05.30.15
Posted in Europe, Patents at 4:48 pm by Dr. Roy Schestowitz
Escaping a crisis by bribing and attacking the media
Summary: The European Patent Office (EPO) is misusing public funds to manufacture self-congratulatory publicity for itself whilst attacking those who write negative commentary
THE publicity stunts from the EPO are not shocking to us. We already know that the EPO wastes a lot of public money on paid placements ('articles') which disgrace scientific publications (fake staff testimonials), not to mention how the EPO wasted money to harass the press and its very own staff (real staff, not fake staff).
“EPO management has the pervasive illusion of omnipotence; its behaviour proves that it thinks it can do whatever it wants.”In an effort to deal with some core issues Merpel looks into the financial state of the EPO, whose management likes to pretend self-sufficiency (rather than exploitation of taxpayers as unwilling subsidisers, often directly harmed by the EPO’s actions).
“Having been returned to blogging duty,” Merpel refers to herself as a third person (as usual), she “has turned her attention to the finances of the European Patent Office. She wrote about this last year, examining the 2013 financial report of the EPO, and concluded that it was not possible to establish with any confidence, or in any degree of detail, what the true financial position actually is.”
Merpel’s colleague Darren Smyth has meanwhile slammed this latest EPO publicity stunt, which it calls “European Inventor Award”. Smyth writes:
Whatever the European Inventor Award is, it is certainly not “to grant European patents”. So this Kat’s first gripe is that the event seems completely ultra vires in respect of what the EPO is actually supposed to be doing. National patent offices may have a wider mandate to foster innovation, to promote intellectual property generally, and to raise the profile of patenting, but the EPO most emphatically does not. At best, it is a distraction, and an apparently costly one at that, from the EPO’s legally defined role.
But this Kat thinks that it is worse than that. The European Inventor Award is about ranking inventions. Publicly proclaiming that one invention (the winner) has more merit than others (the runners up and those that were not even nominated). This is actually contrary to the EPO’s role as a body that grants patents, in which role (its only legally ceded role) it is bound to judge any invention against the objective standards of novelty and inventive step, irrespective of merit with respect to any other invention. Others are free to opine that one invention is “better” or has more worth than another, but the EPO should be quite disinterested in this. Its involvement with such an event tarnishes its objectivity.
[...]
The European Inventor Award is at best an expensive distraction, and at worse a dangerous compromise of principle.
This is probably the least worrisome among the EPO’s wasteful uses of its budget. In a matter of days we are going to write more about how EPO management attacks the media (to force it to only say nice things about the EPO, or nothing a all). EPO management has the pervasive illusion of omnipotence; its behaviour proves that it thinks it can do whatever it wants. It is this arrogance and resultant abuse that a vast number of EPO employees are protesting against. The EPO should be held accountable by its shareholders, i.e. the European public, but EPO management is now greedy and self-serving to the extreme. █
“The European Patent Office is an executive organisation, it deals especially with patent applicants, as such, its view of the world may be biased. As an executive organisation, its interpretative powers are very limited. The European Patent Convention excludes computer programs, it is outside the EPO’s power to change this.”
–Ante Wessels
Permalink
Send this to a friend
Posted in Microsoft, Security, Windows at 4:26 pm by Dr. Roy Schestowitz
The NSA is playing with nukes
Summary: Windows is sufficiently ‘NSA-compatible’ for remote compromise and physical damage (sabotage) to highly sensitive, high-risk equipment
MANY news reports from around Friday [1-13] made it abundantly clear that Stuxnet, an Israel- and US-made virus that targets Microsoft Windows, was deployed not only in Iran (which uses Windows and Microsoft Linux) but also deployed (albeit unsuccessfully) in North Korea.
It is worth noting that Stuxnet was developed not only in the US but also in Israel and much of Microsoft’s software development for ‘security’ is also done in Israel, so it might not detect Stuxnet (by design).
“Imagine the media reaction if some nation’s government tried to install viruses in nuclear facilities in the US…”News from North Korea should remind any nation with military facilities (that’s about every nation on Earth) to dodge Microsoft Windows. Turkey, for instance, reportedly moved its army to GNU/Linux and several other nations make similar moves for security reasons. In order to explain North Korea’s resistance to the infection some corporation media likes to highlight “near-complete isolation” (see below) rather than reliance on GNU/Linux. The ToryGraph (see below) calls Stuxnet a “computer virus” even through it is uniquely a Microsoft Windows virus. Imagine the media reaction if some nation’s government tried to install viruses in nuclear facilities in the US…
This is by no means defence of North Korea; it’s just that the story makes is abundantly clear that, Microsoft’s special relationship with the NSA aside, Windows is a target. Even Western governments target it. The NSA habitually said that it worried about attacks on its electric grid while hypocritically enough it is attacking nuclear facilities in other countries, never mind the risk of “blowback” or the “fallout” (pun intended) such aggressive actions may consequently bring. Pentagon would label this an “act of [cyber] war”. █
Related/contextual items from the news:
-
The NSA tried to wreck North Korea’s nuclear weapons lab using the centrifuge-knackering malware Stuxnet, and ultimately failed, multiple intelligence sources claim.
-
By almost completely shutting itself off from the rest of the world, the North Korean government has denied its people and society access to the fruits of the digital communications revolution. It has also reportedly helped stymie a U.S. cyberattack on the country’s nuclear infrastructure modeled on the so-called Stuxnet virus the United States and Israel used against Iranian centrifuges.
-
Right around the time that the Stuxnet attack so famously sabotaged Iran’s nuclear program in 2009 and 2010, the U.S. National Security Agency reportedly was trying something similar against North Korea.
The NSA-led U.S. effort used a version of the Stuxnet virus designed to be activated by Korean-language computer settings, but it ultimately failed to sabotage North Korea’s nuclear weapons program, according to a Friday Reuters report, which attributed the information to people familiar with the campaign.
-
The US tried to deploy a version of the Stuxnet computer virus to attack North Korea’s nuclear weapons programme five years ago but ultimately failed, according to people familiar with the covert campaign.
-
-
-
-
-
-
-
-
-
Permalink
Send this to a friend
Posted in News Roundup at 4:00 pm by Dr. Roy Schestowitz
Contents
-
-
But inside the spacecraft’s Linux-based flight software, a problem was brewing. Every 15 seconds, LightSail transmits a telemetry beacon packet. The software controlling the main system board writes corresponding information to a file called beacon.csv.
-
Desktop
-
This tweet shouldn’t suggest that Dell is preparing to dump Windows for Ubuntu on a wider scale, but it’s certainly an interesting sentiment for the company to share with the account’s followers. While it’s well loved by its users, Ubuntu doesn’t have anywhere near the mainstream cognizance of popular OS options like Windows and Mac OS X.
-
-
Server
-
Imad Sousou, VP in Intel’s Software and Services Group and GM of the Intel Open Source Technology Center, discusses the Clear Linux and Clear container efforts.
-
CoreOS is a Linux startup that has been making a name for itself by building out a clustered, scalable container operating system distribution. On the path toward building scale, CoreOS is also focusing on security.
-
Kernel Space
-
-
-
Mauro Carvalho Chehab, the maintainer of the kernel’s media subsystem, has posted the first two in a series of articles on digital video broadcasting support in Linux.
-
Graphics Stack
-
It turns out, Wayland’s code license may have been slightly incorrect all these years and doesn’t comply with the FSF / open-source definition.
-
Benchmarks
-
Earlier this month I posted some Btrfs RAID 0/1 benchmarks on Linux 4.1 as a prelude to some larger Btrfs RAID benchmarks. Today the rest of those results are available with using five disks and testing Btrfs on this newest version of the Linux kernel while testing the RAID 0, 1, 5, 6, and 10 levels.
-
The Atom Z3735F is what powers Intel’s Compute Stick. The Z373F has a Scenario Design Power of just 2.2 Watts while being a quad-core 64-bit processor with a clock speed of 1.33GHz and a burst frequency of 1.83GHz. This low-power Atom SoC also has Intel HD Graphics that work fine under Linux. In this article are some early test data from the Intel Compute Stick with Ubuntu Linux.
-
For those that haven’t yet upgraded to Fedora 22, here’s some benchmarks comparing the open-source Radeon graphics performance of Fedora 21 against the newly-released Fedora 22 Linux distribution update.
-
Ealier this year the HiSense Chromebook was released at Walmart in the US, a 11.6-inch quad-core ARM notebook priced at just $149 USD and running ChromeOS. But how well does it run Ubuntu Linux?
-
Applications
-
As you may already know, Calibre is an open-source book management software, with many interesting features including e-book conversion, e-book viewer, library to ebook reader synchronization and support for the most popular eBook formats, including: epub, cbz, mobi, fb2. Being multi-platform, the app works on Linux, Windows and Mac OS X.
-
Browser wars has been going on for more than a decade now and yet, there are no signs of a let down by any parties involved. In fact, things are only hotting up with the big three competing tooth and nail to become the leader of the pack. But that’s not the entire story. A host of niche players are also in the market which are equally good and sometimes even better. Here, we’ll discuss 3 superb free and open source web browsers you’ve probably never heard about.
-
While Nemo 2.6 wasn’t officially released yet (Cinnamon 2.6 is currently undergoing testing in the Linux Mint Romeo repository), its source has been available for some time on GitHub.
-
WinFF is a tool that uses FFMPEG to convert any kind of video files by using a large number of presets and a ton of other options. It’s been around for a long while, so it’s time to take a closer look at it and see how it has endured the passage of time.
-
After 4 release candidates, the FusionForge community is proud to announce the new major Fusionforge 6.0 final release.
-
Instructionals/Technical
-
Wine or Emulation
-
The Wine development release 1.7.44 is now available.
-
Wine devs have announced that a new version of their application is out and it comes with some very interesting features, including improved support for the 64-bit platform.
-
Wine 1.7.44 is out this morning to end out the month of May for the Wine development community.
-
Games
-
Is there any stopping GOG right now? They are really heating up the Linux releases recently, and I am sure our DRM free loving fans will snap at these.
-
The new horror game ‘SOMA’ from Amnesia developer Frictional Games is due in September, and they confirmed it should be a day-1 Linux release.
-
OpenMW is an open source implementation of The Elder Scrolls 3: Morrowind game engine and functionality, and the developers have just upgraded it to version 0.36.0, bring the project a little bit closer to a stable release.
-
Here are your top 10 favorite video games, with No. 1 receiving the most nominations across our social channels.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
I bought a tablet to start to paint digitally during this period. I didn’t know many things about software, so my first years of digital painting were made with Photoshop Elements (bundled with the tablet). With digital painting, I could experiment with many themes I could never have sold on canvas. Then I met online publishers interested in my digital art and started to work more and more as a digital painter with an official Photoshop licence, Corel Painter, etcetera. In 2003 I ended my career as a traditional painter when a client decided to buy my whole stock of canvas.
-
Implementing Qt data models is anything but fun. For that reason, I don’t blame anyone for writing a beginResetModel / endResetModel combo any time a more complex change has happened.
-
What I have done till now is collect constellation artwork used in Stellarium, and complied a list of 3 stars for each constellation which would be used to position the constellation image in the sky map. I started coding and have written the ConstellationArt class declaration. Earlier I had included a Q_PROPERTY to make constellations fade in and out, but I was told that this would be difficult to achieve since KStars doesn’t use OpenGL. In any case, I think getting the constellations to display correctly in the sky is more important than making them fade. That could always be done at a later point of time.
-
The world changes, and with it, we change too. For this new version of Kamoso we wanted to iterate what we’re presenting.
-
KDE Plasma 5.3.1 was just announced by the KDE Community a few days ago, and now it has been made available in Kubuntu 15.04 with the help of a single PPA.
-
Packages for the release of KDE’s desktop suite Plasma 5.3.1 are available for Kubuntu 15.04. You can get it from the Kubuntu Backports PPA.
-
GNOME Desktop/GTK
-
…the second snapshot of the GNOME 3.17 development cycle, the 3.17.2 release.
-
This week’s GNOME 3.18 development update for the Mutter window manager brought X11 / Wayland clipboard interoperation so that the clipboard contents can be shared across Wayland and X11/X.Org clients. With the latest Git code, there’s now drag-and-drop interoperation.
-
Javier Jardón announced the GNOME 3.17.2 release a short time ago as the second in the GNOME 3.17 development cycle. GNOME 3.18 is building up a whole lot of exciting changes as frequently talked about in Phoronix articles.
-
-
Screenshots/Screencasts
-
PCLinuxOS/Mageia/Mandriva Family
-
Mandriva S.A., the French company behind Mandriva, the distribution that long time Linux users will remember as Mandrake, died this week at the age of sixteen. The announcement came in the form of a notice posted by the company earlier this week. The cause of death was financial hemorrhaging.
-
As we previously reported, after 17-years of duking it out with Microsoft Windows with some success, French company Mandriva just shuttered its doors and liquidated its assets.
Mandriva offered a Linux operating system for PCs that was doing well in some developing nations.
We reached out to the former CEO of Mandriva Jean-Manuel Croset, who joined Mandriva in 2011, to ask what happened.
-
-
While the popularity of Mandriva (formerly Mandrake) has been fading in recent years, it turns out the CEO of Mandriva is blaming employee lawsuits and the France legal system on the company’s demise.
-
We reported earlier this week that Mandriva S.A., the French company that handled the Mandriva Linux operating system, was in the process of being liquidated.
-
-
Ballnux/SUSE
-
The openSUSE Tumbleweed distro has received another set of updates this week, and the distribution is now using Linux kernel 4.0.4, which is the most advanced version available right now.
-
Nielsen also discussed why the decades-old COBOL programming language is still relevant today, whether through ATMs or online shopping, and how Linux now fits into the Micro Focus stable with the acquisition of Suse.
-
Red Hat Family
-
Whitehurst believes Amazon Web Services (AWS) makes sense for test and dev, but it can’t compete with private cloud at scale. Do you agree?
-
-
Red Hat and Tata Consultancy Services have forged a partnership to perform verification services on network function virtualization platforms for customers.
-
Red Hat has recently published three different studies focusing on: mobile development trends, OpenStack enterprise adoption, and digital leadership.
-
Fedora
-
-
-
Fedora 22 is the first Linux distribution to ship with version 4.0 of the Linux kernel and GNOME 3.16, which adds a variety of improvements and vastly better HiDPI support. This is the second release of Fedora following the project’s realignment to produce Workstation, Server, and Cloud builds, which are specifically tailored to each use case.
-
Fedora 22 has been released and so far it’s a really awesome Fedora release and the feedback is positive.
-
I’ve been around in the community for quite a bit, and while I’m not a kernel-dev or a team lead, I still like to think I belong to the community – helping where I can. Why I’ve stuck around over the years, other than because I’ve made friends in the community that I’d miss, is the philosophy of Fedora – the stance we take towards FOSS – which distinguishes us from any other Linux distribution.
-
To sum up Betteridge’s law of headlines in a single word: no.
-
The Fedora Project developers are discussing these days the possibility of redesigning their internal upgrade utility for the Fedora Linux operating system.
-
Over the last couple weeks there has been an “Anaconda Wishlist” thread occurring on Fedora’s desktop mailing list. The thread, and the associated Workstation Working Group meeting, are directed at the future of the Fedora Anaconda Installer.
-
None of the Linux distributions comes with all essential applications for daily usage, Agree? You have to install additional Repositories, softwares like Chrome, Flash player, Java or something in order to get a perfect distro for the daily usage. We can do it in two methods. First, you can manually search and install all the required softwares one by one, and the second one is you can use a tool that will help you to find and install all essential applications from one place. Which method would you prefer? I prefer the second method most, not because it is easy, but also it saves some time.
-
-
Debian Family
-
-
In the previous post on the multi-boot usb stick, Debian had to be dropped, due to missing support of iso-loading in the Debian installer iso images. Thanks to helpful comments from Jonathan McDowell and private emails, we found a way around this. In addition to having again an installable Debian image, I also added GRML support.
-
Derivatives
-
Canonical/Ubuntu
-
The $143,000 question: Softpedia reported earlier this week that there’s a unaccounted-for $143,000 in donations to Ubuntu that the Ubuntu Community Council can’t seem to find. While this doesn’t seem to be a new story, if mailing list traffic is any indication, it is an issue that does pique the interest for — what do you call them again? Oh yeah — answers.
-
A lot of information has been published in the past few days regarding the discussions between the Ubuntu Community Council and Kubuntu’s Jonathan Riddell. In short, following some very long and tense conversations, Jonathan Riddell was asked to step down from this leadership role in the Kubuntu community, which he refused. This is not something that often happens in the community, so many eyes have been pointed towards these discussions.
-
Earlier this week a huge fiasco began over the Ubuntu Community Council removing Jonathan Riddell from any leadership position relating to Ubuntu for one year. The Kubuntu Community Council came out in support of Jonathan as have many others from the community, but today the Ubuntu Community Council issued a lengthy statement where they re-affirm they will be sticking by their original decision.
-
It is important that it is understood that we will not be reversing that decision.
-
Seems a feud has been brewing behinds the scenes of two of the most popular distributions today. That feud, over Canonical’s intellectual property policy, ended with the ouster of Kubuntu project leader Jonathan Riddell. There has been enough noise to prompt Canonical into posting a statement saying Riddell was removed for being disrespectful, becoming increasingly difficult to deal with, and for not assuming the best intentions from Canonical.
-
System76, a hardware company, which is being known for building powerful computers with Ubuntu preloaded, has just announced that they have a special sale only for this weekend.
-
A fresh OTA update is being prepared for Ubuntu Touch, and it should land soon. Developers have released some of the most important improvements that will be implemented in the upcoming release.
-
We reported yesterday, May 28 that the major OTA-4 update for the Ubuntu Touch mobile operating system from Canonical will finally arrive sometime in the middle of next week.
-
Software & Updates is one of the most powerful tools in Ubuntu, but it’s not taken all that seriously. We want to take a closer look at this application and reveal some of the interesting functions.
-
Ubuntu 15.04, Ubuntu 14.10, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS have been updated in order to fix a few OpenLDAP vulnerabilities that have been found.
-
Flavours and Variants
-
The new Cinnamon 2.6.x branch is in the works and the developers have already released a few updates for it, but it’s still not available for Linux Mint users. That will change very soon, according to the Linux Mint project leader.
-
Chromixium is a new Linux distro that goes one big step further than the few existing distros catering to the Chrome OS. It one-ups Google’s semi-proprietary Chrome OS locked into the popular Chromebook hardware.
-
-
Eltech’s faster ExaGear Desktop software version now supports ARMv6, in addition to ARMv7, letting users run x86 apps on all models of the Raspberry Pi.
Russia-based Eltechs announced its ExaGear Desktop virtual machine last August, enabling Linux/ARMv7 SBCs and mini-PCs to run x86 software. That meant that users of the quad-core, Cortex-A7-based Raspberry Pi 2 Model B, could use it as well, although the software was not yet optimized for it.
-
CompuLab’s fanless Fitlet-H mini-PC has a quad-core 2.2GHz AMD A10 Micro-6700T SoC, up to 16GB RAM, internal SATA, dual HDMI, dual GbE, and dual mini-PCIe.
-
Phones
-
Android
-
The future of Android is here. Android M (I’m still hoping for Muffin) is the software that will power Android smartphones starting this fall. Aesthetically, everything looks familiar, but there’s a lot buried under that Material Design exterior. Let’s take a look.the
-
-
At its I/O developer conference today, Google announced Android Pay, a new payments solution native to its mobile operating system.
In addition to making it easier to pay at a merchant’s point of sale via NFC, the new system lets merchants integrate payments directly into their apps for selling physical goods and services using an Android Pay API rather than integrating a third-party provider like Venmo or PayPal.
-
Google’s Director of Engineering for Android Wear, David Singleton, has confirmed that Android Wear now has more than 4,000 specifically written apps for the wearable platform, and emphasized the watchword for the OS is, “choice.” Singleton took the stage during the keynote presentation at Google I/O to give us an update on the software and its growing ecosystem.
-
At its I/O developer conference on Thursday, Google unveiled Android M, the latest version of its globally dominant mobile OS, along with a pair of new mobile payments products.
-
Although Apple currently boasts more banks, Android Pay has the support of payment networks Visa , MasterCard , American Express, and Discover, as well as card-issuing banks Chase, Citibank, Capital one, and U.S. Bank, with more no doubt to come.
-
Google is going after the Internet of Things with Android-based software aimed at powering a broad range of connected gizmos.
We’ve heard rumors that the Chocolate Factory was planning a move into the IoT market, but Google platforms senior veep Sundar Pichai formally announced the effort at the Google I/O conference in San Francisco on Thursday.
-
Does the Internet of Things (IoT) need its own operating system? Google thinks it does, and has announced its own offering, Brillo, along with a new common language for connected devices called Weave. Brillo is based on Android and is aimed primarily at devices featuring slower processors and not a lot of memory. The Brillo platform manages and stores data collected by sensors in devices.
-
Android 6.0 is official. Like clockwork Google has again used its I/O developers’ forum to publicly unveil Android’s next major iteration (currently dubbed ‘Android M’) and – while it has some potentially game changing features – the devil is in the detail.
-
Google debuted Android Pay during yesterday’s opening keynote at its I/O developer conference. But the most interesting payments news came at a late afternoon session, where executives from Google’s commerce division showed off a prototype of a hands-free feature that will soon be beta testing in San Francisco. Customers can walk into a store, say, “I would like to pay with Google” and walk out without having touched their wallet or phone.
-
-
At it’s annual developer conference, Google just unveiled its next major version of Android: Android M. They’ll likely announce the full name when it gets closer to its official launch date.
-
It looks like Android M is taking some baby steps toward addressing our complaints about Android on large-screened tablets. The preview build released yesterday includes a split keyboard for easier thumb typing, but if you dig a little deeper you can also find a “highly experimental” split-screen multitasking mode that suggests that Google is doing more work on the problem behind the scenes.
-
-
-
-
-
Google on Thursday announced Android M, its next major Android release that focuses on significantly improving overall user experience across the operating system. One of the new features the company announced is fingerprint sensor support, which will let users both securely pay for products with Android Pay and also log into various services. To further help with the latter task, a password manager app has already announced that it’s ready to support Google’s newest Android security feature.
-
NVIDIA has been talking about its SHIELD Android TV device since the Game Developers Conference back in March, though the product was being called the SHIELD Console back then. Yesterday, however, NVIDIA officially launched the product to coincide with some related announcements out of Google and its media partners at the Google I/O conference.
-
The most important news about Android M is how it will handle the way apps get permission to access your private data. That sounds like a humble little technical detail until you realize what a revolution it will be when we can set our own permissions on apps, any time we want. And Chrome is doing it too.
-
-
We just got our hands on Android M and we’re working on a full write-up, but one thing that sent us running for our laptops was buried all the way in Developer Settings.
Android M has a dark mode.
-
-
-
As expected Google has today announced Android 6.0 which it has codenamed ‘Android M’. Google repeated this trick last year when it unveiled Android (5.0) Lollipop, referring to it as ‘Android L’ right until launch. Far more important, however, is what Android M brings to the table – in short: what’s the difference?
-
Fortunately, an open-source solution exists that does not require a monthly fee. That solution is Webmin, which, like competing closed-source products, allows users to configure and control various applications, such as the Apache HTTP Server, PHP, MySQL, Dovecot, SpamAssassin, ClamAV, and others, without needing to use command-line configuration of these disparate products.
-
Microsoft Windows and Apple’s operating systems are malware because they “snoop and shackle” users, GNU creator Richard Stallman said in an opinion piece published in The Guardian.
-
COMMUNITY CUBE is an open source initiative dedicated to protecting the privacy and security of online citizens around the world. We design, build and distribute technological solutions that protect email, web browsing, data storage and social media activity in a safe, affordable and easy to use manner.
-
Two of technology’s most pioneering developers have strongly criticised the current state of the industry, warning that the right to encryption is doomed and that users are exploited by the software that they use.
Open sourcerer Richard Stallman has painted a very bleak picture of today’s technology and communications environment, describing proprietary software as “malware”.
Stallman, the founder of the free software movement, perhaps not surprisingly has a very jaundiced view of proprietary software, and of Microsoft Windows especially.
-
It’s an accusation that SourceForge quickly refuted, with its public response titled “GIMP-Win project wasn’t hijacked, just abandoned.” As far as it’s concerned, the project was dumped more than 18 months ago, and SourceForge charitably “stepped-in to keep this project current.” The rebuttal also claims that previous concerns over misleading third-party ads were discussed and addressed well before this controversy began.
-
SaaS/Big Data
-
MapR Technologies, which focuses on Apache Hadoop, recently announced the general availability of Apache Drill 1.0 in the MapR Distribution. Drill, which we’ve covered before, delivers self-service SQL analytics without requiring pre-defined schema definitions, dramatically reducing the time required for business analysts to explore and understand data.
-
Databases
-
While open source databases have long been popular for niche use cases, over the past decade they’ve steadily grown in maturity and importance.
-
Oracle/Java/LibreOffice
-
The Document Foundation has released a version of Libre Office for Android.
The new app allows users to read and edit documents. The Document Foundation bills the app as a “Viewer” with “experimental … basic editing capabilities, like modifying words in existing paragraphs and changing font styles such as bold and italic.”
Viewing documents will also feel like an experiment for many users: when Vulture South tried the app it dumped us into a listing of our Galaxy S5′s directories and offered no depiction of the phone’s internal storage or secondary SD card. Nor does the app integrate with the cloud storage services to which we subscribe.
-
CMS
-
Since 26th December 2005, I’ve been runnning this blog with WordPress. At the time there were little alternatives and finally I had got hold of a host (Dreamhost, at the time) that supported PHP and MySQL without being overly restrictive. 10 years later, things have somehow changed.
-
BSD
-
DragonFlyBSD’s HAMMER2 file-system has seen a lot of progress made recently. One of the latest additions to this HAMMER successor is enabling LZ4 compression by default.
-
FSF/FSFE/GNU/SFLC
-
I’m glad to announce the release of version 0.3.5 of GNU FisicaLab, this is a feature release. FisicaLab (can be pronounced as PhysicsLab) is an educational application to solve physics problems. Its main objective is let the user to focus in physics concepts, leaving aside the mathematical details
-
Openness/Sharing
-
The Blender Institute has unveiled the trailer for Cosmos Laundromat, an “absurdist love story” directed by Mathieu Auvray, which is the Institute’s fifth open source animated project.
-
-
Open Hardware
-
Anyone who has spent time with a microcomputer knows the importance of electrical power. The DC Motor Control Shield with XMC1202 for Arduino is a power controller for servos, motors, robotic actuators, and other items that need activation via a big boast of power. This shield was designed to control large motors up to 30A—yeah 30As, as in thirty amps. In case you aren’t fazed by that number, all it takes is one amp to kill you. Your car battery doesn’t put out 30 Amps.
-
Programming
-
-
I’ve been working on building a decentralized GitHub, and I’d like to talk about what this means and why it matters — and more importantly, show you how it can be done and real GitTorrent code I’ve implemented so far.
-
Release Candidate versions are available in remi-test repository for Fedora and Enterprise Linux (RHEL / CentOS) to allow more people to test them. They are only available as Software Collections, for a parallel installation, perfect solution for such tests.
-
This, if you’re reading the physical paper – which, of course, you are not – is my last edition as editor. In just over 20 years we have put nearly 7,500 papers “to bed”, as almost no one says nowadays. At some point in the 24-hour, seamlessly rolling digital news cycle, you’ll have a new editor. I will have slipped away and my successor, Katharine Viner, will have materialised at the helm.
-
Maryann Santos de Barona, dean of Purdue University’s College of Education for the past six years, was at the front of a Stewart Center meeting room May 14 for one of those death-by-PowerPoint presentations. From among her dozens of slides, the dean was showing the university’s trustees a sinking trend line of undergraduates enrolled in Purdue’s teacher education program.
-
The CEO of a Pakistani company called Axact, which called itself the country’s largest software exporter, was arrested yesterday in Karachi. Axact and its CEO, Shoaib Ahmed Shaikh, are accused of running a global network of selling fake diplomas.
-
Stuxnet
-
The NSA tried to wreck North Korea’s nuclear weapons lab using the centrifuge-knackering malware Stuxnet, and ultimately failed, multiple intelligence sources claim.
-
By almost completely shutting itself off from the rest of the world, the North Korean government has denied its people and society access to the fruits of the digital communications revolution. It has also reportedly helped stymie a U.S. cyberattack on the country’s nuclear infrastructure modeled on the so-called Stuxnet virus the United States and Israel used against Iranian centrifuges.
-
Right around the time that the Stuxnet attack so famously sabotaged Iran’s nuclear program in 2009 and 2010, the U.S. National Security Agency reportedly was trying something similar against North Korea.
The NSA-led U.S. effort used a version of the Stuxnet virus designed to be activated by Korean-language computer settings, but it ultimately failed to sabotage North Korea’s nuclear weapons program, according to a Friday Reuters report, which attributed the information to people familiar with the campaign.
-
The US tried to deploy a version of the Stuxnet computer virus to attack North Korea’s nuclear weapons programme five years ago but ultimately failed, according to people familiar with the covert campaign.
-
-
-
-
-
-
-
-
-
-
Security
-
-
Blockchain, one of the Internet’s most widely used Bitcoin wallets, has rushed out an update for its Android app after discovering critical cryptographic and programming flaws that can cause users to send digital coins to the wrong people with no warning.
-
Your home router is a big tempting target for hackers. Not only is it connected directly to the Internet and easy to attack, it’s the gateway to your entire network and every computer or gadget you own.
-
-
Defence/Police/Secrecy/Aggression
-
US military officials revealed Wednesday that the Army bioweapons laboratory at Dugway Proving Ground in Utah shipped live anthrax samples to 18 facilities in nine US states, as well as to a US military base in South Korea.
-
Sticking to its stand that McMahon Line on India-China boundary is “illegal”, China said on Monday it is ready to work with India to resolve the vexed border issue at an early date through “friendly consultations” to create more favourable conditions for bilateral ties.
-
-
Alex Salmond has secured time in Parliament on Thursday afternoon to debate claims by a Navy whistleblower that Britain’s Trident nuclear missiles are unsafe and unsecure.
The MP for Gordon and former Scottish National Party (SNP) leader will question the government on safety at HM Naval Base Clyde, where Trident submarines are based.
Whistleblower William McNeilly, 25, is currently being held in a secure military base in Scotland. He went AWOL following the publication of his damning report into safety and security at the site.
WikiLeaks founder Julian Assange has accused the “conspicuously silent” British media of self-censorship over its coverage of the Trident revelations.
-
Environment/Energy/Wildlife
-
Nye: “Floods In Texas, The Strengthening Storms … These Things Are A Result Of Human Activity Making Things Worse”
-
Finance
-
As that makes clear, alongside the fact that it is quite possible that the US will indeed modify its laws here because of a trade agreement, this would be happening even though the laws in question enjoy huge support among the US public. Which shows that trade agreements can not only force laws to be changed, but can do so with absolutely no regard to what the people in whose name they are supposedly negotiated, actually want.
-
-
Cuts to affordable housing deny resources to transform clusters of poverty into functioning and sustainable mixed-income neighborhoods and eliminate lead poisoning in communities such as Baltimore, where this preventable and prevalent illness is a contributing factor in the cycle of poverty.
-
PR/AstroTurf/Lobbying
-
The U.S. Department of Education (ED) has pledged to tighten controls of its quarter-billion-dollar-a-year charter schools program—a program repeatedly criticized by the Office of the Inspector General (OIG) for waste and inadequate financial controls, as CMD has helped document in this special report series.
-
As the Vermont liberal spreads his income equality campaign message, the press corps seems unsure of how to cover him. In the month since he announced his bid, Sanders’ coverage seems to pale in comparison to comparable Republican candidates who face an arduous task of obtaining their party’s nomination. The reluctance is ironic, since the D.C. press corps for months brayed loudly about how Hillary Clinton must face a primary challenger. Now she has one and the press can barely feign interest?
-
Jeremy Hammond’s hack of Stratfor, a corporate intelligence agency, created global solidarity by revealing how the 1% targets activists worldwide.
-
Censorship
-
Now, Spiegelman has accused the magazine of censoring him. In a post on his Facebook page, Spiegelman says that he pulled the special cover he had drawn for the magazine at the last minute after the magazine went back on an agreement to include his ‘First Amendment Fundamentalist’ full-page cartoon. The cartoon in question referenced the Charlie Hebdo cartoonists.
-
The attack on free expression is sinister because it asserts that such freedom is not merely unwise but, in a sense, meaningless. Free speech is more comprehensively and aggressively embattled now than ever before in American history, largely because of two 19th-century ideas. One is that history — actually, History, a proper noun — has a mind of its own. The other is that most people do not really have minds of their own.
-
The panel will be asked to explore from their personal and political perspective different aspects of freedom of expression in repressive regimes; the interface between artistic inspiration and life in repressive regimes, and the role of the media in terms of raising awareness of the increasing restrictions placed on artists to curb freedom of expression.
-
-
Sexualization of the female body is a man-made concept, a notion that dates far prior to the tantalizing brushstrokes of Picasso’s daring hand. Society’s ingrains the impression that the female body is somehow erotic and must be suppressed in order to prevent adultery and fornication. Instead of placing responsibility on the patrilineal figures, the blame is continually set on women.
-
I have nipples.
As does everyone. So why are we obsessed with hiding them?
Instagram clarified its nipple rule last week: They are a no-no, but breastfeeding is OK, as are mastectomy scars. Facebook is also anti-nip.
-
A report by the PEN American Center, which found some books were expurgated by Chinese censors without the authors even knowing it, called on those who want their works published in the lucrative Chinese market to be vigilant, and recommended a set of principles in dealing with publishers.
-
Britain is at the cutting-edge of censorship, it has been claimed, as government plans to implement ID-based age checks for pornography websites gather pace.
-
Britons may soon face identity checks to access adult material on the internet, according to discussions between Whitehall and the private sector.
A scheme proposed by the pornography industry would see adult sites verifying visitors’ identity with organisations such as banks, credit reference agencies or even the NHS.
-
-
-
-
-
The new UK government’s plans to tackle extremism and introduce a British bill of rights, as outlined in the Queen’s Speech on 27 May, raise the stakes significantly for freedom of expression in the United Kingdom.
-
Last week, after Israel’s new cabinet ministers posed for a photographer, the picture appeared in a popular news site and a newspaper serving the country’s haredi, or fervently Orthodox, community. There was, however, a notable alteration: The faces of the three women cabinet ministers were blurred out, apparently for the sake of “modesty.”
-
A group of Chinese filmmakers, scholars and curators discuss independent filmmaking in China and the government’s crackdown on independent film festivals in recent years
-
The mass transit authority that oversees commuter buses and trains in the nation’s capital is banning issue-oriented ads for the remainder of the year after receiving an ad proposal featuring a cartoon of Muhammad, Islam’s central figure.
The cartoon is a sketch by artist Bosch Fawstin of a turban-wearing, sword-wielding man saying “You can’t draw me!” It won a “draw Muhammad” contest in Garland, Texas, that was unsuccessfully attacked by Muslim-American roommates earlier this month.
The ads would have sported a banner saying “Support Free Speech.”
-
Privacy
-
Apple’s co-founder Steve Wozniak has called NSA whistleblower Edward Snowden a “total hero”.
Wozniak said Snowden’s relative youth when he informed the Guardian and The New York Times of the data leak – thus effectively ending the possibility of a normal life in the US – made him even more remarkable.
Snowden, who was 28 when he leaked thousands of highly classified documents he acquired while working for the US National Security Agency (NSA), has been both vilified and praised for his actions.
-
-
-
-
-
-
The new Investigatory Powers Bill, announced in yesterday’s Queen’s Speech, will include legislation to force Internet companies to give access to encrypted conversations of suspected terrorists and criminals. According to The Telegraph: “New laws will require WhatsApp, which is owned by Facebook, Snapchat and other popular apps to hand messages sent by their users to MI5, MI6 and GCHQ about suspects under investigation.”
A Home Office spokesperson told the newspaper that the new bill would “cover the whole investigatory powers landscape in modern communications.” This seems to confirm that the proposed law will be much broader in scope than the earlier Snooper’s Charter, which would have required people’s metadata to be retained by communications companies. The Snooper’s Charter was dropped after it met resistance from the Liberal Democrats when they were part of the previous coalition government, but it would appear to be on its way back under the new Conservative government.
-
More than 14,000 websites in the US have signed up to block Capitol Hill workers from being able access their sites, in an activist movement designed to make sure the highly controversial Patriot Act allowing government mass surveillance is phased out.
-
-
Thousands of websites are blocking Congress’s access to their sites in a show of force to protest the Patriot Act.
Led by the online activist group Fight for the Future, more than 10,000 sites have added code that redirects any visitors from Internet protocol (IP) addresses from Congress away from their site and towards a protest page.
-
More than 10,000 websites blocked users from computers in Congress on Friday, in a demonstration against any possible re-authorization of NSA surveillance powers.
“This is a blackout,” read the site to which computers from congressional IP addresses were redirected. “We are blocking your access until you end mass surveillance laws.”
-
With a key law underpinning US bulk surveillance programs set to expire, the future appears murky for the data sweep led by the National Security Agency.
-
President Obama has told the US Senate to get its act together over the spy-friendly Patriot Act, key provisions of which are due to expire at midnight on Sunday.
-
A Sunday deadline is looming for senators to prevent the expiration of a portion of the Patriot Act, a controversial portion that has allowed the National Security Agency to make mass collection of telephone records.
-
The National Security Agency has said it will lock down and mothball its archive of US citizens’ phone records if its legal authority to go on collecting the metadata expires as it is due to this Sunday.
-
Several provisions of the Patriot Act will expire at midnight on June 1st. The one you’ve probably heard about the most is Section 215, which provides the authority for the NSA’s bulk collection of Americans’ phone records. That’s the controversial program first exposed by NSA contractor Edward Snowden in 2013. This allows the NSA to access telephony metadata — basically information about where, when and to whom calls were made, but not recordings of the calls themselves.
-
U.S. President Barack Obama warned on Friday that surveillance powers used to prevent attacks on Americans could lapse at midnight on Sunday unless “a handful of senators” stop standing in the way of reform legislation.
Obama said he had told Republican Senate Majority Leader Mitch McConnell and other senators that he expects them to act swiftly on a bill passed by the House of Representatives that would renew certain powers and reform the bulk collection of telephone data.
“I don’t want us to be in a situation in which for a certain period of time, those authorities go away and suddenly we’re dark and heaven forbid we’ve got a problem,” Obama told reporters in the Oval Office.
-
-
President Barack Obama on Friday urged the Senate to pass compromise legislation that renews the National Security Agency’s domestic surveillance powers now set to expire on Sunday at midnight. The House of Representatives has already passed a bill that includes new language curbing the NSA’s ability to collect the telephone records of millions of Americans. Senate Republican leaders oppose these limitations. “The only thing that is standing in the way is a handful of senators who are resisting these reforms,” Obama said, warning that he did not want to see the NSA go “dark” and fail to detect a terrorist plot. The Senate is set to meet in rare Sunday session to try to end the stalemate.
-
-
-
-
-
-
-
-
-
President Obama urged the Senate on Friday not to let the National Security Agency’s power to collect Americans’ phone records expire, warning that U.S. intelligence agencies could be left in the dark.
-
-
With debate about NSA spying continuing in the Senate, it’s worth looking at some of the historical and modern precedents for protecting our communications and communications data.
-
The Senate is heading for a tense and unusual Sunday showdown over the expiring antiterrorism surveillance powers of the National Security Agency, and Senator Mitch McConnell, five months into his tenure as majority leader, has a lot on the line.
-
Senate Majority Leader Mitch McConnell sounded more like a salesman desperate to close a deal than the steely strategist he is known as in Washington.
-
AS MEMBERS OF CONGRESS struggle to agree on which surveillance programs to re-authorize before the Patriot Act expires, they might consider the unusual advice of an intelligence analyst at the National Security Agency who warned about the danger of collecting too much data. Imagine, the analyst wrote in a leaked document, that you are standing in a shopping aisle trying to decide between jam, jelly or fruit spread, which size, sugar-free or not, generic or Smucker’s. It can be paralyzing.
-
While President Barack Obama called on the Senate to compromise and extend key provisions of the Patriot Act in order to reform America’s surveillance capabilities, Sen. Rand Paul said Obama was being “disingenuous” and could end the program himself.
-
-
-
-
Presidential hopeful says his 10-hour filibuster against surveillance last week was not a fundraising ploy as he calls on parties to protect fourth amendment
-
-
-
Kentucky senator tells crowd ‘I can talk for a long time’ as privacy advocates feel momentum build against Patriot Act provision ahead of Sunday session
-
Two U.S. senators are pushing proposals to extend the National Security Agency’s domestic telephone records dragnet, but a diverse coalition of civil liberties and advocacy groups have called on lawmakers to vote against those plans.
Proposals by Senator Richard Burr, a North Carolina Republican, and Dianne Feinstein, a California Democrat, to extend expiring parts of the counterterrorism Patriot Act, “contain flaws and omissions that are incompatible with the goal of stopping domestic bulk collection,” the coalition said in a letter to Senate leaders sent Thursday.
big data charts graphs analysis woman user
Survey: Big data interest still growing
It’s not all positive, however: Security issues and problems with some existing products leave room for
Read Now
The proposals from the two senators, both senior members of the Senate Intelligence Committee, “fail to properly address overbroad surveillance activities, and would weaken privacy, civil liberties, and the digital economy,” said the letter, signed by 51 companies, trade groups, digital rights groups and advocacy organizations.
-
The act “reforms the way surveillance programs operate in this country for the better,” Bishop explained. “Just last week, the U.S. Court of Appeals for the Second Circuit ruled that the NSA’s bulk data collection of Americans’ phone records overreaches its legal authority granted in the Patriot Act. … This legislation reaffirms our Fourth Amendment rights as citizens by ending the government’s bulk collection of metadata. It also enhances transparency with the courts and safeguards our national security at a time when we must remain especially vigilant.”
-
The US Senate is taking the unprecedented step of holding a Sunday session, as US intelligence programs face a major interruption.
An expiration of the National Security Agency (NSA) program for bulk data collection is looming; if the Senate fails to act by midnight on Sunday, the program that allows US spy agencies to collect metadata on telephone calls will be shut down.
-
The Senate is in recess, but they will be returning on Sunday for a last minute vote on the extension of the Patriot Act’s Section 215. This is the section which the Obama Administration has been using as the pretext for NSA telephone bulk surveillance of ordinary Americans. The White House says without the renewal, they will have to end the surveillance program.
-
In the week leading up to the Senate session, President Obama, Attorney General Loretta Lynch and the heads of the FBI and other security agencies have depicted the potential expiration of Section 215 in apocalyptic terms. Obama made several appearances before television cameras to demand action “because it’s necessary to keep the American people safe and secure.” Lynch said that a failure to act would cause “a serious lapse in our ability to protect the American people.”
-
As the NSA’s data collection program hangs in the balance, officials have said that no matter Congress’ decision, the agency has no intention of deleting the its massive database.
-
…it’s likely that a big part of the NSA’s surveillance network is about to be dismantled.
-
Critics also point to the absence of reforms aimed at making the court approval process more transparent and accountable, and believe it is unlikely to attract support from reformers such as Democratic senator Ron Wyden and Republican Mike Lee.
-
The House Judiciary Committee reviewed the legislation and revised it so that it would meet Fourth Amendment norms. The revised version permitted federal agents to write their own search warrants for business records, but the warrants could be challenged by the custodian of the records or by the person whose records were being sought. Because the records were in the hands of a third party, they were in no danger of destruction.
-
The USA Freedom Act, which the House passed this month by an overwhelming 338 to 88 vote, would end the NSA’s vast effort to compile phone call “metadata.” We learned that the government was keeping a comprehensive record of our calls only when fugitive whistleblower Edward Snowden spilled the beans; our elected officials, including President Obama, hadn’t bothered to tell us.
-
From a Top Secret NSA report, “NSA collects, on a representative day, (about sign) 500,000 buddylists and inboxes. More than 90% collected because tasked selectors identified only as contacts (not communicant, content, or owner).”
-
Were it not for Edward Snowden or someone like him, the N.S.A. would likely still be collecting the records of almost every phone call made in the United States, and no one outside of government would know it. A handful of civil-liberties-minded representatives and senators might drop hints in hearings and ask more pointed questions in classified settings. Members of the public would continue making phone calls, unaware that they were contributing to a massive government database that was supposedly intended to make their lives safer but had not prevented a single terrorist attack. And, on Monday, the government’s Section 215 powers, used to acquire records from hundred of billions of phone calls, among other “tangible things,” would be quietly renewed.
-
While the country slept Friday night and into Saturday morning, the U.S. Senate debated and voted on whether to alter substantially the NSA’s bulk telephone meta-data collection program, extend it for a short period, or simply let it die on June 1 when the “sunset” provision governing the relevant section (Sec. 215) of the Patriot Act kicks in.
-
Congress has a chance to clear the way for real reform of NSA surveillance
-
-
-
-
In-Q-Tel was formed specifically to funnel technology from Silicon Valley to American intelligence agencies.
-
All told, the “it’s just metadata” line strikes me as being incomplete, too. It is fair to submit that this sort of data is much less useful to a hacker or a rogue than is, say, wiretapping. But that difference can in practice be overrated.
-
Speaking at the CyCon conference in Tallinn, Estonia earlier this week, Rogers promoted the need for international collaboration, saying that cyber-crime can’t be solved by an individual party alone.
-
…but intelligence agency still wants access to encrypted communications.
-
They additionally challenged calls by Rogers and different prime D.J. and British officers to weaken encryption by enabling legally approved wiretapping of the Internet.
-
International partners should embrace a sort of “Law of the Sea” for the internet, the head of the United States National Security Agency now says, in order to keep the web open and safe from bad actors, state-sponsored or otherwise.
-
NBC News White House correspondent Kristen Welker pressed Obama administration press secretary Josh Earnest three times for a specific example of a time when the NSA’s bulk collection metadata program was used as part of an investigation which prevented a terrorist attack, and three times Earnest refused.
-
The Obama administration’s authority to collect Americans’ phone records in bulk will likely expire next week after senators from both parties rejected attempts to extend it. First, the Republican-led Senate rejected a House-passed measure to curb bulk spying by keeping the records with phone companies instead of the government. The Senate then rejected a bid by Senate Majority Leader Mitch McConnell to extend the current bulk spying program for two months. The Senate adjourned and will reconvene May 31, the day before the program expires. In an exclusive interview from his place of refuge inside the Ecuadorean Embassy in London, WikiLeaks founder Julian Assange weighs in on the NSA standoff.
-
The US spying agency NSA’s authority to collect US citizens’ personal data will remain in place, despite the expiry of respective legislation, WikiLeaks founder Julian Assange said in an interview released Wednesday.
-
-
Tim Berners-Lee, the inventor of the world wide web, has urged Britons to fight the government’s plans to extend the country’s surveillance powers, and act as a worldwide leader for promoting good governance on the web.
Berners-Lee said Britain had “lost the moral leadership” on privacy and surveillance, following the revelations of the former National Security Agency contractor, Edward Snowden.
Speaking before the Web We Want Festival in London’s Southbank Centre, which starts on Saturday, Berners-Lee expressed concern about the UK government’s decision to reintroduce a beefed-up version of the “snooper’s charter”.
In an unexpected move announced in the Queen’s Speech earlier this week, the government is to introduce an investigatory powers bill far more wide-ranging than expected. The legislation will include not only the expected snooper’s charter, enabling the tracking of everyone’s web and social media use, but also moves to strengthen the security services’ warranted powers for the bulk interception of the content of communications.
-
Former Vice President Walter Mondale on Thursday urged the Senate to kill off the National Security Agency’s controversial collection of millions of people’s phone records.
-
A new cybersecurity elite moves between government and private practice, taking state secrets with them.
-
It was designed as a way to help the intelligence community keep an eye on people who might want to do harm to the United States and protect citizens, but some say the Patriot Act goes far beyond that — particularly by collecting data on just about everyone’s phone activity.
-
Reps. Justin Amash (R-Mich.) and Thomas Massie (R-Ky.) were on hand at a pro forma House session that lasted less than three minutes Friday morning to ensure that GOP leaders didn’t extend expiring portions of the law without their consent.
-
If you’ll be hanging around New York City at all in the near future, you may want to hold off on the gossip — at least while you’re in public.
A group of anonymous anti-NSA activists claim to have placed hidden recording devices in restaurants, bars, gyms and cafes all around the city to eavesdrop on citizens’ private conversations.
-
The German government declined to comment on a report that U.S. intelligence agencies were reviewing their cooperation with German counterparts and had dropped joint projects due to concerns secret information was being leaked by lawmakers.
Bild newspaper reported on Saturday that U.S. spy chief James Clapper had ordered the review because secret documents related to the BND’s cooperation with the United States were being leaked to media from a German parliamentary committee.
-
The chairman of a German parliamentary inquiry has denied a report that the country’s lawmakers leaked secret data about cooperation between US and German spy agencies. However, he said the cooperation was necessary.
-
Tensions have been growing between Berlin and Washington and within the German ruling coalition since it became known at the end of April that the German foreign intelligence service (BND) had spied on European politicians, businesses and individuals for the American National Security Agency (NSA). In particular, the demand of the Bundestag (parliamentary) NSA committee of inquiry for the list of so-called selectors–the phone numbers, names and keywords by which digital communications were searched–has led to fierce conflicts.
-
The German federal government on Wednesday adopted proposals to force telecom companies to retain customers’ phone and Internet data for 10 weeks.
In a statement, the Justice Ministry said the draft law would require firms to keep details on the time and duration of telephone calls, location data and Internet protocol addresses to identify web users.
-
-
A German newspaper reported Wednesday that the German government led by Chancellor Angela Merkel had exaggerated the possibility of a no-spy agreement with the United States in the run-up to Germany’s general elections in 2013.
-
-
A German newspaper has reported that the Merkel administration exaggerated the possibility of an anti-spy deal with the US in 2013. The government has said it spoke according to what it believed to be true at the time.
-
What to do with a party that is anti-American, sympathizes with Vladimir Putin’s Russia, wants Germany out of NATO — and whose present members started their careers in the ruling party of communist East Germany? The German answer: Give it leadership of the Parliamentary Control Committee, which oversees the work of the secret services.
While the Bundestag is wrestling with the implications of the most recent spy scandal, the ex-Communist Left Party (Die Linke) has access to the secrets of Germany’s three intelligence agencies: the domestic intelligence service (Verfassungsschutz), whose spying on Germans until recently focused also on Left Party parliamentarians; the military counterintelligence service (MAD); and the foreign intelligence agency (BND).
-
The Swiss Federal Prosecutor’s Office is investigating whether America’s National Security Agency (NSA) tapped Swisscom phone lines. The accusation comes from Austrian parliamentarian and whistleblower Peter Pilz.
-
If downloading apps from the Play store is confidential, think twice as the National Security Agency is planning to use this platform to infect smartphones with malware and track them. NSA’s Plan To Spy Through Android App Stores Made Public
-
You just purchased a brand new swanking Android smart phone with Google Play, congratulations! Unless you’re a model citizen with nothing to hide, you might want to think twice before downloading anything from Google’s app store. Gone are the days when suspicious persons break into homes and install bugs into handsets. Thanks to technology, bugging is done en masse. According to the latest leaked documents from Edward Snowden, the National Security Agency apparently hijacked Google Play in order to distribute spy software into Android phones. As if we already didn’t have enough malware. The bug is basically harmless but if you’re worried, consider downloading from other Android app stores, if they haven’t been bugged already.
-
You might know this branch of government as Surveillance, but I prefer “technotyranny,” a term coined by investigative journalist James Bamford to refer to an age of technological tyranny made possible by government secrets, government lies, government spies and their corporate ties.
-
The month of June has proven to be a notable one for revelations about abuses of government power carried out under the cloak of secrecy. June 1971 brought us the Pentagon Papers case, followed two years later with the Watergate hearings into the break in at the Democratic National Committee headquarters. A generation later, another national security whistleblower—Edward Snowden—revealed in June 2013 a fresh series of government abuses of power in secret.
-
Belgium and the Netherlands have joined Austria and Luxembourg in getting really rather upset that German spies, er, spied on them.
But what really as the Belgians worked up is that the information collected by the German intelligence agency (BND) was passed on to the NSA.
-
The government is to introduce an investigatory powers bill that is far more wide-ranging than expected, including an extension of the powers of the security services in response to the surveillance disclosures by the NSA whistleblower Edward Snowden.
-
-
Joseph Gordon-Levitt has big expectations for the impact of “Snowden.”
-
The White House ramped up its campaign to persuade the Senate to renew National Security Agency surveillance powers before they expire at midnight Sunday, likening a potential lapse to playing “Russian roulette” with national security.
-
-
“Encryption and anonymity enable individuals to exercise their rights to freedom of opinion and expression in the digital age and, as such, deserve strong protections,” says the report written by David Kaye, special rapporteur in the U.N.’s Office of the High Commissioner for Human Rights.
-
The United Nation’s Office of the High Commissioner for Human Rights has released a new report that says the ability to encrypt one’s personal data and communications online are basic human rights.
-
A United Nations report released Thursday argues that strong encryption is fundamental to exercising basic human rights.
-
A new report from the United Nation’s Office of the High Commissioner for Human Rights says digital security and privacy are essential to maintaining freedom of opinion and expression around the world — and warns that efforts to weaken security tools in some countries may undermine it everywhere.
-
Barrack Obama, the president of the United States, has been urged to disapprove backdoors in encryption by well-known figures in IT security, along with advocacy groups and technology firms.
-
He said the NSA playset is a set of security tools used by nation states to attack computer systems. “By sharing and building these tools, we are democratising technology, making it available to everyone.”
-
Earlier on Tuesday, German tabloid Bild reported citing its sources that US President Barack Obama could skip the G7 summit if the German government decided to handover a list of US spying targets to parliament.
-
In the two years since the data mining has been exposed, repeated reviews and even an audit by the Justice Department inspector general “couldn’t point to a single plot that has been foiled thanks to bulk data collection,” The Washington Times reported.
-
U.S. Rep. Scott Tipton said Tuesday there’s little chance a “clean” renewal of controversial government surveillance programs would pass the House of Representatives.
-
Delivering the first keynote address at ITWeb Security Summit 2015 this morning, in Midrand, Binney said he was “trying to go around the world and explain what the material released by Edward Snowden really means and how it affects the Internet worldwide. It is based on my understanding of how the NSA works, since I was the technical director there before I left.”
-
Civil Rights
-
-
Five years ago this week, U.S. Army whistleblower Chelsea Manning was arrested in Kuwait and charged with leaking classified information. Weeks later, WikiLeaks published tens of thousands of internal logs from the war in Afghanistan. It was one of the largest leaks in U.S. military history. Major articles ran in The New York Times, Guardian, Der Spiegel and other outlets. Chelsea Manning, then known as Bradley, and Julian Assange soon became household names. While Manning was sentenced to 35 years in jail, Assange has been living for the past three years inside the Ecuadorean Embassy in London, where he has political asylum. Assange faces investigations in both Sweden and the United States. Here in the United States, a secret grand jury is investigating WikiLeaks for its role in publishing leaked Afghan and Iraq war logs and State Department cables. In Sweden, Assange is wanted for questioning on allegations of sexual misconduct, though no charges have been filed. “Look at Thomas Drake, for example, NSA whistleblower … The pretrial process was both the deterrent, the general deterrent, and it was the penalty,” Assange said. “And the same thing is happening here in the WikiLeaks process, where we have no rights as a defendant because the formal trial hasn’t started yet. The same thing has happened with me here in this embassy in relation to the Swedish case: no charges, no trial, no ability to defend yourself, don’t even have a right to documents, because you’re not even a defendant.”
-
-
In an hourlong discussion on “Democracy Now!” WikiLeaks founder Julian Assange says that the NSA can continue to spy on Americans in spite of legislation coming out of Congress and that the Trans-Pacific Partnership is about corporate control.
-
This currently anti-democratic system can likely be traced to a couple of weeks after the September 11, 2001 attacks, when a top secret memo was written by Office of Legal Counsel (OLC) Attorney John Yoo, (who would also write the “torture memo” a year later). The OLC memo stated, among other things: “First Amendment speech and press rights may also be subordinated to the overriding need to wage war successfully. ‘When a nation is at war, many things that might be said in time of peace are such a hindrance to its effort that their utterance will not be endured so long as men fight and that no Court could regard them as protected by any constitutional right.’” This OLC opinion–see full article by retired Army Major Todd Pierce–claimed authority of the President as the Commander in Chief to use the military both inside and outside of the U.S., and was probably the authority for the National Security Agency’s (NSA’s) military operation within the U.S., spying on Americans.
-
It shouldn’t need to come to this, but the Dallas Police Department has finally issued a policy related to citizen photography. There are many reasons law enforcement agencies need to remind officers of the right to record, but the Dallas PD may have needed a bit more of a nudge after a Texas legislator tried (unsuccessfully) to impose additional restrictions on citizen recordings — like a 25-foot “halo” around working officers, supposedly for their safety.
-
The Dallas Police Department has officially released a new general order that’s meant to inform officers on photographers’ rights. The document, titled “Public Recording of Official Acts,” warns officers that they cannot interfere with a person photographing or filming their activities as long as the recording is being done in an appropriate way.
-
On May 11, Justin Way was drinking and threatening to hurt himself. His father, George Way, said his son was a recovering alcoholic and had been alcohol-free for five weeks.
“He just lost his job, and he had a setback,” he said.
Way’s live-in girlfriend, Kaitlyn Christine Lyons, said she’d caught Justin drinking a bottle of vodka, which she took away from him to pour out. She said he was drunk, lying in their bed with a large knife, saying he would hurt himself with it. She called a non-emergency number in an attempt to get her boyfriend to a local St. Augustine, Florida, hospital for help—and told them she did not feel threatened.
“My brother has been Baker Acted three times because he was threatening to hurt himself so I figured that would happen with Justin,” said Lyons. Florida’s Baker Act allows the involuntary institutionalization of an individual, and it can be initiated by law enforcement officials.
“The only person Justin threatened was himself and I honestly don’t think he wanted to die.”
Minutes later, two St. Johns County Sheriff’s deputies, 26-year-old Jonas Carballosa and 32-year-old Kyle Braig, arrived at the home, armed with assault rifles, and told Kaitlyn to wait outside.
“I thought they were going into war,” she remembered thinking when she first saw the large guns. Within moments, Justin was shot dead.
-
On October 1, 2013, the last day that Ross Ulbricht would be free, he didn’t leave his San Francisco home until nearly 3:00pm. When he did finally step outside, he walked ten minutes to the Bello Cafe on Monterey Avenue but found it full, so he went next door to the Glen Park branch of the San Francisco Public Library. There, he sat down at a table by a well-lit window in the library’s small science fiction section and opened his laptop.
From his spot in the library, Ulbricht, a 29-year-old who lived modestly in a rented room, settled in to his work. Though outwardly indistinguishable from the many other techies and coders working in San Francisco, Ulbricht actually worked the most unusual tech job in the city—he ran the Silk Road, the Internet’s largest drug-dealing website.
-
Ross Ulbricht, the man behind the darkweb drug marketplace known as the Silk Road, has just been sentenced to more imprisonment than he has actual lives: two life sentences and “max sentences on all other charges.” In addition, the government has chosen to hold him financially culpable for every single transaction that occurred at the Silk Road — a fine of $184 million — $166 million of which it has already recouped through the auction of seized Bitcoins.
-
J. Dennis Hastert, the longest-serving Republican speaker in the history of the U.S. House, was indicted Thursday by a federal grand jury on charges that he violated banking laws in a bid to pay $3.5 million to an unnamed person to cover up “past misconduct.”
-
Intellectual Monopolies
-
Copyrights
-
Earlier this week, something suspicious started happening with Web addresses related to sites seized by the FBI from Megaupload and a number of online gambling sites. Instead of directing browsers to a page with an FBI banner, they started dropping Web surfers onto a malicious feed of Web advertisements—some of them laden with malware.
Permalink
Send this to a friend
05.29.15
Posted in Google, Oracle at 7:50 am by Dr. Roy Schestowitz
Fool of the day
Photo via Wikipedia
Summary: US Solicitor General Donald Verrilli urges the Supreme Court (SCOTUS) to let APIs be covered by copyrights, rendering almost every program a potential copyright violation
YESTERDAY we received some disturbing news from iophk, who sent the official page and original material pertaining to Google’s fight against API copyrights — a subject that we covered here before. It’s like an extension of the patent threat to Free software.
“Superficially,” Simon Phipps wrote, “the Solicitor General’s advice to SCOTUS to find against Google and reject its appeal looks like bad news. But there are some substantial straws to grasp” (see the role of the Obama administration and the Justice Department). That is very disturbing because non-technical people, who never wrote a computer program in their entire life, want API monopoly and they are actively interfering with the process of courts of justice, even the highest court, the Supreme Court (SCOTUS).
“People in suits (sometimes with ornaments and white wigs), who obviously don’t know how computers work, always get to decide on what’s allowed and what’s not allowed.”SCOTUS now helps trolls and even says “patent troll”, which means that it knows what it’s doing. Jeff John Roberts from the corporate media which helps trolls (Fortune) wrote: “The term “patent trolls” is controversial, mostly because certain companies object to it. Now, a Supreme Court Justice has embraced it.”
Trolls are going mainstream with help from the top judges. What a corrupt system. It is inherently rigged against Free/libre software, even once it has managed to beat the FUD, the lobbying, etc. People in suits (sometimes with ornaments and white wigs), who obviously don’t know how computers work, always get to decide on what’s allowed and what’s not allowed. They are figureheads because they are influenced behind the scenes. It’s unthinkable, but that’s how it goes.
Marc Andreessen (the man behind Netscape) wrote: “Obama administration to software programmers: Drop dead!”
Even the Microsoft booster from Business Insider (owned in part or at least funded by Marc Andreessen) wrote about it, stating that “Oracle won another battle in its epic war with Google, and the whole computer industry is nervous about it”.
Our reader iophk wrote: “In a foaming at the mouth rabid desire to screw Google for any and all activity they are going to get the rest of us as collateral damage if APIs become copyrightable in the US. It boggles the mind. The very purpose of APIs is violated.”
This is what it looks like when a government is clueless about technology and is lobbied (at times bribed) by large corporations such as Oracle. █
Permalink
Send this to a friend
Posted in Asia, Free/Libre Software, Microsoft at 7:15 am by Dr. Roy Schestowitz
Photo from NASSCOM’s Web site
Summary: Microsoft’s covert efforts (lobbying with the help of public partners like NASSCOM) to eliminate an India-leaning software policy in India is finally paying off
After Microsoft lobbying (both directly and by proxy) against Indian sovereignty we seem to have ended up with a watered-down Indian policy, which briefly favoured Free/Open Source software (FOSS). This happened in many nations before (especially in Asia) and given Microsoft’s influence in the Indian government we pretty much expected this to happen once again. Let’s not forget that Microsoft is blackmailing British politicians (as it always did). If Microsoft can do this to the empire which ruled India, why not India too?
“It’s not just Microsoft doing it because one must recall OOXML pressure in India (usually done by proxy, as in this case, via NASSCOM).”The latest article from the corporate media in India (Business Standard in this case) makes it very clear that Microsoft leads in lobbying against the policy which favours Free software. “Government says open source software use not made mandatory” is the headline and Microsoft is all over it:
Business Standard had reported earlier this month that software firms such as Microsoft had expressed concerns over the policy, unveiled in March, as it had a clause that stated use of anything other than open source software had to be justified by the official concerned.
Bhaskar Pramanik, chairman of Microsoft India, had said, “The government needs to be technology-neutral. You should be able to adopt the best technology, the most economical and the most appropriate technology for the problem at hand. Let’s not have biases one way or the other.” Because of this policy, he added, a company might end up choosing a technology solution that’s not the best and this might take the “country back”.
The corporate media is doing it again, relaying Microsoft talking points and using straw man arguments. Microsoft needs to maintain the illusion that it is not fighting FOSS while it actually does fight it. Here’s why we need to watch out. As Sir Humphrey Appleby famously said in Yes Minister: “It is necessary to get behind someone in order to stab them in the back.”
Indian politicians now come out with statements about the FOSS policy which suggest they either got intimidated or bribed by Microsoft et al. It’s not just Microsoft doing it because one must recall OOXML pressure in India (usually done by proxy, as in this case, via NASSCOM). To remind readers what NASSCOM has been doing:
Microsoft “loves Linux” and supports FOSS like BP loves nature and supports wind power. █
Permalink
Send this to a friend
Posted in Europe, Patents at 6:52 am by Dr. Roy Schestowitz
“They [EPO examiners] claim that the organisation is decentralising and focusing on granting as many patents as possible to gain financially from fees generated.” —Expatica, European Patent Office staff on strike
Summary: In order to make the Unitary Patent a reality (towards a ‘no place to hide’ patent approach) misleading claims are being made
THE EPO is getting away with a lot of misdeeds and corruption, never mind a globalisation effort that removes Europe’s sovereignty in favour of multinational corporations.
There has been some opposition to the UPC Agreement from several large European member states, such as Spain and Italy. Lawyers’ sites are seemingly happy that Italy is giving up after initial opposition about four years ago and it sure looks like UPC is only a matter of time now.
The UPC takes us a step closer to what we call "Global Patent System", as explained here before. This, in due course, may mean software patents in Europe. The UPC Web site rejects that claim by stating:
No, the UPC Agreement doesn’t touch upon the patentability criteria. This will also in the future be governed by the European Patent Convention. According to Article 52 (c) of the EPC software as such are not patentable.
The unitary character of the UPC will make it easier to revoke a patent on software if such a patent is granted by mistake and there will be no need for parallel litigation. A third party will not have to wait for the outcome of opposition procedures at the EPO before bringing a revocation action before the UPC.
That is nonsense because it works the other way around, too. If a software patent is granted or defended, then it becomes a weapon in the whole of Europe. We already know that the EPO is increasingly open to software patents, predating Benoît Battistelli and going all the way back to Alison Brimelow, as we explained at the time (around 2009).
The UPC Web site continues to discredit Spain’s opposition to the UPC. They’ll just say anything to pass the UPC, even if it’s a half-truth and borderline lie. █
Permalink
Send this to a friend
Posted in Deception, Free/Libre Software at 6:36 am by Dr. Roy Schestowitz
Summary: Ford is once again misleading regarding Open Source, mischievously associating a patent pledge with Open Source
Ford’s distortion of the term Open Source has gone on for years. The company is exceptionally close to Microsoft, but it is seemingly moving away from Microsoft after that very long cuddle. Ford is now openwashing itself in the same way that Tesla did (and to a lesser degree Panasonic too).
“This has got nothing to do with “Open Source” or even “open-source”, whatever that may mean.”When patents are defanged it is not “open source”, it’s just de-weaponisation of patent weapons that one applies for — weapons which oughtn’t have been pursued in the first place. Yesterday we saw over 50 articles with headlines along those lines (calling a patent promise “open source”), e.g. [1, 2]. One article said:
Ford Motors (F) became a bit more like Tesla Motors (TSLA) this week with the announcement by Ford that the company’s electric car patents will become open-source. Tesla CEO Elon Musk announced that Tesla’s patents would be open-source last year in an effort to bolster the electric car market, and that is apparently the same idea behind the decision at Ford.
This has got nothing to do with “Open Source” or even “open-source”, whatever that may mean. It’s all marketing. Ford is perhaps hoping that if many people see the name Ford with “open source” all over the place, then they will perceive Ford as “ethical”. Ford tried to paint proprietary software from Microsoft “open”. We repeatedly complained about that. █
Permalink
Send this to a friend
Posted in News Roundup at 5:51 am by Dr. Roy Schestowitz
Contents
-
Quite simply, most of us use desktop Linux because it’s superior to all other brands, including Windows and OS X — even including Unix and the BSDs. This is a fact, not an opinion. There are reasons why Linux runs a majority of the worlds servers and powers most big enterprises, and in an example of where the trickle down theory actually works, those reasons trickle down (or up — depending on your viewpoint) to the desktop.
-
Desktop
-
The openSUSE Project, through Douglas DeMaio, had the great pleasure of informing us that approximately 45,000 students from an Indonesian province are currently testing a pilot program powered by openSUSE Linux.
-
Kernel Space
-
Graphics Stack
-
Developers working on the open-source Exynos DRM driver for supporting the display block found on Samsung’s Exynos ARM SoCs are up to their 9th version of patches for providing atomic mode-setting support.
-
Alex Deucher of AMD has filed his main pull request today for the Radeon DRM driver updates to be integrated in the upcoming Linux 4.2 kernel.
-
Applications
-
A new version of the famous Calibre eBook editor, viewer, and converter has been released, and the developer has further improved the DOCX functionality that was made available a short while ago.
-
Proprietary
-
Surprisingly, a lot of people who want to write expect to start perfectly, so they think that if they have the proper tools right from the beginning, then it will actually be easier to take up writing. This is the reason there are quite a few applications out there that focus on stuff like writing goals, for example, and that try to provide the minimum number of features that a writer might need.
-
Instructionals/Technical
-
Games
-
I am always hesitant to cover any crowdfunding campaigns, but I think Voxelnauts has just won me over. All development is done on Linux, they have video’s showing it, and it looks like a great game.
-
It’s another game that takes advantage of the excellent DOSBox project, and after my testing it’s flawless work from GOG to make it “just work” as usual. GOG’s commitment to getting Linux a lot of classic games pleases me, and I hope we soon have all the classics using DOSBox that Windows has. It’s only a matter of time!
-
Heroes of Loot is a 2D dungeon crawler with twin stick like shooting, I’ve taken a little look so that you know what to expect.
-
Umbra is a new hack ‘n’ slash RPG built on the CRYENGINE that looks absolutely stunning. It will be released on the PC and Linux platforms if the developers will get enough funds on Kickstarter.
-
-
The beta for 2.5D physics puzzler Unmechanical was announced a couple of weeks ago, and is now available for all owners of the game on Steam. An extended version of the game was released for PlayStation 3 and 4, and Xbox One earlier this year, but is so far not available for PC.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Layers feature is almost done. A list of layers is being generated in the left sidebar and toggling visibility of layers is also working.
-
GNOME Desktop/GTK
-
The GNOME project is sad to have learnt that Marco Pesenti Gritti recently passed away after a long fight with cancer. Marco made major contributions to GNOME, having been the original author of both the Epiphany (also known as “Web”) browser and Evince, the GNOME PDF reader. Besides his significant contributions and technical ability, Marco was known as a good friend who served as an inspiration to many within the community.
Members of the GNOME community have expressed their sadness at Marco’s death. Xan López, the current Epiphany maintainer, wrote: “I remember fondly working with Marco on Epiphany many years ago. His patience and good character were instrumental in getting me involved with GNOME and Free Software”. Another contributor, Tomeu Vizoso, said: “He reviewed my first patches ever to a free software project and his contagious enthusiasm was what put into motion my career in open source.”
GNOME wasn’t the only community that Marco was a part of: he also played an important role in the development of Sugar, a platform which focused on education and the developing world.
Our thoughts are with Marco’s family and friends at this difficult time.
-
The GNOME developers are still preparing for the release of the second milestone towards the GNOME 3.18 desktop environment, due for release on September 23, 2015.
-
-
At the request of many users, the Kali Linux developers are proud to announce the immediate availability of Docker images for the Kali Linux operating system, helping users run Kali on various OSes.
-
Reviews
-
Bodhi Linux is a distribution I have followed for a number of years. I used to have it installed on my Acer Aspire Netbook and it featured in my list of “12 great distributions for netbooks” article that I wrote back in October 2013.
The point of Bodhi Linux is to get out of your way and let you decide which applications are installed on your computer.
I gave my previous review of Bodhi Linux the title “Quick but Quirky”.
The reason for that title was that the desktop whilst whizzing along quite nicely had a few strange Enlightenment-isms which would have made it a probably no-no for beginners.
How does the latest version measure up? Read on and find out.
-
I have run Ubuntu 15.04 since the day it was made available, and while it was a great release, one decision by Ubuntu is ruining it for me.
-
New Releases
-
Andrei Cherepanov had the great pleasure of informing us about the immediate availability for download of the fifth maintenance release of the Russian ALT Linux 7.0 operating system.
-
The IPFire team had the pleasure of announcing earlier today, May 28, the immediate availability for download of IPFire 2.17 Core Update 90, a major version that brings a number of new features, updated packages, a new kernel, and various security enhancements.
-
PCLinuxOS/Mageia/Mandriva Family
-
Softpedia was among the first to report a few days ago the sad news that the French Mandriva S.A. company that developed, maintained, and distributed the popular Mandriva Linux operating system is in the process of being liquidated.
-
It’s with a heavy heart that I report that Mandriva Linux is no more. Mandrake Linux, as it was known in the beginning, was the Linux distribution that freed my computer from the lock-in and insecurity of proprietary alternatives. While saddened, no one is really surprised at this last whimper. Mandriva suffered financial issues for nearly the entirety of its existence, even filing bankruptcy at least once. Fortunately, with projects like Mageia and OpenMandriva, Mandrake Linux will live on in more than just our memories.
-
Good news everyone, a new version of OpenMandriva is ready to see the world in a few days, 2014.2 will soon bemaking its way to you. Listen out for details, features – and torrents!
-
Yesterday we learned that Mandriva, the company, was shutting down. I read a lot of sad comments on Twitter about it and realized that few of those guys seemed to be aware that actually Mandriva, the company, wasn’t doing a Linux distribution anymore for several years. The Mandriva Linux distribution, which earlier forked as PCLinuxOS, Mageia and others, is now OpenMandriva.
-
Slackware Family
-
During the previous couple of weeks I enjoyed several long weekends due to national holidays, and so it happened that I could spend some time re-visiting the calibre.SlackBuild and updating it so that it was able to compile a package for Calibre 2.x.
-
Red Hat Family
-
The Red Hat Cloud Adoption survey also revealed that many companies fear their applications won’t be suitable for deployment into IaaS or PaaS.
-
-
Fedora
-
-
I’ve been working on generating appstream data for RPMFusion packages recently. At the moment, since only Fedora packages provide appstream data, only they can be installed using Gnome software – for RPMFusion packages, a user must use another package manager – DNF and so on. Considering that a lot of the packages in RPMFusion are media player front-ends and things, it’d make it a lot easier for users if these were also listed in Gnome software. I spent a number of hours today writing appstream data files for the RPMFusion packages – both in the free and non free repositories. I believe I’ve written appstream data files for all packages that could be listed in Gnome software now. (They’re hosted here in the Github repository I set up for this purpose). I had already generated initial RPM packages for the free and non free repositories and submitted review tickets to RPMFusion. They’re still unassigned, so if you are a package maintainer with a few free cycles, please consider reviewing them. They are really simple reviews.
-
Fedup right now is the command for handling in-place Fedora upgrades from release-to-release and it’s been around since Fedora 17. However, with the Fedora 23 release due out in late 2015, that utility will likely be replaced with a new version to handle upgrading to new releases.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
In case you missed the latest news, Jonathan Riddell has been accused by the Ubuntu Community Council (CC) of breaking Ubuntu Code of Conduct (CoC) and has been asked to resign from his position of leader of the Kubuntu project (a title which actually does not exist and which he never claimed to hold)
I had the chance of meeting Jonathan when I joined Canonical in 2009. I was a bit intimidated during my first Canonical real-life meeting, but Jonathan carried me around and went out of his way to introduce me to many of my then new colleagues.
Since then he has always been one of the friendliest person I know. We often shared rooms during Canonical, Ubuntu or KDE events and went on to be colleagues again at Blue Systems. I believe Jonathan kindness is one of the reasons why the Kubuntu community has grown into such a welcoming and closely-knit group of people.
-
This month’s Ubuntu Phone Update sent over-the-air is bringing a number of new features and improvements for Ubuntu smartphone users over the next few days.
-
Flavours and Variants
-
As you may already know, the Linux Mint Team is maintaining both the Linux Mint systems, based on Ubuntu, and the Linux Mint Debian Edition systems, based on Debian.
-
Animesoft International, the developers of the Mangaka Project, an Ubuntu-based Linux distribution designed primarily for fans of Japanese anime and manga, have announced a new Alpha release of the next major version of the distro.
-
-
Freescale’s dual- and quad-core “Plus” i.MX6 SoCs boost graphic performance and RAM support, while the single-core Cortex-A7 “UltraLite” targets secure IoT.
Freescale Semiconductor announced three new versions of its popular i.MX6 SoCs, all of which will be backed with Linux BSPs and evaluation kits. The new i.MX6 DualPlus and i.MX6 QuadPlus system-on-chips offer optimized GPUs and memory support, but keep the same 21 x 21mm packages, and remain with the same allotment of Cortex-A9 cores. They offer full software and pin compatibility with earlier i.MX6 models, says Freescale.
-
Phones
-
Tizen
-
The Samsung Open Source Group (OSG) have created a Getting started guide that has been tested on Linux Mint 17, and most of it should also work for Ubuntu. It shows you the prerequisites that you need as well as showing you step by step Instructions on how to install the Tizen SDK. You get to setup a test device and get familiar to the new environment that you will be soon calling your new home.
-
The Speed Truck was the third most downloaded game from the Tizen store during April 2015. The file size is only 0.65MB which takes not take up too much space, version 1.2.0. You can drive your BigFoot truck across the desert and compete against other truck racers whilst keeping an eye on your trucks health and the time limit. There will be power ups along the way to help you to enhance your speed against other players.
-
Android
-
-
We’ve gotten our first official look at Android M, and it offers scores of subtle improvements that promise to make using Android 6.0 a whole lot better. It’s evolutionary, not revolutionary—which is exactly what Android 6.0 needs to be.
-
-
The way Android handles your privacy isn’t perfect, and various studies have shown that apps can and will take advantage of the way you set up app permissions to mine personal data for commercial purposes. However, a new leak indicates that Android M will offer users better privacy by introducing new features that’ll give them granular app permission control.
-
Lenka, the black-and-white photo app by photographer Kevin Abosch that has taken the monochrome shooting set by storm, has now released an Android version.
-
-
Standalone streaming service will be available in Google Play store
-
As promised back in March, the Nvidia Shield Android TV console is coming this month — today, in fact. The company has announced it’s now available to order from Amazon, Best Buy, and its own website.
-
Today at Google I/O 2015 Google detailed its plan to roll Android into the home and everyday devices. Meet Brillo and Weave. Together, these two software products will power and allow Internet of Things devices.
-
It was two years ago at Google I/O 2013 that the company originally announced Android Studio, a new integrated development environment (IDE) for Android apps. Six months ago, Google announced that the product was ready to move out of beta, but Android Studio 1.0 still couldn’t do all of the things that the old Eclipse ADT could do. Most notably, developers that used Google’s Native Development Kit (NDK) to use C and C++ code in their apps were left out in the cold.
-
First up is Brillo, an Android-derived operating system for IoT devices. Brillo is smaller and slimmer than Android, providing a kernel, hardware abstraction, connectivity, and security infrastructure. The company didn’t talk technical details, so the range of systems-on-chips supported and specific hardware requirements are currently unknown; previous rumors estimated that it would go as low as 32 or 64 MB of RAM, making it a lot smaller than regular Android.
-
USB Type-C is still a rarity today, but as the year goes on, the new port is going to begin showing up in more and more devices. In anticipation of this, Google has introduced a handful of features in the Android M release to support some of Type-C’s new features.
-
Google is combining all of its login and identity solutions into a single platform today under the ‘Google Identity Platform‘ moniker. What’s more interesting than that, though, is that Google is launching the Smart Lock Passwords Manager today, which will make it easier for users to sign in to third-party Android apps that implement this service.
-
We’re pretty enthusiastic around here for the all-new Google Photos, and now it’s available to everyone to try. On the web, you can visit it at photos.google.com. Or you can download the app for Android or iOS. The new service, which has “graduated” from Google+, now offers unlimited storage of photos up to 16 megapixels and video shot in 1080p. You can also store higher-resolution imagery in Google Photos, though it will count against the 15 GB of free storage you get with your Google account.
-
As you read this, Google I/O will currently be raging on—and hopefully just wrapping up the keynote. A few days before the show, however, Nvidia invited us to check out the Nvidia Shield—the company’s first entry into the Android TV market.
-
Google officially unveiled Android M today from their I/O 2015 conference today.
-
Swisscom has signed 500,000 customers onto its Swisscom TV 2.0 IPTV platform since April 2014 when the company introduced its next-generation offer based on open source Android and featuring a new UEX, network DVR to the set-top box and unified STB and multiscreen service delivery. In its annual report in February, the telco listed 1.17 million television customers (including those on the ‘legacy’ Swisscom TV 1.0) and 306,000 people using TV 2.0. The company is predicting a 2-3 year migration (from April 2014) to the new solution before it switches off its original IPTV platform.
-
-
-
That will become a question for millions more people this summer as Google’s new digital wallet system, Android Pay, becomes active.
Google announced Android Pay at the Google I/O developers conference in San Francisco on Thursday.
-
-
If you purchased a 2015 Hyundai Sonata with a factory-installed navigation system, and have a smartphone with the Android Lollipop 5.0 or higher operating system, you can integrate your car with the new Android Auto software.
-
At its developer conference I/O 2015, Google today unveiled Android M, the latest iteration to its mobile operating system. The update brings with it a handful of interesting features and other improvements. The full-fledged version of Android M will roll-out sometime later this year, but for those who want a sneak peek a developer preview version of Android M for select Nexus devices is out now. Here’s how you can install it on your smartphone or tablet.
-
Google has launched new features for its Google Play store to make it easier for parents to find Android apps, games and videos for children.
-
At Google I/O, the company’s annual developer event in San Francisco, Google announced a new version of Android Wear.
The update will make items more glanceable, actionable and effortless. Android Wear will now allow you to leave apps permanently on your device in a low-power black and white mode.
-
After loading Google’s first developer preview of Android M onto a Nexus 6, we’ve just had our first peek at what’s to come when the big update is ready for consumer release in Q3. For starters, most of the most important features that Google announced today are nowhere to be found. The very cool Now on Tap feature isn’t yet active (hopefully that’ll come in a later preview update), Android Pay’s not yet ready, and obviously the Nexus 6 isn’t going to do much in the way of scanning fingerprints. So what’s left? Well, the first developer preview shows that Google has been working to refine and polish the work that began in Android 5.0 Lollipop.
-
As Google opens its annual I/O software developer conference this morning in San Francisco, it will be looking to extend its reach even further beyond the computer and the smartphone.
-
-
-
-
-
-
-
-
-
The battle for the living room (i.e, controlling the television experience) is heating up with forays from multiple vendors. As the cord-cutting trend gains momentum, the time seems to be right for disruption. Roku has been around for a long time and they continue to taste success with inexpensive and small over-the-top set-top boxes (OTT STBs). At the other end of the spectrum is the Apple TV, which, despite just being a ‘hobby’, has managed to move millions of units. Google had tried to make inroads into this market a few years back with the Google TV / Logitech Revue, but, it unfortunately didn’t pan out as expected. Chromecast turned out to be more popular in their second attempt, but it was a limited play. In late 2014, Google launched Android TV along with the Nexus Player.
-
-
Like them or not, emojis are turning into the mobile era’s lingua franca. Now a project called emojidex is offering “emojis-as-a-service,” with a platform that lets developers share new emojis with each other and add them to their websites and apps.
-
An international trade agreement under negotiation with Australia, the United States, the European Union and others may have wide-ranging implications for the technology users, according to civil liberties groups.
The Electronic Frontier Foundation has analysed leaked drafts of texts for the Trade In Services Agreement (TISA) written in February this year, and claims it would prohibit countries involved from forcing vendors to disclose source code used for applications in their equipment.
-
Forget the dotcom bubble burst of the noughties; never before has the promise of a digital economy ranked so highly in the global marketplace. Having faced significant downturns over the last decade or so, many economies – the UK, Portugal and Iceland, to name a few – have spawned a new wave of digital entrepreneurs.
Those who perhaps found themselves out of a job, or facing unprecedented levels of competition for limited employment opportunities after education, have created their own jobs and companies, bringing new found energy and increased competitiveness into the enterprise sector.
-
-
In advance of Google I/O later this week, Twitter is making both Twitter Kit and its telephone sign-on tool Digits open source on GitHub for Android developers.
-
-
Events
-
The Linux Foundation in conjunction The Apache Software Foundation has announced Apache: Big Data, an inaugural conference to take place on September 28-30 in Budapest, Hungary.
-
The Twin Cities campus of the University of Minnesota will be hosting a Moodle conference sponsored by the main organization behind the Moodle project. “MoodleMoot US” will run Aug. 4-6 in Minneapolis and feature Moodle founder Martin Dougiamas as well as speakers from higher ed and K-12 sharing how they use open source tools, including the Moodle open source course management system, in education.
-
This 3-day seminar focuses on how Linux has been adapted for use in embedded environments, with specific emphasis on the ARM architecture. Through extensive hands-on lab work, you learn how to install a cross-development environment, build a compact version of Linux for an embedded device, install the build on the target system, and test its operation. You’ll create and test programs that exercise I/O as well as networking applications .
-
Core counts keep rising, and that means that the Linux kernel continues to encounter interesting performance and scalability issues. Which is not a bad thing, since it has been well over ten years since the “free lunch” of exponential CPU-clock frequency increases came to an abrupt end. This microconference will therefore look at futex scaling, address-space scaling, improvements to queued spinlocks, additional lockless algorithms, userspace per-CPU critical sections, and much else besides.
-
Web Browsers
-
Chrome
-
On May 27, Penny MacNeil from the Google Chrome development team was happy to announce the promotion of the Google Chrome 44 web browser from the Dev channel to the Beta one for all supported platforms, including Linux, Mac OS X, and Windows.
-
Mozilla
-
Today we are happy to inform you that Mozilla has published some details about the next major version of its popular, cross-platform, and free web browser, Mozilla Firefox 39.0.
-
Oracle/Java/LibreOffice
-
FSF/FSFE/GNU/SFLC
-
Maybe my memory is blurred due to the fact, that the seperation of firmware from the Linux kernel, and proper firmware loading got implemented only years later. I remember the discussion about the pwc driver and its removal from Linux. Maybe the situation wasn’t better at that time but the firmware was just hidden inside the Linux driver code?
-
Licensing
-
Since its resurfacing as an open source project in 2008, Dolphin has been licensed under the GNU General Public License version 2 (GPLv2). This license, created in 1991, is still a fairly common license used in the open source world. But as with anything that deals with technology, times are changing at a rapid rate. More recent projects are using GNU Public License version 3 and Apache 2.0, for their additional freedoms, protections from outside liability, and improved inter-license compatibility. Unfortunately these newer licenses are not compatible with GPLv2, and any project using these licenses cannot link to Dolphin and thus, Dolphin cannot link to them.
-
Openness/Sharing
-
Apps implementation and open government data use and re-use, are examples of it, and Open & Smart Government are nowadays trends where technology has an important role. In this paper we explore this perspective, with special focus in the open innovation within the city.
-
Open Hardware
-
Over the past few years we have seen rapid progress in the use of 3D printing to create low cost alternatives to traditional prostheses for amputees. The latest development involves the exiii team from Japan whom we previously reported on for their handii device. In review, the team is made up of former Sony and Panasonic engineers, they set out to create a low cost myoelectric prosthesis that was not only functional but also stylish and customizable. The result of the efforts is the HACKberry, a sleek and functional $300 prosthesis made up of 3D printed components and myoelectric sensors. The sensors interact with a smartphone to actuate the fingers of the device. The design won them a James Dyson award in 2013.
-
Then, in 2014, Chris read about an organisation called e-NABLE, a 5000-strong international group of 3D-printing enthusiasts. Using open-source prosthetic designs, these volunteers print and assemble prosthetic hands and arms costing as little as £40. Those wanting a prosthesis send through photos, measurements and other specifications. The organisation then matches recipients with volunteers.
-
Programming
-
-
SourceForge didn’t stop at taking over the GIMP account and locking Simončič out, they also manipulated the software and wrapped it inside an ad-infested installer. I checked yesterday and it was indeed adware. Unfortunately I didn’t bother to grab a screenshot and I regret it now. Today when I checked, the package had been updated and it’s now ad-free. There is no changelog on SourceForge so I can’t see what changes were made to the package, but I can see that the last update was made today.
-
Over the 2015 Easter holiday the Scribe project received more than 3000 stars (a combination of bookmarking, liking and favouriting) on Github, making it easily one of the most popular open-source projects we have created at the Guardian.
In addition to that milestone we also celebrated the release to our internal production systems of a number of community-contributed changes to Scribe. Guardian journalists now benefit every day from participation in the open-source community!
-
Security
-
-
Docker Hub is a central repository for Docker developers to pull and push container images. We performed a detailed study on Docker Hub images to understand how vulnerable they are to security threats. Surprisingly, we found that more than 30% of official repositories contain images that are highly susceptible to a variety of security attacks (e.g., Shellshock, Heartbleed, Poodle, etc.). For general images – images pushed by docker users, but not explicitly verified by any authority – this number jumps up to ~40% with a sampling error bound of 3%.
-
Defence/Police/Secrecy/Aggression
-
The Harper government has manipulatively invoked the threat of ISIS to create unreasonable societal fear, so that it can advance an imperial agenda beneath the cover of lies and deceptions.
-
Environment/Energy/Wildlife
-
Finance
-
The author of a key report commissioned by German Finance Minister Sigmar Gabriel on possible reforms for the controversial ISDS-mechanism, has said while the report offers some suggestions for reforming the mechanism in the future, he still does not see the need for ISDS in TTIP.
-
If you want to understand what’s really happening in Greece and Ukraine, just follow the money
-
PR/AstroTurf/Lobbying
-
Billionaire Pete Peterson is spending lots of money to get people to worry about the debt and deficits, and National Public Radio is doing its part to try to promote Peterson’s cause with a Morning Edition piece that began by telling people that the next president “will have to wrestle with the federal debt.”
This is not true, but Peterson apparently hopes that he can distract the public from the factors that will affect their lives, most importantly the upward redistribution of income, and obsess on the country’s relatively small deficit. (A larger deficit right now would actually promote growth and employment.)
-
Privacy
-
In many EU countries, entire herds of cattle are carefully “micro-chipped” so the animals can be monitored. What if we did the same to people? It would be difficult to become a criminal or (gulp) a terrorist!
Obviously, nobody is going to allow that to happen. For now, we’ll just have to track our dogs, though our phones already track us quite a bit.
-
Civil Rights
-
National Review editor Rich Lowry advocated for mass incarceration and “disproportionate police attention” toward “dangerous, overwhelmingly black neighborhoods” in response to a spike in murders in Baltimore.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »