their open-source computer operating system, this time built around the modern and beautiful KDE Software Compilation graphical desktop environment. It is a distro where the main emphasis is on running Windows applications natively.
-
Dejan Petrovic, the developer of the recently introduced ChaletOS computer operating system informed us today, February 12, that he just pushed a February 2015 release on his servers, urging users to update to it as soon as possible. The new ISO images are available for download right now (see link at the end of the article) for 32 and 64-bit PCs, bringing assorted bugfixes and improvements.
-
Screenshots
-
Slackware Family
-
Rather than writing blog articles and helping people, I decided to wind down during the evenings by baking bread. The kneading process relaxes the mind while it exercises the muscles (and relieves back pains). My son does not mind… he eats all I bake anyway. Sourdough in the weekend and regular yeasted breads during the working week. The aromas coming from the oven right now are making me feel hungry again at 10:30 PM.
-
Red Hat Family
-
-
Red Hat Enterprise Virtualization offers the ideal platform for both traditional and cloud-enabled workloads
-
-
-
Red Hat Inc. continues to form partnerships to position its OpenStack cloud platform as a leading contender in the new era of software-defined networking and network functions virtualization.
-
Fedora
-
One of the planned Changes in Fedora 22 is to make DNF the default console package manager, instead of yum. As part of this, we have been converting Anaconda, the Fedora installer, to use DNF rather than yum. At present, in Fedora 22 images, anaconda will use DNF by default but the yum code is still present and switchable with a kernel parameter (inst.nodnf).
-
-
I met Matthew at LinuxCon 2013 and have been hounding him for an interview ever since then. He’s worth the wait, though. He really gets under the hood of his GNOME setup and he has some great things to say about the power of open source software. Also, I’ve mentioned this before, but it’s worth repeating: Fedora has been great for me lately. I know there have always been Fedora fans, but my experience with it was always that there were one or two annoyingly broken things in each release. But 21 is solid. Like Ubuntu solid. And that’s thanks to the work of people like Matthew.
-
Fedora 22 will ship with GCC 5, which brings a whole host of enhancements, among which is a new default C++ ABI. In this article, we’ll cover how that ABI transition will work in Fedora.
-
While Fedora 21 has been officially released on December 9, 2014, and users worldwide still enjoy the powerful operating system on their desktop or server computers, the time has come to look at the future and see what the forthcoming Fedora 22 release has prepared for its dedicated users.
-
While Fedora 22 isn’t being released for several more months, so far it’s running quite well.
-
For something about 15 years I was using Debian distribution and ones which derived from it (like Ubuntu). Basically whole time I used development versions of them and amount of issues was nearly not existing. Now I run Rawhide…
-
-
Debian Family
-
I recently acquired a vServer hosted by Server4You and decided to install a Debian Wheezy image. Usually I boot any device in backup mode and first install a fresh Debian copy using debootstrap over the provided image, to have a clean system. In this case I did not and I came across a few glitches I want to talk about. So hopefully, if you are running the same system image, it saves you some time to figure out, why the h*ll some things don’t work as expected
-
The best software, whether it’s operating systems or anything else, is predictable. You read the documentation, or explore the interface, and you can make a logical prediction that “when I do action X, the result will be Y.” grep and cat are perfect examples of this.
-
Derivatives
-
Canonical/Ubuntu
-
-
-
-
-
-
-
-
-
-
-
We’ve been hearing rumors about a Meizu MX4 handset with Ubuntu Phone for quite a while now, yet there’s been no official word on the matter yet – not for the MX4, nor for the MX4 Pro.
-
Carbonado Intermedia and are two digital media companies owned by Nestle Snipes (typically referred to as Nes Snipes). Carbonado produces animated sitcoms such as Budz, while Auteuristic is a traditional digital video production company focused on live series, including the Times Square Chronicles’ video version of their newspaper, Times Square Beat. Budz and the Time Square Beat are being leveraged by properties such as Verizon and Dish Network.
-
Linux 3.20 To Fully Support The IBM z13 http://www.phoronix.com/scan.php?page=news_item&px=Linux-3.20-s390-IBM-z13
-
-
-
96Boards, the open hardware specification for ARM boards out of the Linaro Community Board Group, has out their first ARM board certified against their consumer edition standard.
-
Aaeon’s “EPIC-BDU7″ SBC uses Intel’s 5th Gen Core processors, and offers multiple graphics, GbE, USB, and SATA ports, plus mini-PCIe and PCI-104 expansion.
Aaeon’s EPIC-BDU7 single board computer uses the same old-school EPIC form factor adopted by its Atom-based EPC-CV1 board, but instead loads up with Intel’s brand new 5th Generation Core processors using the 14nm “Broadwell” architecture. Aaeon typically supports Linux on its SBCs, and although no OS support was listed, Linux should run on this board with no problem.
-
Phones
-
Android
-
Google’s team in Japan connected 300 smartphones and tablets with different animated characters “singing” through the devices’ speakers for your listening pleasure.
-
Android 5.0 Lollipop may not feel like the most stable operating system Google has ever put out, though a new report seems to claim otherwise. According to data from mobile application performance management solution Crittercism, application crash rates are .2% lower on devices running Lollipop than devices running iOS 8.
-
While Apple may have beaten Android when it comes to sales, when it comes to stability the new Android 5.0 Lollipop beats Apple’s iOS 8.
According to data from mobile application performance management specialists Crittercism, app crash rates for the Lollipop are 0.2 percentage points lower than for iOS 8.
Android Lollipop: 2.0% crash rate
iOS 8: 2.2% crash rate
-
AOpen’s rugged “MEP320″ media player and signage device runs Android 4.2.2 on a 1GHz Freescale i.MX Quad, and offers a thin profile and dual HDMI ports.
-
-
This week the LG G3 Android 5.0 Lollipop update finally arrived for users in the United States. A few weeks ago LG started teasing that it was “coming soon” for all users, and as of February 10th the LG G3 Android 5.0 Lollipop update is officially rolling out in the U.S. starting with AT&T.
-
The LG G3 Android 5.0 Lollipop update is finally here and delivering tons of new features and changes to LG’s flagship smartphone, but the Android 5.0 Lollipop update is also causing problems for many. The update initially started outside of the US, and then this week the AT&T LG G3 finally received Android 5.0 Lollipop, and we’re hearing Sprint is up next.
-
Quantified-self enthusiasts – those who are somewhat obsessed with using technology to better understand themselves, their daily habits and personal trends – have been fortunate to have a wide variety of niche apps to choose from for measuring everything from athletic activity, to travel time, and even time you’ve spent using your smartphone on a given day. But for the most part, you would have to download a handful of apps in order to log this data. Newly launched Instant 2.0, now available on Android, instead is offering a single destination for tracking nearly everything you want to record, including phone usage, app usage, fitness activity and traveling.
-
OnePlus kind of let us believe it would show us at least a preview of its new OxygenOS today, but instead we’ve got news on who is going to develop the new OS – some of the leading figures behind Paranoid Android.
-
You might have heard OnePlus has formed a dev team to build its OxygenOS ROM. They even did an AMA on the /r/Android subreddit today. Among the bits of info revealed by the team is the fact that OxygenOS won’t be open source. Instead it will be a “real OS.” Steve “Cyanogen” Kondik couldn’t resist poking fun at that.
-
One Plus has been teasing their OxygenOS (replacing CyanogenMod) and fans have been waiting for an announcement as to when they would see this custom Android ROM on their One devices. Today One Plus made an OxygenOS announcement – but not about the ROM itself. Instead they introduced the team that is developing the ROM, and that very team includes developers from the popular ROM Paranoid Android.
-
Most Moto G devices around the world have already received Android 5.0 Lollipop, but while Android One devices are already running on Android 5.1 Lollipop, we are expecting the new software update to roll out to other devices, too. A Moto G was spotted running Android 5.1 Lollipop, which leads us to believe that a soak test might have begun for the new OTA update.
According to Tech Droider, one of their readers sent in a photo of a Moto G 2014 running on Android 5.1 Lollipop, build number LXY22E, supposedly received on February 2. It’s a bit odd that the image hasn’t surfaced online if the update had rolled out to this particular user more than a week ago, so take this rumor with a grain of salt. Even though a soak test for the Moto G Android 5.1 Lollipop update is the most likely scenario, we can’t be sure that the photo wasn’t faked or manipulated.
-
Traditionally thought of as intelligence, surveillance, reconnaissance (ISR), or kinetic action platforms, unmanned systems are now filling roles such as command and control communications, meteorological survey, and resupply, and explosive ordnance disposal platforms. Historically, these platforms have been developed and fielded as standalone systems built by different vendors with unique and often proprietary payloads, control mechanisms and data formats. But this process has created limitations on interoperability and increased costs, leading the DoD to look at other, more viable options, including commercially supported open source middleware.
-
The shockwaves generated by Edward Snowden’s revelations of the close collaboration between US tech giants such as Microsoft and Apple and the NSA are still reverberating through the industry. Those disclosures, together with related ones such as the involvement of the NSA in industrial espionage, as well as the asymmetric nature of US law when it comes to gathering data from foreign individuals, present something of an open goal for non-US technology companies – or so one might have thought.
On the face of it, then, it is surprising that non-US technology firms and others that can distance themselves from the US law are not proclaiming this fact more loudly. After all, there must be a considerable number of organisations that would dearly love to locate their data as far away from the attentions of the NSA as possible.
-
When you choose not to work in the open, what are your reasons? Are they Good, Bad or Ugly? What are your suggestions for how those of us who want to work more in the open can all do better?
-
The popular, open source Node.js JavaScript runtime engine is getting a new foundation to manage its development, in a move that could help mend the recent schism in the project’s community.
-
Google’s latest foray into the open-source realm is a framework it’s calling “PerfKit,” which is designed to measure application performance in the cloud, the company announced Wednesday.
-
The Apache Software Foundation has, since those early days, been at the forefront of challenging problems. Within the context of this article, the ASF has both fostered, and continues to host keynote scientific projects such as Apache OODT (a Top Level Project at the ASF which originally came from NASA’s Jet Propulsion Laboratory), to recently incubating projects such as Singa (an efficient, scalable and easy-to-use distributed platform for training deep learning models used currently within Deep Convolutional Neural Network and Deep Belief Network as examples).
-
Web Browsers
-
Mozilla
-
Corporations that seek to control the Web, massive government and corporate surveillance, chilling effects on free expression — all of these issues will be harder to address if the next billions coming online think that the Internet exists solely within the walled gardens of platforms like Facebook and WhatsApp. The greatest danger is people relinquishing their control to gatekeepers that get to decide the rules about what we see and what we create.
-
When I first heard of Mozilla Open Badges, my heart skipped a beat. Wisely implemented, digital badges can help individuals and communities focus their energies on worthy goals.
-
SaaS/Big Data
-
“Warehouse-grade” automation is the key to the future of big data and distributed computing. So says infrastructure provider StackIQ, which today has rebranded its products and unveiled new automation features for Docker and other technologies that it believes will be crucial to next-generation enterprise data centers.
-
The open-source OpenStack Foundation grew its’ revenue based by 52 percent in 2014 over 2013. OpenStack Foundation 2014 revenue came in at $17.5 million.
-
-
As 2015 began, Blue Box, which offers private cloud services based on OpenStack to big companies including Viacom, announced a new round of $4 million in funding on top of the $10 million the company raised late last year. The fruits of that funding appear to thriving, as the company has now, with Alliance Technology Group, announced a joint development program that will deliver an on-premise version of Blue Box Cloud in the second quarter of 2015.
-
-
MapR and Mesosphere are announcing a new open source big data framework (called Myriad) that allows Apache YARN jobs to run alongside other applications and services in enterprise and cloud datacentres.
-
Databases
-
The open source cross-platform document-oriented database company MongoDB has reached version 3.0 this month.
The new iteration sees significant changes in its storage layer performance and scalability.
-
Healthcare
-
Creating an artificial pancreas is now open source, reported Boing Boing.
-
Funding
-
You’d be forgiven for thinking that the tech world is a loathsome hotbed of rapacious venture capitalists, airheaded trend-riders, and publicity hounds. That’s the image presented by much of the tech press, which prizes stories about the Montgomery Burnses of the tech world over ones about its more idealistic denizens.
-
With the new website, we’ve decided to revise how we promote and handle payments. We understand that this has rubbed some people the wrong way, and in the spirit of addressing concerns, we’ve decided to write this post. Keep in mind that this was a really difficult post to right. It covers sensitive territory, and it becomes difficult to choose the right words without offending anyone. That said, here’s our best explanation:
-
Elementary OS has attracted a lot of attention lately. But a controversy is brewing over how the distro developers are setting up their new site for payments by users. The Elementary OS site is being redesigned to encourage users to pay for the distro. But should the Elementary OS developers expect a payment in the first place?
-
-
-
-
Jahia is getting a $22.5 million cash infusion from Invus, a New York City-based investment firm, the Geneva, Switzerland-based open source content management system (CMS) vendor announced today.
-
BSD
-
EdgeBSD remains one of the newer BSD distributions that is a fork of NetBSD but switches from CVS to Git for source code management.
-
Everybody’s favourite audio hacker Alexandre Ratchov (ratchov@) is inviting you to a concert in Grenoble (France).
-
FSF/FSFE/GNU/SFLC
-
Valentine’s day is this Saturday and, if you’re like us, you’re either trying to pick the right gift or wishing you had someone to exchange gifts with. We wish you luck with that. But there’s something important that you can do regardless of your relationship status:
-
Project Releases
-
Now that Cutelyst is allowing me to write web applications with the tools I like, I can use it to build the kind of web applications I need but am not fine with using the existing ones…
-
Cutelyst, the Qt/C++ web framework just got another step into API stabilization.
Since 0.3.0 I’ve been trying to take the most request per second out of it, and because of that I decided to replace most QStrings with QByteArrays, the allocation call is indeed simpler in QByteArray but since most of Qt use QString for strings it started to create a problem rather than solving one. Grantlee didn’t play nice with QByteArray breaking ifequal and in the end some implicit conversions from UTF-8 were triggered.
-
Public Services/Government
-
The Defense Information Systems Agency is launching a web-based, open source collaboration tool for the Defense Department that provides webconferencing, chat and instant messaging functions for employees based in the U.S. and abroad.
-
Licensing
-
This is the latest installment of our Licensing and Compliance Lab’s series on free software developers who choose GNU licenses for their works.
In this edition, we conducted an email-based interview with Rainey Reitman, Activism Director for the Electronic Frontier Foundation, about their new EFF Alerts mobile app.
-
Openness/Sharing
-
Running communities around projects is all about getting the job done, and getting it done well. If you don’t nurture a community, it won’t grow and produce. Then, if you get that right but fail to maintain and organize things so that the people involved, your community, can continue to succeed and feel happy doing it, your project’s growth and success won’t last long.
-
Facebook is taking its crusade for open networking to a broader battlefield, using its 16-port “Wedge” switch design as the basis of a new modular platform that can link together racks of servers across a data center.
-
-
-
-
-
Part of it has to do with most farmers being, at a fundamental level, DIY enthusiasts. The prospect of a tractor that can automatically collect data to track crop growth and offer suggestions on how to make growth more efficient sounds useful to most farmers—and it is. Of course, as most farmers are DIY and handymen types to begin with, they tend to tinker with any device, whether it’s making a knife sharper, or trying to expand the capabilities of a complex high-tech machine.
-
Open Access/Content
-
It’s good to see more government agencies moving in this direction. It would be even nicer to see shorter time frames for the embargo, and even further commitment to releasing the data beyond just “exploring,” but this is good for science, data, learning and innovation.
-
Open Hardware
-
That sentence was taken directly from Open Source Hardware Statement of Principles 1.0, a preamble of sorts located in the definition section of the Open Source Hardware Association (OSHWA) website. Part blog, part doctrine, the site serves as a hub for this ever-growing community of creators.
-
One thing that’s been endlessly fascinating about the fledgling virtual reality industry is the amount of collaboration and cooperation going on between disparate companies. First you had Valve providing its research to Oculus, then Oculus and Samsung partnered up for GearVR.
-
Razer today announced that support for the Open Source Virtual Reality (OSVR) ecosystem has grown to 38 members with the recent addition of 13 new partner companies. OSVR claims to be building from the ground up “the best Virtual Reality gaming experience,” and offers a unified – but innovative – approach to input devices, games, and output.
-
-
Programming
-
Joining in on the heated discussion that originated over Richard Stallman voicing concerns over adding LLVM’s LLDB debugger support to Emacs, Eric S Raymond has come out to once again voice his support in favor of LLVM/Clang and express his feelings that GCC’s leading days are over.
-
Despite criticisms such as it having a “cryptic syntax,” the Perl language has remained prominent in language popularity assessments, even if popularity has declined and a planned upgrade has been slow to appear. Designed by Larry Wall, the scripting language is suited for tasks ranging from quick prototyping to Web programming and system management tasks, and it’s part of the prominent LAMP (Linux Apache MySQL Perl/PHP/Python) open source stack. At the recent FOSDEM conference in Brussels, Wall revealed intentions to have the long-awaited Perl 6 release out in a beta version in September and generally available by December. Wall answered some questions from InfoWorld Editor at Large Paul Krill via email about what’s planned for the language and responded to criticisms.
-
Get started using the open source R programming language to do statistical computing and graphics on large data sets
-
Your daughter comes home from school with a report card studded with A’s. You (1) give her a hug and raise her allowance or (2) ground her and tell her you know she’ll never do this well again.
Perversely enough, too many pundits and academics have chosen option No. 2 since Apple CEO Tim Cook presented investors the company’s most recent financial report card — a fourth-quarter earnings story that featured record sales at Apple, rapid growth, and (most important) a quarterly profit that is the largest ever recorded by a publicly traded company.
-
A young Russian woman has died after her charging iPhone fell into the bathtub in her Moscow flat.
Yevgenia Sviridenko, 24, who was originally from Omsk, more than 2,000 miles from the Russian capital, was discovered by her flatmate in the bath on Monday evening, the Komsomolskaya Pravda newspaper reported according to The Moscow Times.
-
Security
-
The Apache Software Foundation is out this week with patches for its Tomcat Java middleware server. What interested me most about the update was that it was for flaws first reported in 2014.
-
-
Defence/Police/Secrecy/Aggression
-
The US destruction of Fallujah in 2004 was a prime motivation for the growth of ISIS.
-
The Senate on Thursday confirmed Ashton Carter as President Obama’s new secretary of Defense in a 93-5 vote.
Carter, 60, will be the 25th secretary of Defense and Obama’s fourth. He is expected to be sworn into office next week
-
As the U.S. continues to bomb the Islamic State in Iraq and Syria, President Obama asked Congress today to approve a new legal framework for the ongoing military campaign.
The administration’s draft law “would not authorize long-term, large-scale ground combat operations” like Iraq and Afghanistan, Obama wrote in a letter accompanying the proposal. The draft’s actual language is vague, allowing for ground troops in what Obama described as “limited circumstances,” like special operations and rescue missions.
The authorization would have no geographic limitations and allow action against “associated persons or forces” of the Islamic State. It would expire in three years.
-
Ukraine’s security service arrested a journalist on treason charges Sunday after he posted a video online urging people to dodge the country’s new military draft, his wife and officials said.
Ruslan Kotsaba — a television journalist from the western region of Ivano-Frankivsk — was ordered held in custody for 60 days pending investigations, his wife, Uliana, wrote on Facebook.
-
Just weeks after a coup that ousted Yemen’s Western-backed government, the capital of Yemen is a city painted in green, mostly with spray paint.
Green tree trunks, green sidewalks, green walls and even a green Ford F-350 bearing the Houthi slogan, which includes the words “Death to America,” on each side of the iconic American truck, about 340 of which the Pentagon shipped to Yemen over the past few years.
-
President Obama has sent Congress a formal request to authorize military force against the Islamic State six months after the U.S. began bombing Iraq and Syria. The resolution imposes a three-year limit on U.S. operations, but does not put any geographic constraints. It also opens the door for ground combat operations in limited circumstances. The resolution’s broad language covers military action against the Islamic State as well as “individuals and organizations fighting for, on behalf of, or alongside [ISIS] or any closely-related successor entity in hostilities against the United States or its coalition partners.” The resolution also leaves in place the open-ended Authorization for Use of Military Force Congress enacted one week after the Sept. 11, 2001, which has been used to justify U.S. action in Afghanistan, Somalia, Pakistan, Yemen and beyond, and which Obama had previously called for repealing. We speak with Norman Solomon, executive director of the Institute for Public Accuracy and author of many books, including “War Made Easy: How Presidents and Pundits Keep Spinning Us to Death.”
-
PRESIDENT OBAMA is going before Congress to request authorization for the limited use of military force in a battle of up to three years against the Islamic State. On the surface, this looks like a welcome recognition of Congress’s ultimate authority in matters of war and peace. But unless the resolution put forward by the White House is amended, it will have the opposite effect. Congressional support will amount to the ringing endorsement of unlimited presidential war making.
Whatever else they decide, the House and Senate should revise the White House initiative to guarantee that it won’t have this tragic result. First do no harm; before proceeding with a debate over the limits of our continuing military engagement, Congress should make it impossible for future presidents to evade its final decision.
-
He is a liar of course, someone who did not tell the truth no matter the reason or excuse, a bad trait for a journalist. Williams lied about being RPG’ed in a helicopter over Iraq; he did not see any variant of what you can see in the photo above. And that’s not a hard thing to “misremember.”
But if there is any reason to forgive Williams, it was that he was seduced by both his own conflation of his sad little life as a talking head and the “brave troops,” and, more clearly, by the process of embedding with the military. I know. I saw it.
-
As Washington is not a partner to the Minsk peace deal, how can there be peace when Washington has made policy decisions to escalate the conflict and to use the conflict as a proxy war between the US and Russia?
-
A New York City police officer was indicted Tuesday in the fatal shooting of an unarmed black man in a Brooklyn public housing complex stairwell in November, several people familiar with the grand jury’s decision said.
-
The Obama administration has informed lawmakers that the president will seek a formal authorization to fight the Islamic State that would prohibit the use of “enduring offensive ground forces” and limit engagement to three years. The approach offers what the White House hopes is a middle way on Capitol Hill for those on the right and left who remain deeply skeptical of its plans to thwart extremist groups.
-
Transparency Reporting
-
Public docketing and confirmations to the clerks in the U.S. District Court in Alexandria, Virginia by the U.S. Attorney in the Eastern District of Virginia, who was responsible for filing all three search warrants for WikiLeaks staffer’s email content in March 2012, reveal that Google waited six months to disclose the existence of the search warrants by the U.S. Department of Justice, despite a May 15, 2014 ruling by Magistrate Judge John F. Anderson to unseal the search warrants for the limited purpose of informing the three WikiLeaks staffers.
-
Google is facing renewed questions about its handling of subscribers’ private information following the revelation that it waited six months after the lifting of a gagging order to alert WikiLeaks that emails and other data belonging to its employees had been passed to the FBI.
-
U.K. taxpayers have now forked out US$15 million on a two-year-old siege of the Ecuadorean embassy.
-
Environment/Energy/Wildlife
-
It turns out that oil companies in California didn’t inject wastewater into of usable aquifers, with the state’s permission, hundreds of times — it was more like thousands.
-
Privacy
-
Samsung has been doing a great job this week illustrating why consumers should want their televisions to be as dumb as technologically possible. The company took heat for much of the week after its privacy policy revealed Samsung smart TVs have been collecting and analyzing user living room conversations in order to improve voice recognition technology. While that’s fairly common for voice recognition tech, the idea of living room gear that spies on you has been something cable operators have been patenting for years. And while Samsung has changed its privacy policy language to more clearly illustrate what it’s doing, the fact that smart TV security is relatively awful has many people quite justly concerned about smart TVs becoming another poorly-guarded repository for consumer data.
-
About 20 minutes into this electrifying, often terrifying documentary, the film-maker shows for the first time the man we have come to know as Edward Snowden. The ex-NSA employee who blew the whistle on the US Government’s spying on its citizens is a familiar face only because of 24 hours of interviews this film’s maker compiled over eight days in a Hong Kong hotel room. But when he first appears, he’s talking to Guardian journalist Glenn Greenwald about how they will deal with what Greenwald calls “the ‘you’ story”.
-
A federal court in San Francisco sided with the U.S. Department of Justice, ruling that the plaintiffs could not win a significant portion of the case—a Fourth Amendment challenge to the NSA’s tapping of the Internet backbone—without disclosure of classified information that would harm national security. In other words, Judge Jeffrey White found that “state secrets” can trump the judicial process and held that EFF’s clients could not prove they have standing.
-
Advocates for less government snooping suffered a blow Tuesday when a federal judge in California ruled that a group of citizens can not sue the National Security Agency to stop the “upstream” collection of their data.
-
Civil Rights
-
The most half-baked “weapon” in any policeman’s arsenal should never be raised to the level of a felony. “Resisting arrest” is the charge brought when bad cops run out of better ideas. This truism runs through nearly every law enforcement agency in the country. When you take a look at videographers and photographers who have been arrested for exercising their First Amendment rights (and backed by a DOJ statement), you’ll see plenty of “resisting arrest” charges.
-
A 37-year-old woman has died after deputies in northern Virginia used a Taser stun gun on her while she was in custody.
Natasha McKenna of Alexandria was taken off life support Sunday, five days after she was stunned at the Fairfax County jail, the Fairfax County Sheriff’s Office said in a news release.
McKenna was in the process of being transported from the Fairfax County jail to the Alexandria city jail Tuesday when deputies say she failed to comply with their commands and resisted them. A deputy then used a Taser to restrain her, sheriff’s Lt. Steve Elbert said Monday.
-
In the South Carolina prison system, accessing Facebook is an offense on par with murder, rape, rioting, escape and hostage-taking.
Back in 2012, the South Carolina Department of Corrections (SCDC) made “Creating and/or Assisting With A Social Networking Site” a Level 1 offense [PDF], a category reserved for the most violent violations of prison conduct policies. It’s one of the most common Level 1 offense charges brought against inmates, many of whom, like most social network users, want to remain in contact with friends and family in the outside world and keep up on current events. Some inmates ask their families to access their online accounts for them, while many access the Internet themselves through a contraband cell phone (possession of which is yet another Level 1 offense).
-
With just 59,000 residents, the Pasco police department in Washington state have shot and killed four people in the past six months—more than police in the entire United Kingdom, which has over 80,000,000 citizens, in the past three years combined. In fact, Pasco police are on pace to have more police shootings than Germany, also with 80,000,000 citizens, over the current 12 month period.
-
Each year, Reporters Without Borders issues a worldwide ranking of nations based on the extent to which they protect or abridge press freedom. The group’s 2015 ranking was released this morning, and the United States is ranked 49th.
That is the lowest ranking ever during the Obama presidency, and the second-lowest ranking for the U.S. since the rankings began in 2002 (in 2006, under Bush, the U.S. was ranked 53rd). The countries immediately ahead of the U.S. are Malta, Niger, Burkino Faso, El Salvador, Tonga, Chile and Botswana.
-
Media freedom has suffered a ‘drastic decline’ worldwide last year in part because of extremist groups such as Islamic State and Boko Haram, the watchdog group Reporters Without Borders says. – See more at: http://www.skynews.com.au/news/world/europe/2015/02/12/-drastic-decline–in-world-media-freedom.html#sthash.dLBZAYMJ.dpuf
-
I didn’t know Yusor Mohammad, Deah Shaddy Barakat or Razan Mohammad Abu-Salha — the victims of Craig Stephen Hicks’ shooting spree in Chapel Hill, North Carolina – but I recognize them. Anyone who has spent time in American Muslim communities would, and that’s partly why this horrible crime is so painful. I realize I’m making assumptions and maybe getting sentimental in the process, but I can’t help it. The personalities that come through from the testimonies of friends and family, the record of the efforts and achievements of these young people, and the photographs that radiate such joy and life are all too familiar to miss.
-
Not all conservatives used the death of American hostage Kayla Mueller to highlight the brutality of the Islamic State — some decided to focus their disgust on the 26-year-old’s humanitarian work for Palestinians.
“No tears for the newly-departed Kayla Mueller, the ISIS hostage whose parents confirmed today that she is dead,” conservative blogger Debbie Schlussel wrote on Tuesday, under the headline, “Kayla Mueller: Dead ISIS Hostage Was Jew-Hating, Anti-Israel Bitch.”
“Mueller was a Jew-hating, anti-Israel piece of crap who worked with HAMAS and helped Palestinians harass Israeli soldiers and block them from doing their job of keeping Islamic terrorists out of Israel,” she wrote.
Schlussel condemned Mueller’s humanitarian work in the “so-called ‘West Bank’” to prevent the demolition of “terrorists’ ‘houses.’”
-
A press freedom advocate — and husband of an American servicewoman — went to the U.S. embassy in Azerbaijan, fearing for his life. But he was turned away.
-
-
Foreign Ministry spokesperson Hikmet Hajiyev said in this regard that the investigation carried out under the court verdict discovered that chairman of the Institute for Reporters’ Freedom and Safety Emin Huseynov has engaged in illegal business over unregistered grant contracts, making a great deal of money – AZN 1,575,956 – but evading from taxes AZN 247,551 tax to be paid to the state budget.
-
Caracas, February 11th, 2015. (Venezuelanalysis)- The German Embassy in Caracas has alarmed political observers in Venezuela by publishing what the press has described as an “alarming” official declaration to its citizens in the South American country.
Published on February 5th, the declaration is written and signed by the Chargé d’Affaires at the German Embassy, Dr. Jörg Polster. It began to make the rounds on social media networks over the last two days.
In the statement, German diplomat Polster informs readers that the embassy is extremely “worried” about the current situation in the country and advises German residents to take a number of “precautions in the face of the crisis”.
-
-
Bipartisan lawmakers aim to make renunciation of Israel boycott efforts in Europe a key negotiating point in largest free trade deal in history
-
President George W. Bush was fond of saying that “9/11 changed everything.” He used that one-liner often as a purported moral basis to justify the radical restructuring of federal law and the federal assault on personal liberties over which he presided. He cast aside his oath to preserve, protect and defend the Constitution; he rejected his oath to enforce all federal laws faithfully; and he moved the government decidedly in the direction of secret laws, secret procedures and secret courts.
During his presidency, Congress enacted the Patriot Act. This legislation permits federal agents to write their own search warrants when those warrants are served on custodians of records — like doctors, lawyers, telecoms, computer servers, banks and even the Post Office.
Such purported statutory authority directly violates the Fourth Amendment to the U.S. Constitution, which guarantees the right to privacy in our “persons, houses, papers and effects.” That includes just about everything held by the custodians of our records. Privacy is not only a constitutional right protected by the document; it is also a natural right. We possess the right to privacy by virtue of our humanity. Our rights come from within us — whether you believe we are the highest progression of biological forces or the intended creations of an Almighty God — they do not come from the government.
-
Nationalists and anti-imperialists marched to commemorate the 116th year of the Philippine-American War on Feb. 4, with a call to make President Aquino, suspended Police chief Alan Purisima, and the US government accountable for the recent Mamasapano deaths.
-
An Egyptian court on Thursday ordered the release of two journalists jailed for more than a year on charges of broadcasting false news in a conspiracy with the Muslim Brotherhood.
The release followed the publication this week of a previously undisclosed opinion by Egypt’s highest appeals court condemning the journalists’ conviction as baseless when it ordered a retrial at the beginning of this year. The release also comes at a time when the Egyptian government appears to be trying to allay some of the international criticism it has received after a series of harsh and hasty criminal convictions issued during a crackdown on dissent after the military takeover in July 2013.
-
On Monday, February 9th, Matt DeHart’s parents, Paul and Leann, received notice by mail from the Refugee Protection Division of Canada’s Immigration and Refugee Board that the family’s claim for Refugee Protection had been denied. The family fled the United States after Matt was interrogated and tortured during an FBI espionage investigation in which child pornography charges were hastily filed after Matt was detained at the Canadian border, an action which was triggered by an espionage alert.
-
Matt DeHart claims that all his troubles stem from a file uploaded, twice, to a Tor server he ran out of a closet in his parent’s home. An FBI investigation into something the CIA might have done.
-
Mr. DeHart testified the pornography charges are a ruse to investigate an espionage and national security probe tied to his involvement in Anonymous and his operation of a “hidden” Internet server used to leak a classified U.S. government document, likely destined to WikiLeaks, the whistle-blowing organization.
-
Jails across the country have become vast warehouses made up primarily of people too poor to post bail or too ill with mental health or drug problems to adequately care for themselves, according to a report issued Wednesday.
The study, “Incarceration’s Front Door: The Misuse of Jails in America,” found that the majority of those incarcerated in local and county jails are there for minor violations, including driving with suspended licenses, shoplifting or evading subway fares, and have been jailed for longer periods of time over the past 30 years because they are unable to pay court-imposed costs.
-
Internet/Net Neutrality
-
Google has long been behind the SPDY networking protocol as a faster alternative to HTTP 1.1. With the HTTP/2 draft standard being based on SPDY, Google is preparing to sunset the SPDY protocol support within the Chrome/Chromium web-browser.
-
-
Intellectual Monopolies
-
Copyrights
-
The MPAA, RIAA and other entertainment industry groups keep hammering on Canada for its lacking anti-piracy enforcement. The groups label Canada a “safe haven” for both file-sharers and online pirate sites, and ask the U.S. Government to intervene.
-
In a fuming blog article, David Newhoff claims that non-infringing, legal uses of copyrighted works – that is, of people’s own property – are like “aggravated rape” when made without unneeded consent of the monopoly holder. Newhoff tries to scold the crucial concept of “fair use” in copyright monopoly doctrine, the concept which explicitly says that some usages are not covered by the monopoly and therefore not up to the monopoly holder, and ends saying that if you don’t grant permission and can’t set limits, it’s “aggravated rape”. Just when you think copyright monopoly zealots can’t sink any lower, they surprise you with one of the few creativities they’ve ever shown.
-
YouTube’s automated takedown tool is known for its flaws, but this week it crossed a line by attacking a purring cat. According to YouTube’s Content-ID system both EMI Publishing and PRS own the rights to a 12 second purring loop. The cat in question, Phantom, has filed a dispute and hopes to reclaim his rights.
-
Mocking the ridiculous “Special 301 report” from the US Trade Representative has become something of an annual sport around these parts. As we’ve explained, the whole concept of the report is something of a joke: copyright, patent and trademark maximalists send in reports to the USTR, claiming which countries don’t do enough to respect US intellectual property, and the USTR — via no systematic or objective process — rewrites those complaints into a report that declares certain countries “naughty” for their practices. The whole thing is such a joke that even those in the government will openly mock it. As I’ve said in the past, I once saw the head of the US Copyright Office openly joke about the purely arbitrary nature of the 301 report at a conference. Countries like Canada — which are regularly named to the report, despite having copyright laws that are, in many areas, more stringent than the US’s — have openly declared that they do not find the Special 301 process to be legitimate, and thus do not pay any attention to it. A couple of years ago, Chile also made it clear that it felt the 301 process was illegitimate.
-
Empornium, one of the leading private torrent trackers for adult content, says it believes a copyright troll gained access to a staff moderation account and is now using obtained data to threaten its users. The revelations may shine light on why some Empornium users have received settlement threats with no lawsuit filed and no notice from their ISPs.
-
The move might be an effort to appear more legitimate to advertisers and others within entertainment content distribution circles. The BitTorrent file-sharing protocol is often linked with users of the downloading software exchanging content in violation of intellectual property laws. The first project under this original video distribution agreement is the movie Children of the Machine.
Permalink
Send this to a friend
Posted in News Roundup at 6:29 am by Dr. Roy Schestowitz

Contents
-
A Debian developer, who faced issues with some minor tasks on his own machines, has now raised the question whether the distribution being built is too complex to understand and debug.
-
Server
-
What’s the next step for Docker, one of Silicon’s Valley’s hottest startups?
It’s not an initial public offering — at least not this year, apparently. The well-funded, lean company says that it’s in no rush to go public.
-
Kernel Space
-
Linux kernel 3.19 has been officially announced by none other than its father, Linus Torvalds, on February 8, 2015. It is a great release that brings some very interesting features. Because we didn’t have access to a complete list of its features at the moment of writing the news article about its availability, we have decided to drop another one that highlights Linux 3.19 kernel’s prominent features.
-
Applications
-
Instructionals/Technical
-
-
-
-
-
-
GNOME 3 has improved by leaps and bounds since its original release and it’s my daily driver window manager on my Linux laptop. Even with all of these improvements, there’s still no built-in way to rotate wallpaper (that I’ve found).
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
As per our Release Schedule, the freeze for KDE Applications 15.04 is in two weeks (25 February).
-
Kexi uses a lot of the KDE and Calligra libraries, but some of the libraries used are not used by other Calligra apps, making them ripe for pulling out and maintaining separately.
-
GNOME Desktop/GTK
-
gThumb 3.3.3 was released recently, bringing new image tools, preferences dialog UI changes along with fixes for GTK 3.14 and more.
-
Before I start, an addendum to my last post about the DX hackfest: I wish to thank Codethink for sponsoring dinner one night of the event. I forgot to include that in my original post, sorry! Thanks again to all the companies who let employees attend: Endless, Codethink, Canonical and Red Hat.
-
-
DistroWatch.com is currently tracking 287 active Linux distributions. That’s a lot, but not every Linux distribution is a massive project. For every Ubuntu or Fedora, there are many more hobbyist distributions created and run by one or two people. Sometimes they grow into their own large projects, like Linux Mint did. And sometimes a developer decides to pull the plug, as CrunchBang’s developer recently did.
[...]
In the end, hobbyist Linux distributions are created to scratch an itch. Developers may eventually find that itch has been solved elsewhere, or may not want to put the long hours into scratching it anymore. CrunchBang no doubt has users who use and love it, even today—but the end of CrunchBang doesn’t have to be sad. CrunchBang’s developer now believes the larger Linux ecosystem has improved so much that CrunchBang is no longer necessary.
That’s good news for everyone, including Newborough, who now gets to spend his valuable time on something else. Thanks for a killer run, Philip.
-
Security Onion is a Linux distribution for intrusion detection, network security monitoring, and log management. It’s based on Ubuntu and contains Snort, Suricata, Bro, Sguil, Squert, Snorby, ELSA, Xplico, Network Miner, and many other security tools. Security Onion is a platform that allows you to monitor your network for security alerts. It’s simple enough to run in small environments without many issues and allows advanced users to deploy distributed systems that can be used in network enterprise type environments.
-
Time flies. It’s hard to believe it, but it’s been four years since I first took a look at a Linux distribution called UberStudent. Back then it was in its 1.0 release, called “Cicero.” The latest release, “Epicurus,” came out in mid-January, with a version number of 4.1.
There are a lot of Linux distributions out there. What makes this one worth checking out?
As with previous releases, what makes UberStudent unique is its target audience, and the software and little added touches it has as a result.
-
New Releases
-
In a world where everyone tries to drop 32-bit support for their OSes, Black Lab Linux developers have announced on Twitter that they’ve released a 32-bit version of their KDE-based distribution in order to support installations of the Black Lab Linux KDE Edition 6.0 SR1 operating system on low-end computers or machines with old/semi-old hardware components.
-
Arch Family
-
Richard M Stallman congratulated Arch for their achievement but also pointed out the areas where he thinks Arch needs improvement, “Arch’s lack of support of DRM and binary blobs are the only areas where I see hurdles in the wide-spread adoption of Linux. We have elevated the DRM implementation project at FSF to boost work on it. Today Arch is the second most popular operating system and this gap is only due to Arch’s bad philosophy of pure Open Source software. I think they should start offering proprietary and patented applications in their repositories.”
-
Red Hat Family
-
Red Hat, Inc. (RHT), the world’s leading provider of open source solutions, today announced that UAE Exchange, a leading foreign exchange and money transfer brand, has successfully created a scalable, secure, robust and high-performance datacenter environment by consolidating its IT infrastructure on Red Hat Enterprise Linux.
-
The prolific developers at Red Hat have been relatively quiet in the New Year. Now, the open source leader is picking up the pace with the introduction of the latest version of its enterprise virtualization tool.
The company announced general availability this week of Red Hat Enterprise Virtualization 3.5 aiming to offer tighter integration with OpenStack while promising to ease deployment of IT infrastructures for traditional virtualization workloads along with enterprise-level cloud infrastructure.
-
Debian Family
-
Derivatives
-
The top stories today are more thoughts on CrunchBang and Elementary OS’ move to raise capital. My Linux Rig spoke to Matthew Miller from Fedora about his desktop and Adam Williamson announced Fedora 22 Anacoda/DNF testing day. Canonical pats itself on the back for a job well done in media production and John Goerzen hits the complexity nail on the head.
-
Canonical/Ubuntu
-
-
Amazing, simply amazing! We have no idea how many Ubuntu phone units were sold today, but after only three hours all available BQ Aquaris E4.5 Ubuntu Edition smartphones were sold out. Looks like the Ubuntu community in Europe is really strong, as they also had to face some server issues with BQ’s online store, which apparently was not prepared for a large crowd.
-
-
-
Flavours and Variants
-
Now the first point is there is nothing wrong with charging money for work and time invested in a project. Nothing at all. Elementary OS is fully within its right to want to pay people for the time and work they have put in. That’s fine. Where I see the problem is when requests or payment start becoming more of a play on guilt, rather than a request for support.
-
Upon first boot, Elementary obviously is designed to look and function like OS X. Although that might turn the stomachs of die-hard Linux fans, it provides an interesting platform for folks who appreciate the clean, functional layout Apple provides on its flagship OS. Elementary OS includes the Ubuntu Software Center, and like most variants, it can install any program in the Ubuntu repositories. Out of the box, however, it’s a clean, fast operating system that people familiar with OS X will recognize right away.
-
-
Is the Pi robot a specific product or just a concept? An easy answer for some, but not everyone knows the score
-
Shenzhen Xunlong has launched a $59 open-spec “Orange Pi Plus” SBC with a 1.6GHz quad-core Allwinner H3 SoC, 40-pin Pi-compatible expansion, WiFi, and SATA.
In December when Shenzhen Xunlong Software announced its open-spec, Linux- and Android-ready Orange Pi and Orange Pi Mini SBCs, both of which use the dual-core, Cortex-A7 Allwinner A20 system-on-chip, the company also briefly noted an upcoming, quad-core Orange Pi Plus. The Plus was said to offer a quad-core, Cortex-A7 Allwinner A31 SoC with a PowerVR SGX544MP2 GPU. Instead, the shipping version, now available at AliExpress for $59, arrives with Allwinner’s new quad-core Cortex–A7 based H3 SoC and a Mali-400 MP2 GPU.
-
Former Unbounded Robotics execs have launched “Fetch Robotics” with $3 million in funding, and will ship a ROS-on-Linux mobile manipulator bot in Q2 2015.
A startup called Fetch Robotics has announced $3 million in Series A financing from O’Reilly AlphaTech Ventures (OATV) and Shasta Ventures, along with a development team that jumped from the apparently now defunct Unbounded Robotics. Fetch Robotics plans to announce and ship two mobile manipulation robots in the second quarter that are aimed principally at the logistics and light industrial markets, “as well as for other human-robot collaboration opportunities,” says the company.
-
Phones
-
Tizen
-
The Tizen Operating System has got unexpected interest from the Russian Federation, as the Minister of Communications and Mass Communications Nikolai Nikiforov showed his enthusiasm for the Tizen based Samsung Z1 and the “de-monopolization of the global IT-ecosystems”. When prompted about the lack of software, Nikiforov said that conditions will be created to promote the independent mobile OS.
-
Samsung’s 2015 TV Line up will be Tizen, and they have confirmed that they will be dropping Android as a suitable TV platform for them. Using Tizen and EFL for its User Interface, Tizen TVs will have great multitasking between applications and movie streaming services, and great gaming potential with Sony’s PlayStation Now service, and much more!
-
Sony’s been trying the smartwatch thing for years, but the original SmartWatch and the SmartWatch 2 both… what’s the word I’m looking for here? Sucked? Yeah. But the SmartWatch 3 has solid performance and two nifty features you won’t find on any other Android Wear. It’s the first with built-in GPS and a screen you can read without backlighting.
Android Wear watches are off to a pretty decent start. The Moto 360, the LG G Watch R, and the Asus ZenWatch are all lovely and useful in their own ways. So why might you buy a Sony smartwatch instead?
-
Android
-
Most of us will never see our Android antivirus apps spit out a warning because most of us will never encounter malware on our phones. So how can you tell if your Android antivirus is actually protecting your phone against the malware that sometimes sneaks onto Google Play or is installed by an overbearing spouse? Independent testing lab AV-Test is here with the answers.
-
Nokia has announced that an update for its Windows Phone and Android Here mapping apps will be rolling out from today.
-
Google is working hard to kill the password. If you want to live in that future now, you can turn on a feature that automatically unlocks your Chromebook whenever you wander near it with your Android phone in your pocket.
-
The Android Lollipop 5.0.2 update has been made available to some Nexus devices, including the Nexus 7 2012 and 2013 models and the Nexus 10. However, there is still no sign of the update for the Nexus 5 or the Nexus 4. While both the Nexus 6 and the Nexus 9 come with Android 5.0, apparently, the Nexus 5 Android 5.0 Lollipop update has been suspended because it was reported that the update causes the device’s battery to drain at a faster than normal rate.
-
To this point, the PlayStation 4′s novel Remote Play function was only accessible on the PlayStation Vita, PlayStation TV, and certain Xperia mobile phones. That’s no longer the case, thanks to an unofficial port that lets the official PS4 Remote Play app work on practically any modern Android device.
-
AT&T began deploying Android 5.0.1 for its LG G3 variant on Tuesday. The carrier will automatically push the roughly 700MB update over the air, but eager users can also manually search for the file by navigating to Settings>General>About phone>Software Update.
-
Google started pushing out its latest version of Android in November, but most Android phone owners are still waiting for the update.
-
Research firm Canalys says just 720,000 smartwatches powered by Android Wear, Google’s operating system for wearable devices, shipped in the last six months of 2014.
-
-
JW Player, the streaming video company that (in the words of its president Chris Mahl) helps online publishers find “life after YouTube, or life beyond YouTube,” has made a big move onto mobile with the general release of its Android SDK.
The player already worked in mobile web browsers, so it wasn’t entirely absent from Android. But this will allow publishers to include the players directly in their apps, to customize its appearance, and to include video advertising.
-
Regardless of the tinkering Google’s engineers have done under the bonnet, the most noticeable improvement has to be the overall look. Google is calling Android’s fetching new aesthetic “Material Design” and it’s all about giving the OS a more welcoming look. It’s mostly flat colours, clever use of shadow and UI elements which look like layers of paper stacked on top of one another. Google has left behind the world of skeuomorphic design –– just like Apple did with iOS 7 –– and the end result is something that looks less cluttered and more eye-catching.
-
Sub-notebooks/Tablets
-
After releasing Android 5.0 Lollipop updates for a variety of top flagship handsets in the past weeks, including the Galaxy S5 and Galaxy Note 3, Samsung has started rolling out the one official Lollipop ROM certain smartphone buyers were waiting for, the one made for the Galaxy Note 4.
-
The other side of community involvement in an open source project is the end users. It’s hard to be a successful open source project if no one is using it! But aside from providing documentation and forums, how else can projects and users connect?
Kara Sowles, community manager for Puppet LabsOne way is a users group, a type of club where the members all share an interest in a particular arena. SHARE is one of the oldest computer users group around. The basic idea behind a users group is to provide more resources and share information among a local cell, provide support, encouragement, new ideas, mailing lists, and more. There are some challenges with belonging to a users group, managing a users group, and representing your open source project in a users group.
-
Cisco is developing open source tools designed to allow network operators to describe policy in more meaningful terms.
The Noiro Networks team inside Cisco Systems Inc. (Nasdaq: CSCO) is trying to solve the problem of network policy that doesn’t make sense in an application-centric world. Typical networking policy uses networking language — describing traffic flows or or whether specific ports are allowed to connect with each other. Instead, the Noiro Networks team is looking to describe policies in terms of how applications are allowed to interoperate, says Thomas Graf, a principal software engineer at Cisco working on Noiro Networks.
-
If we’re going to do DevOps, we have to give up open source. Right? Wait, we’re an Agile shop, so we have to give that up, too. Right?
Over the last five years or so, I’ve talked with a lot of people confused about what it means to “do DevOps,” and clearly concerned about having to give up other things that have already proven their value in order to adopt DevOps. The bad news is, we’ve not done a good job in the DevOps community of nailing down what DevOps is and what it isn’t at an earlier stage in our development.
-
Google today launched PerfKit, an open-source cloud-benchmarking tool that, in Google’s words, is an “effort to define a canonical set of benchmarks to measure and compare cloud offerings.” The PerfKit tools currently support Google’s own Compute Engine, Amazon’s AWS and Microsoft’s Azure clouds. Google says it has worked on this project with over 30 researchers, companies and customers, including ARM, Canonical, Cisco, Intel, Microsoft, Rackspace and Red Hat.
-
Events
-
The South California Linux Expo (SCALE) is an annual event aiming to provide educational opportunities on the topic of open source software. This is SCALE13X, and prior to the event I caught up with one of the speakers, Emily Durham, who will give a talk called Human Hacking.
Emily Dunham of Open Source Lab at OSUEmily is currently finishing her final year in computer science at Oregon State University (OSU), where she is the student systems engineer at the OSU Open Source Lab. Previous to that gig at OSU, she helped run the Robotics Club, Linux Users Group, and Security Club. Emily has 7 years of experience in open source communities, and I talked with her regarding her career and life, open hardware, community psychology, and of course, her upcoming talk at SCALE13X.
-
SaaS/Big Data
-
There are a lot of interesting announcements arriving as the O’Reilly Strata event rolls out. In one notable example, MapR and Mesosphere have announced a new open source Big Data framework (called Myriad) that allows Apache YARN jobs to run alongside other applications and services in enterprise and cloud datacenters. The initiative was kicked off by a developer at Ebay and turned into a collaborative effort between multiple companies. The project is now approaching Apache incubation.
-
Funding
-
We’ve been watching the Big Data space pick up momentum as 2015 begins, and now Hitachi Data Systems Corporation has announced its intent to acquire Pentaho in what is being billed as “the largest private Big Data acquisition transaction to date.” Hitachi claims that the acquisition will accelerate enterprise adoption of Big Data technologies and solutions through “easier, faster deployment, leading to faster ROI.”
-
BSD
-
Licensing
-
Most discussions of free software licenses bore listeners. In fact, licenses are usually of such little interest that 85%of the projects on Github fail to have one.
However, one aspect of licensing never fails to stir partisan responses: the debate over the relative advantages of copyleft licenses such as the GNU General Public License (GPL), and permissive licenses such as the MIT or the Apache 2 licenses.
You only have to follow the links to Occupy GPL! that are making the rounds to see the emotions that this unending debate can still stir. Calling for an end to “GPL purism,” and dismissing the GPL as “not a free license,” the site calls on readers to use permissive licenses instead, describing them as “truly OSS [Open Source Software] licenses and urging readers to “Join the Fight!”
Occupy GPL! itself is unlikely to have a future. Anonymous calls to actions rarely succeed; people prefer to know who is giving the call to arms before they muster at the barricades. Nor is the site’s outdated name and inconsistent diction, nor the high number of exclamation and question marks likely to inspire many readers. Still, the fact that the site exists at all, and the counter-responses in comments on Google+ show that the old debate is still very much alive.
-
As a recovering proprietary programmer, I can assure you that things work a bit differently in the open-source world, so some adjustment is required. But participation in an open-source project can be very rewarding and worthwhile!
-
Security
-
The Obama administration is establishing a new agency to combat the deepening threat from cyberattacks, and its mission will be to fuse intelligence from around the government when a crisis occurs.
-
Most people use passwords many times a day. They’re the keys that unlock digital doors and give us access to our computers, our email, our data and sometimes even our money. As more and more things move online, passwords secure an ever growing part of our lives. We’re told to add capital letters, numbers and punctuation to these passwords to make them more secure, but just what difference do these have? What does a really secure password look like?
-
-
Red Hat is introducing new identity management features as part of Red Hat Enterprise Linux 7.1, including a much-anticipated two-factor authentication option based on FreeOTP.
-
Defence/Police/Secrecy/Aggression
-
Secret embassy cables leaked by WikiLeaks in 2010 reveal the United States’ heavy involvement in the Philippines’ counter-terrorism efforts including the botched police operation in Mamasapano, Maguindanao, a party-list congressman claimed on Wednesday.
Kabataan Party-list Rep. Terry Ridon said the cables, which were from 2005 to early 2010, show how the US government planned to operate covertly within the ranks of Philippine forces.
-
A shooting in the US, which has reportedly left three Muslims dead in a North Carolina university town, has set social media buzzing over accusations of double standards, with major media outlets failing to report the story.
-
The U.S. ambassador to Lebanon announced a new shipment of weapons and ammunition have arrived in Beirut, the latest American assistance to Lebanon’s army as it fights ISIS along its border with Syria. The Ambassador said the equipment includes more than 70 M198 howitzers and over 26 million rounds of ammunition and artillery “of all shapes and sizes, including heavy artillery.”
“We are very proud of this top-of-the-line equipment. This is the best that there is in the marketplace. It’s what our soldiers use,” the Ambassador continued. “I know that in a matter of days it’s going to be what your brave soldiers are using in the battle to defeat terrorism and extremism.”
-
Transparency Reporting
-
The Republic of Ecuador will take the case of its most famous asylum seeker, Julian Assange, to the U.N. Human Rights Council, according to reports this week.
-
London’s police chief said Tuesday that the cost of keeping watch on Julian Assange, who is holed up in the Ecuadorean Embassy there, was draining resources and must be reviewed. Mr. Assange, the WikiLeaks founder, sought refuge in the embassy in June 2012 to avoid extradition to Sweden for questioning on sexual assault allegations, which he denies. London’s Metropolitan Police have been standing guard around the clock to prevent him from fleeing, at a cost of about $15 million since the operation began. Police Commissioner Bernard Hogan-Howe told LBC Radio that officials were considering “how we can do that differently in the future, because it’s sucking our resources in.” Mr. Assange says the allegations were trumped up to facilitate his extradition ultimately to the United States, where he could be put on trial over huge leaks of information to WikiLeaks.
-
A review of the round-the-clock operation to guard Julian Assange, the WikiLeaks founder who is holed up in the Ecuadorian embassy, was announced by Sir Bernard Hogan-Howe yesterday.
-
The UK’s most senior police chief says he is reviewing the operation to guard WikiLeaks founder Julian Assange because it is “sucking” their resources. Deputy Prime Minister Nick Clegg last week revealed the cost of the surveillance operation outside the Ecuadorian Embassy in London had reached around £10m. Metropolitan Police Commissioner Sir Bernard Hogan-Howe told LBC radio: “We are reviewing the way forward there.” Mr Assange, who has been granted political asylum by Ecuador, has been living at the embassy since June 2012.
-
Security costs for Wikileaks founder Julian Assange are to be reviewed, Metropolitan Police Commissioner Sir Bernard Hogan-Howe has said.
Maintaining a guard for Assange at the Ecuadorean Embassy in central London has cost £10m, according to figures disclosed to LBC radio.
-
Finance
-
The newspaper argued that similar policies would be followed by journalists in other parts of the globe, saying that it wouldn’t be responsible to just dump information on all account holders, as this could unnecesarily expose them to criminals after the extent of their wealth became public. Although no relevant accounts were tied to government officials by La Nación yet, investigations were said to be ongoing.
-
Conservative donors, peers and a high profile MP are listed among the wealthy who legally held accounts in Switzerland with HSBC’s private bank, for a wide variety of reasons.
Their ranks include Zac Goldsmith, MP for Richmond Park, plus his brother the financier Ben Goldsmith, and a Swiss resident, German-born automotive heir Georg von Opel, who has donated six-figure sums in the past two years.
Peers named in the HSBC files include Lord Sterling of Plaistow, the P&O shipping and ports entrepreneur who was ennobled by Margaret Thatcher, and Lord Fink, who was a party treasurer under David Cameron and has given £3m to the Conservatives.
-
PR/AstroTurf/Lobbying
-
February 04, 2015 “ICH” – Americans love their reality TV shows—the drama, the insults, the bullying, the callousness, the damaged relationships delivered through the lens of a surveillance camera—and there’s no shortage of such dehumanizing spectacles to be found on or off screen, whether it’s Cops, Real Housewives or the heavy-handed tactics of police officers who break down doors first and ask questions later.
-
Privacy
-
Afshin Rattansi goes underground on Google’s shady privacy record. Kristinn Hrafnsson, lawyer for WikiLeaks, warns that it appears Google is “not a benign company, it has sinister aims,” and reveals that it wants to be a dominant part of the military intelligence complex, handing information to the US government. Dr. Suzy Lishman, president of the Royal College of Pathologists, warns up to 10,000 deaths every year should be referred for further investigation, but are not due to massive numbers of death certificates being filled out minimally or wrong. We look into why the Church of England is removing the right to free speech for one of its vicars. Boris Johnson meets Hillary Clinton to discuss ISIS in New York. And if you’re a war-wounded veteran, you’d better hope you were injured after April 2005 – or you may lose most of your compensation to pay for basic care.
-
Be careful about what you say in your living room if your new TV is on. News broke earlier this week that Samsung’s Web-connected SmartTV can listen to, record, and send what the television hears to a third-party company. The television doesn’t watch you watch it back, but it is listening.
-
D.C. Mayor Muriel Bowser has ordered the D.C. Fire Department to lift the encryption of the department’s radios.
News4′s Mark Segraves broke the news on Twitter Tuesday night.
She has instructed the fire chief to stop encrypting the department’s radio transmissions beginning Friday morning. Encryption of the radios prohibits anyone except fire personnel from listening to the radio transmissions.
-
President Barack Obama asked Germans to give the United States the “benefit of the doubt” when it comes to snooping by the National Security Agency.
In a Monday joint press conference with Chancellor Angela Merkel held at the White House on Monday, Obama said he recognizes “the sensitivities around this issue.”
In October 2013, German media reported that Merkel had “strong suspicions” that her personal cellphone was being monitored by American authorities.
White House spokesman Jay Carney unequivocally told reporters at the time that such surveillance was not continuing, but he did not directly deny the allegations of past conduct. The next year, Germany decided not to renew its government contract with Verizon, citing concerns over spying by the National Security Agency.
-
The first glimpse the world had of Edward Snowden was in a short video in a dark Hong Kong hotel room. But film-maker Laura Poitras’ journey with the NSA whistleblower began much earlier.
-
-
In a ruling handed down Tuesday, a federal district judge in California refused to rule that NSA collection of Internet and phone content without a warrant violates the Fourth Amendment, and dismissed part of a lawsuit challenging the spy agency program.
-
Ah well, all that discussion probably counts as a state secret. A concept which is getting more and more farcical every year.
-
Despite the continuing torrent of disclosures concerning previously secret and wide-ranging government surveillance efforts, many criminal defendants are not getting notice of the secret surveillance authorities used in their cases. This is a serious problem—one felt acutely by defendants, but one that also has immense consequences for the public at large in an age of mass surveillance. To those whose liberty is not on the line, the right of criminal defendants to notice might seem like a narrow, procedural issue. It is not. In a world of multiplying surveillance techniques used in secret, the criminal defendant’s right to notice of surveillance used against him is vanishing—and this shift presents a fundamental obstacle for defendants, and a basic, structural problem for courts and the public.
-
EFF will keep fighting the unlawful, unconstitutional surveillance of ordinary Americans by the U.S. government. Today’s ruling in Jewel v. NSA was not a declaration that NSA spying is legal. The judge decided instead that “state secrets” prevented him from ruling whether the program is constitutional.
-
A U.S. judge on Tuesday ruled in favor of the National Security Agency in a lawsuit challenging the interception of Internet communications without a warrant, according to a court filing.
U.S. District Judge Jeffrey White in Oakland, California wrote the plaintiffs failed to establish legal standing to pursue a claim that the government violated the Fourth Amendment.
-
These findings are the result of the exposure of mass surveillance that seriously undermines the safety of journalistic sources, the safety of whistleblowers and freedom of the media, in stark contrast with a meaningful democracy where access to information, privacy and freedom of expression is protected.
-
Twitter on Monday released its twice-yearly transparency report, showing a surge in government requests for users’ Twitter information.
The report, which discloses the frequency with which government agencies from around the world ask Twitter to hand over data on specific users, said total requests rose by 40 percent, to about 2,871, compared with the company’s last report, in July. The latest requests came from more than 50 countries.
-
The Snowden docs show us that high value targets have been getting compromised forever, and while the game does heavily favour offence, how is it possible that defence hasn’t racked up a single catch? The immediate conclusions for defensive vendors is that they are either ineffective or, worse, wilfully ignorant. However, for buyers of defensive software and gear, questions still remain.
-
TheWrap in conjunction with Facebook took a look at some of the chatter about the film — and its stars Dakota Johnson and Jamie Dornan — online. The data came from likes, comments and shares about the movie on Facebook. “For the past seven days, 3.7 million people had over 6 million interactions related to the Jamie Dornan and Dakota Johnson romp on Facebook,” TheWrap reported.
-
Customers who are concerned about the surveillance capabilities of Samsung’s smart TVs have another headache to worry about: Tampering with the machine to disable such components may be a felony.
Samsung’s privacy policy raised concerns with privacy activists who spotlighted the warning: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.” Now there are concerns that tinkering with the software by tech-savvy customers may run afoul of the Digital Millennium Copyright Act.
“Most smart TVs on the market have taken technological measures to prevent users from accessing or modifying firmware in order to prevent illegal copying and distribution of copyrighted material. But users could technically face felony charges for circumventing lockdown restrictions — even if the modifications they’re trying to make are legal under copyright law,” Slate reported Tuesday.
-
That’s not exactly what the Terms say; they note that “if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted”. So we’re not just talking about the sort of data Google Now or Siri sends to their service provider (the phrase after you have started the voice recognition). Samsung also sends the commands themselves, plus any conversation around them. From that description, it seems the whole stream of conversation is likely to be sent.
-
Civil Rights
-
When a Washington, DC, area jury convicted Jeffrey Sterling of multiple counts of espionage, the smoking gun wasn’t a key bit of classified information found in the former CIA officer’s possession; it was a trail of phone calls and emails of unknown content.
The information about where those calls and emails went, however – to a New York Times reporter – was enough to convince a jury to send Sterling to prison for up to 80 years.
According to the US Justice Department, Sterling was providing Risen with details of a failed CIA attempt to undermine Iran’s nuclear programme by having a Russian scientist code-named Merlin pass along intentionally flawed blueprints. Risen then exposed the operation in his 2005 book, State of War.
-
The most recent data on lynching, compiled by the Equal Justice Initiative, shows premeditated murders carried out by at least three people from 1877 to 1950 in 12 Southern states. The killers claimed to be enforcing some form of social justice. The alleged offenses that prompted the lynchings included political activism and testifying in court. FEB. 9, 2015 Related Article
-
It is important to remember that the hangings, burnings and dismemberments of black American men, women and children that were relatively common in this country between the Civil War and World War II were often public events. They were sometimes advertised in newspapers and drew hundreds and even thousands of white spectators, including elected officials and leading citizens who were so swept up in the carnivals of death that they posed with their children for keepsake photographs within arm’s length of mutilated black corpses.
These episodes of horrific, communitywide violence have been erased from civic memory in lynching-belt states like Louisiana, Georgia, Alabama, Florida and Mississippi. But that will change if Bryan Stevenson, a civil rights attorney, succeeds in his mission to build markers and memorials at lynching sites throughout the South as a way of forcing communities and the country to confront an era of racial terror directly and recognize the role that it played in shaping the current racial landscape.
Mr. Stevenson’s organization, the Equal Justice Initiative, took a step in that direction on Tuesday when it released a report that chronicles nearly 4,000 lynchings of black people in 12 Southern states from 1877 to 1950. The report focuses on what it describes as “racial terror lynchings,” which were used to enforce Jim Crow laws and racial segregation. Victims in these cases were often murdered without being accused of actual crimes but for minor social transgressions that included talking back to whites or insisting on fairness and basic rights.
The report is the result of five years of hard work. Researchers reviewed local newspapers, historical archives and court records; interviewed local historians, survivors and victims’ descendants; and scrutinized contemporaneously published articles in African-American newspapers, which took a closer interest in these matters than the white press. In the end, researchers found at least 700 more lynchings in the 12 states than were previously reported, suggesting that “racial terror lynching” was far more common than was generally believed.
-
Crossfire’s whole premise was a debate between left and right, one that at times degenerated into a shouting match. Stewart often criticized the show as dumbing down American public discourse. And, when Crossfire’s hosts invited him on to debate, he embarrassed them.
“You’re partisan — what do you call it — hacks,” Stewart said, to a stunned Carlson and Begala. “Stop hurting America.” Here’s the clip…
-
White House to unveil on Tuesday the Cyber Threat Intelligence Integration Center but critics fear an expansion of government monitoring of online data
-
“I believe that the people who build these things have the ability to make them absolutely attack-proof, but in order to do that, they have to make them impervious to government intrusion,” Judge Nap said, adding that any government agency big enough to protect us is big enough to surveil us.
“The Internet cannot be protected by the government, because the government will never permit a system that it can’t zero into,” Judge Nap said, concluding that he would “absolutely not” establish this agency.
Watch Judge Nap and Stuart
-
Last Saturday, January 31, CIA Inspector General David Buckley resigned after a little more than four years in office. His departure came at the end of the same month his office published a scathing report that found the agency committed serious wrongdoings in connection to its rendition, detention, and torture program. It was also the same month that his report was swept aside by a parallel investigation conducted by a CIA “Accountability Board” that was hand-picked by agency leadership. Unsurprisingly, the Accountability Board recommended holding no one accountable for any failings.
-
The Guantánamo Bay war court is now costing US taxpayers over $7,600 per minute, according to new Pentagon figures.
-
Internet/Net Neutrality
-
First it conquered search. Then it was online video and advertising. Now Google is turning its attention toward telecom — and it’s no experiment.
In recent months, Google has said it’s bringing ultra-fast Internet to at least 18 US cities, including Atlanta and Nashville. It announced pilot tests of a low-cost, modular smartphone. The company’s joined an influential lobbying group for upstart telecom firms. And now Google is considering an entry into wireless service, as first reported by The Information, a technology news site founded by former Wall Street Journal reporter Jessica Lessin.
-
HTTP is the fundamental networking protocol that powers the web. The majority of sites use version 1.1 of HTTP, which was defined in 1999 with RFC2616. A lot has changed on the web since then, and a new version of the protocol named HTTP/2 is well on the road to standardization. We plan to gradually roll out support for HTTP/2 in Chrome 40 in the upcoming weeks.
-
And, indeed, it appears the stock market acted accordingly. Following Tom Wheeler’s official announcement that the FCC would move to reclassify under Title II, all the key broadband players saw their stocks jump up, not down. If it was really that bad, you would have seen the opposite.
Permalink
Send this to a friend
02.11.15
Posted in News Roundup at 8:04 am by Dr. Roy Schestowitz

Contents
-
Hiring top Linux and open source talent isn’t as easy as initiating a search with your favorite recruiter. Linux and open source developers and SysAdmins are among the most sought after talent in tech; companies like IBM, Twitter, Facebook and many more understand that to attract these folks, they have to do things differently. I’ve been working in open source since the late 90s and have seen first hand many of these changes.
-
No matter. Millions of servers will not be properly migrated to M$’s next release on time so they might as well migrate to GNU/Linux and take charge of their futures rather than be dependent on M$’s schedule and desire for cash. Why should your organization uproot itself because another organization wants a fresh influx of cash? Do the right thing. Go to Debian GNU/Linux and FLOSS. It will work for you, not M$.
-
While some Windows users are quite satisfied with Microsoft’s desktop operating system, others are not. Does it make sense for Windows users make the jump to Linux or Mac?
-
You can answer three questions to choose between Linux or Windows, and you can gripe about how Windows is killing the traditional desktop, but all that is fluff. The purpose of an operating system is to put forth an environment where you can get things done—where you can get things done. You are what matters and everything else is bullshit.
-
Server
-
-
The Docker project team wanted to start the new year out right with something awesome; that’s why we’re super excited to announce the first Docker release for 2015. We’ve smashed many long-standing, annoying bugs and merged a few awesome features that both the community and maintainers are excited about. Let’s check out what’s in Docker 1.5.
-
Notably, though, 49 percent of survey respondents pointed to a lack of operational production tools and problems with Docker’s security as the biggest obstacles to adoption.
-
IBM announced a new 10-year services agreement with Shop Direct to move the multi-brand digital retailer to a hybrid cloud model.
Shop Direct said it will tap IBM’s outsourcing capabilities and the IBM Cloud for analytics, mobile, social and security services that will enable greater customer satisfaction and workforce productivity.
-
Kernel Space
-
Linus Torvalds announced the first new Linux kernel of 2015 on February 9, with the debut of Linux 3.19. It took seven release candidates to hit the final 3.19 release, which is about average.
-
-
So nothing all that exciting happened, and while I was tempted a couple of times to do an rc8, there really wasn’t any reason for it.
-
The Internet of Things is already a reality — thousands of devices, from home appliances and consumer electronics, to smartwatches and cars already connect to the Internet. The problem is that they don’t easily, or simply can’t, connect to each other to form an Internet of Everything, says Philip DesAutels, senior director of IoT at the AllSeen Alliance, a Linux Foundation Collaborative Project.
-
A collaboration between SUSE and Red Hat is going to bring relief to Linux users the world over: they’ll be able to patch their systems without reboots.
-
The changes going in through Ingo Molnar’s branches aren’t incredibly exciting this round, but it looks like the scheduler tree updates have the potential to be semi-exciting. In particular, the kernel scheduler changes have minor micro-optimizations, various fixes and enhancements, and a idle-poll handler fix that has the potential to result in power-savings.
-
-
Benchmarks
-
If you’re wondering about any file-system performance changes for XFS/EXT4/Btrfs/F2FS when operating on a single SSD, I ran the vanilla Linux 3.18 vs. 3.19 benchmarks this weekend on an ASUS Zenbook UX301LAA with Intel Core i7 4558U Haswell processor and the file-system tests targeting the secondary 128GB SanDisk SATA3 SSD with this ultrabook. A development snapshot of Ubuntu 15.04 x86_64 was used for this kernel/file-system comparison with its updated file-system user-space utilities. For this testing, the stock mount options of each file-system was used.
-
Applications
-
As you may or may not know, I have been working on this project for quite some time, but actually really started the most critical parts a couple months ago. After having looked for (and chosen) a new name for what was a prototype project, it’s now time for a very first release.
-
-
Proprietary
-
Opera Software, though Ruarí Ødegaard, has announced today, February 10, that the developer channel of the amazing Opera web browser is now open and updated to version 29.0.1770.1, based on the Chromium 42.0.2287.0 web browser.
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
I will try again (as in this issue) to explain why we decided to slowing that feature. Slowing means that it will be done later, not never, as it was stated. It is just that we think that other things benefit the whole idea of ownCloud more. That has plain technical reasons. Let’s dive a bit into.
-
From almost every app being on the command line to doing everything through the web browser, GNU/Linux has come a long way towards user-friendliness. But in always using that ever-present Firefox or Chromium session, something has been lost along the way.
-
Wine or Emulation
-
With Wine 1.7.36 having been released on Friday, the Wine-Staging crew released their respective updated version of Wine patched with experimental features.
-
Games
-
I took a look at the game a little while ago and was impressed by the ambition and vision of the game. If the game lives up to the promise and has a good launch, I could see myself sinking in a lot of hours. It’s been a while since there’s been a good city builder available and it’s even nicer that we look set to get a same-day release on Linux.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
A few years ago I used to regularly publish videos, so back then I started with an evaluation of FOSS video editors available for Fedora. At the time I decided the “winner” to be Kdenlive (at the time PiTiVi was useless, OpenShot unavailable and Blender unknown for its video editing capabilities), despite all the drawbacks of its KDE interface and sudden crashes.
-
In Plasma 5.3 some of the things that were lost along the way of the port to Plasma 5 due to the massive architecture change will be back.
-
GNOME Desktop/GTK
-
-
New Releases
-
The second beta release of elementary OS ‘Freya’ is now available for download, and arrives some six months after the first beta was released to much excitement.
-
-
Screenshots
-
Red Hat Family
-
With more than 600 branches across 30 countries, UAE Exchange has a large, and growing customer base. However, rapid expansion caused performance and availability concerns about the company’s distributed IT systems, previously comprised of servers running various versions of UNIX . To better support its fast growing portfolio of web-based applications for new services such as payment for credit cards, utility bills, subscriptions, airline tickets and others, the company needed to consolidate its environment on a single platform.
-
The joint solution will leverage NEC’s infrastructure offering and Red Hat’s cloud solution to help service providers quickly adopt NFV.
Red Hat and NEC want to make it easier for communications service providers to embrace network-functions virtualization in their data centers.
-
As 2015 begins, we’re seeing a lot of action from telecom players and the open source community surrounding Network Function Virtualization (NFV) technology. Now, Red Hat and NEC Corporation have formed a partnership to develop NFV features in he OpenStack cloud computing platform, with the goal of delivering carrier-grade solutions based on Red Hat’s OpenStack build.
-
Fedora
-
The Korora 21 screenshot tour series ends with the Xfce edition, which is built around the lightweight and fast Xfce 4.10.1 graphical desktop environment and targeted at users of low-end machines or computers with old/semi-old hardware components.
-
I’ve had Fedimg spin up some fresh Fedora 21 Cloud AMIs on Fedora’s official AWS account. I’ve done this for a couple of reasons.
First, the AMIs linked to by the official download page were created on the Fedora Cloud SIG community account. In production, Fedimg registers the AMIs with the official Fedora AWS account, but I had triggered these uploads from a machine configured with the community account credentials. Registering these AMIs from the official Fedora AWS account (to which few people have access) provides additional security. You can further verify uploads by checking out the associated fedmsgs. For instance, here are the latest upload messages. In this example, you can see information about the AMI, including its ID and the name of the image it was created from.
-
The famous Network Security Toolkit (NST) computer operating system used by many network administrators and security specialists to analyze and monitor networks, as well as to tighten the security of computer networks, received an update on February 9, 2015. The version is now Network Security Toolkit 20 SVN 6535.
-
Debian Family
-
Yesterday, however, I’ve seen an experienced Linux person frustrated because the shutdown function of the desktop was doing nothing whatsoever. Today I found John Goerzen’s post on planet.
-
Derivatives
-
The Elive Team proudly announced the immediate availability for download and testing of a new Beta version of their Elive computer operating system, based on the highly acclaimed Debian GNU/Linux distribution.
-
The Univention Corporate Server (UCS) enterprise-ready Linux server distribution based on the Debian GNU/Linux operating system has been updated today, February 11, to version 4.0-1, a minor release that includes an updated Debian base and various tweaks.
-
Canonical/Ubuntu
-
-
For those of you who don’t know me, I am an open source community management and leadership dork. I spent just under eight years as Ubuntu community manager at Canonical, leading a team of six and providing community management consultancy via my own practice. I then moved on to join XPRIZE last year. I wrote “Art of Community,” “Dealing With Disrespect,” and a few other books, founded the Community Leadership Summit, which takes place just before OSCON in Portland each year, co-founded a technology podcast called Bad Voltage, and record some music from time to time.
-
After years of development, the first Ubuntu phone is finally here (Europe only) and while the hardware is average at best, the OS is a breath of fresh air, bringing innovations like scopes and “magic edges”, designed not just to be different, but in many ways, better than the current trends.
-
Some news sites claimed earlier that the Ubuntu Phone Aquaris E4.5 smartphone will ship today, February 9. It turns out that the information is completely false, as BQ immediately posted on their Twitter account that the device will be available this week, but not today.
-
We have some amazing news for you guys if you’re in the market for an Ubuntu Phone, as both Canonical and BQ have confirmed a few minutes ago on their Twitter accounts that limited Ubuntu phones will be available for you to buy tomorrow, February 11, 2015, between 9am and 6pm CET (Central European Time).
-
As we announced yesterday, Ubuntu Phone’s flash sale happens today, February 11, 2015, right now. Therefore, if you are desperate to get one today, forget about reading this article and go get yours from BQ’s online store.
-
Videos of the first Ubuntu-based phone to be released in the UK show that the low-budget handset may struggle in terms of performance. The BQ Aquaris E4.5 Ubuntu Edition will be released this week, and marks the end of a two-year journey for Ubuntu to find a manufacturer willing to ship its smartphone OS.
-
-
Open-source technology is one solution to this challenge, especially where it allows the tight integration of software with a range of hardware options.
An important aspect of this is the creation of open-source platforms around the Linux operating system, which has a growing software infrastructure that OEMs can take advantage of to develop and debug designs.
-
Phones
-
Tizen
-
Today we are excited to see that the source code for Tizen 2.3 has been finally released. The last code drop for mobile was back in November 2013, so this is seen as something quite overdue by platform developers. We hope more OEMs will now stop sitting on the sidelines and join Samsung in developing Tizen based Smartphones and wearables, that will further enrich the Tizen ecosystem.
-
Samsung recently launched its first Tizen OS smartphone in India and although initial reports said that the Korean tech giant managed to sell 50,000 units in the first 10 days, concerns were raised over Tizen’s skimpy app ecosystem.
-
We are excited to announce the availability of Node.js v0.12! It has been a long process, and we want to thank contributors and all of the community who waited patiently for this event. Node.js has such a vibrant and enthusiastic community, and we’re very lucky to have you all supporting us.
-
In a bid to quell an uprising within the Node.js ranks, vendor sponsor Joyent has announced an independent foundation to provide an open governance structure for the project.
Though big players including IBM, PayPal and Microsoft will be involved, CEO Scott Hammond said the foundation will help ensure all voices are heard.
-
Node.js, the popular server-side JavaScript framework, is getting its own open-source foundation and will no longer be governed by Joyent, the cloud-infrastructure provider plans to announce on Tuesday. It should take around two to three months before the foundation is formally established, and until then, Joyent will remain the corporate steward of the Node.js open-source project, according to Joyent.
-
Events
-
It’s been one of those years, and with 2015 being the 13th year for the Southern California Linux Expo — hence SCALE 13x — you might expect that superstition would be rearing its ugly head.
-
OSDC Nordic is an upcoming open-source friendly community-oriented xevent, held May 8th – 10th in Oslo.
-
Web Browsers
-
In the past, Microsoft’s Internet Explorer was the go-to Web browser for Internet users. But end-user confidence in Internet Explorer appears to be waning.
Last summer, Google Chrome passed Internet Explorer in combined U.S. desktop and mobile Internet market share for the first time. Chrome now holds 31.8 percent of total market share compared to Internet Explorer’s 30.9 percent share. Furthermore, Chrome has been growing at a rate of 6 percent year over year from 2008, while Explorer has been decreasing at a rate of 6 percent during the same time frame.
-
Mozilla
-
The Firefox OS-based “Matchstick” media player has been delayed a half year to August, and will receive an overhaul to move to a quad-core SoC and add DRM.
-
One thing I am trying to convince folks though is that working in the open is not so hard that we ignore the principles of working in the open and avoid trying to build a good foundation of open processes. One thing I am finding when I have these discussions though is people do not always feel empowered to speak out about working in the open. Simply put teams and organizations will get in these status quos where they put off this hard work and nobody really comes around often to challenge the status quo because often the debates that pursue of working in the open are filled with disagreement.
-
SaaS/Big Data
-
OwnCloud Server 8 has been released this morning and with it comes improved sharing and collaboration between clouds and other features.
-
ownCloud Server 8 has been released and come full with features to make browsing and sharing the contents of your cloud quicker. The search interface has been updated to provide a simpler and easier user experience by introducing: enhanced result set reporting which speeds up access to searched siles, additional search parameters and other general usability improvements to make finding files easier. To aid your search, the new release comes with the ability to assign a favourite icon to files and folders.
-
ownCloud, a free software alternative to proprietary web services such as Dropbox, Google Drive and others that you can install on your own server, has reached version 8.0.0.
-
-
CloudStack is an open source cloud software platform which is designed to deploy networks of scalable virtual machines in an Infrastructure-as-a-Service environment. It is often likened to OpenStack, and provides on-premises cloud computing as part of a hybrid cloud solution.
-
Public Services/Government
-
A new open source, online collaboration tool will allow Defense Department employees to easily and securely web conference and instantly chat from anywhere around the world.
The Defense Information Systems Agency is expanding the capability called Defense Collaboration Services, or DCS, across the department, according to a Feb. 6 press release from the Air Force.
-
An NHS open source community interest company (CIC) has been set up to guide the development of an electronic patient record system, which NHS England hopes will ignite the open source digital health and care services markets to better serve clinicians and patients.
-
-
Openness/Sharing
-
Are you the kind of drone pilot that wants to do things with your aircraft no one’s thought of before? If so, then Tower, the new open-source flight control app from 3D Robotics, could well be for you.
-
3D Robotics, the largest U.S.-based drone manufacturer, today announced the launch of its open-source Tower flight control app for drone copters and planes on Android phones and tablets. The app gives users a few new ways to talk to their drones, but far more importantly, it offers developers a new way to build new features for drones into the app without having to reinvent the wheel by starting from scratch.
-
Modelling energy usage is not enough, so an energy measurement board (the ‘MAGEEC Wand’) has been created, which can be applied to a range of embedded architectures. MAGEEC was presented at GNU Tools Cauldron – the annual gathering of GNU tools developers (CC- licensed video and slides at gnu.org) – this July in Cambridge, on the Atmel AVR. Since this, further work has completed the “proof of concept” framework, which fits both GCC and LLVM compilers – a working system that currently awaits further optimisations.
-
Open Hardware
-
Open Source Virtual Reality (OSVR), the initiative from Razer and Sensics to connect multiple VR software and hardware partners together, had a good handful of partners at CES 2015, and 13 more have been announced today. The new partners include Jaunt — a maker of cinematic VR experiences that already has apps for Google Cardboard — plus a few game developers, audio and interface accessory companies.
-
Open Source Virtual Reality, a Razer-spearheaded coalition that was introduced at CES 2015 in January, has announced 12 new partners.
OSVR aims to build an open source VR platform that developers and hardware makers can use to create virtual reality devices and experiences across multiple operating systems
-
Health/Nutrition
-
Every six months, like clockwork, I fly home to the UK for three days for one reason: to pick up my supply of prescription medication.
I consider myself lucky—drugs are cheap there, where a national health service exists that I can partake of as a UK citizen. The very vast majority of Americans are not as fortunate. John Oliver, fellow Brit, comedian, and host of Last Week Tonight, said Sunday in a skit about Big Pharma that the cost of drug spending in the U.S. last year “works out to be about a thousand dollars per person.”
-
Radical right-wingers in a series of red states are punishing hundreds of thousands of low-income people by blocking efforts by Republican governors to expand Medicaid—state-run health care—by modifying Obamacare to include Republican ideas.
-
Security
-
Cybercrooks have cooked up a Linux backdoor boasting multiple malicious functions.
The Swiss Army Knife-style malware – dubbed Xnote.1 by Russian anti-virus company Doctor Web – can be used as a platform to mount DDoS attacks and other malicious tasks.
To spread the new Linux backdoor, criminals mount a brute force attack to establish an SSL connection with a target machine.
-
-
The Core Infrastructure Initiative (CII), which was formed last year to identify open-source projects in need of extra support, expects to name the projects that will receive its backing within a few months, said Jim Zemlin, executive director of the Linux Foundation, which oversees the CII.
-
Administrators of tens of thousands of MongoDB databases around the world failed to enforce any security mechanisms, allowing access outside the backend and exposing information of millions of customers to unauthorized parties.
-
Managed cloud hosting provider SingleHop hopes to stand out from the pack with new security tools that outsource data protection and DDoS-attack mitigation to the cloud. Its solution, Shield Plus Advanced Security, debuted this week.
-
Defence/Police/Secrecy/Aggression
-
Enormous Gender Disparity Present Across All Three Outlets. Fox News featured women in roughly 25 percent of recorded segments, while MSNBC and CNN each featured female guests in just over 20 percent of segments discussing foreign affairs and national security.
-
On January 26, the New York Times claimed that “a CIA drone strike in Yemen. . . . killed three suspected Qaeda fighters on Monday.” How did they know the identity of the dead? As usual, it was in part because “American officials said.” There was not a whiff of skepticism about this claim despite the fact that “a senior American official, speaking on the condition of anonymity, declined to confirm the names of the victims” and “a C.I.A. spokesman declined to comment.”
That NYT article did cite what it called “a member of Al Qaeda in the Arabian Peninsula” (AQAP), who provided the names of the three victims, one of whom was “Mohammed Toiman al-Jahmi, a Yemeni teenager whose father and brother were previously killed in American drone strikes.” The article added that “the Qaeda member did not know Mr. Jahmi’s age but said he was a member of the terrorist group.”
In fact, as the Guardian reported today, “Mr. Jahmi’s age” was 13 on the day the American drone ended his life. Just months earlier, the Yemeni teenager told that paper that “he lived in constant fear of the ‘death machines’ in the sky that had already killed his father and brother.” It was 2011 when “an unmanned combat drone killed his father and teenage brother as they were out herding the family’s camels.” In the strike two weeks ago, Mohammed was killed along with his brother-in-law and a third man.
-
Mohammed Tuaiman becomes the third member of his family to be killed by what he called ‘death machines’ in the sky months after Guardian interview
-
At least part of the reason for this is that many American officials have continued in Bush’s tradition of defining the U.S. conflict with extremist Middle Eastern groups as a grand civilizational and religious battle, thus playing in to the same sharply polarizing narrative those groups seek to promote.
-
On Sunday night, a series of YouTube videos appear to show a large explosion in Donetsk, Ukraine (several can be watched here). However, it wasn’t a “tactical nuclear weapon,” as some social media users claimed, but just a big blast–reportedly Ukrainian army artillery fire hitting an ammunition depot held by the rebel Donetsk People’s Republic.
-
Transparency Reporting
-
…in-depth look at the vital role of whistleblowers in ensuring public safety and government accountability.
-
British police are reviewing the operation to guard WikiLeaks founder Julian Assange, the UK’s most senior officer has said.
Metropolitan Police Commissioner Sir Bernard Hogan-Howe told LBC radio that the force is assessing its options due to the pressure the operation at the Ecuadorian embassy in London is putting on resources.
“We won’t talk about tactics but we are reviewing what options we have. It is sucking our resources,” he said.
-
Environment/Energy/Wildlife
-
Harper, who assumed office in 2006 and who has been a staunch supporter of Canada’s tar sands industry, has tried to silence activists who speak out against the industry. But he hasn’t stopped there: his administration has been accused of muzzling its scientists and meteorologists in an attempt to stop certain information on climate change or environmental issues from reaching the public. Under Harper, Canada withdrew from the Kyoto Protocol — which the prime minister once referred to as a “socialist scheme” — in 2011 and cut about 500 jobs from the Department of Fisheries and Oceans in 2013. The government also closed seven scientific libraries in 2014.
-
Finance
-
Given this lopsided distribution of income gains, it’s not irrational for people who make quite a bit more than the median income to identify with the middle class and applaud policies that are aimed at curbing the accumulation of wealth by the super-wealthy. But Edsall’s argument for the failure of middle-class populism depends on better-off voters who think of themselves as middle class not really being middle class–and knowing somehow that when politicians talk about the “middle-class,” they aren’t talking about them.
-
-
McKinsey, one of the world’s preeminent business consultants, released a sobering new report this week detailing that, worldwide, total debt has risen by 40.1 percent — or $57 trillion — since the financial crisis of 2008. “Debt,” here, can mean many things: debt to other countries and international institutions, as in Greece and Italy, which were bailed out by the troika; it also means debt to financial institutions, or household and personal debt of the kind those of us paying off mortgages, medical debt or student loans here in the states know all too well. It all means bad news for the economy.
-
On Wednesday, the European Central Bank announced that it would no longer accept Greek government debt as collateral for loans. This move, it turns out, was more symbolic than substantive. Still, the moment of truth is clearly approaching.
-
Half of our nation, by all reasonable estimates of human need, is in poverty. The jubilant headlines above speak for people whose view is distorted by growing financial wealth. The argument for a barely surviving half of America has been made before, but important new data is available to strengthen the case.
-
PR/AstroTurf/Lobbying
-
An upcoming House Oversight Committee hearing features two conservative media darlings infamous for their anti-immigrant rhetoric and peddling misinformation about voter fraud and election law.
-
I don’t know that there’s anyone who seriously argues that there’s any actual doubt that Israel has nuclear weapons; if there were any lingering questions, they were resolved by the revelations of Mordechai Vanunu, a whistleblower who exposed details of Israel’s nuclear warhead lab in 1986 and was imprisoned by Israel for 18 years as punishment. Later on in the piece, in fact, the Times notes that “the Arms Control Association, a research group in Washington, says Israel is believed to have 100 to 200 warheads.”But it’s still treated as claim to be attributed to a source rather than a verified fact.
-
A hundred and fifty plus 72 is 222 congressmembers, or 51 percent of the House of Representatives. That’s a pretty big “fringe.”
-
Censorship
-
Mr Galloway has used his Twitter account to claim he was the victim of a “lynch mob”. He encouraged his supporters to call the BBC and complain about the treatment he received.
-
Galloway has complained about the BBC and Freedland’s behaviour, accusing the broadcaster of setting him up. He has written a scathing piece about his experience here.
-
Privacy
-
Fitness trackers and even Samsung televisions are becoming more advanced, and that data can inadvertently reveal sensitive things we never meant to make public
-
On Tuesday, former Florida governor Jeb Bush published Volume 1 of an e-book detailing all of his official correspondence while in gubernatorial office. Although the e-book is edited and e-mail addresses have been redacted, the Governor’s Office also published six Outlook files full of all of Bush’s unredacted correspondence—creating a trove of full names connected with personal e-mail addresses, home addresses, phone numbers and even social security numbers, as The Verge first reported.
[....]
The scope of the e-mails is vast and includes everything from automated messages to brief summaries of the state of Cuban refugees who arrived on Florida’s shores to oddly personal e-mails from constituents. Some e-mails include correspondence that had not been addressed to Bush originally but showed up when part of an e-mail was forwarded to him. Other e-mails include personal information about people who aren’t involved in the e-mail thread at all. “Did you get this? Eric’s wife is being induced tomorrow a.m. so we’ll be out of town for a while. Merry Christmas and Happy New Year to you and your family!” one cheerily reads.
-
The Electronic Frontier Foundation filed a lawsuit Monday in order to learn more about the United States Marshals Service’s use of airborne cell-site simulators.
The San Francisco-based advocacy group filed a Freedom of Information Act (FOIA) request with the Department of Justice (DOJ), the USMS’ parent agency, shortly after the revelations came to light in November 2014. However, the DOJ has not produced any responsive documents and has long exceeded the 30-day deadline as defined under the FOIA law.
In the suit, which was filed in federal court in Washington, DC, the EFF asks the court to compel the DOJ to immediately produce the documents. The DOJ did not immediately respond to Ars’ request for comment.
-
Mark Zuckerberg isn’t the only one in Silicon Valley with Craigslist envy. A decade ago, Google tried to meld classified ads with other crowdsourced content in a website called Google Base. The service never took off, and it now redirects to a site soliciting retailers to list on Google’s shopping search engine. Along with the big companies, countless startups have set out to make prettier, more functional versions of Craigslist, only to fail.
-
If you’ve ever filed a public records request with your local police department to learn more about how cell-site simulators are used in your community—chances are good that the FBI knows about it. And the FBI will attempt to “prevent disclosure” of such information.
Not only can these devices, commonly known as “stingrays,” be used to determine a phone’s location, but they can also intercept calls and text messages. During the act of locating a phone, stingrays also sweep up information about nearby phones. Last fall, Ars reported on how a handful of cities across America are currently upgrading to new hardware that can target 4G LTE phones.
-
The U.S. Government often warns of increasingly sophisticated cyberattacks from adversaries, but it may have actually contributed to those capabilities in the case of Iran.
A top secret National Security Agency document from April 2013 reveals that the U.S. intelligence community is worried that the West’s campaign of aggressive and sophisticated cyberattacks enabled Iran to improve its own capabilities by studying and then replicating those tactics.
The NSA is specifically concerned that Iran’s cyberweapons will become increasingly potent and sophisticated by virtue of learning from the attacks that have been launched against that country. “Iran’s destructive cyber attack against Saudi Aramco in August 2012, during which data was destroyed on tens of thousands of computers, was the first such attack NSA has observed from this adversary,” the NSA document states. “Iran, having been a victim of a similar cyber attack against its own oil industry in April 2012, has demonstrated a clear ability to learn from the capabilities and actions of others.”
-
Civil Rights
-
Aftenposten, one of the largest newspapers in Norway, today report that three of the nude body scanners now is put to use at Gardermoen, the main airport in Norway. This way the travelers can have their body photographed without cloths when visiting Norway. Of course this horrible news is presented with a positive spin, stating that “now travelers can move past the security check point faster and more efficiently”, but fail to mention that the machines in question take pictures of their nude bodies and store them internally in the computer, while only presenting sketch figure of the body to the public. The article is written in a way that leave the impression that the new machines do not take these nude pictures and only create the sketch figures. In reality the same nude pictures are still taken, but not presented to everyone. They are still available for the owners of the system and the people doing maintenance of the scanners, as long as they are taken and stored.
-
Manning was sentenced to 35 years in prison in 2013 after being convicted of leaking classified national security documents to WikiLeaks.
-
Newly declassified documents from the FBI reveal how the US federal agency under J Edgar Hoover monitored the activities of dozens of prominent African American writers for decades, devoting thousands of pages to detailing their activities and critiquing their work.
-
Internet/Net Neutrality
-
Google has decided to mothball its home-grown SPDY internet application-layer protocol in future versions of its Chrome browser, in favor of the Internet Engineering Taskforce’s HTTP/2 spec.
-
Intellectual Monopolies
-
Copyrights
-
Today it was revealed that a Swedish prosecutor is trying to force the .SE registry, via a court case, to ban ThePirateBay.se and PirateBay.se from being in use. He even wants to go so far as to claim the domains for the state in order to put up a ‘stop’ logo on them.
-
RapidShare, once the most popular file-hosting service in the Internet, has announced that it will shut down next month. The company doesn’t cite a reason for the surprising shutdown, but losing the majority of its users in recent years after the implementation of tough anti-piracy measures is likely to be connected.
[...]
RapidShare fought many legal battles with entertainment companies seeking to hold the company liable for the actions of its users, and to top it off the site was called out by the U.S. Government as a “notorious market.”
-
Andrus Nomm, one of the seven Megaupload employees indicted by the United States, has been arrested. The U.S. authorities have yet to comment on the arrest of the programmer but Megaupload lawyer Ira Rothken believes that he may have cut a deal with the FBI.
Permalink
Send this to a friend
02.10.15
Posted in News Roundup at 7:47 am by Dr. Roy Schestowitz

Contents
-
Desktop
-
There’s been a lot of interesting Linux news of late. Not just GNU/Linux, but all types of Linux, Android, Chrome OS, Firefox OS, embedded (IoT), cloud computing, cars, TVs, just about anything you can think of. But truth be told, I’d like to see more Linux on the desktop — just as Linus Torvalds said he would like to see that.
The recent purchase of a Chromebook for my son got me thinking about a new opportunity for Linux on the desktop. This is not an idea for getting a standard GNU/Linux desktop to automagically replace all existing Windows desktops, but to leverage the cloud computing paradigm with a bulked-up Chromebook-like system that would be workable for 80 to 90 percent of personal, school, and business needs.
-
Kernel Space
-
The latest open-source desktop program making optional use of systemd is the popular VLC media player.
As of this morning, there’s now a native logger module for the systemd journal within VLC.
-
Last Sunday when releasing Linux 3.19-rc7, Linus Torvalds mentioned he was looking at doing the official 3.19 release in one week. It seems to have been a relatively calm week to end out 3.19 development with no nasty regressions turning up, so chances are in a few hours he’ll have the new release out the door.
-
The Linux 3.19 kernel was tagged in Git close to an hour ago now. Surprisingly, as of writing this news post, Linus Torvalds has yet to issue any Linux 3.19 release announcement but things went according to plan as per last week with the plans for 3.19 final.
-
News of the release emerged in a typically economical Sunday evening post to the Linux Kernel Mailing List, in which Torvalds noted there are still a couple of bugs in this release but they were pretty obscure so “… while I was tempted a couple of times to do an rc8, there really wasn’t any reason for it.”
-
Good news for all users of a GNU/Linux operating system, as Linus Torvalds announced the immediate availability for download of the Linux 3.19 kernel, which brings interesting features, the usual bugfixes, and general performance improvements.
-
As the AllSeen Alliance’s senior director of IoT, Philip DesAutels (shown) works with Alliance members to advance the Internet of Everything by building out an open source software framework, AllJoyn, to seamlessly connect a range of objects and devices in homes, cars and businesses. He oversees and guides all aspects of the Alliance, from governance and technology, to the developer community and marketing efforts.
-
It looks like the infrastructure to facilitate live kernel patching will be added to the Linux 3.20 kernel, the result of collaboration for SUSE’s kGraft and Red Hat’s Kpatch.
Last year SUSE and Red Hat introduced their own live kernel patching mechanisms after not knowing each company was independently working on a solution for patching running versions of the Linux kernel against basic security/bug fixes. In the months since the unveiling of kGraft and Kpatch, the kernel developers have been working together to come up with a common base that addresses the needs of each implementation. That common work for supporting Kpatch and kGraft is now what’s ready for merging into Linux 3.20.
-
-
Today in the Linuxsphere the systemd controversy doesn’t seem to be subsiding as the main reason for it is no more. Jim Zemlin blogged about The Linux Foundation’s efforts to save small but key projects from starving to death as well as contributing to the security process. Speaking of security, a new trojan has been identified that can open backdoors on Linux servers that can, among other things, participate in DDoS attacks. Matt Hartley shares his list of the best software ever for Linux and Leif Lodahl declares LibreOffice better than the competitors.
-
The HID subsystem work for Linux 3.20 includes improvements to the Logitech HID++ protocol implementation, support for composite RMI devices, a new driver for the BETOP force feedback controller, new hardware support in the Wacom driver, and various fixes. The fixes and new device ID additions are “all over the place” for HID drivers.
-
Benchmarks
-
While my full Linux review of the NUC5i3RYH / Core i3 5010U will come in the days ahead on Phoronix, this weekend I uploaded some preliminary benchmark data for those curious. The Intel Core i3 5010U features a dual-core processor with Hyper Threading and is clocked at 2.1GHz for its frequency without Hyper Threading. The i3-5010U has a 15 Watt TDP, 3MB cache, and supports DDR3L/LPDDR3 1600/1333MHz memory. The graphics processor is Intel HD Graphics 5500 with a maximum frequency of 900MHz.
-
For any Intel Haswell Linux users with Iris Graphics thinking of switching to the Linux 3.19 kernel when it’s released in what might just be a few hours, be forewarned as testing this weekend revealed there looks to be an OpenGL performance regression attributed to this new kernel.
-
Applications
-
Version 7.6.0 of the powerful MKVToolNix software is now available for download, still providing computer users with one of the best collection of tools for analyzing, converting, merging, and splitting Matroska (popularly known as MKV) files on GNU/Linux, Mac OS X, and Microsoft Windows operating systems.
-
For hardcore geeks, Common UNIX Printing System or simply CUPS is an open-source printing layer for UNIX-like operating systems, including GNU/Linux, BSD (FreeBSD, OpenBSD), Solaris, Mac OS X, and Microsoft Windows. For end users, CUPS is that piece of software that lets them add printers, manage printers, as well as print documents on their computers.
-
The Oyranos library became quite slower during the last development cycle for 0.9.6 . That is pretty normal, as new features were added and more ideas waited for implementation letting not much room for all details as wanted. The last two weeks, I took a break and mainly searched for bottlenecks inside the code base and wanted to bring performance back to satisfactory levels. One good starting point for optimisations in Oyranos are the speed tests inside the test suite. But that gives only help on starting a few points. What I wished to be easy, is seeing where code paths spend lots of time and perhaps, which line inside the source file takes much computation time.
-
Over the years, there have been a number of claims that the Linux desktop is lacking in terms of good, highly useful software. Today, I’m aiming to put this myth to bed once and for all. Continue reading for my list of the top ten best applications for Linux.
-
It is my pleasure to finally release Icemon 3.0 to the public. If you don’t know it — Icemon is a GUI monitor for Icecream, a distributed compiler system.
-
-
Instructionals/Technical
-
-
-
-
-
-
Under a superficial examination, the Pebble doesn’t exactly look like an ideal device for gaming. If we look at its puny 80MHz processor, which is paired up with a monochrome e-paper screen, the display does not only lack the ability to display colour but is furthermore not particularly well suited to frequently updating content. The Pebble also interacts with its user via a grand total of four buttons, one of which cannot be accessed easily by third-party applications.
-
Years ago, I worked for an automotive IT provider, and occasionally we went out to the plants to search for rogue Wireless Access Points (WAPs). A rogue WAP is one that the company hasn’t approved to be there. So if someone were to go and buy a wireless router, and plug it in to the network, that would be a rogue WAP. A rogue WAP also could be someone using a cell phone or MiFi as a Wi-Fi hotspot.
-
One of the most popular articles on this site shows how to install Ubuntu and Minecraft on the HP Chromebook.
Some people have found the guide difficult to follow and so I have decided to rework it and I also retested all the steps to make sure they work correctly.
This guide shows how to install Ubuntu with the Unity desktop on a HP Chromebook using Crouton.
-
Recently I have spent a lot of time with Linux iSCSI Target software solutions. After using iSCSI Enterprise Target (IET) (not active), the Linux SCSI Target framework (TGT), and the generic SCSI Target Subsystem (SCST), I have come to the realization that SCST definitely stood out as the most superior of the bunch and with good reason. It is also the most storage industry supported of iSCSI Target solutions.
-
Games
-
Within a short period, two people showed up with proposals for games for inclusion with GNOME 3.16. One is a 2048 clone, the other is a revival of Atomix (last maintenance was GNOME 2.14). Both proposals seem to be maintained by just one person.
-
As a story-based adventure it’s a decent attempt, even if it has some omissions or streamlining that work against its overall purpose. It’s not the finest thing ever to grace the screen of my lowly Pentium 4, but I wouldn’t mind trying it again, just for fun.
-
Dead Island has been patched to fix multiple issues in the Linux version, so it looks like it’s properly playable now months after release. It may have taken over 3 months for the game to get these fixed, but it’s good to see the port wasn’t forgotten about as we thought previously.
-
Desktop Environments/WMs
-
LXQt 0.9.0 has been released, dropping compatibility with Qt 4 and setting the minimum version required to be Qt 5.3. This release features lots of internal cleanups and refactorings which should make it faster. The release also utilise KDE Frameworks for the first time, KWindowSystem replaces the XFitMan library, KGuiAddons replaces a dependency on xlib in lxqt-panel.
-
Version 0.9 of the lightweight LXQt desktop environment was released this Sunday. LXQt is the next-generation, lightweight desktop derived in part from the LXDE and Razor-Qt desktops. LXQt 0.9 is the release that begins to enforce Qt5.
LXQt 0.9 abandons Qt4 compatibility and now requires Qt 5.3 or newer. LXQt 0.8 that was released last October had full Qt5 support while maintaining Qt4 compatibility, but this new version focuses exclusively on modern Qt5 library support.
-
Three days after the official announcement of Manjaro Linux 0.8.12, a point release that brings only a couple of changes, such as out-of-the-box support for Microsoft’s exFAT filesystem and Pacman 4.2 package manager, the Manjaro community released today the LXQt edition of the acclaimed Arch Linux-based computer operating system. At the moment of writing this article, only the 32-bit Live image was available for download, but that’s more than enough for us to take a quick screenshot tour of the release.
-
After three months of development work we are proud to announce the release of version 1.13 of EFL, Elementary, Evas Generic Loaders and Emotion Generic Players.
In this 12 weeks we got over 700 commits from 68 authors in EFL alone. Doing 111275 line insertions and 28292 line deletions. Elementary has another 370 commits by 48 authors.
-
-
K Desktop Environment/KDE SC/Qt
-
I started off my Project under Season of KDE 2014 with a motive to design and revamp KDE’s own blog aggregator, PlanetKDE. Initiated by my mentor Jonathan Riddell, back in 2008, this website did an amazing job of scraping off content from KDE’s bloggers.
-
Plasma 5 has the potential to revitalize the Linux world, it’s that important and meaningful. Of course, we must not forget that applications play their critical role, but if you need to sell your product, the first look, the very first impression is important. And in that regard, Plasma has everything to gain and lose. After what happened with Gnome, it’s the one remaining bastion of sanity in the Linux desktop world. And so we begin.
-
A 15 minute review of the forthcoming Plasma 5 distro
-
I’ve never really had the time to explore KDE Plasma 5 since it was released back in July 2014. I’ve played with it a bit, but not much.
Now that it’s at version 5.2 and at that stage when its deemed almost ready for primetime, that is, ready to replace all aspects of KDE Plasma 4, I decided to kick the tires a little bit harder.
To do that, I had to download and install an ISO image of a release candidate of KaOS – KaOS-kf5 ISO 2015.01.25.
KaOS is a KDE-centric Linux distribution that uses a rolling release development model. It was inspired by Arch Linux and uses that distribution’s package manager. Tt also makes use of the Calamares graphical installer, which I wrote about recently (see Calamares will be the graphical installer on the next OpenMandriva edition).
-
GNOME Desktop/GTK
-
Dear GNOME community, you all owe Krzesimir Nowak, Andrea Veri, and Olav Vitters some icecream and drinks: The Bugzilla software running on bugzilla.gnome.org has been upgraded to the latest stable version available.
-
-
We’ve had some fairly high profile Linux distros fold up their tents and move along. Whether due to a lack of financial support or the project growing larger than a one man dev team can manage, distros do go away. It’s never for a good reason but the fact remains: When a distro ceases to exist, a lot of people get left in the lurch.
-
Reviews
-
It has been a while since I reviewed Manjaro Linux. In fact, my last review of it was almost 2 years ago. Since then, I have seen a lot of news about how much it has grown and how good it has gotten. I figured I should give it another review.
For those who don’t remember, Manjaro is a distribution that based on Arch Linux. It maintains a rolling-release base, and it is compatible with most Arch repositories, though some of its repositories are its own. It officially supports KDE and Xfce, though community editions exist for other DEs as well.
-
From a practical point of view, I’m sure most people will stick with running either Arch Linux or vanilla FreeBSD. However, as an experiment into what is possible, ArchBSD does provide us with something interesting, something a little different. With some work to flesh out the documentation and more volunteers to keep the base operating system up to date, I think ArchBSD could be a viable server operating system.
-
New Releases
-
After two years of development, Offensive Security, the creator of the famous BackTrack Linux distribution, has announced today, February 9, that the first point release for its Kali Linux computer operating system designed for penetration testing and digital forensics operations is now available for download.
-
PCLinuxOS/Mageia/Mandriva Family
-
News from OpenMandriva has it that the next release of the distribution will feature the Calamares graphical installer.
Calamares is a “distribution independent installer framework” that features a modular design with 25 modules already implemented. It has plugin interfaces for C++, Python and a generic process, and an advanced partitioning tool with support for DOS and GPT partition tables.
-
Red Hat Family
-
-
-
Fedora
-
The short story is that I didn’t do many tweaks to my GNOME 3.14 desktop and it’s going well. Fedora 21 with GNOME 3.14 is running well for my X1 Carbon connected to this affordable 4K monitor. The only tweaks made were enabling icons on the GNOME Shell desktop (to get closer to my original workflow) and allowing thumbnails on images greater than 10MB (with the many original DSLR photos for Phoronix articles being 15MB+).
-
Derived from Fedora 21 and powered by the pursuit of perfection, dedication and freedom, the final version of Korora 21 computer operating system is here, available for download in four separate editions with the Cinnamon, KDE, GNOME, and Xfce graphical desktop environments, as announced by its developer Chris Smart on the project’s website.
-
It has taken a few weeks longer than we had hoped, but we’re finally happy to announce that the final release of version 21 (codename “Darla”) is now available for download (we strongly recommend using BitTorrent).
-
-
-
-
-
-
Debian Family
-
The issue is the same as I have with the boot-times for my desktop PC, systemd makes assumptions that break Debian systems. In my case, systemd insists on every other service starting and running before attempting to start X, the thing I want up ASAP. In the case of the bug reported above, how the system time was handled over a reboot is changed with systemd. The old behaviour was that the clock was stored and retrieved so things survived reboots nicely. No more. Poettering et al have decided that time should be set by NTP or other means and systemd should not have anything to do with that although systemd is replacing the old init that did… BREAKAGE!!! Now I know why Linus swears so much! If a change to systemd breaks user’s systems, it’s a bug in systemd, not that the world needs to change to be the way Poettering wants. Putting folks who break things in charge of millions of systems is a tragedy of huge proportions. People should not have to rewrite init scripts to switch to systemd. Otherwise, systemd should get the Hell out of our way… or go away…
-
For years, I used to run Debian sid (unstable) on all my personal machines. Laptops, workstations, sometimes even my personal servers years ago ran sid. Sid was, as its name implies, unstable. Sometimes things broke. But it wasn’t a big deal, because I could always get in there and fix it fairly quickly, whatever it was. It was the price I paid for the latest and greatest.
-
Derivatives
-
Philip Newborough, aka @corenominal, posted his decision to stop work on the distro last Friday.
“I’m leaving it behind because I honestly believe that it no longer holds any value, and whilst I could hold on to it for sentimental reasons, I don’t believe that would be in the best interest of its users, who would benefit from using vanilla Debian,” he wrote.
CrunchBang’s a Debian variant optimised for the desktop and back in 2009 we rated it a contender for use on Netbooks. Newborough wanted it that way: his aim was to create a lightweight distro at a time few existed.
-
-
Canonical/Ubuntu
-
After nearly two years of development, Canonical has confirmed that the first Ubuntu smartphone is scheduled to go on sale in Europe starting next week.
-
Two years after its initial announcement, Canonical will finally release its Ubuntu Phone in Europe during the coming week.
-
Remember the Indiegogo campaign that popped up back in 2013 for the Ubuntu Edge smartphone? If not, it’s okay; it’s just important to know that it happened. At the time, Ubuntu for phones and a Ubuntu smartphone was a pretty big deal. Ubuntu, an already popular open-sourced operating system for computers, had arguably the best potential to become the “fifth” major operating system in the smartphone industry. Unfortunately, the goal needed for the Ubuntu Edge crowdfunding campaign, which was $32 million, was never reached (although it did manage to earn a staggering $12.8 million).
-
-
Canonical is all set to release its first Ubuntu-based smartphone in partnership with Spain’s BQ, a company known for making ebook readers, smartphones and tablets in Europe. The smartphone, named Aquaris E4.5, has till date been available with Android 4.4 KitKat OS, and will now be released in a new version running Ubuntu OS for phones, which has previously also been called Ubuntu Touch OS. The smartphone is dubbed the BQ Aquaris E4.5 Ubuntu Edition.
-
As you may know, Folder Color is an open-source app that allows the users to easily color their folder icons, initially created for Nautilus.
-
The already crowded mobile operating system market has a new entrant—Ubuntu. The open-source Linux operating system, which has been running on PCs and servers for years, is now available in a smartphone known as the BQ Aquaris E4.5 Ubuntu Edition. The Aquaris E4.5 is not necessarily an impressive device. The smartphone looks like most other devices on the mobile market shelves and comes with standard components one would expect from midrange handsets. But that might not matter. It’s the operating system that makes the smartphone unique in the marketplace. The Aquaris will only be available in Europe, and it’s not expected to be a huge seller even on that continent, but it will be viewed as a test that prompts other smartphone makers to think about using Ubuntu Linux as their mobile operating system. They will want to see how customers respond to the first model to see if there is a future for Canonical’s operating system on mobile devices. This slide show takes a look at the Aquaris E4.5 to see how it might fare in the market and to see what is in the device that could potentially attract buyers in an increasingly crowded mobile space.
-
The “age of Aquaris” is now here as a long-awaited Linux mobile device becomes reality with the BQ Aquaris E4.5 Ubuntu Edition smartphone.
-
-
-
-
-
-
-
-
-
THE first Ubuntu smart phone goes on sale in Europe in the next few days, but early reports suggest that very few people outside the continent will get to see or buy one any time soon. This is a bit of a disappointment for dyed-in-the-wool Ubuntu users who have waited eagerly to see how well their operating system of choice runs on a mobile device.
-
Flavours and Variants
-
Six months after the first beta, elementary OS Freya beta 2 was released yesterday. Based on Ubuntu 14.04 LTS (which is supported until April 2019), Freya beta 2 comes with various UI improvements, UEFI/SecureBoot support along with other interesting changes as well as almost 600 bug fixes.
-
-
After six months of hard work, the development team behind one of the most beautifully designed GNU/Linux operating system in the world, elementary OS, happily announced on February 8 the immediate availability for download of the second Beta for the forthcoming Freya (version 0.3) release with over 600 fixes, but still based on Ubuntu 14.04 LTS (Trusty Tahr).
-
The Elementary OS team has announced the release of second beta of their upcoming Feya. The release comes six months after the first beta and packs a lot of features such as UI improvements, new apps and 600 bug fixes.
This is the last beta. Elementary OS team says that the next release will be a release candidate, which will be a ‘cleanup and details release’ where amongst other things, translators will help ready the release for worldwide consumption.
-
-
-
-
Merrii announced a high end, Android- and Linux-ready “H88 Hummingbird” SBC based on the octa-core Cortex-A15/-A7 Allwinner A80 SoC.
The second-generation Raspberry Pi 2 managed to maintain its $35 price despite moving to a quad-core Cortex-A7 system-on-chip, but faster, pricier quad- and octa-core ARM SoCs haven’t seen as much traction in the single board computer scene. Yet, just as we’ve seen a lot of SBCs based on the Cortex-A7 based Allwinner A20 or Cortex–A9 based Allwinner A31, several companies and community projects are now trying out the octa-core Allwinner A80. The A80 combines four Cortex-A15 and four Cortex-A7 cores in a Big.Little configuration.
-
-
Linaro has launched an open-source spec for ARM SBCs called “96Boards,” first available in a $129 “Hikey” SBC, featuring a Huawei octa-core Cortex-A53 SoC.
Linaro, the ARM-backed not-for-profit engineering organization that has aimed to standardize open source Linux and Android software for Cortex-A processors, is now trying to do the same thing for hardware.f Linaro, which is owned by ARM and many of its top system-on-chip licensees, has launched 96Boards.org, a cross between a single board computer hacker community and an x86-style hardware standards organization.
-
Phones
-
Tizen
-
-
Russia’s Minister of Communications and Mass Media, Nikolai Nikiforov, has announced that his administration is to support the development of open-source IT software by awarding grants to developers who produce applications which run on platforms other than Google’s Android and Apple’s iOS.
-
-
-
-
-
-
-
-
-
Samsung has been arguably the most popular Android manufacturer over the past few years, which would make sense given that the South Korean company has several different lines of Android devices. You have the Samsung Galaxy S, Samsung Galaxy Note, Samsung Galaxy Alpha, Samsung Galaxy Zoom, Samsung Galaxy Mega… the list goes on (and on, and on…) The bottom line here is that Samsung and Google make a pretty good team when you look at the numbers.
-
South Korea-based Samsung has just begun domestic sales of high-end televisions with a smart interface powered by its own Tizen operating system.
It is part of a wider push by the consumer electronics firm to incorporate the software in a wide range of its home products – everything from fridges and washing machines to robotic vacuum cleaners.
-
Android
-
It would be something of an understatement to say that the smartphone market is hot: it has clearly taken over from the desktop sector as the mainstream that defines the direction of computing. That’s good news for open source, since it means Windows is increasingly irrelevant as far as the future is concerned. Android, of course, is dominating this sector, but nothing stays still: there will, one day, be an “after Android” – so who will be the key player(s) there?
Not, I fear, Tizen. Although to begin with I hoped this might develop into a strong alternative to Android, that is clearly not to be. I’ve not written much about it here, since it seems to spend most of its time merging with other projects and re-branding itself. This article has an excellent representation of how Tizen has evolved over the years; it also reviews the first Tizen phone, from Samsung, concluding.
-
But companies are indeed bothering to make new designs and try different approaches to the tried and true tablet formula. The latest of which is Dell, which recently launched the clumsily named Venue 8 7000 Series (I’m just going to call it the Venue 8). The $399 Venue 8 is part of a design renaissance at Dell (along with the new XPS 13 laptop), showcasing premium materials and killer displays. It also acts as a vehicle for some never-before-seen mobile technologies from Intel. There are really two things that matter with the Venue 8, and they’re why anyone is spending time talking about it: its design and its camera array.
-
Dave Hakkens is the founder of Phoneblocks, an initiative that supports and pursues the creation of modular hardware for cellular phones to reduce electronic waste (e-waste) and increase efficiency. In this interview, Dave shares the story of what brought him to this mission and what he believes the future holds for one of our most treasured devices, the phone.
-
Netflix has developed a platform, using soon-to-be open source tools, that probes for vulnerabilities and monitor data leakage.
One initiative dubbed the “Dirty Laundry Project” monitors for Netflix assets unintentionally exposed by its staff.
-
Network monitoring is a key component in making sure your network is running smoothly. However, it is important to distinguish between network monitoring and network management. For the most part, network monitoring tools report issues and findings, but as a rule provide no way to take action to solve reported issues.
-
We found all four products to be capable network monitoring tools that performed well in our basic tasks such as checking for host availability and measuring bandwidth usage. Beyond the basics, there were quite a few differences in terms of features, granularity and configuration options.
-
I’ve been designing and developing commercial software for more than 30 years, and I’m pleased to announce that for the first time, some of my software has been released as a new open source project. For open source at Dell, it’s a Java project called Mensa.
-
Events
-
SaaS/Big Data
-
-
ownCloud reached version 8 today, February 9, 2015. We’re talking about the ownCloud Server, a powerful, open-source, free, and self-hosted file sharing solution that offers easier and faster file syncing and sharing functionality, along with numerous other attractive features. ownCloud Server is considered by many a Dropbox replacement and it is distributed in two editions, ownCloud Community Edition and ownCloud Enterprise Edition.
-
When you put your data in the public cloud — whether it be Dropbox, Google Drive, OneDrive, iCloud, or other services. It’s dictated by the terms and services of the service provider and is subject to laws that may give the government full access to your data without giving you the slightest hint of any compromise.
-
VMware has remained in the news cycle since its announcements on the cloud computing front last week. In a blog post, the company announced the launch of VMware Integrated OpenStack, which, notably, is available for use, free of charge, with VMware vSphere Enterprise Plus, vSphere with Operations Management Enterprise Plus and all editions of vCloud Suite. The company is also pushing its vision of “one cloud, any app, any device.”
-
Oracle/Java/LibreOffice
-
With the recent release of LibreOffice 4.4 there was a significant bump in compiler requirements in order to begin allowing LibreOffice developers to use basic C++11 functionality. Going forward, the compiler requirements will continue to rise as the developers of this open-source office suite seek to utilize more modern C++ features.
-
Let’s have a look at some of the areas where LibreOffice is actually BETTER than the competitor Microsoft Office.
-
CMS
-
It goes without saying that WordPress is big — the Goliath of free and open source content management systems (CMS). WordPress is the number 1 CMS system currently in use, and increased its usage on more than 2 million domains since June 2014.
-
Funding
-
This past week the person who manages one of the world’s most important cryptography projects, Werner Koch, went from going broke to raising more than $100,000 for his project, GNU Privacy Guard. This is in addition to the $60,000 The Linux Foundation’s Core Infrastructure Initiative (CII) dedicated to Werner last month. GnuPG is used not just to encrypt and authenticate email but provides the confirmation that software packages and releases are what they claim to be. Facebook, Stripe and others are answering the calls to support the individuals who are developing the world’s most critical digital infrastructure.
-
In 2014, OpenSSL had a gigantic security problem: Heartbleed. Its root cause? A combination of blind trust in the open-source programming method and a shoe-string budget. Less than a year later Werner Koch, author and sole maintainer of the popular Gnu Privacy Guard (GnuPG) email encryption program, revealed he was going broke supporting GnuPG.
Koch’s story had a happy ending. First, The Linux Foundation, via its Core Infrastructure Initiative (CII), donated $60,000 to GnuPG. Then, e-payments vendor Stripe and Facebook agreed to sponsor the program’s development to the tune of $50,000 a year.
-
-
-
BSD
-
With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD.
-
FSF/FSFE/GNU/SFLC
-
We provide “patchsets” to stable releases. Patchsets allow quick bug fixes and updates for production systems.
-
Project Releases
-
-
The Postfix open-source mail server software reached the big 3.0 milestone on Sunday with various improvements to this Sendmail alternative.
The release of Postfix 3.0.0 stable brings SMTP UTF8 support for internationalized domain names and address local parts, support for Postfix dynamically-linked libraries and database plug-ins, support for operations on multiple look-up tables, support for pseudo-tables, table-driven transformations of DNS lookup results, an improved configuration file syntax, and per-session command profiles.
More details on Postfix 3.0 can be discovered from Postfix.org.
-
A new releases of the RPushbullet package (interfacing the neat Pushbullet service) arrived on CRAN today.
It brings several weeks of extensions, corrections and cleanups—with key contributions by Mike Birdgeneau and Henrik Bengtsson.
-
Public Services/Government
-
The Greek region of Attica, encompassing Athens, is considering a switch to free and open source solutions. Representatives of the regional authority discussed the move with the Greek Free/Open Source Software society. GFOSS has offered to help modernise Attica’s ICT policies.
-
A new open source, online collaboration tool will allow Defense Department employees to easily and securely web conference and instantly chat from anywhere around the world.
The Defense Information Systems Agency is expanding the capability called Defense Collaboration Services, or DCS, across the department, according to a Feb. 6 press release from the Air Force.
-
Openness/Sharing
-
Open Hardware
-
With the rise of distributed manufacturing of 3D printing, hardware designs released under open source licenses are increasing exponentially. These designs—for everything from phone cases to prosthetic hands for children—can have an enormous value for those who need and want them.
[...]
The results of Pearce’s case study analysis were shocking. “Millions of dollars of value can be created by designers if they share their work under open licenses, says Pearce. “For individuals or funding organizations interested in doing the most good and maximizing value for the public it is clear that supporting open designs should be a top priority.”
-
Makers, developers and hobbyists looking to add networking functionality to their projects in the form of NAS, VPN and Firewall features may be interested in a new piece of open source hardware called the ONetSwitch developed by MeshSr.
-
One day the robots may rebel against humans, taking control of the world and turning us into a relatively green source of energy. But today is not that day, even if one such robot did “attack” its owner in South Korea.
-
To most outside observers, the collapse of RadioShack Corp. was set in motion years, if not decades, ago.
-
Security
-
Seen on an ATM in Hong Kong airport.
-
If you’re one of the unlucky 80 million Anthem customers whose Social Security number, salary, and other sensitive data were stolen by hackers, the most basic step to protect yourself is to set up a fraud alert with the three major credit agencies: Experian, Equifax, or TransUnion.
-
Xnote a new multi-purpose backdoor Linux trojan authored by ChinaZ, converts Linux systems into botnets
[...]
The malware will only be installed in a system if it has been launched with superuser (root) privileges. During installation, the malware creates a copy of itself in the /bin/ directory in the form of a file called iptable6. The malware then tries to hide itself by deleting the original launch file.
-
The backdoor contains a list of control servers within its body, and tries to contact them one by one. Once a connection to one of the servers is established, information is exchanged between them in compressed packets.
-
-
Defence/Police/Secrecy/Aggression
-
• If the video of a prisoner being burned to death displays “a level of brutality shocking even by the standards” of Islamic State, how should we describe the actions of the US and UK around the world? According to a 2012 joint report from the NYU and Stanford University law schools on US drone strikes in Pakistan, “the missiles fired from drones kill or injure in several ways, including through incineration”. Similarly barbaric, in 2008 the Sunday Times reported British forces were using Hellfire missiles in Afghanistan, creating “a pressure wave which sucks the air out of victims, shreds their internal organs and crushes their bodies”.
-
‘I am convinced that there was a direct line between at least some of the terrorists who carried out the Sept. 11 attacks and the government of Saudi Arabia,’ says former senator and commission member
-
Transparency Reporting
-
Michael Ratner says that US government is still pursuing criminal investigations against Wikileaks Editor and staffers, not just because of what they have already released to the public but because of what they still continue to release
-
The man who stole the trove of secret files that sparked a global scandal over banking giant HSBC’s alleged assistance to wealthy tax dodgers called Monday for more protections for whistleblowers.
Herve Falciani, the former HSBC employee behind the so-called SwissLeaks revelations, said far more needed to be done to protect whistleblowers like himself, including financial support.
-
Ecuador prepares a side event for March 19 or 20 in the framework of the 28th Session of the Human Rights Council to deal with the case of WikiLeaks founder Julian Assange who is wanted in Sweden and the US.
-
Environment/Energy/Wildlife
-
Australia’s hottest year on record would not have happened without climate change, according to a new report.
The country experienced its hottest day, month, season and calendar year in 2013, registering a mean temperature 1.2C above the 1961-90 average.
The Climate Council says recent studies show those heat events would have occurred only once every 12,300 years without greenhouse gas emissions from human activities.
-
The UK government has broken a key pledge to support green energy abroad over “dirty” energy projects by spending more than three hundred times as much backing fossil fuel energy compared with clean energy projects via the government’s export credit agency.
-
The sharp decline in honeybees has been linked with a change in the foraging behaviour of young bees brought on by some kind of environmental stress such as parasitic attacks or pesticides, a study has found.
-
One of the biggest jokes in conservation is the Japanese government’s claim to be engaged in “scientific whaling”. All the killing by its harpoon fleet takes place under the guise of “research”, as this is the only justification available, under international rules.
-
Finance
-
Hervé Falciani’s long, strange journey from bank computer expert to jailed fugitive to candidate for office to spokesman for whistleblowers
They almost had him.
On December 22, 2008, Swiss federal police handcuffed 36-year-old Hervé Falciani, a systems specialist they suspected of stealing data from HSBC Private Bank (Suisse), his employer, and trying to sell it to banks in Lebanon. They seized his computer, searched his Geneva home and interrogated him for hours.
Then – on the condition that he return the next day for more questioning – they let him go.
-
According to a report released on Sunday, files analyzed by 140 reporters in the International Consortium of Investigative Journalists (ICIJ) have revealed that British banking giant HSBC provided accounts to international criminals, corrupt businessmen, politicians and celebrities.
“HSBC profited from doing business with arms dealers who channeled mortar bombs to child soldiers in Africa, bag men for Third World dictators, traffickers in blood diamonds and other international outlaws,” ICIJ reported.
-
Britain’s biggest bank helped wealthy clients cheat the UK out of millions of pounds in tax, the BBC has learned.
Panorama has seen thousands of accounts from HSBC’s private bank in Switzerland leaked by a whistleblower in 2007.
They show bankers helped clients evade tax and offered deals to help tax dodgers stay ahead of the law.
HSBC admitted that some individuals took advantage of bank secrecy to hold undeclared accounts. But it said it has now “fundamentally changed”.
-
Secret documents reveal that global banking giant HSBC profited from doing business with arms dealers who channelled mortar bombs to child soldiers in Africa, bag-men for Third World dictators, traffickers in blood diamonds and other international outlaws.
-
HSBC found itself under fire again on Monday after news reports over the weekend provided more details about long-running accusations that its Swiss private banking arm helped clients hide billions of dollars in assets from international tax authorities before 2007.
In a report released on Sunday, the International Consortium of Investigative Journalists, an organization based in Washington, said that secret documents revealed that bank employees had reassured clients that HSBC would not disclose details of their accounts to tax authorities in their home countries and discussed options to avoid paying taxes on those assets. Also contributing to the report were the newspaper Le Monde in France, The Guardian in Britain, the BBC program “Panorama” and CBS News’s “60 Minutes.”
-
The US government will come under intense pressure this week to explain what action it took after receiving a massive cache of leaked data that revealed how the Swiss banking arm of HSBC, the world’s second-largest bank, helped wealthy customers conceal billions of dollars of assets.
The leaked files, which reveal how HSBC advised some clients on how to circumvent domestic tax authorities, were obtained through an international collaboration of news outlets, including the Guardian, the French daily Le Monde, CBS 60 Minutes and the Washington-based International Consortium of Investigative Journalists.
The files reveal how HSBC’s Swiss private bank colluded with some clients to conceal undeclared “black” accounts from domestic tax authorities across the world and provided services to international criminals and other high-risk individuals.
-
Prominent Australian political and business figures are among thousands of people identified as Swiss bank account holders, a cache of leaked documents from the Swiss arm of the HSBC bank shows.
They include the late media mogul Kerry Packer and the former ANZ Bank chairman Charles Goode.
The International Consortium of Investigative Journalists (ICIJ) and the Guardian has accessed data on the accounts, which reveal unprecedented insights into offshore banking with the Swiss arm of the bank.
-
Secret documents reveal that global banking giant HSBC profited from doing business with arms dealers who channelled mortar bombs to child soldiers in Africa, bag-men for Third World dictators, traffickers in blood diamonds and other international outlaws.
-
Team of journalists from 45 countries unearths secret bank accounts maintained for criminals, traffickers, tax dodgers, politicians and celebrities
Secret documents reveal that global banking giant HSBC profited from doing business with arms dealers who channeled mortar bombs to child soldiers in Africa, bag men for Third World dictators, traffickers in blood diamonds and other international outlaws.
The leaked files, based on the inner workings of HSBC’s Swiss private banking arm, relate to accounts holding more than $100 billion. They provide a rare glimpse inside the super-secret Swiss banking system — one the public has never seen before.
-
HSBC’s Swiss banking arm helped wealthy customers dodge taxes and conceal millions of dollars of assets, doling out bundles of untraceable cash and advising clients on how to circumvent domestic tax authorities, according to a huge cache of leaked secret bank account files.
-
Some projections endorsed by the European Commission point to positive, though negligible, gains in terms of GDP and personal incomes. Others make greater claims, asserting that the deal will add over £100 billion to the UK and European economies every year.
-
The EU and the US are negotiating their proposed free trade agreement behind closed doors. Third countries, for instance in Africa, have no say in these talks, although the deal could have a far-reaching impact on them.
-
With a new ‘HSBC list’ of Swiss bank accounts revealing over 1,000 Indian names, Switzerland today said these are from “stolen data” — an assertion that might make it difficult for India to get details on these accounts without any additional evidence.
-
An international collaboration of media outlets have leaked HSBC files which prove the Bank has actively sought to undermine domestic tax laws and keep millions of pounds from reaching the UK Treasury – but what is truly remarkable, it the complicity of the UK government in helping the 1% avoid paying their dues.
-
The only countries that held more money in the HSBC branch were 11,235 Swiss with $31 billion, 8,844 Britons with $21.7 billion, 1,138 Venezuelans with $14.7 billion, 4,193 Americans with $13.4 billion and 9,187 French with $12.5 billion.
-
Hundreds of South Africans have stashed more than $2-billion (about R23-billion) in accounts at Swiss banking group HSBC, details of which have now emerged in a leak that shines a new spotlight on the secretive world of Swiss banking.
-
Last year more than 200,000 people were prosecuted for not having a TV licence.
More than fifty – many of them women – went to prison for it.
But HMRC say it is not in the public interest to prosecute tax criminals and the bankers and accountants who set arrangements for them.
-
Censorship
-
KickassTorrents has lost access to its Kickass.so domain name and is currently offline. The Somalian domain of the most-visited torrent site on the Internet is now listed as “banned” by the .SO registry, forcing the site’s operators to find a new home.
-
Privacy
-
Part of the Samsung Smarttv EULA: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.”
-
My name is Alison, and I’m the founder of the Library Freedom Project, an initiative that aims to make real the promise of intellectual freedom in libraries. It’s a partnership among librarians, technologists, attorneys, and privacy advocates to teach librarians about surveillance threats, privacy rights, and privacy-protecting technology tools. So far, we’ve been all over Massachusetts and parts of New England, and we have been awarded a generous grant from the Knight Foundation to bring privacy training to libraries across the United States.
We teach librarians three things. Kade Crockford of the ACLU of Massachusetts teaches the current state of digital surveillance. Jessie Rossman, an attorney and surveillance law expert also from the ACLU of Massachusetts, offers a privacy-focused “know your rights” training. I teach technology tools – like Tor and Tails .
-
Campaigning group Privacy International is preparing to help “potentially millions” of people request that their GCHQ records be deleted, following a landmark ruling by the Investigatory Powers Tribunal on Friday.
The IPT ruled that the intelligence-sharing relationship between the US and UK had been unlawful prior to December 2014, because the rules governing the UK’s access to the National Security Agency’s PRISM and UPSTREAM programmes had been kept secret.
-
The recent ruling that mass surveillance of UK citizens’ internet communications by the UK intelligence services was unlawful until the end of 2014 does not go far enough, according to Open Rights Group.
The Investigatory Powers Tribunal (IPT) ruled that UK intelligence agency GCHQ had breached the Human Rights Act by using intelligence on UK residents from the US National Security Agency (NSA).
-
For the state of Iowa to step forward, alongside others, in mitigating the powers of the NSA comes as a pleasant surprise. The federal agency has shown that it has no intention of reining in their surveillance.
-
The UK government slipped out consultation documents on “equipment interference” and “interception of communications” (read: computer hacking by police and g-men) on Friday.
They were made public on the same day that the Investigatory Powers Tribunal ruled that the spying revelations exposed by master blabbermouth Edward Snowden had accidentally made British spooks’ data-sharing love-in with the NSA legal.
-
A documentary about NSA whistleblower Edward Snowden has won the prestigious Directors Guild Award as best movie in the category. Laura Poitras, the director of Citizenfour, received her award at a ceremony in Los Angeles on Saturday.
-
The Counter-Terrorism and Security Bill 2014-15, having been rushed through the House of Commons with alarming speed and ease, has passed its second reading in the House of Lords. It is now in the final committee stages and on course to become law within a matter of weeks.
-
The unresolved fallout between the U.S. and Germany over espionage and mass surveillance has slid to the background ahead of a visit today by Chancellor Angela Merkel to Washington, according to her top aide.
-
As Chancellor Merkel visits President Obama on Monday, the US sees Europe as a continent in crisis. Two experts take on the roles of Germany and the US to tease out the countries’ views on key international issues.
-
Polarizing divisions will color President Barack Obama’s discussions with German Chancellor Angela Merkel when the supposedly staunch allies meet at the White House on Monday for talks expected to primarily address the ongoing crisis in Ukraine.
The meeting comes after a year of lingering tensions in a relationship that, at least publicly, was tested by reports of CIA spying and National Security Agency surveillance of the phone calls of Merkel and other European leaders.
-
Altegrity Inc, owner of the company that carried out background checks on former NSA contractor Edward Snowden and Navy Yard shooter Aaron Alexis, filed for Chapter 11 bankruptcy protection on Sunday as it implements a restructuring deal with its lenders.
Altegrity, which owns USIS Investigations Services, listed assets and liabilities of more than $1 billion, according to court documents.
The company said some of its lenders, including funds managed by Third Avenue Management, Litespeed Management LLC and Mudrick Capital Management LP, have committed to provide $90 million in debtor-in-possession financing.
-
These enhanced minimization procedures collectively represent a response to heavy criticism that Section 702 constitutes a “backdoor” that would allow the intelligence community to monitor the communications of American citizens, without a warrant, if these communications were incidentally collected as a result of surveillance on foreign persons.
-
Let’s go to another room so that the telly can’t hear us! Samsung’s smart TVs don’t just respond to your spoken commands any more – they also tell unspecified third parties what you’re saying while you sit in from of them.
-
Indonesians surveyed by Galpaya told her that they didn’t use the internet. But in focus groups, they would talk enthusiastically about how much time they spent on Facebook. Galpaya, a researcher (and now CEO) with LIRNEasia, a think tank, called Rohan Samarajiva, her boss at the time, to tell him what she had discovered. “It seemed that in their minds, the Internet did not exist; only Facebook,” he concluded.
-
Not long ago, the sharing economy seemed to have taken over. Privacy was dead, and no one cared. But that was until revelations about government spying and worse came to light. Today, it seems just as many people are sharing…but many do so with more caution.
For some of us, the need to go truly anonymous is more important than ever. But when you go to a service online and its first three choices for signup are to use your existing Google, Facebook, or Twitter account credentials, it’s almost like a subtle background check. Other services—like Google—expect you to share a phone number and older email address—to sign up (and if not at initial signup, you’ll need them for activations later). So you’re not exactly hiding your tracks.
-
The e-mail was blunt: Mark Zuckerberg had no interest in playing nice with the guy from next door.
“How do we make this go away?” a Zuckerberg adviser wrote to his real estate agent. “MZ is not going to take a meeting with him … ever.”
Now that 2013 e-mail, and others like it, are at the center of property war gone rogue. On one side is Zuckerberg, the billionaire founder of Facebook Inc. On the other is the businessman from next door, a real estate developer who hoped to profit from Zuckerberg’s desire for privacy.
-
Guess who’s eavesdropping on you now? It’s not some nefarious government agency (although, rest assured, there has been no downturn in surveillance). Nope, it’s that smart TV you paid good money for and invited into your home.
-
The new privacy policy for Samsung’s smart TVs allows the company and its partners to listen in on everything their users say.
The policy has drawn the ire of internet users, who compared it with George Orwell’s dystopian fiction 1984.
-
A Texas teenager has been fired from her job at a pizza parlor before she even started after she sent out a tweet complaining about the gig and her new boss saw it.
-
Some folks have taken issue with this, going so far as to call Tor employees “government contractors.” On the one hand, this is pretty sensational talk: In much of Europe, for example, public funding of advocacy isn’t uncommon. On the other hand, there are real issues with implicitly supporting what is ultimately an imperialist agenda by taking US government funds.
-
Backed by a number of tech companies, California is eyeing state legislation to protect its citizens from warrantless government surveillance of e-mails, text messages and cellphone communications. The proposed legislation is being backed by state senators Mark Leno, a Democrat, and Joel Anderson, a Republican.
-
The Silk Road trial has concluded, with Ross Ulbricht found guilty of running the anonymous online marketplace for illegal goods. But questions remain over how the FBI found its way through Tor, the software that allows anonymous, untraceable use of the web, to gather the evidence against him.
The development of anonymising software such as Tor and Bitcoin has forced law enforcement to develop the expertise needed to identify those using them. But if anything, what we know about the FBI’s case suggests it was tip-offs, inside men, confessions, and Ulbricht’s own errors that were responsible for his conviction.
This is the main problem with these systems: breaking or circumventing anonymity software is hard, but it’s easy to build up evidence against an individual once you can target surveillance, and wait for them to slip up.
-
A German-Arab web of companies advertises a new government spyware “made in Germany” at international surveillance industry trade shows. In a lengthy investigation, we gathered background information on companies and actors involved. It remains unclear, whether the company even has a finished product for sale, nevertheless they continue to promote the product – directly to law enforcement and intelligence agencies.
-
Civil Rights
-
During widespread protests in New York last summer after the killing of Eric Garner by police officer Daniel Pantaleo (who was not charged in Garner’s killing), New York City Police Commissioner Bill Bratton had this message for protesters: “You must submit to arrest, you cannot resist …The place to argue your case is in the courts, not in the streets.”
-
-
A 74-year-old man is dead and an officer is on administrative leave pending an investigation into the fatal shooting. Police say Officer Josh Lefevers shot and killed James Howard Allen after Allen pointed a gun at the officer in his home and refused to drop the weapon.
-
It took nearly two years, but a North Carolina judge dismissed a case against a man who was arrested for drinking a can of Arizona Iced Tea in a parking lot of a liquor store.
And only because it was captured on video.
Otherwise, the cop’s word would have been treated as gospel, resulting in a conviction of trespassing and resisting arrest against Christopher Lamont Beatty, a former soldier who is also a hip hop musician known as Xstravagant.
But even despite the video evidence, prosecutors along with his own lawyer, tried to get him to agree to a plea deal where he would accept probation and community service.
In other words, they wanted him to admit to a crime he did not commit without even having the chance to be tried for that crime.
-
CIA whistleblower John Kiriakou, who was released from a federal prison in Loretto, Pennsylvania, last week, after serving about 23 months in jail, called for CIA case officers to be prosecuted for “flouting” the law when they tortured detainees.
In an interview for “Democracy Now!”, Kiriakou addressed the shocking details in the executive summary of the Senate intelligence committee report on the CIA’s torture program. He said he understood that President Barack Obama was not going to pursue the prosecution of CIA officials who carried out torture. Obama was not going to prosecute officers who carried out the “day-to-day torture program.” Lawyers at the Office of Legal Counsel in the Justice Department were going to get a pass too. However, there are officers, who clearly violated the law, when they carried out interrogations.
-
In a broadcast exclusive interview, we spend the hour with John Kiriakou, a retired CIA agent who has just been released from prison after blowing the whistle on the George W. Bush administration’s torture program. In 2007, Kiriakou became the first CIA official to publicly confirm and detail the agency’s use of waterboarding. In January 2013, he was sentenced to two-and-a-half years in prison. Under a plea deal, Kiriakou admitted to a single count of violating the Intelligence Identities Protection Act by revealing the identity of a covert officer involved in the torture program to a freelance reporter, who did not publish it. In return, prosecutors dropped charges brought under the Espionage Act. Kiriakou is the only official to be jailed for any reason relating to CIA torture. Supporters say he was unfairly targeted in the Obama administration’s crackdown on government whistleblowers. A father of five, Kiriakou spent 14 years at the CIA as an analyst and case officer, leading the team that found high-ranking al-Qaeda member Abu Zubaydah in 2002. He joins us from his home in Virginia, where he remains under house arrest for three months while completing his sentence. In a wide-ranging interview, Kiriakou says, “I would do it all over again,” after seeing the outlawing of torture after he came forward. Kiriakou also responds to the details of the partially released Senate Committee Report on the CIA’s use of torture; argues NSA whistleblower Edward Snowden did a “great national service,” but will not get a fair trial if he returns to the United States; and describes the conditions inside FCI Loretto, the federal prison where he served his sentence and saw prisoners die with “terrifying frequency” from lack of proper medical care.
-
-
A federal judge is demanding that the government explain, photo-by-photo, why it can’t release hundreds, and perhaps thousands, of pictures showing detainee abuse by U.S. forces at military prison sites in Iraq and Afghanistan.
In a courtroom in the Southern District of New York yesterday, Judge Alvin Hellerstein appeared skeptical of the government’s argument, which asserted that the threat of the Islamic State and Al Qaeda exploiting the images for propaganda should override the public’s right to see any of the photos.
-
Are you, your family or your community at risk of turning to violent extremism? That’s the premise behind a rating system devised by the National Counterterrorism Center, according to a document marked For Official Use Only and obtained by The Intercept.
The document–and the rating system–is part of a wider strategy for Countering Violent Extremism, which calls for local community and religious leaders to work together with law enforcement and other government agencies. The White House has made this approach a centerpiece of its response to terrorist attacks around the world and in the wake of the Paris attacks, announced plans to host an international summit on Countering Violent Extremism on February 18th.
-
Ethan Czahor’s tweets began disappearing today after news broke that he had been hired by Jeb Bush. A spokesperson for Bush told BuzzFeed News: “Governor Bush believes the comments were inappropriate. They have been deleted at our request. Ethan is a great talent in the tech world and we are very excited to have him on board the Right to Rise PAC.” Czahor also apologized in a tweet on Monday.
-
The 9/11 trial judge abruptly recessed the first hearing in the case since August on Monday after some of the alleged Sept. 11 plotters said they recognized a war court linguist as a former secret CIA prison worker.
Alleged plot deputy Ramzi bin al Shibh, 42, made the revelation just moments into the hearing by informing the judge he had a problem with his courtroom translator. The interpreter, Bin al Shibh claimed, worked for the CIA during his 2002 through 2006 detention at a so-called “Black Site.”
-
In early 2003, James Risen, an investigative reporter in the Washington bureau of The New York Times, prepared a story about a covert CIA effort to undermine Iran’s nuclear program. Before publishing it, he informed the CIA of his findings and asked for comment. On April 30, 2003, according to a subsequent Justice Department court filing, CIA Director George Tenet and National Security Adviser Condoleezza Rice met with Risen and Jill Abramson, then the Times’s Washington bureau chief. Tenet and Rice urged the Times to hold Risen’s story because, they said, it would “compromise national security” and endanger the life of a particular CIA recruit. (The agent is referred to in the Justice filing as “Human Asset No. 1.”) Eventually, the Times informed the CIA that it would not publish Risen’s story. Abramson said recently that she regrets the decision.
-
A US defense contractor that provided interrogators to Abu Ghraib prison in Iraq sought to have a federal judge dismiss a lawsuit because its employees were working under military control in wartime.
Four former inmates of the notorious prison, where horrific abuses took place during the Iraq war that damaged US credibility, have sued CACI International Inc. for torturing them ahead of interrogations.
-
I do think there have been some very significant changes as a result of [our] reporting. There hasn’t been a lot of legislation passed. But I never thought that the place to look for restrictions on the power of the U.S. government would be the U.S. government itself, because human beings generally don’t walk around thinking about ways to restrict their own power.
I think the much more significant changes are the changes in consciousness that people have, not just about surveillance but about privacy, the role of government, their relationship to it, the dangers of exercising power in the dark and the role of journalism as well.
There are all kinds of ways that surveillance is now being curbed, from other governments acting in coalition to impede U.S. hegemony over the Internet to technology companies like Facebook, Yahoo and Google knowing that, unless they make a real commitment to protecting their users’ privacy, they’re going to lose a generation of users to other countries’ companies.
-
It wasn’t former director Leon Panetta, who was ultimately responsible for the actions of his agency. It wasn’t any number of agents, officials or supervisors who directly or indirectly participated in the ultimately useless torture of detainees. It wasn’t the private contractors who profited from these horrendous acts committed in the name of “national security.”
-
Internet/Net Neutrality
-
In the excitement following FCC chairman Tom Wheeler’s announcement that he would propose Title II classification for Internet service providers, it’s important that we understand a few things. First, this is not a done deal yet, though it looks likely to pass. Second, this is only the first step in a long and arduous journey.
-
Intellectual Monopolies
-
Since the gains for this industry are expected to be so large, and those for other industries so small, why not drop all the contentious stuff that threatens to derail the whole deal, and concentrate on cars? In any case, it would be more honest to rename the TTIP proposal as the “Atlantic Car Trade Agreement,” since that’s what it is really about. We could even call it “ACTA” for short.
Permalink
Send this to a friend
02.08.15
Posted in News Roundup at 12:55 pm by Dr. Roy Schestowitz

Contents
-
Applications
-
In our connected world, the traditional UNIX privilege separation is not enough anymore. Security models are changing in order to provide a higher level of protection expected by users. We start with seccomp-bpf, a software techniques introduced in 2010 that seems to gain more and more popularity as networked application grow and expand. After a short introduction and a look at some of the software packages using seccomp-bpf, we continue with the list of the projects released during January.
-
If you’re new to FreeBSD and PC-BSD, you might not yet be aware of all their package manager’s many commands. Nobody expects you to, at least not initially.
Pkg is that package manager and one of the its many commands I think you should get to know asap is the audit command. It’s used to audit installed packages against known vulnerabilities. I could be wrong, but I don’t think your favorite Linux distribution’s package manager has an equivalent command.
-
Instructionals/Technical
-
-
-
-
-
On a secret cloud server, with ssh key access only, I like to keep a encrypted text file with passwords that I can never remember e.g. because I seldom use some of them, and/or have too many of them.
-
Games
-
I’ve had a rotten time trying to update this site over the past couple days. My home network has been exceptionally flaky since Friday afternoon, and on top of that, I spent the precious little time I had yesterday testing and prodding a program, only to find when I was done writing, that I had already seen it a year ago.
[...]
That’s tornado. As I understand it, tornado is a remake of a classic C64 game called Weatherwar, with the object being to destroy your opponents house by controlling the elements. It’s a variation on the catapult game theme, since your success at tornado will depend a little on your ability to calculate the target given information on wind speeds.
-
duelcommander got lumped into my “game” category but I almost hesitate to call it that. It appears to me to be more a framework for a combat system, much like you might expect in larger, more complex games.
-
Desktop Environments/WMs
-
Xfce 4.12 is running about two years behind its original schedule but there’s now a concerted effort underway to get out this lightweight GTK+ desktop environment out around the end of February or early March.
-
Fluxbox 1.3.6 was released last month after this lightweight window manager went two years without a new release. It looks like the rate of development of Fluxbox is ticking back up as Fluxbox 1.3.7 was just tagged this morning.
-
K Desktop Environment/KDE SC/Qt
-
Ever since we introduced our ideas the next version of akonadi, we’ve been working on a proof of concept implementation, but we haven’t talked a lot about it. I’d therefore like to give a short progress report.
-
System Settings is a strange part of Plasma; it composes of umpteen modules gradually written over the last 15 years by a lot of different people.
-
-
Screenshots
-
Red Hat Family
-
Fedora
-
Yup, I just got bored of running Spotify on my cellphone when working on computer. Unfortunately there is no native support for Spotify on Fedora just like in Debian / Ubuntu (which are preferred distros by Spotify for Linux today).
-
There are so many Linux-based operating systems nowadays, that it can be maddening to try and settle on one. For many home users, sticking with Ubuntu or Mint is probably for the best. Why? These distributions are beginner-friendly while also be powerful for experts too. In other words, you can grow with them without fear of hitting a ceiling.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
The Aquaris E4.5 Ubuntu Edition will retail for €169.90 and be sold via BQ.com through a series of flash sales.
-
Canonical and BQ want to make this release memorable so they have planned a bunch of Flash Sales, available via the BQ.com official website, and will cost about 169.90 Euros (~ $193 / £127).
-
The Telegram application is now ready for daily usage and has been added to the Ubuntu App Store, so that the users can install it easily. This messenger service is among the most popular ones in its category because it has good encryption and via the Telegram API, a lot of Telegram clients for Linux have been developed.
-
-
Almost a year after Ubuntu developer Canonical joined hands with Meizu and BQ to manufacture handsets with the Linux-based OS installed on them, the company has now announced its plans to release the world’s first Ubuntu smartphone – the Aquaris E4.5 Ubuntu Edition.
-
-
Phones
-
Tizen
-
He was replying to a lad, telling him that they are going to help developers to port their applications from iOS and Android Monopoly to Sailfish OS and Tizen.
-
Events
-
The Lenovo ThinkPad T430s is now the latest laptop to be running atop Coreboot as an alternative to its proprietary UEFI/BIOS.
-
BSD
-
The last PC-BSD release I reviewed was PC-BSD 10.1. And that was actually just late last year. You may read that review at PC-BSD 10.1 review.
It was the worst edition of any distribution I have even reviewed.
An installation of the Cinnamon desktop, which shipped with Cinnamon 2.2, was especially bad. Out of the box, it was unusable. When PC-BSD 10.1.1 was released (on February 2 2015), I knew I had to take another look at a Cinnamon installation.
So that’s what this article is about – a cursory review of an installation of PC-BSD 10.1.1 Cinnamon.
-
FSF/FSFE/GNU/SFLC
-
GNU lightning is a library to aid in making portable programs that compile assembly code at run time.
-
Pictures have emerged showing the Sochi Olympics Winter Park standing empty and neglected just a year after Russian president Vladimir Putin pumped billions into the venue.
Many of the custom built stadiums, which cost an estimated $51 billion in total, now appear deserted and unused.
The companies that maintain the facilities are reportedly struggling to stay afloat as tourist numbers plummet.
-
The Deputy Prime Minister is found to be trailing Labour by 10 points in his Sheffield Hallam constituency, according to a survey for the trade union Unite.
-
Health/Nutrition
-
-
Is the Central Intelligence Agency partially culpable for bringing crack cocaine to US streets, especially to the black neighborhoods of South Central, Los Angeles, and hence supporting its spread like an epidemic among the forgotten children of the “American Dream”? Yes it is, perhaps to the surprise of younger generations; and Kill The Messenger, a film released in November 2014, reminds us of this.
-
Security
-
Britain’s security services have acknowledged they have the worldwide capability to bypass the growing use of encryption by internet companies by attacking the computers themselves.
The Home Office release of the innocuously sounding “draft equipment interference code of practice” on Friday put into the public domain the rules and safeguards surrounding the use of computer hacking outside the UK by the security services for the first time.
The publication of the draft code follows David Cameron’s speech last month in which he pledged to break into encryption and ensure there was no “safe space” for terrorists or serious criminals which could not be monitored online by the security services with a ministerial warrant, effectively spelling out how it might be done.
-
The Obama administration has accused North Korea of hacking Sony in retaliation for “The Interview,” a goofball comedy about assassinating the country’s real-life leader, but the case may be another politicized rush to judgment by the U.S. government, writes James DiEugenio.
-
Defence/Police/Secrecy/Aggression
-
The government of Niger claims it killed over 100 fighters from Islamic militant group Boko Haram when the fighters attacked within the borders of the country for the first time.
-
President John F. Kennedy increased U.S. involvement, and the CIA encouraged the assassination of South Vietnam President Ngo Dinh Diem, which led to a succession of unstable and short-lived juntas.
Fifty years ago, President Lyndon Baines Johnson embarked upon the massive escalation that would bring us the Vietnam War as we came to know it and that would bring an end to his presidency.
-
So Barack Obama has killed at least 2,500 in drone strikes during the six years of his presidency, not including those killed in Iraq or Afghanistan. The Spanish Inquisition reportedly killed 2,250 over 350 years. For comparative purposes, I would note, as I reported here at PJ Media last month, that Boko Haram reportedly killed 2,000 over several days in a massacre in Northern Nigeria.
-
Nothing good so far has come out of all the high-level meetings in Kiev and Moscow. US-NATO continue to threaten Russia with more and wider war in Ukraine. Russia is basically told they have to accept the US-NATO backed onslaught in eastern Ukraine. Russia must stop supporting eastern self-defense forces or expect even more of the west’s Strategy of Tension.
-
A Green Beret officer who was stripped of a prestigious valor award and dropped from the Special Forces fell out of favor with Army officials after the CIA shared information it gathered about him while he was going through screening for a potential job, according to officials familiar with the case.
-
If a decision is made to honor Poroshenko’s request for aid in the escalating conflict in Ukraine, action will not be taken right away. An anonymous official said that a public effort to arm Poroshenko’s troops could cause tension between the United States and its allies in NATO and the EU. The official also said that it would take time to decide what to send. In the past, the government has sent Soviet-made weapons from a CIA warehouse in North Carolina. The official said that this could be a viable option in this case, if the United States decides to offer support.
-
These were largely courtesy of the CIA, which reportedly devised no fewer than 638 plots to kill him, ranging from your typical poisoned handkerchief scheme to fungus-infected diving suits and exploding molluscs.
-
While watching the film, I kept waiting for something to be said or even suggested, about the deeper reason our military was in Iraq other than the film’s repetitive message: “They are the bad guys and we are the good guys.”
I kept hoping to at least see a Chevron Oil rig burning in the distance.
One scene was quite effective in portraying even the women and children as evil, showing a veiled mother and child in an almost Madonna and child way, beautiful but evil and carrying a grenade. The message here was that all Iraqis were evil, men, women and children, and all of the American troops there were the good guys.
-
Obama and Washington had a very different response to the March 2013 death of Hugo Chavez, the democratically elected president of Venezuela who used his nation’s also remarkable oil wealth to reduce poverty and inequality in his nation. Chavez won respect and even adoration from much of his nation’s citizenry, including especially the poor, even as he offered remarkable tolerance and freedom to wealthy elites who hated him and his egalitarian agenda.
Surely, then, the president of the world’s self-proclaimed greatest democracy, the United States, reacted to Chavez’s death with words of sympathy and respect that went beyond the reverence and compassion he expressed for the deceased king of an absolutist, arch-repressive, and ultra-reactionary dictatorship, right? Hardly. The White House responded with the following dismissive and disrespectful statement: “At Venezuela begins a new chapter in its history, the United States remains committed to policies that promote democratic principles, the rule of law, and respect for human rights” – a commitment that finds curious expression in Washington’s longstanding support for the Saudi dictatorship.
-
The brouhaha about possible Saudi Arabian funding of Al Qaeda in the run-up to the September 11, 2001, attacks is being fueled from two directions. It is being pushed by Zacarias Moussaoui, sometimes called the “twentieth hijacker,” now serving a life sentence in a federal supermax penitentiary. There are also allegations of Saudi funding in a congressional report on 9/11, a portion of which has not been released. That Saudi Arabia or its royal family were complicit in an attack on New York and Washington is completely implausible. The Saudi ruling class long ago decided that they would trade foreign policy independence for an American security umbrella, given that they preside over a small country with enormous petroleum wealth and resources, and could not protect themselves from external threats. Moreover, they are heavily invested in the New York stock market, and took an enormous bath on September 12 and after, as the latter suddenly lost half its value. The whole idea is a nonstarter.
-
-
A CIA leak and the a reading of the 28 pages by two US senators had revealed that there was enough evidence to show the involvement of the Saudis in the attack. A CIA leaked memo had gone on to show that it was not the Al-Qaeda or the Taliban that carried out this attack, but it was Saudi Arabia.
Further the memo also went on to read that wealthy Saudis, diplomats and intelligence officials employed by the Saudi Royal family had helped the hijackers with both logistics and finances.
The pages which had been blacked out by the Bush administration suggest that the Saudi consulate in Los Angeles had facilitated the arrival of two hijakers Khalid al-Mihdhar and Nawaf al-Hazmi in 2000.
A Saudi intelligence official named Osama Bassnan and a spy Omar Bayoumi established a base in San Diego which housed the hijackers. This was the same place where al Qaeda cleric Ankar Al-Awlaki met with the hijackers.
[...]
Some of the pages even indicate that a huge amount of money had been sent to the hijackers. Specific information suggests the Saudi Arabian ambassador to the US, Prince Bandar had sent $130,000 to Saudi intelligence agent Osama Bassnan.
Although Prince Bandar had claimed that this money was a donation made to Bassnan who had an ailing wife, the US had managed to track that this money had infact reached the hijackers. There was also a trail that Prince Bandar had paid for the establishment of an Islamic Centre in Virgina which was incidentally close to the Pentagon.
-
Zacarias Moussaoui, the so-called ‘20th hijacker’ in the 9/11 plot, has alleged that Saudi diplomat discussed plans to shoot down Air Force One
-
A convicted al-Qaeda operative has claimed that members of the terrorist network received extensive financial support from members of the Saudi royal family throughout the late 1990′s and into 2000, the New York Times reported Wednesday.
-
There is a coup underway in Venezuela. The pieces are all falling into place like a bad CIA movie.
At every turn, a new traitor is revealed, a betrayal is born, full of promises to reveal the smoking gun that will justify the unjustifiable. Infiltrations are rampant, rumours spread like wildfire, and the panic mentality threatens to overcome logic.
Headlines scream danger, crisis and imminent demise, while the usual suspects declare covert war on a people whose only crime is being gatekeeper to the largest pot of black gold in the world.
-
The fallout in Argentina from the mysterious death of a prosecutor in January has exposed to the public a power struggle at the highest levels of the state.
On February 1, a Buenos Aires newspaper reported that prosecutor Alberto Nisman—who was found dead on January 18 with a suspicious gunshot wound to the head—had prepared draft warrants for the arrest of President Cristina Fernandez de Kirchner, Foreign Minister Hector Timmerman, and Congressman Andres Larroque preceding his death.
-
-
The founder of Stratfor, the “private CIA” firm, says that the overthrow of Viktor Yanokovych in Ukraine in February 2014 was “the most blatant coup in history.” The President of the Czech Republic contrasts that coup versus Czechoslovakia’s authentically democratic 1968 “Velvet Revolution,” and he says that “only poorly informed people” don’t know that the governmental overthrow in Ukraine in 2014 was a coup. America’s liberals, then, are indeed poorly informed, and they are so partly because they don’t want to know the truth about Obama; America’s conservatives, by contrast, simply hate Obama, merely because he’s a black Democratic politician (and any President who has been so good to Wall Street would be loved by them if he were a white Republican); they don’t mind (and they actually support) that Obama hates Russia and institutes an ethnic cleansing campaign in his aggressive war against Russia. Whereas conservatives don’t mind Obama’s ethnic-cleansing campaign to get rid of pro-Russians in Ukraine, liberals don’t want to know about it. The result is actually conservatives reigning in both Parties, not just in one: we now have one-party government, in all but name.
-
Clashes took place in Benghazi where pro-government forces led by CIA-linked General Khalifa Haftar have been trying to retake the city from an umbrella group of Islamist militias opposed to the Tobruk governent.
-
The cowardly NATO assassinations of Hezbollah’s top commander Imad Mughniyeh (2008) and his son Jihad Mughniyeh (2015) which both took place outside any battlefield, highlights the criminal nature of colonial militarism which does not recognize ‘military rules of engagement’ because it has never had any legal grounds for being in the Middle East.
-
In 2008, Lebanese terrorist overlord Imad Mughniyeh was killed by a car bomb in Damascus, Syria. Twisted metal wreckage was all that remained of his Mitsubishi Pajero. And according to a report from the Washington Post, the CIA built and tested the entire system at a secret facility, somewhere in North Carolina.
-
NBC’s new show Allegiance, debuting tomorrow night, starts out with a scene of a man being burned alive, which appears to be a case of very unfortunate timing, given what’s been in the news this week.
-
When word recently leaked that the CIA inspector general was preparing to step down, agency Director John Brennan issued a glowing statement about his watchdog’s work.
Left unsaid was the role CIA Inspector General David Buckley had in refereeing one of the most acrimonious disputes between a spy director and his congressional overseers in decades.
-
A member of the panel that investigated JFK’s death now worries he was a victim of a “massive cover-up.”
-
Lee Harvey Oswald may have been part of a conspiracy, according to investigative reporter Philip Shenon, whose book “A Cruel and Shocking Act: The Secret History of the Kennedy Assassination,” has just been issued in paperback.
-
However, David Slawson was a young lawyer who became a part of the Warren Commission in January, 1964. He is now 83-years of age. The retired law professor now believes that he and the other members of the commission victims of a ‘massive cover-up.’
Slawson’s individual assignment within the Warren Commission was to investigate whether there was any involvement from a foreign nation in the assassination of President Kennedy. Until last year, he was certain that his reported findings were accurate. Recently he discovered that the CIA and other agencies withheld large amounts of information from his investigation. He has now determined that others were aware of Oswald’s plans before the shooting occurred. With the definition of ‘conspiracy,’ when at least two people conspire to commit a wrongful act, Slawson now is certain that a conspiracy did exist.
-
-
A former CIA contractor says since the Ukrainian forces are using cluster bombs and illegal weapons against civilians, Washington’s decision to provide Kiev with further lethal aid does not make any difference.
-
-
A series of recent setbacks underlines this point. The United Arab Emirates (UAE) has quietly withdrawn from strike missions in Syria, with questions emerging about how far any country other than the US is now operating over it.
-
It’s no secret that the mid-20th century was a dirty time for U.S. intelligence agencies. J. Edgar Hoover’s FBI was waging personal wars through the government, infiltrating social movements and encouraging civil rights leaders to commit suicide. The CIA was working with the Mafia to assassinate foreign leaders, and had gotten into the business of overthrowing foreign governments, leaving a trail of fractured regimes through Africa and the Middle East.
-
In most countries controlled by the Emperor the most important “asset” are the military.
-
Kadyrov also suggested the West was backing IS in order to distract public attention from numerous problems in the Middle East, in the hope of destroying Islamic nations from inside.
-
Transparency Reporting
-
Risen has published many important stories, and two books, about secret and often illegal practices at the National Security Agency (NSA) and the CIA. I’ve heard many Lovejoy addresses, but rarely has there been a statement as startling as Risen’s assertion, in response to a question, that President Obama “hates the press.”
-
Americans tend to believe in government that is transparent and accountable.
-
Environment/Energy/Wildlife
-
It was the Newman government’s great hope for Queensland’s economy: a proposal for Australia’s biggest coal development, unprecedented in scale.
Indian billionaire Gautam Adani’s mammoth Carmichael mine, in central Queensland, is pledged to bring with it 10,000 jobs and $22 billion in taxes and royalties.
-
Some North Dakota companies have shut down 40 percent of their operations as plummeting oil prices render their industry far less economic than it became during the boom of the past five years.
-
Finance
-
Rashia Wilson bought a $92,000 Audi, proclaimed herself a millionaire, and announced on her Facebook page that she was “the queen of IRS tax fraud,” as prosecutors told the story.
But even more than her flamboyance, it was the seeming ease of her crime that was most stunning: She and an accomplice were alleged to have hijacked the identities of other taxpayers to get fraudulent refunds. They used stolen Social Security numbers, a computer, and basic knowledge of how to file a tax return, according to the government.
-
With advice from more than 200 policy experts, Hillary Rodham Clinton is trying to answer what has emerged as a central question of her early presidential campaign strategy: how to address the anger about income inequality without overly vilifying the wealthy.
Mrs. Clinton has not had to wade into domestic policy since before she became secretary of state in 2009, and she has spent the past few months engaged in policy discussions with economists on the left and closer to the Democratic Party’s center who are grappling with the discontent set off by the gap between rich and poor. Sorting through the often divergent advice to develop an economic plan could affect the timing and planning of the official announcement of her campaign.
-
Business tycoon and former Fidesz insider Lajos Simicska, speaking out as the key editors of his media group resigned, apparently in protest against Simicska’s threat to launch a “media war” against Orbán’s government.
-
PR/AstroTurf/Lobbying
-
William Colby, ex-director of the Central Intelligence Agency, is a man who should know Western media: “The CIA (Central Intelligence Agency) owns everyone of any significance in the major media.” Not long after becoming a whistle-blower Colby died in a freak canoeing accident.
-
Not only did Williams lie just one time about the incident, he’d done it numerous times over the years.
-
Further scrutiny of NBC News anchor Brian Williams’ other past statements began to surface Friday when the New Orleans Advocate reported that the newsman’s account of his experience covering Hurricane Katrina may not be entirely accurate.
In a 2006 interview with former Disney CEO Michael Eisner, Williams said he witnessed a body floating in the French Quarter area of the city. “When you look out of your hotel window in the French Quarter and watch a man float by face down, when you see bodies that you last saw in Banda Aceh, Indonesia, and swore to yourself that you would never see in your country,” Williams told Eisner, who suggested in the interview that Williams emerged from former NBC News anchor Tom Brokaw’s shadow with his Katrina coverage.
-
But the caustic media big shots who once roamed the land were gone, and “there was no one around to pull his chain when he got too over-the-top,” as one NBC News reporter put it.
-
You don’t have to be North Korean to be annoyed by this film.
-
There’s a whole host of people that’ll tell you that comedy can’t be insulting – by its very nature, it’s a joke, therefore it’s not an insult. What they forget is, if it’s not funny, it’s just sort of sad and offensive.
-
-
As the South Korean government, which has executed hundreds of thousands of leftists and suspected leftists, now bans the Unified Progressive Party (UPP), which got 10% of the vote in the last election, so too the U.S. imperialists are ratcheting up their economic sanctions and cyber attacks on North Korea. They are doing this partially on unsubstantiated accusations of terrorist threats flowing from the idiotic movie “The Interview”.
Korea was divided by the U.S. imperialists after WW II who imposed a far right capitalist dictatorship on South Korea that carried out mass executions of hundreds of thousands of leftists and suspected leftists. While in the south the new government employed the torturers and murderers of the Japanese occupation, in the north a new government was born out of the leadership that fought against Japanese occupation. Through social revolution they established a planned socialist economy that greatly benefitted the working class. In the 1950s the United States sent troops to Korea and carried out a brutal war against the Korean people in an attempt to destroy the social revolution in the north and protect the brutal capitalist dictatorship in the south. In that war, conservative estimates are that the U.S. murdered 3,000,000 people. North Koreans, perhaps more accurately, estimate 5,000,000 people.
Korea is one country and discussion of reunification is popular. Leninist -Trotskyists also call for Korean reunification, but only through a social revolution in the South. Kim Il Sung’s illusions in a peaceful reunification after the imperialists murdered 5,000,000 people is a deadly pipe dream. The only reunification the imperialists and the capitalist government in the South will agree to is one that annexes the north and destroys the gains of the North Korean Revolution, much as was done to East Germany. For any useful reunification to occur, the brutally repressive capitalist state of South Korea must be smashed in a proletarian socialist revolution. In addition, the highly deformed Stalinist government in the DPRK that promotes these kinds of deadly illusions really needs to be swept away in a political revolution as well. That is a revolution that overthrows the Stalinist bureaucracy and establishes workers democracy and an internationalist revolutionary program, while at the same time maintaining the social gains of the revolution including the socialist planned economy, socialist food distribution, free education to higher grade levels than the South, and guaranteed free socialized healthcare.
-
JAMES FRANCO and Seth Rogen reteam for this infamous comedy romp that’s finally released after generating global headlines for all the wrong reasons.
[...]
VERDICT: An abomination of a comedy, pitched to the lowest common denominator, with some seriously questionable intent to boot.
-
Censorship
-
Last week, students at Goldsmiths College in London banned a performance by the fantastic feminist comedian Kate Smurthwaite in an act of neurotic prudery that bordered on the insane. Her show was on freedom of speech – yes, yes, I know. She told me that Goldsmiths did not close it because of what she had planned to say, but because she had once said that the police should arrest men who go with prostitutes and that she was against patriarchal clerics forcing women to wear the burqa. In the demonology of campus politics, these were not legitimate opinions that could be contested in robust debate. They marked her as a “whoreophobe” and “Islamophobe”, who must be silenced.
-
Online magazine Spiked has published a ranking of the attitudes of British universities towards free speech, placing Oxford in the “red” category. The website states that universities in this category, the “most censorious” one, have “banned and actively censored ideas on campus”.
-
Spiked’s Free Speech University Rankings, which launched this week, shows that many of the day-to-day restrictions on campus free speech emanate not from universities but rather from students themselves. This free-speech league table came out in the same week as a debate about the impact of the government’s proposed anti-terror legislation on higher education really took off. Vice chancellors have taken to the airwaves, started petitions, and penned letters to national newspapers in defence of academic freedom. It would be easy to get the impression that students have created an environment in which banning things on a whim is the new normal, while academics look on in horror and champion the cause of free speech.
-
This isn’t about your photos or public messages violating Facebook’s own rules, like posting pornography. This is Facebook (FB, Tech30) acting as a government censor on that country’s behalf.
It’s worst in India, Turkey and Pakistan, where thousands of pages and photos get pulled down every year for “blasphemy,” criticizing the government or posting something that’s religiously offensive.
-
Mihir Joshi, an Indian musician recording his first album last year, needed a word to rhyme with today in one of his songs and found one that he thought fit perfectly. But India’s Central Board of Film Certification disagreed, and replaced it with a beep when the music video debuted on TV over the weekend.
-
-
“As a correspondent, I just shared a piece of news that was true with my followers. Sharing this kind of news with people is my job,” Yazıcı said. Her colleague, Taraf’s political editor Dicle Baştürk, received a similar notification and did not delete her tweet. She says it’s still visible. Days later, Baştürk received another email from Twitter informing her that the company may still have to remove it.
-
Dennis Toeppen, the owner of the Illinois bus company Suburban Express, has become something of a legend for the way he manages his company’s reputation online and deals with customers who fail to play by his rules. Still facing a trial in Lake County for misdemeanor charges of electronic harassment, Toeppen has continued to police reviews of Suburban Express on Yelp and other services, using his company’s website as a way to call out those who he believes have wronged him. From his perspective, this is just digital self-defense; from the perspective of his targets, it’s Internet intimidation and an attempt to damage the reputations of anyone who complains about how Toeppen does business.
-
The US Department of Defense has been given a week to explain why it has not yet complied with a federal court order to list the individual exemptions for the disclosure of over 2,000 photographs depicting military abuse of detainees in Afghanistan and Iraq.
-
-
Privacy
-
Appear in a photo taken at a protest march, a gay bar, or an abortion clinic, and your friends might recognize you. But a machine probably won’t—at least for now. Unless a computer has been tasked to look for you, has trained on dozens of photos of your face, and has high-quality images to examine, your anonymity is safe. Nor is it yet possible for a computer to scour the Internet and find you in random, uncaptioned photos. But within the walled garden of Facebook, which contains by far the largest collection of personal photographs in the world, the technology for doing all that is beginning to blossom.
-
The Obama administration requested $53.9 billion for its spy agencies in the year beginning Oct. 1, up sharply from its request of $45.6 billion last year.
The money would be used to fund operations spread across six federal departments, as well as the Central Intelligence Agency and the Office of the Director of National Intelligence.
-
In 1991, Senator Daniel P. Moynihan (D-N.Y.) introduced The End the Cold War Act that would have abolished the Central Intelligence Agency and transferred all of its functions to the Department of State. The Act declared that “the creation of the Central Intelligence Agency as a separate entity during the Cold War undermined the role of the Department of State as the primary agency of the United States Government formulating and conducting foreign policy and providing information to the President concerning the state of world affairs.”
-
The German magazine Focus says Britain has threatened to cease cooperation with Germany’s BND intelligence service. The BND in turn has been accused by a Berlin inquiry panel of withholding documents.
-
Germany’s Parliament is getting ready to review the NSA with a Parliamentary inquiry. Both Britain and the U.S. are threatening to discontinue sharing intelligence with Germany as a result. This ‘threat’ has not been verified. However, with tensions as they are and a crisis meeting to discuss intelligence in Germany’s intelligence sharing, the threat may be genuine.
-
-
This shouldn’t come as much of a shock, but your Smart TV is probably spying on you. This doesn’t mean it is out to do something malicious or that the machine has become self-aware, but it does mean that advertisers and third parties have another route to figure out how to reach you.
-
Director Johanna Hamilton talks about her latest documentary, “1971.” On March 8, 1971, The Citizens’ Commission to Investigate the FBI, as they called themselves, broke into a small FBI office in Media, Pennsylvania, took every file, and shared them with the American public. These actions exposed COINTELPRO, the FBI’s illegal surveillance program that involved the intimidation of law-abiding Americans and helped lead to the country’s first Congressional investigation of U.S. intelligence agencies. Never caught, forty-three years later, these everyday Americans – parents, teachers and citizens – publicly reveal themselves for the first time and share their story in this documentary. Hamilton is joined by two members of The Citizens’ Commission, Bonnie Raines and John Raines. The film opens at Cinema Village February 6.
-
For more than 18 months the response from the security services to the disclosure by Edward Snowden of the mass harvesting of personal data of British citizens has been to say: “Trust us, nothing we are doing is unlawful.”
-
Civil Rights
-
Yesterday, an important committee in the Virginia House of Delegates passed a bill to take action against federal indefinite detention powers. The unanimous tally was 20-0.
-
A bill introduced in the Washington state legislature would prohibit the state from assisting the federal government in the indefinite detention without due process under provisions of the National Defense Authorization Act of 2012 (NDAA) or any other federal acts purporting to authorize such powers.
-
A bill up for consideration in the Mississippi Senate would prohibit the state from assisting the federal government in the indefinite detention without due process under provisions of the National Defense Authorization Act of 2012 (NDAA), or any other federal acts purporting to authorize such powers.
-
The United Kingdom’s costs for its embassy “siege” against Julian Assange, who has not been charged with an offence, has hit 10 million pounds, Scotland Yard confirmed today.
-
We’re all braced for another grotesque video clip from the fundamentalist nutters of the so-called Islamic State, because they’ve released a primer on the likely beheading of two Japanese hostages – unless Tokyo will hand over a $US200 million ransom in the coming days.
IS’s video production values are sickeningly creepy – the prisoners in orange jumpsuits; their would-be executioner in black, wielding a knife and spewing bile.
-
The real breeding ground for extremism stems from the treatment of immigrant groups within Europe. Racial, ethnic, and religious discrimination have driven a generation of young migrants to radical movements as a solution to an absence of job prospects, poor education, deteriorated neighborhoods, lack of respect, and repeated bouts in jail. Ironically, the crackdown on these communities in the aftermath of the attacks could potentially escalate the problem.
-
So, what if I told you that an internationally known American – a 75-year-old Army veteran and a longtime official at the Central Intelligence Agency, someone who had famously questioned the imperious Defense Secretary Donald Rumsfeld about his Iraq War lies in a public event that led evening newscasts in 2006 – was recently denied entry to a public speech by another Iraq War icon, Gen. David Petraeus, and – despite having paid for a ticket – was brutally arrested by the police and jailed?
Wouldn’t that be a story? Wouldn’t that be something that the news media, especially the “liberal” news media, should jump all over? Wouldn’t a newspaper like the New York Times just love something like that?
But what if I told you that the New York Times wasn’t interested at all? You might think that perhaps the event occurred in some distant hamlet, maybe a small college town where there wasn’t much media, so it just fell through the cracks.
Yet, this story actually played out in New York City, the media capital of the world, on the Upper East Side at the 92nd Street Y in full view of hundreds of New Yorkers on the night of Oct. 30, 2014. Former CIA analyst Ray McGovern was roughly arrested, with the police ignoring his howls of pain as they pulled his arms behind his back. (McGovern had recently suffered a painful shoulder injury from a fall.}
-
-
-
CIA whistleblower John Kiriakou, who has been serving a prison sentence at the federal correctional institution in Loretto, Pennsylvania, has written a letter reporting that a correctional officer committed suicide in January. How the prison officials handled the death stood in stark contrast to the treatment prisoners experience when an inmate dies or an inmate needs to go to a funeral for an immediate family member.
For much of Kiriakou’s prison sentence, Firedoglake has published his “Letters from Loretto.” He was the first member of the CIA to publicly acknowledge that torture was official US policy under President George W. Bush’s administration. In October 2012, he pled guilty to violating the Intelligence Identities Protection Act (IIPA) when he confirmed the name of an officer involved in the CIA’s Rendition, Detention and Interrogation (RDI) program to a reporter. He was sentenced in January 2013 and reported to prison on February 28, 2013.
Kiriakou writes in the letter dated January 22, 2015, that he did not know the officer or ever “have any contact with him,” however, it is his understanding that the man was a “nice guy,” someone “friendly, reasonable and honest.” He feels very sorry for his family, but the response from staff was “fascinating.”
As a CIA officer, when he lost a colleague, a star would go up on the agency’s Wall of Honor. Everyone would move on. That is not how the prison chose to handle the death.
-
-
-
-
-
-
John Kiriakou was the first whistleblower to reveal that torture was the official policy of the the Goerge W. Bush Administration.
-
-
-
“I knew I was not guilty, and my attorneys knew I was not guilty, but a jury would convict a ham sandwich given a chance,” he said.
The government pursued the prosecution on the leak because of the 2007 television interviews, he said.
“I’ve maintained from the very beginning, as did my attorneys, that my case was not about a leak. My case was about torture,” he said.
A Justice Department spokesman said Kiriakou has made the whistleblower retaliation claim since he was indicted.
-
It is a scandal stretching across six decades: the forced removal of hundreds of native people from a British overseas territory to make way for a US military base. That Diego Garcia, the main island in the Chagos archipelago – seven atolls in the Indian Ocean – has played a part in the CIA’s torture programme has only added to Britain’s sense of shame.
-
The United Nations, which is the legal guardian of scores of human rights treaties banning torture, unlawful imprisonment, degrading treatment of prisoners of war and enforced disappearances, is troubled that an increasing number of countries are justifying violations of UN conventions on grounds of fighting terrorism in conflict zones.
-
The ex-CIA officer who first blew the whistle on the agency’s waterboarding practice says the 30-month prison sentence he got for revealing classified information was “worth it.”
“It’s been a terrible three years, and it’s ruined me financially and personally, but in the greater picture it’s all been worth it,” John Kiriakou told Fusion over the phone from Arlington, Virginia, where he just began serving an 85-day house arrest sentence. It was his first interview since leaving a federal prison in Pennsylvania on Tuesday.
“I’m proud I had a role in seeing that torture is now banned in the United States,” he said.
For now, he’s only able to leave his home to go to a halfway house or to church, so Kiriakou, 50, is struggling to wrap his head around everything that happened while he was behind bars—namely the release of the Senate’s torture report less than two months ago.
-
The Obama Administration is pledging that it won’t destroy or return copies of the full-length Senate Intelligence Committee report on CIA detention and interrogation practices without permission from the federal courts.
In a court filing Friday night, the Justice Department asked U.S. District Judge James Boasberg not to grant an American Civil Liberties Union motion seeking to block the government from returning the unabridged versions of the so-called torture report to the Senate as new Senate Intelligence Committee Chairman Richard Burr (R-N.C.) has requested.
However, Justice Department lawyers agreed not to send the report back to the Hill while the ACLU’s Freedom of Information Act lawsuit is pending, unless they seek Boasberg’s okay to do so.
-
When conservative Christians claim that the Bible God condones torture, they’re not making it up. A close look at the good book reveals why so many Christians past and present have adopted an Iron Age attitude toward brutality.
-
When the hijacked airplanes hit the World Trade Towers on 9/11, John Yoo was working in his Justice Department office in Washington, D.C. At the time, he was assigned to one of the most crucial legal departments in the federal government, the Office of Legal Counsel (OLC). Although he was an important lawyer in the administration of President Bush, Yoo himself was not well known outside of a close circle of Washington bureaucrats and policy wonks. He wasn’t famous. But all of that would change very quickly.
Yoo had taken a leave of absence from Berkeley Law School to work for the Bush administration. His academic work had focused on constitutional law and foreign affairs, and he had earned a reputation for being a strong supporter of presidential war powers. According to Yoo, the president of the United States has virtually unlimited power as the constitutionally appointed commander in chief of the armed forces. Although Congress can play some role in times of war, Yoo had insisted in a series of law review articles that this role was secondary at best. In times of crisis, presidential power always trumps congressional deliberation.
-
Everybody gets upset by the anti-democratic acts, the shelving of the Constitution, the non-compliance with judicial decisions and the pressure on the business world, civil society and opposition parties.
Maybe we should just be sad about people who, after being humiliated in the past and imprisoned for exercising fundamental rights, embraced democratic reforms and standards, only to abandon this democratic stance. Maybe we should be just sad about a person or a group of people who have been against a single-party regime for many years but have started to implement one. We should be sad about people who, after arguing that they would subscribe to religious and ethical principles, violated all ethical rules and considerations once they acquired power.
-
An 8-year-old boy in Nice, a small city on France’s Mediterranean coast near Italy, was hauled out of school to the police station. The boy’s father was called, television crews were summoned and headlines blared about the boy allegedly not respecting the minute of silence for Charlie Hebdo victims. An atmosphere of frenzied overreaction was created. (TV2, Jan. 28)
-
The US leadership role in the world is undermined by political dysfunction and polarization in the country, the US National Security Strategy released on Friday stated.
[...]
A CIA torture report released in December detailed a wide range of practices used by the agency, including waterboarding, mock executions, prolonged sleep deprivation and threats of sexual abuse in the wake of the September 11, 2001 attacks on New York and Washington.
-
Last year, government lawyers made inquires into allegations that CIA personnel and Senate Intelligence Committee staffers broke federal laws in connection with the committee’s work on the Senate torture report. But the Department of Justice has classified dozens of pages of documents related to that investigation.
[...]
VICE News filed a Freedom of Information Act (FOIA) request for those criminal referrals as well as all documents that “refer” to it. In a letter dated January 26, the Justice Department’s National Security Division said it identified about 85 pages — and that it was withholding all but two pages on grounds that disclosure would threaten national security, result in an unwarranted invasion of privacy, and reveal behind-the-scenes deliberations.
-
Many in Congress and the news media were surprised by a recent CIA Accountability Board report that cleared CIA personnel of wrongdoing in last year’s spying-on-Congress scandal, a finding that contradicted a July 2014 report by the CIA Inspector General. However, a close reading of both reports — which were released in unclassified form last month — indicates that the fault in this affair lies almost entirely with the Senate Intelligence Committee, whose staff appeared to have engaged in serious misconduct, including trying to smuggle a camera into a secure CIA facility, hacking into a CIA computer system, and stealing and misusing classified documents subject to attorney-client privilege.
-
Mr Krongard was Executive Director of the CIA from 2001 to 2004 and a former chairman of Alex. Brown and Sons, a Baltimore investment bank.
After being recruited, Hale says he helped run a fake company created under a legitimate corporation the Agency created.
The fake company included shipping and trucking companies which Hale ran whilst leading the bank.
Hale travelled extensively to countries such as Saudi Arabia, Israel, Poland, Denmark, and Norway. This was in order to provide cover to operatives supposedly working for the company.
-
“History, despite its wrenching pain, cannot be unlived,” wrote Maya Angelou, “but if faced with courage, need not be lived again.” We call on U.S. Sen. Richard Burr to stop trying to unlive our nation’s ugly torture program, and face it with courage.
-
Last Saturday, January 31, CIA Inspector General David Buckley resigned after a little more than four years in office. His departure came at the end of the same month his office published a scathing report that found the agency committed serious wrongdoings in connection to its rendition, detention, and torture program. It was also the same month that his report was swept aside by a parallel investigation conducted by a CIA “Accountability Board” that was hand-picked by agency leadership. Unsurprisingly, the Accountability Board recommended holding no one accountable for any failings.
-
-
Winston-Salem’s own Sen. Richard Burr is at the center of an epic struggle over whether we will be allowed to know the truth about the taxpayer-funded torture that stains our nation’s soul. He has taken an astonishing action that appears at odds with both law and morality.
Sen. Burr, now chair of the Senate Intelligence Committee, recently wrote to the White House insisting that all copies of his committee’s 6,900-page report on CIA torture be “returned immediately.” The report had been distributed to many agencies and departments within the executive branch, and the idea of its being totally wrapped in secrecy again is ludicrous.
-
The FAIR study reviewed the guests of several popular news shows in the week when the report was most prominently discussed. The surveyed programs included the five Sunday talk shows (NBC’s Meet the Press, CBS’s Face the Nation, ABC’s This Week, Fox News Sunday, and CNN’s State of the Union) along with four weekday news shows (MSNBC’s Hardball, Fox’s Special Report, CNN’s Situation Room, and the PBS NewsHour).
[...]
Only 18 guests articulated clear opposition to the CIA’s torture practices. That’s just half the number who spoke up in support.
-
British prime minister David Cameron has hinted that UK will launch an investigation by an independent inquiry into the country’s involvement in CIA torture.
The Intelligence Security Committee (ISC) is already investigating whether British officials were complicit in torture overseas.
Revelations were made recently that British overseas territory of Diego Garcia had been used to interrogate terrorist suspects.
-
He also has expressed concern at the “disproportionate” number of young black Americans who die in encounters with police officers and the high rate of blacks in U.S. prisons and on death row.
-
The article continues with a condemnation of a petition from Nobel Peace Prize winners Adolfo Perez Esquivel and Mairead Corrigan Maguire, with 129 other signatories, which criticized HRW for having “close ties to the U.S. government which call into question its independence.” There has been plenty of mudslinging back and forth about this, but in essence, the authors of the petition contend that Human Rights Watch employs too many former American officials, including veterans of the CIA and a former NATO Secretary General, thus compromising the independence of the group. They think this influence causes Human Rights Watch to go easy on American violations.
-
According to Wikidpedia, “An expatriate (often shortened to expat) is a person temporarily or permanently residing in a country other than that of the person’s upbringing. The word comes from the Latin terms ex (“out of”) and patria (“country, fatherland”).”
Defined that way, you should expect any person going to work outside of his or her country for a period of time would be an expat regardless of his skin color, country, etc.
That is not the case in reality: expat is a term reserved exclusively for western White people going to work abroad.
Africans are immigrants.
Arabs are immigrants.
Asians are immigrants.
However Europeans are expats because they can’t be at the same level as other ethnicities. They are superior. Immigrants is a term set aside for inferior races.
-
Internet/Net Neutrality
-
After waffling for months on the question of Net neutrality, who would have guessed that former telecom lobbyist Tom Wheeler would argue such a strong case for reclassifying broadband as a Title II common carrier? Though the FCC steered clear of onerous regulation, the reaction from telecoms has been largely a howl of distress.
-
There’s been plenty of propaganda concerning the net neutrality fight, but with FCC boss Tom Wheeler finally making it official that the FCC is going to move to reclassify broadband, it’s kicked into high gear of ridiculousness. An astroturfing front group that’s anti-net neutrality is trying to make a “viral” anti-net neutrality video, and it did so in the most bizarre way, by making an attempted parody porno video, based on the classic “cable guy” porno trope.
-
DRM
-
A year ago, the largest video site on the net ditching Flash would have been a blow for Internet freedom. Today, it’s a bitter reminder of how the three big commercial browser vendors—Apple, Microsoft and Google—Netflix, the BBC, and the World Wide Web Consortium sold the whole Internet out.
Permalink
Send this to a friend
02.07.15
Posted in News Roundup at 8:12 pm by Dr. Roy Schestowitz

Contents
-
The upcoming PapyrOS is trying to build an entirely new Linux distro (based on Arch Linux) which will have Android 5.0′s now famous material-design inspired look and feel.
-
Server
-
Oracle puts its official mark on Oracle Linux and MySQL images on the Docker Hub registry.
-
Kernel Space
-
Greg Kroah-Hartman has released stable kernels 3.10.68, 3.14.32, and 3.18.6, each with important fixes and updates throughout the tree.
-
Graphics Stack
-
While all exciting work going into Mesa Git is for Mesa 10.5, Mesa 10.4.4 is out for stable users sticking to tagged releases. Mesa 10.4.4 fixes just a handful of bugs rangingg from core Mesa to the i965 driver and DRI3.
-
A set of fourteen patches were published today for the Intel Mesa DRI driver for implementing glMemoryBarrier() as needed by OpenGL 4.2 and newer.
-
Benchmarks
-
As the latest Linux benchmark numbers to deliver for Intel Broadwell and the new ThinkPad X1 Carbon ultrabook, here’s a nine-way Linux laptop/ultrabook comparison. All nine devices in this article were tested against the latest snapshot of Ubuntu 15.04 while running a big set of benchmarks and also monitoring the CPU temperatures and battery power consumption while testing for a nice look at Clarksfield/Nehalem, Sandy Bridge, Ivy Bridge, Haswell, and Broadwell mobile hardware on Linux.
-
Applications
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
Wireless printing has made it possible to print to devices stored in cupboards, sheds and remote rooms. It has generally shaken up the whole process of printing and enabled output from smartphones, tablets, laptops and desktop computers alike. But you don’t have to own a shiny new printer for this to work; old printers without native wireless support don’t have to end up in the bin, thanks to the Raspberry Pi.
-
Wine or Emulation
-
Wine (Wine is not an emulator) 1.7.36 is now out and comes with quite a few improvements and new features, not to mention the fixes for various applications and games that have been added.
-
Wine 1.7.36 has been released and it brings a few new features while correcting 44 outstanding bugs over the past two weeks.
-
Wine development team was able to produce a new experimental release today. 1.7.36 bringing many new features and as many as 44 bugfixes.
-
Games
-
Feral Interactive, a game publisher and developer that historically focused on bringing AAA games to Mac OS X, is now looking to do more Linux game ports.
-
While LZHAM 1.0 was recently released, the former Valve engineer behind the compression library targeting game assets, Rich Geldreich, is already targeting more post-1.0 improvements to this library.
Rich Geldreich blogged today about some upcoming LZHAM decompressor optimizations that improve the speed by up to around 2%, which can become significant when dealing with game assets of several gigabytes.
-
Feral Interactive are looking to expand their team to help out with the Linux (and Mac) porting, so this could be a great opportunity for a few of you. Feral are responsible for the excellent Linux ports of XCOM Enemy Unknown and Empire: Total War.
-
Apotheon is an indie game based on the concept of taking the ancient Greek mythological pottery art-style and story; incorporating it with a 2D metroidvania (platform adventure), heavy physics driven, open world. Wow, what a mouthful description. I hope I didn’t butcher it because it’s one hell of an adventure I want to embark on!
-
Red Goddess, an upcoming platformer projected for release this month, now has a new trailer showing off some more action as well as introducing the plot of the game.
-
Deadnaut is Screwfly Studios’ second game and follow up to cult hit, Zafehouse: Diaries. Deadnauts, so named because they’re unlikely to return, must explore, investigate and fight their way through the derelict ships of dead civilisations. Every mission is unique and no two locations are the same.
-
Desktop Environments/WMs
-
The Elive Team is proud to announce the release of the beta version 2.5.4
-
-
Linux Questions — the place you go where you really need a Linux or FOSS question answered because, well, most of the smart FOSS folks are there answering them — released the results of its Members Choice Awards for 2015.
So when the membership of LQ speaks — or at least votes on FOSS programs — you should probably listen. Don’t take my word for it: Steven J. Vaughn-Nichols thinks so, too.
There were some expected results: For example, LibreOffice wins the Office Suite category by a ton, garnering 86 percent of the vote. To break this down, that’s nearly 9 in 10 folks favoring LibreOffice to the second-place finisher, Apache OpenOffice, and the others.
Same with categories like Browser of the Year — Firefox, need we say more? — with the blazing vulpini taking 57 percent in a crowded field. Same for Android, the Mobile Distribution of the Year which finished 40 percentage points ahead of the second-place finisher. Even vim, at 30 percent in a crowded field, heads up the Text Editor category with three times the votes of Emacs.
-
New Releases
-
Looking for a bit of mystery from your Linux distribution? 4MLinux delivers just that—and much more. In fact, the four M’s in its name stand for maintenance, miniserver, multimedia and mystery—the four elements that the distribution delivers. The “mystery” actually refers to gaming, which is a component of 4MLinux. This is not your average Linux distribution in other areas as well. Many Linux distributions in the market today are based on larger community Linux distributions. For example, many distributions use Ubuntu as a base, and Ubuntu itself is based on the upstream Debian Linux project. That’s not the case with 4MLinux, however, as it’s not based on another Linux distribution. Many Linux distributions also tend to favor GNOME or KDE as the default desktop, but not 4MLinux. 4MLinux leverages Joe’s Window Manager (JWM) as its default desktop environment. 4MLinux is available in several editions, including an Allinone Edition and 4MRescueKit, which focuses on the maintenance capabilities. 4MLinux 11.0 Allinone and 4MRescueKit were released on Jan. 24, while 4MLinux 11.1 beta Allinone was released on Feb. 1. In this slide show, eWEEK examines the key features in the new 4MLinux 11.1 Allinone update.
-
Arch Family
-
We’re happy to announce the 0.8.12 release of Manjaro Linux installation media, including images for the Xfce and KDE4 desktop environments, and our minimal ‘Net’ edition. This release is predominantly a maintenance release and includes very few changes to system defaults relative to the previous 0.8.11 ISOs, with some notable exceptions, such as out-of-the-box support for the exFAT file system and the change to pacman 4.2. Otherwise all the usual upstream updates are included, along with the latest from the Xfce 4.11 development series and the KDE 4.14 series.
-
Manjaro, a Linux distribution based on well-tested snapshots of the Arch Linux repositories and powered by the Xfce and KDE desktop environments, has been upgraded to version 0.8.12 and is now ready for download.
-
Slackware Family
-
Repeat message: Widevine is a Content Decryption Module (CDM) used by Netflix to stream video to your computer in a Chromium browser window. With my chromium and chromium-widevine-plugin packages you no longer need Chrome, or Firefox with Pipelight, to watch Netflix. The chrome-widevine-plugin is optional. If you don’t need it, then don’t install it. It is closed-source which for some is enough reason to stay away from it. The Chromium package on the other hand, is built from open source software only.
-
Red Hat Family
-
Fedora
-
It has taken a few weeks longer than we had hoped, but Korora 21 images are now available. I strongly recommend downloading with BitTorrent if you can.
The 21 beta was quite successful and we were able to make some minor changes to help improve the overall experience. Users who are currently on the beta need not re-install, updates are provided via the package manager. Users who are on 20 may consider upgrading, however this is not necessary as version 20 is supported for another 6 months or so.
-
Debian Family
-
It’s the end of an era, lightweight Linux fans. Philip Newborough has decided that it’s time to move on, and he’s ceasing development of #! — CrunchBang, for the uninitiated.
-
Derivatives
-
By now, most if not all of you have seen Philip Newborough’s announcement that he is moving on. First things first: Thank you, Philip, for providing sensible and solid leadership over the past several years. And, of course, all of us are grateful for your bringing CrunchBang — a simple and solid distro that works on a wide range of hardware — into the world.
-
Philip Newborough today announced the end of his Linux project that produced the fairly popular CrunchBang distribution. A few years back it seemed like a post would pop up every few days praising CrunchBang but Newborough said today that it was time to call it quits. “When progress happens, some things get left behind, and for me, CrunchBang is something that I need to leave behind.” He said his users would be better off using vanilla Debian nowadays. Once upon a time CrunchBang filled a niche but today there are other more popular choices according to Newborough. He said of CrunchBang, “I honestly believe that it no longer holds any value.” So the community bids adieu to yet another favorite…
-
Canonical/Ubuntu
-
-
-
-
The BQ Aquaris E4.5 Ubuntu Edition smartphone has been announced and will begin shipping in the days ahead.
-
Canonical and BQ are launching the first Ubuntu Touch phone — the dual-SIM, quad-core, 4.5-inch “Aquaris E4.5 Ubuntu Edition” — for 170 Euros unlocked.
Starting on Monday, Spanish mobile manufacturer BQ will begin selling the world’s first Ubuntu-based phone, the Aquaris E4.5. The long-awaited Ubuntu phone will initially be sold in a series of limited volume “flash sales” across Europe that will be announced in the coming week. You can buy the dual-SIM phone unlocked for 169.90 Euros (about $190) and then purchase SIM bundles from 3 Sweden, amena.com (Spain), giffgaff (UK), and Portugal Telecom.
-
Canonical announced today that the first Ubuntu phone, made in partnership with BQ, called Aquaris E4.5 Ubuntu Edition, will go on sale in Europe starting next week on BQ.com, through a series of “flash sales”, and it will cost 169.90 Euros (~ $193 / £127).
-
Jane Silber, CEO at Canonical comments; “The launch of the first Ubuntu smartphones is a significant milestone. The new experience we deliver for users, as well as the opportunities for differentiation for manufacturers and operators, are a compelling and much-needed change from what is available today. We’re excited that a rising star like BQ has recognised this opportunity and is helping us make it a reality.”
-
-
-
-
-
-
-
-
-
-
-
-
Let’s face it, if you’re going to buy a new smartphone, you’re probably looking at the iPhone and Android first, because almost everyone you know has either one or the other, You may also be inclined to try other things such as Windows Phone and BlackBerry, which may better suit your current smartphone needs. But don’t forget that there are plenty of other mobile operating systems to choose from, although they’re not very popular.
-
-
-
-
-
Unity 8 is coming to the Ubuntu desktop and it’s bringing with it the Mir display server, Qt implementation, and a host of other core modifications. That doesn’t mean that traditional GTK+ apps won’t work anymore and there is proof of that.
-
Following the announcement of the BQ Aquaris E4.5 Ubuntu Edition that will begin going up for sale next week, the first real hands-on videos of the Ubuntu Phone in action are starting to come out…
-
BQ and Canonical announced the Aquaris E4.5 Ubuntu Edition yesterday, which will available for purchase very soon, but only in Europe. The rest of the world will have to wait, but there is good news. The United States haven’t been forgotten and plans are in motion to have a hardware partner for those territories as well.
-
-
The Creator 120 and the Raspberry Pi 2 are single-board computers designed for developers and hobbyists.
The Creator C120 was announced in late 2014, but started shipping at about the same time that the Raspberry Pi 2 was announced/starting shipping, which was just last week.
-
Phones
-
Tizen
-
The Tizen based Samsung Z1 has now gone on sale in India, and now has also began its rollout in Bangladesh, but there is one major problem that faces overseas linux enthusiasts / early Tizen adopters that have purchased the Z1, namely being you can only access the Tizen Store using the Samsung Z1 from the country that this product is currently being sold in.
-
Android
-
Samsung is losing ground, and that has allowed iOS to overtake Android in the US. But with the flagship Samsung Galaxy S6 now on the horizon, will it have what it takes to win back the fans.
-
Over the past year some excellent Android tablets have been released to rival Apple’s popular iPad lineup, and choosing the right one can sometimes be difficult. These days consumers have a lot of choices and making a decision isn’t going to be easy. This is especially true for the average buyer that doesn’t keep up with the latest and greatest device announcements, or know about budget options released during the year.
-
-
Part of the allure of Android One was that it would bring faster, almost Nexus-like updates to lower end phones, promising an affordable offering that would still provide a decent Android experience. With the slow update to Lollipop and the fact that sale numbers are reportedly not all that high, is Android One delivering on this promise? That’s exactly what we wish to discuss for this week’s Friday Debate. Can Android One prove to be a success, despite a somewhat slow start, or with so many other affordable devices is it a largely unnecessary program?
-
-
Cloud has become one of the buzzwords in modern computing; there are so many advantages of cloud that it can’t be ignored. It is becoming an integral part of our IT infrastructure. However cloud poses a serious threat to the ownership of data and raises many privacy-related questions. The best solution is to ‘own’ your cloud, either though an on-premise cloud running in a local network disconnected from the Internet or one running on your own secure server. Seafile is one of the most promising, open source-based cloud projects.
-
Last week I was in Italia at the Cisco Live! Milano event where I also had the opportunity to speak about OpenDaylight (ODL) and Software-Defined Networking (SDN). What stood out for me the most during my time there was the tremendous progress being made on technologies that are really disrupting the networking space
SDN and NFV have been advancing innovation in the networking industry over the past few years, but it’s still early, and not many of the technologies have made it out of the lab and into the networks – until now.
-
Events
-
-
The calls for proposals (CFPs) for Linux Plumbers Conference microconferences and refereed track presentations are now up. The conference will be held August 19-21 in Seattle, WA, co-located (and overlapping one day) with LinuxCon North America.
-
The X.Org Board of Directors have decided on Toronto, Canada as the location for this year’s annual X.Org Developers’ Conference.
-
The second release candidates to Wayland 1.7 and the reference Weston compositor is now available.
Wayland 1.7 RC2 fixes a regression on older systems (Ubuntu 12.04 ea) and a fix for a test failure on systems with the Yama Linux Security Module enabled. Wayland 1.7 RC1 was released last week.
-
SaaS/Big Data
-
Encouraged by the promise of cost savings and better efficiency, early adopters are wading into Hadoop as a central reservoir for their analytics data.
-
I recently taught an MBA course at the University of San Francisco titled the “Big Data MBA.” In working with the students to apply Big Data concepts and techniques to their use cases, I came away with a few observations that could be applied by any entrepreneur.
-
Pivotal, the cloud computing spinoff from EMC and VMware that launched in 2013, is preparing to blow up its big data business by open sourcing a whole lot of it.
Rumors of changes began circulating in November, after CRN reported that Pivotal was in the process of laying off about 60 people, many of which worked on the big data products. The flames were stoked again on Friday by a report in VentureBeat claiming the company might cease development of its Hadoop distribution and/or open source various pieces of its database technology such as Greenplum and HAWQ.
-
Though the open-source OpenStack cloud platform only has two major releases in any given year, each release is preceded by a steady cadence of incremental milestone updates.
-
FSF/FSFE/GNU/SFLC
-
In recent times Red Hat has proven, through their political maneuvering and control over the GNU/Linux community, the need to rethink the definition of “Software Libre”. The violent and absurd landing of systemd over 99% of the GNU/Linux distributions is proving that it is not enough that the source code of the software is free for users to be free. We have lost the freedom of choice, control, and decisions made on our systems.
In the times we live is not enough that the source code is released under the GPL license to ensure that software is free. Some years ago, when words GNU and Linux perhaps were known to few, and the companies behind them were not competing for the millions of dollars generated today, perhaps this was true. But today there are other variables at play such as freedom of developers and users.
Whoever controls the free software developers will be able to control his users. It has become clear that even though the source code is free, if the user loses his ability to choose freely and hasn’t resources (knowledge, time and money) to adapt the code to your needs and/or preferences, ” freedom “is an empty word.
-
Richard Stallman has come out against support for basic LLVM debugger (LLDB) support within Emacs’ Gud.el as he equates it to an attack on GNU packages.
-
The GNU C Library version 2.21 is now available.
-
Project Releases
-
After Opera 27 stable, Opera 28 beta released with new features and improvements. The new major features are regarding bookmarks, syncing bookmarks with multiple devices is very useful feature added to this beta release.
-
Public Services/Government
-
“Our nation’s elections systems and technology are woefully antiquated. They are officially obsolete,” says Greg Miller of the TrustTheVote Project, an initiative to make our voting system accurate, verifiable, transparent, and secure. He adds: “It’s crazy that citizens are using twentieth-century technology to talk to government using twentieth-century technology to respond.”
Miller and others are on a mission to change that with an entirely new voting infrastructure built on open-source technology. They say open source, a development model that’s publicly accessible and freely licensed, has the power to upend the entire elections technology market, dislodging incumbent voting machine companies and putting the electorate at the helm.
-
Licensing
-
You’ve found an amazing open source project that you think will enhance your proprietary software. But before you and your team of developers can get to work incorporating someone else’s code into your own product, there are some basic steps that you need to take.
-
Openness/Sharing
-
This week the team at Raspberry Pi unvieled the Raspberry Pi 2. Its increased horsepower means that emulation of the Nintendo 64 and Playstation 1 are possible, as the Raspberry Pi team shows us with some gameplay footage of Mario Kart 64 and Spyro the Dragon.
-
Free and Open Source software has revolutionized how the world consumes software. Linux, BSD, httpd, nginx, MySQL, PostgreSQL, and thousands of other software products are consumed voraciously. But almost universally people are only consuming. And generally that’s okay. Sharing is one of the key tenets and strengths – that we are able to freely share code to help our neighbor.
-
Health/Nutrition
-
According to the World Health Organization, they have a higher measles immunization coverage among 1-year-olds than the United States. And, as this interactive map shows, they are far from alone.
-
The agency’s new inspection model is a threat to food safety, federal whistleblowers allege
-
Security
-
We’re addicted to Adobe Flash, and it’s time to break the habit. In the last three months, multiple Flash security holes have been found and exploited. In the last two weeks alone, security expert Brian Krebs has reported that Adobe has released three emergency Flash security patches. Enough already.
-
A while back I wrote about John McAfee saying that North Korea had nothing to do with the Sony breach, now Taia Global a US security firm is stating that Russian hackers could have been the ones behind the attack and that they could still have access to Sony’s servers.
-
-
There’s a new twist in the already tangled tale of the Sony Pictures mega-hack: it’s now claimed Russians possibly broke into the company’s computers.
-
The insurer acknowledged that data accessed by hackers had not been encrypted, as is the normal practice at many companies.
-
Defence/Police/Secrecy/Aggression
-
In other words, Kissinger blames the U.S. and Europe for the current catastrophe in Ukraine. Kissinger does not begin at the point where there is military conflict. He recognizes that the problems in Ukraine began with Europe and the U.S. seeking to lure Ukraine into an alliance with Western powers with promises of economic aid. This led to the demonstrations in Kiev. And, as we learned from Assistant Secretary of State Victoria Nuland, the U.S. spent $5 billion in building opposition to the government in Ukraine.
-
For years, some current and former American officials have been urging President Barack Obama to release secret files they say document links between the government of Saudi Arabia and the Sept. 11 attacks.
-
Questions over the 28-page section of the congressional report have been raised this week following the deposition of imprisoned former al-Qaeda operative Zacarias Moussaoui in which he claimed major Saudi figures were donors to his group in late 1990s.
Saudi officials have denied this.
According to White House spokesman Josh Earnest, US intelligence last year began reevaluating the decision to classify the section following a request from congress, though no timescale for the decision was given.
-
Although U.S. drones firing missiles at suspected bad guys in faraway places — such as Pakistan, Yemen, and Somalia — have gotten much publicity in recent years, it was recently revealed that the CIA assassinated top Hezbollah terrorist Imad Mugniyah with a good old-fashioned car bomb in Damascus, Syria with President George W. Bush’s strident approval in 2008. Because of an executive order, signed in 1975 by President Gerald Ford, prohibiting assassinations by the CIA, presidents usually get around that order by using the military to kill an enemy bigwig and then make the disingenuous claim that it was merely taking out a “command and control” target rather than an assassination. In this case, Bush, never one to observe constitutional or legal niceties, became incensed that the CIA director was being too timid in carrying out the hit using the exploding car. The real issue in such cases is not whether it is more dangerous to liberty to kill the enemy using a high-tech drone or a more traditional car bomb, but whether it constitutional to do either.
-
But despite their vaunted precision, there are reports the latest strike in Somalia, on January 31, killed or injured civilians.
-
At least 45 suspected al-Shabaab militants have been killed in drone strikes in Southern Somalia on Saturday, a government official said.
-
A commander of Islamist militant group al-Shabaab was killed in a US drone attack in Somalia, the East African nation’s National Intelligence and Security Agency said Wednesday.
“The killed al-Shabaab commander is called Abdinur Mahdi, also known as Yusuf Dheeg,” NISA said in a statement.
Dheeg, who was killed on Saturday, was in charge of coordinating attacks inside and outside of Somalia, as well as assassinations and suicide bombings, the statement added.
-
At least 2,464 people have now been killed by US drone strikes outside the country’s declared war zones since President Barack Obama’s inauguration six years ago, the Bureau’s latest monthly report reveals.
-
This week Women Against War and members of several other Capital District peace groups joined in a Statewide lobbying initiative of our two Senators, Kirsten Gillibrand and Chuck Schumer, after having to re-schedule our Monday appointments due to the foot of snow and more that fell on the area.
-
According to Peter Singer, a Senior Research Fellow at the Brookings Institute, “The first predator drones were used in 1995 during the Balkan conflicts in Bosnia and Kosovo. By 2000, the Air Force was developing ways to weaponize predator drones, as they were previously used exclusively in spy missions. When the US started the war in Iraq, back in 2003, there were a handful of drones in the air. By 2010, there were over 5,300 drones operating in Iraqi airspace. Additionally, the US went into Iraq with zero unmanned ground systems. By 2010, there were over 12,000 operating in the combat zone.”
-
Three BBC journalists have been questioned by Swiss police for breaching high-level security protocols by using a drone at the World Economic Forum in Davos last month.
-
My fear is that some of the dishonest people in government will abuse drones and push for drone strikes on U.S. soil. Food for thought.
-
It was recently reported that $400 million worth of US military weapons went missing in Yemen over the past several years. The equipment includes helicopters, night-vision gear, surveillance equipment, military radios and airplanes.
-
Chaos in the functionally leaderless country has seen Houthi rebels reportedly take control of Yemeni military’s arms depots and bases
-
America’s war machine breeds enemies faster than the US can kill them, argues Larry Beck.
-
As Europe still reels from the Charlie Hebdo and Hyper Cacher attacks in Paris, something far more profound to Western security is happening largely unnoticed—the failure of remote-control warfare. Open Briefing’s remote-control warfare briefing for January, commissioned by the Remote Control project, identified and analysed several trends, which taken together indicate the tactics and technologies deployed are coming back to haunt those Western powers that have embraced them in recent years.
-
President Obama is being urged to supply Ukraine with “defensive lethal assistance”, which sounds almost like a contradiction in terms. James Morgan asks what people mean by “defensive” weapons – and finds out it’s what a hedgehog has.
It’s widely believed in the US, and in other Nato countries, that Russia is not only arming the rebels but sending soldiers to fight alongside them, so the pressure is increasing on the White House to ramp up military supplies to the Ukrainian government to help it resist a new offensive.
Currently the US only provides non-lethal equipment, such as gas masks, night-vision goggles and radar. How much further can it go without escalating the conflict or being seen as an aggressor?
-
The leaders of Germany and France fly to Kiev and Moscow with new Ukraine peace plan as Nato bolsters eastern Europe against Russia and EU agrees new sanctions. Follow the latest developments
-
Vladimir Putin has restarted his war against Ukraine, and the U.S. and Europe are unsure how to respond. While Europe has apparently decided that no toughening of economic sanctions is called for, some in Washington are calling for equipping Ukraine with lethal weapons.
Yet arming Ukraine is likely to backfire: It risks misleading the country — which is now pressing to join the North Atlantic Treaty Organization — into believing the U.S. will do what it takes to defeat Russia. It also risks encouraging Russia to expand the war, because it knows the U.S. and its NATO allies don’t have sufficient interests at stake to go all the way. The parallels often drawn with the war in Bosnia, where a U.S. arms and training program eventually turned the war and forced a peace, aren’t helpful: Serbia was a military minnow next to Putin’s nuclear-armed Russia.
-
Video gamers are more prepared for military service than people the same age were in previous generations.
“We don’t need Top Gun pilots anymore, we need Revenge of the Nerds,” said Missy Cummings, former US Navy pilot, Assoc. Prof. of Aeronautics, MIT in Drone Wars: The Gamers Recruited To Kill, a documentary film about gamers and drone operators.
-
Many who are praising the film say the movie is about him, not about the politics of the Iraq war. “It’s a movie about a man, a character study,” said lead actor Bradley Cooper. “The hope is that you can somehow have your eyes opened to the struggle of a soldier, as opposed to the specificity of the war.” Others argue American Sniper is “both a tribute to the warrior and a lament for war,” as the Associated Press reviewer wrote.
Bullshit. Regardless of the intentions of those making these claims, bullshit.
This is a profoundly reactionary movie. American Sniper humanizes and glorifies Chris Kyle, an unrepentant Christian fundamentalist mass murderer, who killed 160 Iraqis (supposedly the most “kills” by any U.S. soldier in history). Meanwhile, the movie demonizes and dehumanizes every single Iraqi (with the possible exception of one family), portraying them as evil terrorists and “savages” who deserve to die.
By telling this story through Kyle’s eyes and purported experience (and prettifying that story), American Sniper weaves a fable about the U.S. invasion of Iraq and its role in the world: America is a force for good. Whatever its mistakes, the U.S. sends its military to places like Iraq to try to protect the innocent and destroy evil. It promotes the outlook that only America and American lives count and anything goes to “defend” them. This is the big lie on the big screen.
-
The Pentagon is doubling down on the development of a new arsenal of stealth fighters, bombers, and drones in its newly unveiled budget for next year.
Never mind the “fifth generation” stealth jets currently rolling off defense contractor assembly lines. The Pentagon is starting to pour money into three different projects to research and develop “sixth-generation” stealth fighters, plus funding for a new Air Force stealth bomber and new Navy carrier-based stealth drone.
-
Brussels. Ottawa. Sydney. Paris. “Terrorist” attacks in these western cities in the last one year have claimed 29 lives. Add to this the beheadings of western citizens by the Islamic State. The horror evoked by these has led to an outcry against Islam and fierce debates about the necessity of reform in Islam. In France, 3.7 million people marched in solidarity — in the largest public rally since the Second World War — with the victims of Charlie Hebdo to show that western civilisation cannot be defeated by Islamic fanatics.
We are back to the days of 9/11 and other terror events in the West, and the debate assumes familiar directions: freedom of speech versus violent threats to it and the enlightened West versus barbaric Islam. We are presented this black and white world even by non-Muslim and non-western nations who have joined the project of moderating and domesticating Islam. Of course, there have been nuanced positions which have affirmed the right to free speech while at the same time calling out Charlie Hebdo for its racist portrayals of Islam. But the issue is larger than this.
-
The Pentagon would get $585 billion next year under the Obama administration’s proposed budget, reversing a five-year decline in military spending and blowing past mandatory spending caps imposed by Congress.
-
The Pentagon has said it has killed 6,000 fighters since coalition strikes began five months ago; the intelligence community estimates 4,000 foreign fighters have entered the fray since September. (A higher estimate, made by The Washington Post, holds that 5,000 foreign fighters have flowed into the two countries since October.)
-
New Zealand’s contribution to oppressed peoples’ fighting US imperialism will be high on the agenda of his talks in Wellington today with British Foreign Secretary Philip Hammond.
-
Agonizing as it may be, we need to stand humbly before all these fraught, painful questions because the problem in Mindanao is neither just a military, a legal, or an institutional problem—something that could be solved by increased firepower, policy formulation or institutional reengineering. It is ultimately and inescapably a moral problem: something that could only be solved by resolving broader questions of power and justice—and thus, something, that could only be solved through politics in the broader sense of the term: politics not as wheeling and dealing, but politics as the struggle over how we should live with our fellow human beings, over how should organize our society so we can live the “good life”—the kind of politics that people will kill and die for.
-
They were not alone. Big Brother was up there monitoring their every move.
“Kasalukuyan pong nag-e-encounter ang 5th Battalion sa Maguindanao para sa misyon kay Marwan” (The 5th Battalion is right now engaged in a mission in Maguindanao against Marwan), an officer from the assault team said, recording what was happening on the ground about 8 in the morning of Jan. 25 in Mamasapano, Maguindanao.
-
A drone sent by the United States was key in locating pinned Philippine National Police Special Action Force units during the recent Mamasapano operation where 44 elite lawmen were killed, “24 Oras” reported on Wednesday.
According to the GMA News source, the US sent a drone to Mamasapano, Maguindanao after the PNP-SAF asked for support.
-
Relatives describe Mohammed as a joyful 12 year old, enjoying school. When he was killed in a latest drone strike in Yemen, authorities listed him as a ‘militant’. The family previously lost Mohammed’s father and brother in a similar attack.
Mohammed Saleh Qayed Taeiman had been among the three killed in the drone strike last week, according to the Yemeni National Organization for Drone Victims (NODV). It also said that previous US drone strikes had killed Mohammed’s father and his brother in 2011, and in a separate attack, another brother had been injured.
-
The Islamabad High Court (IHC) has summoned Islamabad Police Inspector General (IG) Tahir Alam Khan on February, 9 in contempt of court case against Islamabad Secretariat Police station house officer (SHO) for not registering murder case of two people killed in a drone attack in the area of Mir Ali at South Waziristan in 2009.
As the case came up for hearing before IHC Monday, Mirza Shahzad Akbar, counsel for petitioner Karim Khan, Assistant Sub-Inspector (ASI) Nawaz Bhatti from Secretariat Police Station and legal counsel Abdul Rauf appeared in the court.
-
While it is unclear if they were drone strikes versus another type of aerial assault, BIJ notes that 2014 saw the highest number of confirmed U.S. drone strikes in the east African nation of any year despite the administration’s praise of Somali government reforms.
-
This is the first attack since Monday, when the US similarly destroyed a car in Maarib and similarly labeled all of the slain “al-Qaeda” only for one to turn out to be a 12-year-old student.
-
A 12-year-old Pakistani boy who lost his grandmother in a U.S.-led drone strike says he is afraid of the blue sky; he would rather see the gray sky because he knows then that the drones will not fly. Unmanned Aerial Vehicles (UAV’S), commonly known as drones, and particularly armed drones, are most effective when weather conditions provide for clear visibility, hence the better ability to hit identified targets. Drones aren’t flown on overcast days due to cloud cover and lack of visibility.
-
A policy of targeted extrajudicial assassination is by its very nature immoral.
[...]
Once extrajudicial killing was policy reserved for rogue nations like Nazi Germany and communist Russia. Rep. Barbara Lee, the only member of Congress to vote against the AUMF, said in her dissenting vote, “Let us not become the evil we deplore.” We now know that drone warfare, no matter how it is managed, is in fact a deplorable evil.
-
Jordan executed two Iraqi prisoners Wednesday, in answer to the Islamic State group’s killing of a Jordanian hostage in Syria.
Jordanian officials hanged an Iraqi woman sentenced to death for her role in a 2005 suicide bombing in Amman. It also executed another Iraqi who had ties to al-Qaida.
-
When ISIS beheaded two American journalists, there was outrage and denunciation throughout the West, but when the same ISIS beheaded hundreds of Syrian soldiers, and meticulously filmed these war crime, this was hardly reported anywhere. In addition, almost from the very beginning of the Syrian tragedy, al-Qaeda groups have been killing and torturing not only soldiers but police, government workers and officials, journalists, Christian church people, aid workers, women and children, as well as suicide bombings in market places. All this was covered up in the mainstream media, and when the Syrian government correctly denounced this as terrorism, this was ignored or denounced as “Assad’s propaganda.”
So why weren’t these atrocities reported in the western media? If this was reported it would have run counter to Washington’s proclaimed agenda that “Assad has to go,” so the mainstream media followed the official line. There is nothing new in this. History shows that the media supported every Western-launched war, insurrection and coup – the wars on Vietnam, Afghanistan, Iraq, Libya, Syria, and coups such as those on Iran, Guatemala, Indonesia, Chile, and most recently in Ukraine.
-
If Yemen is any kind of model, it is a model of how badly U.S. interventionism has failed.
-
From record ticket sales to major media accolades, from the halls of Congress to the White House, the nation has spoken: “American Sniper” is all-American. Chris Kyle—the most lethal killer in U.S. military history, a true hero, a brave warrior—has been anointed as a role model for all that America has come to stand for.
-
Over the weekend, The Washington Post reported on a joint U.S.-Israeli operation that killed Imad Mughniyah—Hezbollah’s reported chief of international operations—on the streets of Damascus in 2008. The account raises questions about whether the killing violated international law, and central to the Post’s story is the assessment that these actions “pushed American legal boundaries.”
-
Consider the staggering number of murders of innocent human beings committed by the United States government — and ask yourselves how many Auroras those murders represent. I have tried to make calculations of this kind before: using conservative estimates of the deaths in Iraq, the murders in that country alone represent a 9/11 every day for five years. An equivalent number of Auroras would be much higher. modified from Arthur Silber
-
So what happened? The Arab Spring didn’t go as hoped — and the United States began to lose the war. An al-Qaida offshoot shockingly conquered large swaths of Iraq and Syria. Libya descended into civil war. Yemen, which Obama cited just last year as proof of his successful strategy, is on a similar downward spiral. The Taliban is gaining ground in Afghanistan. Boko Haram is carving out another space for barbarism in Nigeria.
-
We’ve been trained to think of war preparations — and the wars that result from being so incredibly prepared for wars — as necessary if regrettable. What if, however, in the long view that this book allows us, war turns out to be counterproductive on its own terms? What if war endangers those who wage it rather than protecting them? Imagine, for a moment, how many countries Canada would have to invade and occupy before it could successfully generate anti-Canadian terrorist networks to rival the hatred and resentment currently organized against the United States.
-
The U.S. spends nearly $1 trillion on national security programs and agencies annually, more than any other nation in the world. Yet despite this enormous investment, there is not enough evidence to show the public that these programs are keeping Americans any safer – especially in the intelligence community. Excessive government secrecy prohibits the public and oversight agencies alike from determining whether our expensive intelligence enterprise is worth the investment.
-
Transparency Reporting
-
The UK government has now spent £10 million keeping Wikileaker Julian Assange holed up in the Ecuadorian Embassy in London.
A website set up by Wikileaks supporters, called govwaste.co.uk, has a counter on the front page that has just creeped past the £10,000,000 mark. The website reads: “Julian Assange has been effectively detained without charge since December 2010.
-
Nick Clegg could face legal action following remarks made about WikiLeaks founder Julian Assange. Speaking on LBC on Thursday, the deputy prime minister commented on Assange’s long stay at the Ecuadorian embassy in London and the £10 million cost of policing the building – comments Assange believes could be defamatory.
-
In SILENCED: The War on Whistleblowers, three Americans reveal the persecution they’ve faced after they dared to question U.S. National Security policy in post 9/11 America. Everyone knows the name Edward Snowden, the fugitive and former intelligence contractor, but Academy Award nominated documentarian James Spione introduces us to three other whistleblowers of the era, speaking for the first time in one film, who discuss in dramatic and unprecedented detail the evolution of the government’s increasingly harsh response to unauthorized disclosures.
-
Finance
-
The funding round, which comes from Quest Venture Partners, Crypto Currency Partners and the AngelList Bitcoin Syndicate, among others, is a step towards creating a scoring system for addresses on bitcoin’s network.
-
-
President Obama has unveiled his $4 trillion budget proposal for next year, asking Congress to raise taxes for the wealthy and corporations to help fund education and fix crumbling infrastructure. The plan includes tax cuts for some poor and middle-class families. It also seeks to recoup losses from corporations that stash an estimated $2 trillion overseas by taxing such earnings at 14 percent, still less than half of the 35 percent rate for profits made in the United States. The budget takes aim at the high cost of prescription drugs, proposes a new agency to regulate food safety, and seeks $1 billion to curb immigration from Central America. It also calls for a 4.5 percent increase in military spending, including a $534 billion base budget for the Pentagon, plus $51 billion to fund U.S. involvement in Syria, Iraq and Afghanistan. Speaking at the Department of Homeland Security, Obama said across-the-board cuts known as sequestration would hurt the military.
-
PR/AstroTurf/Lobbying
-
I’ll save you the trouble of writing a rejection letter, because I know why you wouldn’t run cartoons like these: You would recognize that lumping people together who have nothing in common but their religion is straight-out bigotry. You wouldn’t take it seriously as a defense if I pointed out that the Lord’s Resistance Army and McVeigh really were bad guys.
-
Mitt Romney definitely had his down sides as a candidate: the retread factor, and, as I noted two weeks ago, the fact that he made all those dramatic and (apparently) wrong predictions about the future of the economy. But I will say this for him. He did pass the this-guy-looks-and-sounds-like-a-plausible-president test. I always thought that was his greatest strength. He’s central casting.
-
Brian Williams said he is temporarily stepping away from the “NBC Nightly News” amid questions about his memories of war coverage in Iraq, calling it “painfully apparent” that he has become a distracting news story.
In a memo Saturday to NBC News staff that was released by the network, the anchorman said that as managing editor of “NBC Nightly News” he is taking himself off the broadcast for several days. Weekend anchor Lester Holt will fill in, Williams said.
-
Censorship
-
We’ve been talking a lot lately about how the new school of website design (with ReCode, Bloomberg, and Vox at the vanguard) has involved a misguided war on the traditional comment section. Websites are gleefully eliminating the primary engagement mechanism with their community and then adding insult to injury by pretending it’s because they really, really love “conversation.” Of course the truth is many sites just don’t want to pay moderators, don’t think their community offers any valuable insight, or don’t like how it “looks” when thirty people simultaneously tell their writers they’ve got story facts completely and painfully wrong.
-
An official of the Hong Kong Democratic party says Chinese authorities have seized about 8,000 rolls of toilet paper printed with the image of the territory’s pro-Beijing chief executive, Leung Chun-ying.
Lo Kin-hei, a vice-chairman of the liberal party, said on Saturday that police seized the toilet paper and another 20,000 packages of tissue paper from a factory in the Chinese city of Shenzhen where a friend of the party placed the order to obscure the party as the true buyer.
-
Agency brass tried to spike a story implicating the CIA in the killing of a top Hezbollah terrorist. Newsweek complied. The Post didn’t.
-
Privacy
-
It is a rare thing to bring truth to bear on the most powerful and secretive arm of the state. Never before has the Investigatory Powers Tribunal – the British court tasked with reviewing complaints against the security services – ruled against the government. Not once have the spooks been taken to task for overstepping the lawful boundaries of their conduct. Not a single British spy has been held accountable for mass surveillance, unlawful spying or snooping on private emails and phone calls.
-
In its first ruling against an intelligence agency since it was set up in 2000, the Investigatory Powers Tribunal (IPT) declared today that GCHQ’s access to information intercepted by the US National Security Agency (NSA) breached human rights laws.
-
GCHQ, the UK intelligence agency, unlawfully accessed millions of personal communications collected by the NSA, the Investigatory Powers Tribunal (IPT) has ruled today.
The Tribunal is the only UK court with the power to oversee GCHQ, Mi5 and Mi6. This is the first time it has ever ruled against one of the intelligence and security services.
-
The Investigatory Powers Tribunal (IPT) has declared British intelligence services acted unlawfully by accessing the personal communications data gathered by the US National Security Agency (NSA).
The IPT, set up 15 years ago to oversee the activities of GCHQ, MI5 and MI6, ruling follows a complaint made by several civil liberties organisations, including Amnesty International, Privacy International, Bytes for All and Liberty.
The Tribunal said the way intelligence was shared between GCHQ and the NSA’s Prism surveillance programme was unlawful up until December 2014, because the rules governing the practice were kept secret.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
The Investigatory Powers Tribunal (IPT) has ruled that GCHQ illegally spied on British citizens.
The tribunal, which was created in 2000 to keep Britain’s intelligence agencies in check, stated that GCHQ’s access to intercepted information obtained by the US National Security Agency (NSA) breached human rights laws.
It marks the first time that the IPT has ruled against an intelligence agency in its 15-year history.
-
The sharing of mass surveillance data between U.S. and U.K. intelligence services was unlawful before December 2014, but since then it has become legal, a U.K. tribunal has ruled.
-
-
The British government and its intelligence agencies have successfully fended off the privacy lobby for more than a year and a half since the first of the Snowden revelations, engaging in the time-tested tactics of attack, obfuscation and setting up sham inquiries.
That strategy worked until Friday when the ruling of the investigatory powers tribunal (IPT) blasted a hole through it.
-
In a bizarre twist of events the Tribunal declared that intelligence sharing between the United States and the United Kingdom had been unlawful prior to December 2014, because the rules governing the UK’s access to the NSA’s PRISM and UPSTREAM programmes were kept secret.
Prior to December last year, the secret policy breached Article 8, the right to a private life, and Article 10, the right to freedom of expression without State interference, the tribunal said.
-
-
-
-
-
-
A COURT HAS RULED THAT AN UNDER-THE-COUNTER information sharing pact between the US National Security Agency (NSA) and GCHQ was unlawful.
-
The U.S. National Security Agency and its intelligence partners are reportedly sifting through data stolen by state-sponsored and freelance hackers on a regular basis in search of valuable information.
Despite constantly warning about the threat of hackers and pushing for their prosecution, the intelligence agencies of the U.S., Canada and the U.K. are happy to ride their coattails when it serves their interests, news website The Intercept reported Wednesday
-
-
With that new equipment in place in January 2013, the state was seeing an average of 50,000 a day with spikes up to 20 million, Squires told The Associated Press. In February 2013, the number rose to an average of 75 million attacks a day, with up to 500 million on some days.
-
Paranoid about the National Security Agency spying on you via your webcam? Don’t be. It’s safe to webchat again. Well, at least if you’re Keith Alexander, former director of the National Security Agency. That is, unless he’s watching you.
Alexander was spotted on Tuesday on a train from Washington to New York by the principal technologist of the American Civil Liberties Union (ACLU), Chris Soghoian. The four-star general turned top paid security consultant was working away on his Apple Macbook with the webcam uncovered.
-
New initiatives on data collection by the US Government will set certain limitations on the use of signals intelligence collected in bulk.
-
-
-
The US Intelligence community has proposed to limit the length of time it can hold information on citizens and hide secret data collections.
The proposals are in response to President Barack Obama‘s statement a year ago, in which he said that reform was needed for American surveillance practices in the wake of the Edward Snowden revelations about NSA snooping.
-
A recently launched website that tracks and lists transparency reports from across the web has already received over 20 submissions since its launch on Monday, co-founder Nadia Kayyali told the Sputnik international news service.
Kayyali, who is also an activist at the Electronic Frontier Foundation (EFF), said that EFF became involved in the project because they thought it was important to provide information to people about what companies have so-called ‘canaries.’
-
-
-
Oregon Senator Ron Wyden is calling on President Barack Obama to immediately end the National Security Agency practice of scooping up huge amounts of data from innocent Americans.
He said that data includes phone calls that start and end in America.
“The president has the authority to end this dragnet surveillance immediately,” Wyden said. “The idea of collecting millions of phone records on law-abiding Americans doesn’t make any sense.”
-
Turns out, not even the head of the Senate Judiciary Committee can figure out what’s happened to the National Security Agency (NSA) staffers who were involved in the LOVEINT spying scandal.
-
Personal data sent to Canadian websites is often routed through the United States where the National Security Agency collects it, according to Andrew Clement, a University of Toronto professor.
-
-
After two terrorist attacks on Canadian soil, the federal government proposed new anti-terror laws. Although it’s released details on its bill, many questions remain. Will these laws affect our privacy? How about our freedom of speech? Will they improve security? Considering the experiences of our southern neighbours with mass surveillance programs and the controversial National Security Agency (NSA), these questions seem crucially important.
-
Personal data sent to Canadian websites is often routed through the United States where the National Security Agency collects it, according to Andrew Clement, a University of Toronto professor.
The professor is part of the team of University of Toronto and OCAD University students and professors that has created IXmaps , an online interactive tool that lets Canadians to see how their web traffic moves around the Internet.
-
Germany’s foreign intelligence agency has been using its sophisticated electronic systems to collect 220 million bits of metadata a day from satellites and Internet sources and shares that information with U.S. intelligence agencies, according to Zeit Online. Once it crosses the Atlantic, the National Security Agency (NSA) and Central Intelligence Agency (CIA) use it for their own spying and anti-terrorism activities.
-
Die Zeit claims the BND scoops up 220m metadata every day, through satellites and internet cables. This is just the phone-related surveillance, with the extent of web-based surveillance as yet unknown.
-
-
-
The piece, which appears to be based on official leaks ahead of a Tuesday announcement, suggested foreigners will get for the first time get limited rights regarding how their personal data is treated after it’s been scooped up by agencies such as the NSA. Whereas the data of Americans would be deleted after incidental collection, foreigners’ data would be deleted after five years.
-
The Obama administration has announced changes to the surveillance operations conducted by the United States intelligence community, but critics are already using words like “weak” to describe the so-called reform.
Adjustments to how US intel agencies collect and hold bulk data on Americans and surveillance records concerning foreigners are outlined in a report published on Tuesday this week by the Office of the Director of National Intelligence.
-
Last month, the National Research Council concluded there is no technological replacement for the National’s Security Agency’s mass surveillance and therefore should not be fully replaced.
“No software-based technique can fully replace the bulk collection of signals intelligence,” the report stated.
But there may in fact be a viable alternative — and it’s been around for more than a decade, according to J. Kirk Wiebe, a former NSA analyst.
Wiebe, who created this alternative surveillance technique, spent three decades at NSA and received its second-highest award, the Meritorious Civilian Service Award.
The idea behind Wiebe’s alternative is simple. It boils down to “connect the dots,” he said Saturday at an event sponsored by the Newseum and the Washington, D.C. Public Library.
-
-
As Obama tightens surveillance guidelines, uncertainty lingers on NSA program. “The Obama administration on Tuesday announced a series of modest steps to strengthen privacy protections for Americans and foreigners in U.S. intelligence-gathering, including an end to the indefinite gag order on certain subpoenas issued to companies for customers’ personal data,” writes the Post’s Ellen Nakashima. “At the same time, U.S. intelligence officials said they were still hoping to fulfill a goal President Obama set a year ago: ending the National Security Agency’s collection of millions of Americans’ phone records.”
-
The new rules “clearly show that the government continues to stand by a number of its troubling mass surveillance policies, despite mounting evidence that many of these programs are ineffective,” said Neema Singh Guliani of the ACLU.
-
RSA, with its noted BSafe encryption technology, was bought by EMC in 2006 for $2.1bn, with Coviello in the RSA CEO chair. Its reputation as a trusted security technology supplier was tarnished by allegations from whistleblower Edward Snowden that it was paid $10m by the NSA to use encryption tech with a backdoor for the g-men (and, by extension, world+dog).
-
British spies have warned the government they may cut off ties with their German counterparts over a parliamentary inquiry into spying by the U.S. National Security Agency (NSA).
-
The new law, set to go into effect later this year, will store data in Australian servers for two years. This data will be provided to Australian authorities, who can perform direct warrantless searches of potential criminals.
-
Resisting a campaign for greater transparency, the White House has decided to keep American taxpayers in the dark about how much they’re likely to spend on government spy agencies.
President Barack Obama unveiled his fiscal 2016 budget requests Monday with the continued omission of proposed spending levels for specific intelligence agencies, which are funded with a so-called “black budget” supplement debated and voted upon behind closed doors by congressional appropriators.
-
Zimmermann, creator of the PGP email privacy package, countered Cameron’s argument that encryption is creating a means for terrorists and child abusers to communicate in private, arguing instead that intelligence agencies such as GCHQ and the NSA have “never had it so good”.
-
As the wearable technology industry explodes, security experts warn that the data collected could be stolen or misused.
-
Following EFF’s victory in a four-year Freedom of Information Act lawsuit, the government released an opinion (pdf), written by the Office of Legal Counsel (OLC) in 2010, that concluded that Section 215—the provision of the Patriot Act the NSA relies on to collect millions of Americans’ phone records—does have a limit: census data.
-
Exploitation, either political or personal can occur from the mass information gathered in intelligence operations…
[...]
While the laws that have created this system were passed in the interest of public safety, in protection from risks of terrorism, the post-9/11 world had led to military and cyber exploitations of power that have killed many in wars and drone attacks, as well as ruining lives due to racial and radical profiling. It is vital to consider how much of our private spheres should the government be allowed to have access to. The failures of honouring American rights and dignity thus far must be rectified by transparent and honest accounts from the National Service Agency about their mechanisms of tracking potential threats and treatment of unrelated personal data. Ultimately, no government should have the authority to ubiquitously and opaquely conduct their surveillance. The people should be informed before supporting beyond intent to include the implementation.
-
The conflict between privacy and security is a long-running one, often inflamed by global threats, but always present. In a 2008 Wired article, the extent to which individual privacy should be sacrificed for matters of national security was laid bare by the then-director of national intelligence Michael McConnell.
“In order for cyberspace to be policed, Internet activity will have to be closely monitored. Ed Giorgio, who is working with McConnell on the plan, said that would mean giving the government the authority to examine the content of any e-mail, file transfer, or Web search. ‘Google has records that could help in a cyber-investigation,’ he said. Giorgio warned me, ‘We have a saying in this business: Privacy and security are a zero-sum game.’”
-
ProPublica has the details on this story, which traces Koch’s work on Gnu Privacy Guard and the Windows secure email client, GPG4Win. Since 1997, Koch has maintained and improved his own secure email software. He credits a talk by Richard Stallman for giving him the idea — at the time, the Pretty Good Privacy software package wasn’t available for export, which led RMS to challenge European programmers to create their own implementation.
-
During a 10-minute period one day in November 2008, British spies vacuumed up 70,000 e-mails to and from journalists at major media outlets in the United States and the U.K. And they did it with the blessings of Washington.
Thanks to the Snowden leaks, many Americans are familiar with the surveillance that the NSA and other agencies are conducting on American citizens and citizens of other nations. It is not only U.S. agencies that are spying on our communications; GCHQ, the U.K. equivalent of the NSA, has been conducting is own comprehensive surveillance for quite some time now. The Guardian reported last month that the British agency “has scooped up emails to and from journalists working for some of the US and UK’s largest media organisations.” While not really a revelation in itself, this is bold, specific confirmation of what many have known since Edward Snowden came forward. We are being spied on, not only by nosy corporations and our own government, but by our “allies” as well.
-
House and Senate lawmakers are expected to reintroduce bipartisan legislation on Wednesday that would require law enforcement to obtain a search warrant before accessing the content of private emails.
The Email Privacy Act, sponsored by Reps. Jared Polis and Kevin Yoder, is landing with more than 220 cosponsors, meaning it already has the backing of more than half of House members. Sens. Patrick Leahy and Mike Lee are also slated to reintroduce their mirror version of the bill, though it was not immediately clear how many cosponsors they had on board.
-
It’s only days, a few weeks at most, into the 2015 season for state legislatures, and already there are hundreds of bills looming that challenge the power of Washington on issues ranging from Common Core to marijuana and the National Security Agency, according to a new report.
-
Another reason the Snowden affair is interesting is that it crosses the typical, dismal political categories that infect American politics. Some on both the right and the left consider Snowden a traitor. Other people from all corners of American politics deplore the invasive snooping of the NSA. Other fascinating questions are who is Edward Snowden and why is he doing this?
-
‘How do you get the audience to feel it? Not just to know it in their brains, but to walk out of the theatre and think twice as they use their phones or their email.’
She believes that telling Snowden’s story and questioning the practices of her own government was an obligation.
While she can’t say whether Snowden, still living in exile with his girlfriend in Moscow, is happy, she is confident of at least one thing.
‘I’m pretty sure he doesn’t have any regrets.’
-
When film director Laura Poitras calls from New York, she warns that our conversation is likely to be monitored by the US Government.
Since 2006, after she released the first documentary in her trilogy about America post 9/11, she has been stopped and detained by federal agents at US airports every time she enters the country.
-
Edward Snowden is the fourth most admired man among Germans, according to a new YouGov poll. The NSA whistleblower, whose leaks exposed US spying on German officials – including Angela Merkel’s mobile phone, came in just ahead of racecar driver Michael Schumacher.
-
-
Mass surveillance isn’t the security blanket that politicians are holding it up to be. For many people surveillance makes them less safe.
-
NIS agents were found to have meddled in the 2012 presidential election in the form of an online smear campaign targeting the opponent of the eventual winner, conservative Park Geun-hye. Last year, Won Sei-hoon, the agency’s then-director general, was found guilty of overseeing the operation and sentenced to two years in jail.
-
On February 4, 2015 Rep. Ted Poe of Texas asked for permission to address the United States House of Representatives:
The SPEAKER pro tempore. “Under the Speaker’s announced policy of January 6, 2015, the Chair recognizes the gentleman from Texas (Mr. Poe) for 30 minutes.”
Mr. POE of Texas. “Mr. Speaker, just a few weeks ago, this Chamber was filled with Members of the House of Representatives, and all of us stood up and raised our right hands, and we took an oath to support and defend the Constitution of the United States. It is the same oath the President takes and that others take–the military. We do that for a lot of reasons, but the main reason is that, in this country, the Constitution is paramount to all other law. I agree with that philosophy. The Constitution, I think, is a marvelously written document, as well as the Declaration of Independence, which justified the reason for us to start our own country.
-
Almost two-thirds of investigative journalists (64 percent) polled in a recent survey said they believe that the U.S. government has probably collected data about their phone calls, e-mails, or online communications. Furthermore, 80 percent of those surveyed believe that being a journalist increases the likelihood that their data will be collected.
-
NSA whistleblower Edward Snowden’s revelations of mass surveillance by government agencies has made a big impact on investigative journalists, according to a new study.
The survey of 671 journalists, conducted by the US-based Pew Research Center and Columbia University’s Tow Center for Digital Journalism, found that 64% believe that the US government has probably collected data about their communications.
-
Civil Rights
-
This is the first article in a five part series examining the US legal system. The series collectively argues that corporate media and political rhetoric have made Americans acquiescent toward corruption in the US legal system. This piece examines how discourse regarding law enforcement related issues in the US has been constructed to justify abuse by the police.
-
Conservative media lashed out at President Obama for mentioning the Crusades and Inquisition at the National Prayer Breakfast after condemning the Islamic State (ISIS or ISIL) as a “death cult” that distorts Islam.
-
Guest Attacked Obama For Not Letting Company His Firm Represents Sell Drone To Jordan
-
Anyone paying attention knows that 9/11 has been used to create a police/warfare state. Years ago, NSA official William Binney warned Americans about the universal spying by the National Security Agency, to little effect. Recently, Edward Snowden proved the all-inclusive NSA spying by releasing spy documents, enough of which have been made available by Glenn Greenwald to establish the fact of NSA illegal and unconstitutional spying, spying that has no legal, constitutional, or “national security” reasons. Yet Americans are not up in arms. Americans have accepted the government’s offenses against them as necessary protection against “terrorists.”
-
Former pro cyclist Lance Armstrong was issued two traffic citations in January for allegedly hitting two parked vehicles in Aspen’s West End and leaving the scene — with his girlfriend apparently telling police initially that she had been behind the wheel in order to avoid national headlines.
-
Messrs. Petraeus and O’Hanlan are unconcerned about the nation’s alarmng liberty and justice deficit. The President plays prosecutor, judge, jury, and executioner to kill any American citizen he decreees based on secret evidence is a threat to the national security. Thousands of innocent civilians abroad are killed by predator drones. The National Security Agency conducts surveillance against the entire United States population without suspicion that even a single target has been complicit in crime or international terrorism.
Individuals are detained indefinitely without accusation or trial at Guantanamo Bay. Eighteenth century British legal scholar William Blackstone — who was gospel to the Founding Fathers — wrote: “[T]o bereave a man of life, or by violence to confiscate his estate, without accusation or trial, would be so notorious an act of despotism, as must at once convey the alarm of tyranny throughout the whole kingdom.”
-
In the dead of night, they swept in aboard V-22 Osprey tilt-rotor aircraft. Landing in a remote region of one of the most volatile countries on the planet, they raided a village and soon found themselves in a life-or-death firefight. It was the second time in two weeks that elite U.S. Navy SEALs had attempted to rescue American photojournalist Luke Somers. And it was the second time they failed.
-
The imperial presidency persists. Look at Obama and his drones. Look at George W. Bush. Bush, who lost the popular vote, stole the 2000 election with the Electoral College’s help. As for the Senate, it is surely the world’s most undemocratic legislative body. Since every state gets two senators, one Californian voter has some 1.5 percent of a Wyoming voter’s power. Wyoming’s population is smaller than NJ’s Bergen or Middlesex counties. Senators from Mississippi or Utah can then filibuster and kill reforms voters from demographic mega-states like California or New York demand. These states are less urbanized and diverse in general. With growing inequality between the classes and races, and growing repression in the form of mass incarceration, we need to radically reform and amend our Constitution. As political scientist Daniel Lazare said, the alternative would be, “the old pre-reform Mississippi state legislature stamping on democracy — forever.” I’m sorry Lincoln’s ghost, but that’s not a Union worth saving. But hey, maybe Hillary can save us.
-
Under the terms of his house arrest, Kiriakou is unable to give media interviews at this time.
Radack said he eventually hopes to be an anti-torture and prison reform advocate.
Kiriakou’s official release date is May 1, according to the Federal Bureau of Prisons website.
-
On Monday, BBC Four screened a remarkable film in its Storyville series. The Internet’s Own Boy told the story of the life and tragic death of Aaron Swartz, the leading geek wunderkind of his generation who was hounded to suicide at the age of 26 by a vindictive US administration. The film is still available on BBC iPlayer, and if you do nothing else this weekend make time to watch it, because it’s the most revealing source of insights about how the state approaches the internet since Edward Snowden first broke cover.
-
Internet/Net Neutrality
-
Net neutrality propaganda is starting to get weird. A brand new interest group showed up this week with a confusing porn parody that seems to equate Title II reclassification of the internet with dragnet surveillance, among other fallacies. It’s a good chance to talk about what the Federal Communications Commission’s new open internet policy is — and what it isn’t.
An anti-big government campaign backed by a US Senator released this godawful video that looks like a tasteless ripoff of the age-old “cable guy” porn cliché — except you know not to actually expect any sex because it’s YouTube.
Permalink
Send this to a friend
02.06.15
Posted in News Roundup at 6:49 pm by Dr. Roy Schestowitz

Contents
-
Now what is linux, it is just an Operating System which is used worldwide. Linux for a common man would mean something used in different devices basically for research purposes in NASA, in particle accelerators, also used by Scientists for their studies eg Antartic. Linux is also a vital tool in automobile industry as in car manufacture and also being used by Engineers to build humanoid robots, by security researcher or hackers. Linux is preferred due to its basic properties of being flexible, reliable system and safe. US Navy is now using the Linux Kernel to built their most powerful DDG-1000 Zumawat Class Destroyer.
-
Desktop
-
2015 has been a great year for GNU/Linux on the desktop in India.
-
Audiocasts/Shows
-
Join Aaron Newcomb and Randal Schwartz this week to speak with Boudewijn Rempt about Krita. Krita is a FREE digital painting and illustration application. Krita offers CMYK support, HDR painting, perspective grids, dockers, filters, painting assistants, and many other features.
-
Kernel Space
-
The fact that 75 % of the fastest HPC systems in the world use Lustre, demonstrates an on-going belief in the future of Lustre and its continued development. Lustre contains a number of components, that together, allow for efficient and fast storage and retrieval of large amounts of data. Lustre is based on Linux and uses kernel-based server modules to obtain the high performance I/O that these users require. In terms of capacity, the theoretical limits on the Lustre file system allows for storage of over 512 Petabytes (PB) in total. That is equivalent to 1,000,000of the 1 TB drives in your latest laptop.
-
The OpenDaylight Project, a community-led and industry-supported open source platform to advance Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), today announced the availability of 14 internships — up from seven in 2014 — for people who want to obtain real-world development experience from leading networking technologists while contributing to the industry’s largest SDN and NFV platform.
-
-
Yet another educational opportunity for developers interested in open source software appeared this week with the OpenDaylight’s announcement of an expanded software-defined networking (SDN) summer internship program. It’s not a training program per se, but it’s another way to keep open source expertise coming down the pipeline.
-
Graphics Stack
-
Libinput continues advancing greatly primarily for Wayland and X11 systems as shown by the latest libinput 0.10 release while more surely is on the way.
-
Applications
-
Calibre, an application that can be used as an eBook reader, converter, and editor, among other numerous features, has been updated once more and a few new interesting features have been added.
-
Writing can be hard. One of the main obstacles that people encounter when sitting down to write something is all the distractions that a modern desktop throws at you such as cats on the internet, cats on twitter, and cats on reddit. Focuswriter is a neat word processor available in Fedora that provides a user experience to minimize all these cat-related distractions, allowing you to focus on what you need to write.
-
Bluefish 2.2.7 is mostly a bug fix release. It fixes rare crashes in the autocompletion, the filebrowser, the htmlbar plugin preferences, in file-load-cancel, and fixes a rare case of broken syntax highlighting after multiple search/replace actions. It furthermore displays better error/warning output when parsing language files. It also finally fixes javascript regex syntax highlighting. The loading of files with corrupt encoding or non-printable characters (such as binary files) has been improved, and project loading over sftp has been improved. Various HTML5 tags have been added, and HTML5 is the default now for php, cfml and other languages that can include html syntax. Saving and loading of UTF-16 encoded files was broken and has been fixed. Various languages have better syntax support, such as javascript, css, html, pascal/deplhi, and html has improved autocompletion. On OSX the charmap plugin is finally included, the keys for tab switching no longer confict with some keyboard layouts, and behavior at shutdown was improved. The upload/download feature has a new option to ignore backup files. The home/end keys now work better on wrapped tekst. And finally the search and replace dialog correctly shows the number of results when searching in files on disk.
-
Before I release the final 1.1.0 I wanted to make a release candidate with COPR repos for Fedora 20 and 21. This should be less painful than compiling everything from source so I am hoping to get more feedback and testing that way.
-
-
-
Plenty of people use encrypted email services to protect their identities and information online. But, that could all be coming to an end soon for many folks because the man behind the most popular free email encryption technology out there is going broke.
-
-
-
Werner Koch is looking at a big payday after pulling in over $150,000 to fund the continuing development of his crucial open-source GNU Privacy Guard encryption tools.
-
-
-
-
-
GnuPG is a piece of cryptographic software embedded in numerous online solutions in the world, including email clients, and it’s an indispensable part of our online experience. That also means that it’s underfunded and maintained by a single guy who is ready to give up. Fortunately, the online community has responded to his plea and that reaction was amazing.
-
Werner Koch is a hero, and we owe him so much for selflessly carrying on his work despite that lack of money, because he recognised that it was more important than ever. Fortunately, I am not the only one to think so, and to be ashamed that I/we have allowed this situation to arise. Yesterday, when the article by Julia Angwin appeared on the Pro Publica site, people across the world started donating on a massive scale. As an update by Angwin explains:
-
-
-
-
Proprietary
-
The new Opera 28 Beta has been released and the developers have implemented a number of features from the development version, which includes bookmark syncing and new default themes.
-
2014 showed big growth in the proportion of Linux users downloading CAD Schroer’s free software, and Brazil has joined the top 10
-
“We’re working on Linux support—hang tight!” said Google nearly three years ago. And despite that claim and more repeated promises over those many years, Google Drive for Linux still hasn’t been released.
-
Instructionals/Technical
-
Games
-
Linux is highly lacking in decent 3D RPG games, and let’s not even get into the near drought of MMORPG games, but Shroud Of The Avatar looks like it could fill the gap eventually. The reason we say eventually, is that the game is in Early Access, and they consider it pre-alpha.
-
Astro Emporia is a new turn-based strategy title developed and published on Steam by Squirrelbot Games. A Linux version was made available right from the start by the makers of this rather interesting RTS.
-
The company has scheduled a session for March 5 at the Games Developer Conference where it will talk about the new release of the graphics API in a presentation called glNext: The Future of High Performance Graphics.
-
I had a chance to speak to the developers of Divinity: Original Sin who confirmed the Linux version is being worked on right now.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
So finally Season of KDE has come to an end but I am sure my relation with KDE especially Kubuntu is far from over. I hope to contribute more in future.
-
I usually don’t blog about what I do in my day-time job in my personal blog but since this may affect some of the KDE/Qt developers I will do this time.
-
With Plasma 5 our lock screen architecture changed significantly. For example we do no longer support screen saver hacks or widgets on top of the locked screen. Both are very unlikely to make a return in future releases. This means that bug reports against the old infrastructure might no longer apply to our current code base. Two weeks ago I went through all bug reports and feature requests to evaluate whether they still apply to our new infrastructure or should be closed.
-
-
The KDE community has created some of the best of the breed open source software and they continue to win user’s hearts, according to a new LinuxQuestions survey.
-
GNOME Desktop/GTK
-
While Unity 8 is written in Qt5, GTK+ is still very important to Ubuntu even with their ongoing transition from running the desktop on an X.Org Server to instead using their own Mir display server technology within the next year on the desktop. Landing today in GTK+ Git ahead of GNOME 3.16 is a number of Mir back-end improvements.
-
Do you love Gnome Shell but hate the way it looks? Don’t worry, the Internet is chock full of better-looking themes to choose from. There are so many in fact that we’ve had to filter it down to just eight awesome themes.
-
-
-
Reviews
-
Fedora 21 Cinnamon is a fedora 21 spin featuring with Cinnamon Desktop environment 2.4.5 as default desktop. it also included with kernel 3.18 and default application such as firefox 35, nemo 2.4, libreoffice 4.3, shotwell 0.2, yum extender as default sotware manager and cinnamon system settings.
-
New Releases
-
4MLinux Allinone Edition, a Linux operating system built from scratch that wants to provide a complete desktop experience and manage to keep the size to a minimum, has reached version 11.1 Beta.
-
Jeff Hoogland announced the release of Bodhi Linux 3.0 RC3, proving he is back. This release brings a new wiki and new blog section to the community as well. In other news Evolve OS is winning Jack Wallen away from Ubuntu and Michael Larabel has a report on GNU Guix, that started as a package manager but is turning into a distribution.
-
Bodhi Linux 3.0 ships with just a few applications by default such as Midori 0.5.9 as web browser, nm-applet (connection manager applet) 0.9.8 and of course, a few Enlightenment-specific applications like Enlightenment File Manager, Terminology (terminal emulator) 0.7.0, ePad (text editor) 0.5, ePhoto (picture viewer) 20150116 build, eepDater (update manager) 0.11.
-
-
Arch Family
-
We’re happy to announce the 0.8.12 release of Manjaro Linux installation media, including images for the Xfce and KDE4 desktop environments, and our minimal ‘Net’ edition.
Great progress is being made with our new 0.9 series installation media that uses the Calamares installer, along with our new KDE Plasma 5 installation media, but since neither is quite ready yet we’re providing updated 0.8 series installation media that uses our legacy installer, Thus.
-
Red Hat Family
-
Red Hat Inc, the world’s largest pure-play open-source software company, is ramping up its cloud-based subscription service in Asean to capitalise on the rapid adoption of cloud computing in the region.
Its new cloud service is aimed at competing directly with Microsoft’s cloud platform and provide another alternative for enterprises, said Damien Wong, senior director and general manager of Red Hat Asean.
-
Fedora
-
Corebird 0.9 was released a few months ago, and it is now finally available in the official Fedora repos. Check out my previous post for details on some of the new features in this update.
-
Debian Family
-
-
Back in December 2014 I won a Creator C120 single board computer from Imagination Technologies, a technology outfit based in Hertfordshire (UK).
The Creator C120 is a development board for Linux and Android.
It’s powered by a dual-core MIPS32 CPU (1.2 GHz) and a PowerVR SGX540 GPU. Add to that 1 GB of RAM, 8 GB NAND Flash, two USB ports, an HDMI port up to 2k resolution, a full size SD card slot, 10/100 Mbps Ethernet and WiFi connectivity (with Bluetooth 4) and what you’ve got is a very powerful single-board computer.
-
Derivatives
-
Philip Newborough, the lead developer behind the CrunchBang Linux distribution, has tossed in the towel.
The lead developer of CrunchBang Linux has decided to halt development of this Linux distribution that’s based on Debian but known for its choice of using the Openbox window manager.
-
The Linux world is in mourning following the stunning announcement of the death of CrunchBang Linux. The developer of CrunchBang has decided that it’s time to move on.
-
-
I have decided to stop developing CrunchBang. This has not been an easy decision to make and I’ve been putting it off for months. It’s hard to let go of something you love.
-
-
Canonical/Ubuntu
-
Canonical has published details about a Django regression in Ubuntu 12.04 LTS and Ubuntu 10.04 LTS operating systems, which has been identified and fixed.
-
The mobile market is saturated. Any new entrants are doomed from the start. And if you need proof, just look at Windows Phone or BlackBerry. The problem is that you need an app ecosystem to gain market share, but you need market share in order to entice developers to your platform.
-
-
Ubuntu Touch already has a large number of native apps and more are added every day. The platform needs as many applications as possible and now it’s Telegram’s turn to land in the Ubuntu Store.
-
It’s been a long time coming, but finally Canonical is ready to release its first Ubuntu phone. After teaming up with Meizu and BQ almost a year ago, we’re getting a (sort of) new handset from the latter; it’s actually a repurposed version of its Aquaris E4.5, a mid-range smartphone that normally ships with Android. The new “Ubuntu Edition” keeps all of the same hardware, which is nothing to write home about. It has a 4.5-inch, 540×960 resolution display, a 1.3GHz quad-core MediaTek Cortex A7 processor, 1GB of RAM and 8GB of internal storage. For shutterbugs, there’s also a 8-megapixel rear-facing camera and a 5-megapixel snapper on the front. At €169.90 ($195), the specs are pretty unremarkable.
-
Canonical is launching the first Ubuntu smartphone after a year of promises, though it’s unclear why anybody but hardcore Ubuntu aficionados would want one.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
The Ubuntu launch date are usually set in stone, but from time to time we might see some of them delayed. The same happened with the Ubuntu 14.04.2 LTS release which is delayed for a couple of weeks.
-
A promotional video for the first Ubuntu phone, BQ’s Aquaris E4.5, is now live and it shows just what are some of the capabilities and features of the operating system.
-
-
A “Deep-SCINI” submersible with Linux-based Elphel cameras discovered surprisingly diverse life under the Antarctic ice shelf — and rapidly melting ice.
-
TechNexion and Freescale launched an IoT Gateway that runs Linux on a dual-core, Cortex-A7 QorIQ SoC, offers six GbE ports, and expands via Arduino Shields.
The $429 LS1021A-IoT Gateway Reference Design, which is built by TechNexion and co-branded with Freescale, is the first product we’ve seen to run the first ARM-based versions of Freescale’s previously PowerPC-only QorIQ processor line. QorIQ has always been focused on networking, and that’s no different with the low-power QorIQ LS1 system-on-chip announced in Oct. 2013.
-
Phones
-
Tizen
-
Samsung unveiled their Tizen based TVs at CES 2015, and today they have gone on-sale in South Korea. This initial batch comes in four sizes — 55, 65, 78 and 88 inches. The 55-inch version is priced at 5.49 million won (US$5,038), with SUHD TV’s having the capability of display over 1 billion colors, 64 times more than the existing models.
-
This is the Samsung Z1—the world’s first Tizen phone. After one of the bumpiest pre-launch situations in recent memory, Samsung’s home-grown OS has finally hit smartphones.
-
Android
-
We rightly laud Apple for its ability to get us to pay a premium, but the world owes more to Google for making mobile computing a commodity.
-
My feeling is that we ought to be grateful that people have a choice. I can’t imagine anything worse than one platform dominating any particular market completely. We saw what that looked like on the desktop when Microsoft ruled the roost with Windows back in the 90s, and it wasn’t pretty.
I wouldn’t want Android or iOS to completely dominate the mobile phone market. In fact, I’d much rather there were a strong third or fourth choice available as well. It’s never a good idea for one or two companies or platforms to have too much power or control over consumers.
-
Chinese smartphone manufacturer Xiaomi launched its 2014 flagship, the Mi 4, in India last week, and the device is set to on sale on Tuesday in the country for about $325.
While the phone isn’t exactly new, it does come with the latest version of MIUI, the company’s own flavor of Android. The Mi 4 is Xiaomi’s first device to get the update in English.
-
Today, 6 February, is the third birthday of the Lumicall app for secure SIP on Android.
-
Open source scares people. And tossing them into the deep end usually doesn’t help dampen that fear. Instead, we need to help ease people into using open source. Scott Nesbitt, technology coach and writer, shares some advice to help you do that.
First, curb the urge to get on open source soapbox. Instead, go for the heart of it—show them how they can do their work with it.
Open source is not only for the techie. So, explain to people they don’t have to be a coder. They can learn to code, but it’s not required.
-
The Coreboot project has now ported over the XGI Z9s frame-buffer support from the Linux kernel.
-
-
FOSDEM doesn’t get the ra-ra headlines or (thankfully) the “booth babes” but the conference does get networking and top technologists (and Belgian beer). I saw a couple of my tech heroes and big cheeses here a few minutes apart just before writing this, for example, and got some top advice for a specific tech issue a breath later.
I also saw photos of RMS (Richard Stallman) at large a few paces away, though I didn’t get to meet him in person and buy one of his badges, alas…
Man-flu and technicolour yawning on the second day didn’t stop me having riotous fun with geekery, champers and IP lawyers this year!
-
If you use Linux, most likely Apache is your web server of choice. Apache is a great choice. It’s incredibly powerful, very reliable, and secure. There may, however, be certain deployments that either do not need all of the features found in Apache, do not have the resources to support Apache (such as in the case of an embedded system), or need something easier to manage. If that’s the case, fear not ─ there are plenty of light weight, open source, web servers out there ready to meet and exceed your needs.
-
Salesforce’s new Lightning platform aims to make it easier for ordinary folks to build apps, and leverages open source tech to do so.
-
A year ago, Pivotal announced its intent to set up a foundation for the open source Cloud Foundry project, but issues lurk in the bylaws and ownership of the name
-
Events
-
DevConf.cz, in the beautiful city of Brno, Czech Republic is one of the most popular free software conferences in the region. It brings together hundreds of developers, enthusiasts, and engineers to discuss and collaborate on new technology.
-
-
-
-
SaaS/Big Data
-
Trying to learn more about what OpenStack, the open source cloud infrastructure project, might have to offer? Need some help figuring something out, or inspiration for a new approach to try? We’re here to help. We have gathered some of the best how-tos, guides, tutorials, and tips published over the past month into this handy collection.
-
Lately we’ve been covering tools that orbit Hadoop in the Big Data ecosystem, ranging from Elastic Search to Qubole, which offers analytics on Hadoop data as a service (HaaS), to the Apache Spark project. In this arena, Kafka and YARN are much talked about. YARN is a sub-project of Hadoop at the Apache Software Foundation that takes Hadoop beyond batch to enable broader data-processing. Kafka allows a single cluster to serve as the central data backbone for a large organization. With it, data streams are partitioned and spread over a cluster of machines to allow data streams larger than the capability of any single machine.
-
-
Databases
-
Oracle/Java/LibreOffice
-
Oracle sometimes seems to be a bit miffed by enthusiasm for Linux container darling Docker because its own Solaris “Zones” have done containers for ages.
Big Red also knows in its heart of hearts that Solaris isn’t for everyone, but reckons its own Linux is for anyone who fancies robust, well-supported Torvalds-spawn. And given that Docker needs an OS in which to run containers, Oracle has therefore decided to make Oracle Linux available in the Docker repository. The company will also package an Oracle-maintained version of MySQL and pop it in the same place.
-
FSF/FSFE/GNU/SFLC
-
-
Version 2.21 of the GNU C Library is now available. Glibc 2.21 fixes a lot of issues while also adding some new functionality.
Glibc 2.21 has many bug fixes, several security fixes, a port to the Altera Nios II platform, a new sempahore algorithm, support for TSX lock elision on PowerPC, optimized string functions for AArch64, support for new MIPS ABI extensions, and many other changes.
More details on glibc 2.21 can be found via the mailing list release announcement. Other GNU C Library 2.21 details can be found via the Sourceware.org Wiki.
-
Over the last few months, Webmail provider Posteo has been working with the FSF to license and tag all JavaScript on their Web site and Webmail system so that it is immediately identifiable as free software. They have also done everything possible to ensure that it is 100% compatible with the GNU LibreJS browser extension, which automatically blocks any potentially nonfree JavaScript, making it easy to browse the Web in freedom. This is an outstanding effort in defense of the freedom of Posteo’s users, and the company deserves recognition for it. We hope others will follow their lead.
-
Public Services/Government
-
This year half of all the software applications at the Diputación Foral de Bizkaia (the provincial council of Bizkaia, Spain) will be open source, up from 25 percent in November 2014. The goal was announced on 12 November at the start of the LibreCon software conference. “Open-source technology offers competitiveness and savings, boosts the economy, promotes knowledge and makes us more transparent”, a press statement quotes Counsellor of the Presidency, Unai Rementeria, as saying.
-
Openness/Sharing
-
Science
-
Innovation makes things cheaper, which frees up cash for consumers to buy other things. That drives the virtuous cycle of economic growth. We dug into the inflation data, more formally known as the personal consumption expenditures price index, to highlight some of the items that have seen the biggest discounts.
-
Health/Nutrition
-
The imperative to improve mental health in the UK is primarily a moral one. That said, even a hard-nosed economist, insensible to the suffering of individuals, should appreciate the benefits that better mental healthcare can bring. Unsurprisingly given its prevalence, mental illness has a huge economic impact: a 2010 report by the Centre for Mental Health estimated the aggregate costs in 2009-10 as £105.2 billion – rather more than the total NHS budget for the same year, £95.8 billion. As for the benefits of treatment, a report just released by the same Centre finds that, for every £1 invested in group cognitive-behavioural therapy for adolescents suffering from anxiety, £31 is saved in wider costs.
-
Security
-
Sharyl Attkisson’s lawyer told the Daily Beast that an investigation that found no evidence her personal computer was hacked is “irrelevant” because it reviewed the wrong computer, despite her own repeated claims that the desktop in question had been compromised. He also falsely claimed her lawsuit against the federal government for alleged hacking was focused solely on a separate work computer.
-
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that’s custom built for each infection.
-
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that’s custom built for each infection.
-
We know that the NSA likes taking unsolicited action inside the computers of others. We know the FBI is also very much into hacking.
Now, the UK government is telling the world that its spies and cops are hackers too — and has asked the public what they think about it
In a new unprecedented document released on Friday, the UK government released the guidelines and rules that all British spy and law enforcement agencies have to follow in their “equipment interference” activities.
-
-
Defence/Police/Secrecy/Aggression
-
-
When Kenneth Jarecke photographed an Iraqi man burned alive, he thought it would change the way Americans saw the Gulf War. But the media wouldn’t run the picture.
-
A federal judge is demanding that the government explain, photo-by-photo, why it can’t release hundreds, and perhaps thousands, of pictures showing detainee abuse by U.S. forces at military prison sites in Iraq and Afghanistan.
In a courtroom in the Southern District of New York yesterday, Judge Alvin Hellerstein appeared skeptical of the government’s argument, which asserted that the threat of the Islamic State and Al Qaeda exploiting the images for propaganda should override the public’s right to see any of the photos.
-
Thirteen years ago they were just a few men, disaffected students and farmers, shouting outside a rural mosque in the north Yemeni highlands. Today, they are in charge. They’re known popularly as the Huthis; the U.S. believes they are an Iranian proxy and Saudi Arabia has already fought one war with them.
-
The privatization of America’s wars swells the ranks of armies for hire across the globe.
-
The Middle East today is the last place anyone in mainstream western thought would think to look for progressive political thought, and even less to see those thoughts translated into action. Our image of the region is one of dictatorships, military juntas and theocracies built on the ruins of the former Ottoman Empire, or hollow states like Afghanistan, and increasingly Pakistan, where anything outside the capitol is like Mad Max. The idea of part of the region being not just free, but well on its way to utopian, isn’t one that you’re going to find on mainstream media.
-
Transparency Reporting
-
Prosecutors in the Eastern District of Virginia began investigating WikiLeaks in 2010 after the site posted some of the quarter-million State Department cables leaked by Chelsea Manning.
Last month, an official from the Department of Justice publicly confirmed the investigation is still ongoing. It was the first time anyone, including WikiLeaks’ own defense team, has gotten such confirmation since April 2014.
-
Whistleblower laws exist because government officials do not always act in the nation’s best interests.
The Obama administration, in its war on whistleblowers, just lost a major battle. Major in its venue — the Supreme Court — and major in its implications for future whistleblower cases.
-
As Attorney General Eric Holder is about to leave office, Senator Ron Wyden has sent him a letter more or less asking if he was planning to actually respond to the various requests that Wyden had sent to Holder in the past, which Holder has conveniently ignored. Wyden notes, accurately, that the government’s continued secrecy on a variety of issues “has led to an erosion of public confidence that has made it more difficult for intelligence and law enforcement agencies to do their jobs.”
-
WikiLeaks co-founder Julian Assange is considering suing UK Deputy Prime Minister Nick Clegg for defamation over comments made regarding Assange’s legal situation.
Speaking on LBC radio on Thursday (5 February), Clegg said that Assange should go to Sweden to “face very serious allegations and charges of potential rape.”
Assange has been accused of sexually assaulting two women in Stockholm in 2010, however no formal charges have been made and Assange denies the allegations.
-
-
Scotland Yard have spent more than £10 million on policing the Ecuadorian Embassy where Wikileaks founder Julian Assange has been avoiding extradition.
Mr Assange was granted asylum by the government of Ecuador and has been holed up in the building in Knightsbridge since 2012.
The Metropolitan Police have posted round-the-clock police officers outside the building ever since, costing an estimated £10,500 a day.
-
Finance
-
For his 50th birthday, Jim Tananbaum, chief executive officer of Foresite Capital, threw himself an extravagant party at Burning Man, the annual sybaritic arts festival and all-hours rave that attracts 60,000-plus to the Black Rock Desert in Nevada over the week before Labor Day. Tananbaum’s bash went so well, he decided to host an even more elaborate one the following year. In 2014 he’d invite up to 120 people to join him at a camp that would make the Burning Man experience feel something like staying at a pop-up W Hotel. To fund his grand venture, he’d charge $16,500 per head.
-
PR/AstroTurf/Lobbying
-
NBC Nightly News anchor Brian William has apologized for falsely claiming (NBC, 1/30/15) that “during the invasion of Iraq…the helicopter we were traveling in was forced down after being hit by an RPG.”
-
After a January 30, 2015 ruling from Milwaukee-based federal Judge Charles Clevert, some declared that the “John Doe” probe into alleged campaign finance violations by Governor Scott Walker’s campaign was dead.
The Franklin Center’s Wisconsin Reporter website claimed that Judge Clevert’s decision “effectively pulled the life support plug” on the investigation. The Milwaukee Journal Sentinel’s right-wing columnist Christian Schneider repeated his erroneous “zombie law” claim, declaring that the ruling “almost certainly means the end of the most recent John Doe investigation.”
-
Censorship
-
Google’s lawsuit against Mississippi State Attorney General Jim Hood is a crucial case for the future of SOPA-like Internet filters in the U.S. This week Digital Citizens Alliance, Stop Child Predators and others voiced their support for the Attorney General, suggesting that Google Chrome should be censored as well.
-
After review by the French Cabinet last Wednesday, the implementation decree for the administrative blocking of pedopornographic and terrorist websites was published today.
-
Privacy
-
A security problem in WhatsApp means that anyone can see users’ profile photos, even if they have been set to be viewable to friends only, according to security researchers.
-
US intelligence community issues limited list of tweaks to data collection and surveillance at end of year-long effort to respond to Snowden revelations
-
Director of National Intelligence James Clapper this morning released a report detailing new rules aimed at reforming the way signals intelligence is collected and stored by certain members of the United States Intelligence Community (IC). The long-awaited changes follow up on an order announced by President Obama one year ago that laid out the White House’s principles governing the collection of signals intelligence. That order, commonly known as PPD-28, purports to place limits on the use of data collected in bulk and to increase privacy protections related to the data collected, regardless of nationality.
-
Three Democratic lawmakers on the influential Senate Committee on Commerce, Science and Transportation are calling on federal regulators to investigate Verizon for its practice of using unique customer codes to track the online activities of its wireless subscribers.
-
So for the past three months I’ve been using Tor Browser to surf the Web, not as a primary browser, but as a secondary browser. Firefox is my primary browser.
Together with using StartPage as my search engine, I feel much better about my privacy while surfing the Internet. Using Tor Browser leads to a tad slower browsing experience, but I knew that going in, so no complaints there.
-
The Drug Enforcement Administration (DEA) is using license-plate reader technology to photograph motorists and passengers in the US as part of an official exercise to build a database on people’s lives.
According to DEA documents published on Thursday by the American Civil Liberties Union (ACLU), the agency is capturing images of occupants in the front and rear seats of vehicles in a programme that monitors Americans’ travel patterns on a wider scale than previously thought.
-
About two-thirds of investigative journalists surveyed (64%) believe that the U.S. government has probably collected data about their phone calls, emails or online communications, and eight-in-ten believe that being a journalist increases the likelihood that their data will be collected. Those who report on national security, foreign affairs or the federal government are particularly likely to believe the government has already collected data about their electronic communications (71% say this is the case), according to a new survey of members of Investigative Reporters and Editors (IRE) – a nonprofit member organization for journalists – by the Pew Research Center in association with Columbia University’s Tow Center for Digital Journalism
-
Leonid Levin, the head of the Duma’s committee on public communications policy, wants to grant police the extrajudicial power to block access to Internet anonymizers and “the means of accessing anonymous networks, such as Tor.”
-
-
Regulations governing access to intercepted information obtained by NSA breached human rights laws, according to Investigatory Powers Tribunal
-
-
Spy agency could now be forced to reveal whether it spied on civil rights groups after watchdog human rights ruling
-
A British tribunal ruled on Friday that some aspects of intelligence-sharing between security agencies in Britain and the United States were unlawful until December 2014, in a ground-breaking case brought by civil liberties groups.
The Investigatory Powers Tribunal ruled that Britain’s GCHQ had acted unlawfully in accessing data on millions of people in Britain that had been collected by the U.S. National Security Agency (NSA), because the arrangements were secret.
Campaign groups Liberty, Privacy International, Amnesty International and others brought the case following revelations about mass surveillance made by former NSA contractor Edward Snowden.
-
The court that oversees intelligence agencies in Britain ruled on Friday that the electronic mass surveillance of cellphone and other online communications data had been conducted unlawfully.
The legal decision, the first time the court has ruled against the British intelligence services since the tribunal was created in 2000, relates to information that was shared between British security agencies and the National Security Agency of the United States before December 2014.
Although privacy campaigners claimed the decision as a victory, many experts said the British and American intelligence agencies would continue to share information obtained with electronic surveillance, even if they had to slightly alter their techniques to comply with human rights law.
-
The United Kingdom’s top surveillance agency has acted unlawfully by keeping details about the scope of its Internet spying operations secret, a British court ruled in an unprecedented judgment issued on Friday.
Government Communications Headquarters, or GCHQ, was found to have breached human rights laws by concealing information about how it accesses surveillance data collected by its American counterpart, the National Security Agency.
-
Civil Rights
-
Once the items were deemed harmless, Vanderklok says, he told Kieser that if someone had only told him what “organic matter” meant, he could have saved everyone a lot of trouble. Kieser then became confrontational. Vanderklok says he calmly asked to file a complaint. He then waited while someone was supposedly retrieving the proper form.
Instead, Kieser summoned the Philadelphia Police. Vanderklok was taken to an airport holding cell, and his personal belongings – including his phone – were confiscated while police “investigated” him.
Vanderklok was detained for three hours in the holding cell, missing his plane. Then he was handcuffed, taken to the 18th District at 55th and Pine and placed in another cell.
He says that no one – neither the police officers at the airport nor the detectives at the 18th – told him why he was there. He didn’t find out until he was arraigned at 2 a.m. that he was being charged with “threatening the placement of a bomb” and making “terroristic threats.”
Vanderklok’s Kafkaesque odyssey finally ended at 4 a.m., when his wife paid 10 percent of his $40,000 bail.
When I heard this story, my first thought was that Vanderklok had to have said or done something outrageous for others to respond with such alarm. In fact, Kieser said as much at Vanderklok’s trial on April 8, 2013.
[...]
But here’s the thing: Airport surveillance videos show nothing of the sort.
-
On a quiet weeknight among the stately manors of Great Falls, ten men sat around a table in the basement of a private home last November playing high stakes poker. Suddenly, masked and heavily armed SWAT team officers from the Fairfax County Police Department burst through the door, pointed their assault rifles at the players and ordered them to put their hands on the table. The players complied. Their cash was seized, including a reported $150,000 from the game’s host, and eight of the ten players were charged with the Class 3 misdemeanor of illegal gambling, punishable by a maximum fine of $500. The minimum buy-in for the game was $20,000, with re-buys allowed if you lost your first twenty grand.
[...]
“It’s crazy,” said the regular, looking back on the night of the raid. “They had this ‘shock and awe’ with all of these guys, with their rifles up and wearing ski masks.” He noted that the Justice Department recently revamped its guidelines for civil forfeiture cases, following reports by The Post about abuses of the seizure process by police around the country, including Fairfax. But in Virginia, the seizure law remains the same, and agencies may keep what they seize, after going through a court process.
-
Looking west from the scrub and boulders of the Sandia Mountains, the city of Albuquerque, New Mexico, sprawls across the valley of the Rio Grande, surrounded by the vast openness of the high desert. On the city’s eastern edge, the winding roads and cul-de-sacs of tony subdivisions in the Northeast Heights abruptly give way to the foothills of the mountains, whose sharp red peaks tower over the city.
-
Coca-Cola has been forced to withdraw a Twitter advertising campaign after a counter-campaign by Gawker tricked it into tweeting large chunks of the introduction to Hitler’s Mein Kampf.
For the campaign, which was called “Make it Happy” and introduced in an ad spot during the Super Bowl, Coke invited people to reply to negative tweets with the hashtag “#MakeItHappy”.
The idea was that an automatic algorithm would then convert the tweets, using an encoding system called ASCII, into pictures of happy things – such as an adorable mouse, a palm tree wearing sunglasses or a chicken drumstick wearing a cowboy hat.
In a press release, Coca-Cola said its aim was to “tackle the pervasive negativity polluting social media feeds and comment threads across the internet”.
-
A top U.S. defense official said it was “no coincidence” that recent Islamic State videos of the savage executions of Jordanian and Japanese hostages showed the victims wearing orange jumpsuits, “believed by many to be the symbol of the U.S. detention facility at Guantanamo Bay.”
-
Fox News Radio host Tom Sullivan is backtracking and brazenly lying about his controversial remarks calling bipolar disorder “made up” and “the latest fad.” While Sullivan now claims his remarks were taken “out of context,” this defense is preposterous. He repeatedly dismissed the validity of bipolar disorder and the clip used by Media Matters was the same one posted by his employer with the headline “(AUDIO) Bipolar Woman Says She DESERVES Disability Benefits. Tom Tells Her She’s WRONG!”
-
Few in public life are as contemptuous of privacy as Stewart Baker, an attorney whose career has included stints at the NSA and Department of Homeland Security. He is a staunch defender of most every U.S. government surveillance effort. As Americans expressed alarm at the scope of spying revealed by Edward Snowden, he delivered a speech asserting that they were engaged in an irrational moral panic.
But even this man, who believes that bulk, warrantless surveillance is fine under the Fourth Amendment, acknowledges that the Drug Enforcement Administration deserves censure for secretly operating surveillance programs. In fact, he believes that the DEA’s behavior was egregious enough that the public’s failure to respond more forcefully calls the value of transparency itself into question.
Yet he isn’t personally condemning the DEA.
-
-
Witness after witness in the Jeffrey Sterling trial made claims about how closely held the program was. “More closely held than any other program,” Walter C, a physicist who worked on the program described. “More closely held,” David Shedd, currently head of the Defense Intelligence Agency and head of Counterproliferation Operations until just after the Merlin op.
Of course, Bob S’ admission that — when FBI showed him a list, in 2003, of 90 people cleared into the program, he said it was incomplete — suggests all those claims are overstated.
-
Internet/Net Neutrality
-
Michael Powell tried to do for broadband Internet what his father did for Iraq.
One of the first things George W. Bush did after he was installed in the Oval Office was to put the younger Powell, who was fond of saying things like “the oppressor here is regulation” (Washington Post, 1/23/01), in charge of the agency that regulates media. His blithe attitude toward the consequences of his beloved market was perhaps best expressed by his dismissal of concerns over the digital divide (Chicago Tribune, 2/7/01): “You know, I think there’s a Mercedes divide. I’d like to have one; I can’t afford one.”
-
MSNBC’s Harold Ford, Jr. used air time to push net neutrality myths without disclosing his relationship to the telecom industry, which has contributed millions of dollars to lobbying against net neutrality regulations.
-
Now that FCC boss Tom Wheeler has made it official that he’s going to present rules to reclassify broadband under Title II for the purpose of implementing stronger net neutrality rules (details still to come…), the opponents to this effort have come out of the woodwork to insist, over and over again, that reclassifying is “treating the internet as a utility.” The cable industry’s main lobbyists, NCTA, decried “Wheeler’s proposal to impose the heavy burden of Title II public utility regulation….” and AT&T screamed about how “these regulations that we’re talking about are public-utility-style regulations…” Former Congressman Rick Boucher, who is now lobbying for AT&T whined that “subjecting broadband to public utility regulation under Title II is unnecessary.”
-
Intellectual Monopolies
-
-
It appears that, even though I am past 50, my opportunities to become a spy have not expired. This is because, as an MEP, I have now been granted privileged access to the European parliament restricted reading room to explore documents relating to the Transatlantic Trade and Investment Partnership (TTIP) deal. But before I had the right to see such “top secret” documents, which are restricted from the gaze of most EU citizens, I was required to sign a document of some 14 pages, reminding me that “EU institutions are a valuable target” and of the dangers of espionage. Crucially, I had to agree not to share any of the contents with those I represent.
-
Copyrights
-
Australia’s current Prime Minister Tony Abbott has asked the Opposition to back data retention laws by mid-March, playing the security card to try and pressure Labor leader Bill Shorten.
But, as I’ve pointed out on more than one occasion, this rush to retain data of internet users is for other reasons. One, to satisfy big American media companies who want to use retained data to threated those whom they deem to be copyright violators.
Australian ISPs have been given until April by the government to agree on a scheme for preventing what the big film and music companies call copyright theft. The mid-March deadline for passing data retention laws fits into that scheme neatly.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »