05.08.15
Posted in News Roundup at 4:42 am by Dr. Roy Schestowitz

Contents
-
At a time when faith in open source code has been rocked by an outbreak of attacks based on the Shellshock and Heartbleed vulnerabilities, it’s time to revisit what we know about Linux security. Linux is so widely used in enterprise IT, and deep inside Internet apps and operations, that any surprises related to Linux security would have painful ramifications.
In 2007, Andrew Morton, a no-nonsense colleague of Linus Torvalds known as the “colonel of the kernel,” called for developers to spend time removing defects and vulnerabilities. “I would like to see people spend more time fixing bugs and less time on new features. That’s my personal opinion,” he said in an interview at the time.
-
Every since Linux first became popular, articles have been condemning its shortcomings. Hardly a month goes by without someone explaining what Linux lacks, or how it needs a particular feature, application, or service to be usable– and, as often as not, the complaints are misguided.
Admittedly, the free software that runs on Linux has some shortcomings. For example, you still can’t fill out PDF forms, or, in most countries, calculate your taxes using Linux. In other cases, such as optical character recognition or speech recognition, free software tools are available but primitive compared to proprietary ones. However, the number of legitimate shortcomings becomes smaller every year, and, increasingly the complaints are more likely to be the results of ignorance as anything else.
-
Linux companies Red Hat, SUSE and Canonical will benefit from the decision by Microsoft to suggest that OEMs not provide a means of turning off secure boot on PCs running Windows 10.
-
-
-
-
-
-
-
-
-
-
-
-
As the idea of containers gains momentum, there are a couple of problems that increasingly need to be solved – networking, storage and security being the key three. Twistlock aims to solve the last of those and be part of unlocking far-broader container adoption.
Containers are, of course, a Linux concept that allows the running of multiple isolated Linux systems on a single control host. Instead of creating a full virtual environment, with Linux containers, an operating system is shared across the various containers while running resources are offered to the container in isolation. Linux containers have existed for a long time, but Docker re-invigorated the notion and brought it to a wider audience.
-
Linux has been around for quite a long time now, but it still plays third fiddle to Windows and OS X. Which problems are stopping Linux from dominating the desktop? A redditor asked this question and got some very interesting answers.
-
-
Desktop
-
The Finns have long used a high percentage of GNU/Linux desktops like many European countries.
-
Audiocasts/Shows
-
I want to make this short and sweet. The days that follow will be filled with varied speculation I suspect. This happens anytime there is change afoot! But those who know me, know that I’m merely moving onto new exciting projects.
As of today, I am no longer part of Jupiter Broadcasting. I enjoyed my tenure co-hosting two of the programs and stand by my belief that they have a great production staff and amazing co-hosts. I wish all of them tons of success in their endeavors going forward.
-
Kernel Space
-
Alexander Holler wanted to make it much harder for anyone to recover deleted data. He didn’t necessarily want to outwit the limitless resources of our governmental overlords, but he wanted to make data recovery harder for the average hostile attacker. The problem as he saw it was that filesystems often would not actually bother to delete data, so much as they would just decouple the data from the file and make that part of the disk available for use by other files. But the data would still be there, at least for a while, for anyone to recouple into a file again.
Alexander posted some patches to implement a new system call that first would overwrite all the data associated with a given file before making that disk space available for use by other files. Since the filesystem knew which blocks on the disk were associated with which files, he reasoned, zeroing out all relevant data would be a trivial operation.
-
…than to understand Linux permissions! Honestly though, that’s not really true. Linux permissions are simple and elegant, and once you understand them, they’re easy to work with. Octal notation gets a little funky, but even that makes sense once you understand why it exists.
-
Immediately after announcing the release of Linux kernel 4.0.2, which is currently the most advanced stable branch of Linux kernel, Greg Kroah-Hartman also announced the immediate availability for download and upgrade of the seventh maintenance version of Linux 3.19 kernel.
-
Applications
-
On May 5, Lubomir Rintel announced the immediate availability for download and upgrade of NetworkManager 1.0.2, the default utility for managing network connection under GNOME and GNOME-based desktop environments.
-
-
We’re not just keeping an eye on the kickstarter campaign (three days and almost at 50%! but go ahead and support us by all means, we’re not there yet!), we’re also working hard on Krita itself. Dmitry is busy with improving the performance of clone layers, adding PSD file support to the Layer Styles feature and fixing loading and saving masks to PSD files (we implemented that in October, but broke it subsequently…), and we’ve got a brand new release for you today.
-
Instructionals/Technical
-
I personally like Google’s Chrome interface. It’s simple, fast, elegant and did I mention fast? Unfortunately, I don’t like how locked down the Chrome OS is on a Chromebook, nor do I like its total dependence on Google. I also don’t like the lack of ability to install Chrome easily on generic hardware. Thankfully, Budgie is here to help.
-
-
-
-
Games
-
One of the strengths of Linux is that there really is a distribution for everybody. But which distro would work best for a game developer? One redditor asked that question and got some interesting answers.
-
-
-
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
My efforts to revamp the Jenkins Continuous Integration system for KDE finally came to life and went live!
-
GNOME Desktop/GTK
-
-
As I hinted in my retrospective in February, 2014 has been crazy busy on a personal level. Let’s now take a look at 2014-2015 from a GNOME perspective.
When I offered my candidacy for the GNOME Foundation‘s Board of Directors in May last year, I knew that there would be plenty of issues to tackle if elected. As I was elected president afterwards, I was aware that I was getting into a demanding role that would not only test my resolve but also make use of my ability to set a clear direction and keep us moving forward through tough times. But even if someone tries to describe what’s involved in all this, it remains difficult to truly grasp the amount of work involved before you’ve experienced it yourself.
-
-
Despite the fact I have a different view of which distros are best for kids — Qimo (pronounced “kim-o,” as in the last part of eskimo, not “chemo”) tops the list, as it should, but the French distro Doudou (add your own joke here) is unfortunately left out — the link there is informative. So for those who are just getting their proverbial feet wet in Linux, this is a godsend.
-
Clonezilla Live, a Linux distribution based on DRBL, Partclone, and udpcast that allows users to do a lot of maintenance and recovery work, has been updated to version 2.4.1-15 and is now ready for download.
-
Voyager-X 10.14.4, released in March, is based on Xubuntu/Ubuntu 12.04 LTS (Precise Pangolin). This new Voyager-X is one of the first distros to use the new Xfce 4.12 desktop, more than one year in the making.
-
New Releases
-
The OpenELEC team is proud to announce its 1st Beta of OpenELEC 6.0.
Internally this will be known by the less-catchy name OpenELEC 5.95.1.
The OpenELEC 5.95 release series are test releases (beta) for OpenELEC-6.0.
OpenELEC-6.0 will be the next stable release, which is a feature release and the successor of OpenELEC-5.0.
The most visible change is the update from Kodi-14.2 Helix to Kodi-15.0 Isengard (beta 1). Beginning with Kodi-15 most audio encoder, audio decoder, PVR and visualisation addons are no longer included in our base OS, but they are available via Kodi’s addon manager and must be installed from there, if needed. Our own PVR backends such as VDR and TVHeadend will install needed dependencies automatically. Other than that, please refer to http://kodi.tv/kodi-15-0-isengard-beta-1/ to see all the changes in Kodi-15.
-
Ballnux/SUSE
-
The German GNU/Linux company SUSE has announced support for the “simpler choice” database programme from SAP, whereby it will offer to help businesses migrate any legacy database solution to a more modern alternative.
-
Red Hat Family
-
Red Hat has been grabbing headlines the last couple of days. It started yesterday with the announcement of RHEL 6.7 Beta which brings new and updated features to those not ready to move on to RHEL 7.x. Today Red Hat took “a stand against container fragmentation” and announced their part in six record breaking Intel Xeon E7 v3 systems. SuSE lead seven to world records too and Debian Jessie reviews are still rolling in.
-
At Red Hat, our involvement in open source technologies does not just revolve around code commits and community stewardship; one important focus is on the creation of standards. It may sound boring, but open standards applied to emerging software technologies can go far in not only fostering adoption but also helping to further drive innovation.
Open standards and the governance model of open source projects are closely related. The best projects create innovation and ubiquity by becoming the defacto standard for a given set of problems, absorbing and aggregating the many agendas and needs that drive their contributors. Our approach to open standards is demonstrated by the “power of code,” developed in the open, unlike abstract documents negotiated in the backroom.
-
With every new Intel Xeon processor generation, the benefits typically span beyond simple increases in transistor counts or the number of cores within each processor. Things like increased memory capacity per chip or larger on-chip caches are tangible and measurable, and often have a direct effect on performance, resulting in record-breaking scores on various standard benchmarks.
-
This post is aimed to clarify certain terms often used in the security community. Let’s start with the easiest one: vulnerability. A vulnerability is a flaw in a selected system that allows an attacker to compromise the security of that particular system. The consequence of such a compromise can impact the confidentiality, integrity, or availability of the attacked system (these three aspects are also the base metrics of the CVSS v2 scoring system that are used to rate vulnerabilities). ISO/IEC 27000, IETF RFC 2828, NIST, and others have very specific definitions of the term vulnerability, each differing slightly. A vulnerability’s attack vector is the actual method of using the discovered flaw to cause harm to the affected software; it can be thought of as the entry point to the system or application. A vulnerability without an attack vector is normally not assigned a CVE number.
-
Not ready for the jump to Red Hat Enterprise Linux 7? Be of good cheer, Red Hat is still improving Red Hat Enterprise Linux 6.x.
-
Red Hat have announced JBoss Enterprise Application Platform 6.4 and expanded benefits for subscribers of the software. This release is notable as it now supports Java 8 applications.
-
-
Red Hat has made available a beta release of Red Hat Enterprise Linux (RHEL) 6.7, an update for the firm’s Enterprise Linux 6 operating system that provides security enhancements along with updated systems management and monitoring capabilities for customers.
-
-
Red Hat, a provider of open source software solutions, has made a strategic investment in VMTurbo, a demand-driven control platform for the software-defined data center.
VMTurbo plans to use the funds to develop its control platform, improve adoption of demand-driven control in OpenStack deployments, and increase support to VMTurbo’s growing customer base.
Charles Crouchman, CTO of VMTurbo, said: “Our demand-driven control platform, tightly integrated with Red Hat CloudForms and the Red Hat Cloud Infrastructure, makes OpenStack deployments more resilient, performant and agile.”
-
Fedora
-
AAEON Technology Inc., a Taiwanese computer manufacturer, has recently introduces a new ultra-slim compact embedded computer that runs the Fedora Linux operating system on Bay Trail Intel Atom or Celeron processors.
-
Debian Family
-
The Debian project has a long and rich legacy. Debian is one of the oldest surviving GNU/Linux distributions and, along the way, it has also become one of the largest (over 1,000 developers work on Debian, providing users with over 40,000 packages) and Debian has even branched out, adding GNU/FreeBSD and GNU/Hurd ports to its list of offerings. Debian is sometimes referred to as the “universal operating system” because it runs on a wide array of architectures, offering not only a production branch (Stable), but also multiple development branches (Testing, Unstable and Experimental). Debian, in short, provides a little something for everyone. This “universal” approach, which allows Debian to work just about anywhere while doing almost anything, also attracts developers who wish to build products using Debian’s packages and open infrastructure. Many of the world’s more popular Linux distributions, including Linux Mint and Ubuntu, have their roots in Debian.
-
The Debian Project may not be that slow with new releases, but sometimes it feels like it. The project typically releases a new version “when it’s ready,” which seems to work out to about once every two years lately.
Debian 8, branded Jessie, in keeping with the Toy Story naming scheme (Jessie was the cowgirl character in Toy Story 2 and Toy Story 3) had its feature freeze in November 2014 and there’s a been a beta and RC release available for testing. It wasn’t until the end of April when Jessie was finally judged range ready.
-
Derivatives
-
Canonical/Ubuntu
-
In a recent security notice, dated May 5, Canonical announced the immediate availability of a new kernel update for all of its supported Ubuntu Linux operating systems, including Ubuntu 15.04 (Vivid Vervet), Ubuntu 14.10 (Utopic Unicorn), Ubuntu 14.04 LTS (Trusty Tahr), and Ubuntu 12.04 LTS (Precise Pangolin).
-
Do you want to use OpenStack, but you’re afraid of the headaches of getting its architecture just right? Well, EMC is here to help with OpenStack reference architectures for three leading OpenStack vendors: Canonical, Mirantis, and Red Hat.
-
The first kernel update for the Ubuntu 15.04 (Vivid Vervet) operating system arrived on May 5 and it patched a very important vulnerability in the upstream Linux kernel 3.19. As such, all Ubuntu 15.04 users are urged to update their systems as soon as possible.
-
Canonical is bringing some very significant changes to Ubuntu and that includes a new way of packaging and maintaining the system. That being said, the company will continue to provide support for both the .deb based and .snap based Ubuntu systems for a long time.
-
Mark Shuttleworth had a very interesting keynote at the opening of the Ubuntu Online Summit for 15.10, and he said the developers from all the desktop environments should work together towards a common goal.
-
The desktop flavor of Ubuntu has already moved to systemd from an upstart, but Ubuntu Touch is still using upstart. It’s not clear when the mobile platform will move to the new init system, but Ubuntu developers are already working towards this goal.
-
A new official Xubuntu flavor called “core” has been announced by developers. It’s based on Ubuntu, and it integrates the Xfce desktop environment and nothing else.
-
The ONOS Project and partners said Wednesday they have demonstrated the real-world practicality of using a router with open source software to connect networks in Australia and the US. The test validates the vision of SDN, open source for carriers, as well as ON.Lab’s ONOS network operating system, according to one of its coordinators.
“SDN is about disaggregation of closed, proprietary boxes and separating of forwarding planes, control planes and applications,” says Guru Parulkar, executive director and board member of ON.Lab , which coordinates ONOS development. The communications test between Australia and the US achieved just that, he says. (See ON.Lab Aims to Make White Boxes Carrier-Grade , ON.Lab Intros Open Source SDN OS and SK Telecom Bets on SDN for Wireless.)
-
We reported the other day that the Ubuntu Touch developers had a great session during the Ubuntu Online Summit for the next major release of the world’s most popular free operating system, Ubuntu 15.10 (Wily Werewolf).
-
Unity 8 is the next iteration of the desktop environment that powers the Ubuntu Linux distribution. It’s still under development, but the Ubuntu developers have presented a short demo during one of the Ubuntu Online Summit sessions.
-
Making a mobile device act like a PC might seem like a thing of the future, but it’s not. Ubuntu developers just showed how connecting a mouse to a tablet transforms the Ubuntu Touch into a desktop experience.
-
The Ubuntu Touch platform has a music scope and one of the music sources for that service was Grooveshark, but the service has been shut down. Now Ubuntu developers need to make some adjustments to Ubuntu Touch.
-
Today was the last day of the Ubuntu Online Summit (UOS) event that took place online on the UbuntuOnAir channel on Google+ via YouToube live sessions, between May 5-7, and there were still some interesting discussions about the upcoming features of Ubuntu 15.10 (Wily Werewolf).
-
Despite the recent announcement that Windows 10 phones will be able to be used as PCs when connected to an external monitor, Ubuntu—the first operating system to toy with the idea—hasn’t conceded the smartphone-PC convergence race to Microsoft just yet.
-
As the proprietary and open-source systems battle for mobile and PC users, what are the prospects for these two champions of converged computing?
-
Flavours and Variants
-
-
During a very informative session at UOS (Ubuntu Online Summit) for Ubuntu 15.10 (Wily Werewolf) that took place today, May 7, Martin Wimpress had the great pleasure of informing us about the upcoming features of the Ubuntu MATE 15.10 operating system.
-
elementary OS “Freya” was released a month ago, but the developers are still making big changes to it. One of these modifications will bring a new “Open File Dialog” that should look and work much better than the previous one.
-
The Linux Mint project is constantly working to improve the operating systems they are developing, along with the Cinnamon desktop environment. A new major update for Cinnamon is expected to land pretty soon, and it will come with lots of new features and changes.
-
Ubuntu MATE is now an official distribution for Raspberry Pi 2, and the images for this light and modern operating system are now listed on the website.
-
The Linux Mint developers have announced today, May 7, in what appears to be the shortest monthly newsletter ever released, that the team works hard these days to bring you the second installment of the Linux Mint 17 operating system.
-
During the last day of Ubuntu Online Summit (UOS) for Ubuntu 15.10 (Wily Werewolf), the Lubuntu development team discussed some of the upcoming features that will be implemented in the Lubuntu 15.10 Linux operating system.
-
-
Giada’s compact i200 mini-PC for thin client and signage runs Linux on a 4th Gen Intel Core, and offers mini-PCIe, mSATA, and automated scheduling features.
-
Snuggly situated in an industrial section of Oakland, CA is Next Thing Co. a team of nine artists and engineers who are pursuing the dream of a lower cost single board computer. Today they’ve unveiled their progress on Kickstarter, offering a $9 development board called Chip.
The board is Open Hardware, runs a flavor of Debain Linux, and boasts a 1Ghz R8 ARM processor, 512MB of RAM, and 4GB of eMMC storage. It is more powerful than a Raspberry Pi B+ and equal to the BeagleBone Black in clock speed, RAM, and storage. Differentiating Chip from Beagle is its built-in WiFi, Bluetooth, and the ease in which it can be made portable, thanks to circuitry that handles battery operation.
-
-
-
A Kickstarter campaign promises a $9 computer with a larger processor than Raspberry Pi and the ability for cheap and easy mobile computing.
-
-
Anyone who thought the Raspberry Pi was a little expensive priced at $35 is sure to find the $9 C.H.I.P. tiny computer much more to their liking.
-
A crowd funded startup named Next Thing Co. is creating world’s cheapest computer which will be priced just $9. Named as “C.H.I.P”, this is technically faster, smaller & cheaper than Raspberry Pi, which is currently hailed as the leader of single-board computing world, introduced at $25.
-
Phones
-
Android
-
There are plenty of TV boxes available to choose from on the market, but if you are looking for something a little different that allows you to dual boot Android and Ubuntu, the Ugoos UM3 TV Box is worth more investigation.
-
The Ugoos UM3 is a small box that you can plug into your TV to run Android apps. But unlike most devices that fit that description, this one can also run Ubuntu Linux.
That means you could use it to stream videos from YouTube or Netflix, play music from Pandora or Spotify, or play Android games. Then you could reboot the device and switch operating systems to run full desktop apps including LibreOffice and Firefox.
Ugoos offers a larger model called the UT3S which sells for about $179. But the Ugoos UM3 costs about $50 less.
-
Samsung had confirmed earlier this year that it was taking its time with the next Gear smartwatch in order to make sure it’s as perfect as possible. Called the Gear A, this watch will be the first round smartwatch from Samsung and will bring a new method of user interaction thanks to its use of a rotating bezel ring. Samsung has never actually offered a time frame for when the Gear A will be officially announced, but according to our insiders, the company has delayed the launch till the second half of this year.
-
In the world of smartphones, Samsung and Apple cast big shadows. Perhaps no company is more familiar with those shadows than LG, which has been chasing Samsung’s mobile phone division for years. Each time that Samsung makes a move, LG follows along a few months later and a little less impressively.
-
Those looking for a new Android phone in the month of May are going to find themselves staring at a number of solid options. With that in mind, we want to help narrow things down for those that are need of some assistance. Here, we take a look at the device’s we think represent the best Android phones for May, 2015.
Last month, Samsung and HTC released their new 2015 flagships into the wild. The Samsung Galaxy S6 Edge, Samsung Galaxy S6, and HTC One M9 join a crowded field of competitors tempting those looking for a new Android phone this month. They will soon be joined by an LG G4, a device that’s set to replace the popular LG G3 in June.
-
It looks like Google will reveal the successor to Android 5.0 Lollipop at its upcoming annual I/O 2015 developer conference.
-
Arne Exton had once again the great pleasure of informing Softpedia about the general availability of a new build for its AndEX Live CD project, whose primary goal is to help you run the Android 5.0.2 Lollipop mobile operating system from Google on your personal computer.
-
The choice of Android TV devices has finally expanded beyond Google’s Nexus Player. Last week, Sony, which years ago launched the first Google TV set-top, began shipping the first Android TV based TVs, and this week it will be joined by Razer’s Forge TV gaming player. Later this month, Nvidia will ship its third-generation Nvidia Shield, which similarly runs Google’s new media player and gaming platform.
In today’s more enlightened tech world, failure is not exactly acceptable, but it is at least considered natural. Fail twice in the same product category, however, and few will give much credence to future attempts. The pressure is on for Google to see some early wins for Android TV that can erase memories of its failed Google TV integrated TV/web platform.
-
Bitcoin startup Bitseed has announced it is open-sourcing the creation of its new plug-in node.
The company, which launched its first node in March, is asking contributors to help evolve its product by completing tasks and solving bounties in exchange for rewards.
Bitseed’s project is hosted on Assembly, a collaborative platform that tracks contributions to projects with coloured coins on the bitcoin blockchain.
-
Nervana Systems, one of a handful startups focusing on a type of artificial intelligence called deep learning, today is announcing that it has released its Neon deep learning software under an Apache open-source license, allowing anyone to try it out for free.
The startup is pointing to benchmarks a Facebook researcher recently conducted suggesting that the Nervana software outperforms other publicly available deep learning tools, including Nvidia’s cuDNN and Facebook’s own Torch7 libraries.
-
Ammenti explained that, in order for the manuscripts to be readable, the Vatican Library opted for open source tools that do not require proprietary platforms, such as Microsoft Office, to be read.
-
Open source software is everywhere, and chances are high that you’ll be writing, deploying, or administering it when you enter the workforce. Hiring managers are looking for candidates with experience in open source. Employers will often ask you for your GitHub username along with – or instead of – your resume. So, if you’re all new to open source, where should you get started?
If you’re feeling a bit intimated about the wide world of open source software, it’s totally understandable. There’s thousands of projects, and it’s hard to know which one will give you the best experience you can use to build your skill set. And it can be even harder to know which one will give you the best experience as a contributor and human being.
-
Project CoprHD is positioned in the data center as a single, open control plane for multivendor storage. It offers the same level of flexibility, choice, security and transparency as EMC’s commercial ViPR Controller product. It adds the ability to create new services and applications. EMC will continue selling ViPR Controller as a commercial offering.
-
With the release of the Nginx 1.9.0 Web server, Nginx has taken TCP load-balancing capabilities from its commercial Nginx Plus product and fitted it to the company’s open source technology.
TCP load balancing improves failover consistency among worker processes, according to Nginx. The feature already has appeared in the commercial Nginx 5 and 6 products.
-
Events
-
This is a fun month. Not only are we moving forward with the ownCloud Contributor Conference (some cool interviews coming out soon), but there’s a sudden avalanche of events this month. The ownCloud.org blog already wrote about it – we have had FOSDEM, SCALE, Chemnitz and may others I didn’t attend myself. Find out about the openSUSE conf from last week and the upcoming OTS in Berlin!
-
I asked this of the openSUSE community at the start of my keynote last week at the openSUSE Conferene in The Hague, and they gave some great answers. Community, YAST, quality, OBS, etc.
-
Web Browsers
-
Mozilla
-
Mozilla has revealed how it reckons Firefox should look when it’s on the tellie.
Firefox OS user experience designer Hunter Luo reckons that the four basic functions of a smart television are watching shows, accessing apps, controlling devices and looking at list of your content. The user interface for Firefox-for-tellies therefore presents each of those options as a “deck”, concealing “cards”. So in the image below, “TV” is the deck and each of the channels gets a “card”, in this case Channel 32.
-
Every committed Mozillian and many enthusiastic end-users will use a pre-release version of Firefox.
In Mac and Windows this is pretty straightforward, you simply download the Firefox Nightly/Aurora/Beta dmg or setup tool, and get going. When it is installed it is a proper desktop application, you could make it your default browser, and life goes on.
-
Believe it or not, the folks at Mozilla are working hard these days to bring you a major update to one of the best open-source and cross-platform email, news, and chat clients on the market.
-
-
Oracle/Java/LibreOffice
-
The Document Foundation has just announced that LibreOffice 4.4.3 has been released and is now available for download. It’s a maintenance release with not so many improvements, but it’s here and it will land in repositories soon enough.
-
Please do NOT use this VirtualBox Beta release on production machines. A VirtualBox Beta release should be considered a bleeding-edge release meant for early evaluation and testing purposes.
You can download the binaries here. Please use sha256sum to compare the hash of the downloaded package with the corresponding hash from this list.
Please do NOT open bug reports at http://www.virtualbox.org/wiki/Bugtracker but use our VirtualBox Beta Feedback forum to report any problems with the Beta release. Please concentrate on reporting regressions since VirtualBox 4.3.26.
-
CMS
-
After helping to put the dot in .com by building and configuring enterprise class solutions with WorldCom as a Sun hardware and software engineer, Jason Smith went on to AAAS (The American Association for the Advancement of Science, and the publishers of the journal Science) to direct the technical needs of the education directorate.
Jason has built or architected solutions ranging from enterprise to small business class and has found in Drupal a flexible, scalable, rapid development framework for targeting all levels of projects. A long time beneficiary of the open source movement, Jason—now a senior software architect at The Weather Company—is an avid supporter of open source projects and believes strongly in giving back to the community that supported him.
-
My favorite part about our open source project, PencilBlue, is that I get to interact with people from all over the world. When we first started, there were just two of us, but as the months progressed we saw our contributors begin to grow. It got me thinking about what it takes to be a good maintainer and how my team will make sure the project continues to run smoothly for years to come.
How many people across the world contribute to open source software? If GitHub’s user base is any indication, the open source community is more than 8.5 million. That’s a massive number of people that have the capacity and desire to contribute. These numbers don’t even take into consideration those who clone or download distributions anonymously. Now that we know how many people we can potentially engage, how do we get them interested in our projects?
-
Website publishers using the popular free and open source WordPress content management system (CMS) woke up this morning to find that their sites had been upgraded to version 4.2.2. Users who’s sites somehow missed being automatically upgraded are urged to update immediately, as this update addresses several important security issues. According to Wordfence, maintainers of a popular WordPress security plugin, this release fixes one recently discovered vulnerability and further hardens a security issue that was addressed in version 4.2.1.
-
Healthcare
-
Software projects in health care would benefit from increased collaboration, using open source, exchanging know-how and open documentation, say experts from IsfTeH, International Society for Telemedicine and eHealth. “Most important is the sharing of best practices, but reusing common software components also reduces costs”, the experts say.
-
FSF/FSFE/GNU/SFLC
-
Gnubik is a 3D single player game which displays an interactive cube similar to the well known Rubik Cube.
-
This is a bug-fix release, network still only works at a prototype stage. However, a bunch of bugs have been fixed, including a good deal show-stoppers which were preventing the game from starting some os OS/hardware combinations.
-
The Free Software Foundation (FSF), a Boston-based 501(c)(3) charity with a worldwide mission to protect freedoms critical to the computer-using public, seeks a Boston-based individual to be its full-time Web Developer.
-
Project Releases
-
Cutegram 2 is once again back as one of the best Telegram clients for Linux ever. Version 2.2.0 is here to attest just that, as announced today by its developer on the project’s website.
-
Public Services/Government
-
Ammenti explained that, in order for the manuscripts to be readable, the Vatican Library opted for open source tools that do not require proprietary platforms, such as Microsoft Office, to be read.
-
Gecamed, an open source Electronic Health Record system developed in Luxembourg since 2007, is already used by more than 10 per cent of all general practitioners in the country. It is also the first EHR system in Luxembourg to achieve interoperability with the health records management system used by eSanté, the country’s national eHealth agency, says Guido Bosch, a research engineer at the Luxembourg Institute of Science and Technology.
-
Political commitment and innovative individuals are crucial to get public administrations to switch to open source software, conclude researchers at the Institute of Public Administration at Leiden University (Netherlands). The potential cost savings or the size and complexity of the public administration “have no discernible effect”, the researchers write in Government Information Quarterly.
-
Germany’s Rhine-Neckar metropolitan area, with the three states of Baden Wuerttemberg, Hesse and Rhineland-Palatinate, are testing an open source patient portal that provides access to a ‘personal’ Electronic Health Record (p-EHR) system.
-
It’s fair to say no one was expecting that. Not the political parties, not the punditocracy and – least of all – the pollsters. The exit poll that came on the stroke at 10pm will have caused ashen faces at Labour headquarters. At Lib Dem towers, the spirits would have crumpled in an instant. At Tory mission control, the joy would have been unconfined.
-
Finance
-
CMD’s guide, “New Documents Show How Taxpayer Money Is Wasted by Charter Schools—Stringent Controls Urgently Needed as Charter Funding Faces Huge Increase,” analyzes materials obtained from open records requests about independent audits of how states interact with charter school authorizers and charter schools.
These documents, along with the earlier Inspector General report, reveal systemic barriers to common sense financial controls. Revealing quotes from those audit materials, highlighted in CMD’s report, show that too often states have had untrained staff doing unsystematic reviews of authorizers and charter schools while lacking statutory authority and adequate funding to fully assess how federal money is being spent by charters.
-
-
PR/AstroTurf/Lobbying
-
In case you’re curious, the percentage of Democrats who say they “would consider voting for” Sanders has risen from 14 percent in February to 23 percent now–but 61 percent say they haven’t heard enough to be able to say…which is, of course, in part a function of journalists treating next year’s Democratic contest as a foregone conclusion.
-
Censorship
-
Copyright law is frequently misused as a tool to censor unwanted online criticism. And often, this misuse does not make it into court. But one such case has recently made its way up to the Eleventh Circuit Court of Appeals. And yesterday, EFF filed a “friend of the court” brief, urging the court to consider the First Amendment interests at play when copyright is used to silence public criticism.
-
Privacy
-
The US court of appeals has ruled that the bulk collection of telephone metadata is unlawful, in a landmark decision that clears the way for a full legal challenge against the National Security Agency.
A panel of three federal judges for the second circuit overturned an earlier ruling that the controversial surveillance practice first revealed to the US public by NSA whistleblower Edward Snowden in 2013 could not be subject to judicial review.
-
There is a measure of irony to the landmark intelligence bill that passed the lower house of France’s Parliament on Tuesday: It is intended to legalize some activities that French spies are already doing illegally. With militant fighters streaming back into Europe from the battlefields of Syria, Iraq, and Libya, French authorities have more radicals to keep track of than they have police officers to shadow them. That has left the French security apparatus deeply strained, and the bill passed Tuesday embraces digital mass surveillance as a solution to the manpower problem: What can’t be tracked by a team of undercover officers can perhaps — and “perhaps” is the operative word — be more efficiently monitored by banks of computers.
Permalink
Send this to a friend
05.06.15
Posted in News Roundup at 5:35 am by Dr. Roy Schestowitz

Contents
-
Retired pastor James Anderson, age 84, has never worked in IT or had any formal computer training, but over the past two years he has rebuilt more than a hundred IBM ThinkPad laptops and sent them to schools and nonprofits in Africa – all running Linux.
For the past nine years, Anderson has volunteered at FreeGeek, a Portland, Oregon-based nonprofit that recycles and rehabilitates old computers for donation. He spends four hours every Friday testing and rebuilding the ThinkPads, which he then loads with Linux Mint 17 and sends one or two at a time to Africa via personal couriers.
-
One of the most puzzling questions about the history of free and open source is this: Why did Linux succeed so spectacularly, whereas similar attempts to build a free or open source, Unix-like operating system kernel met with considerably less success? I don’t know the answer to that question. But I have rounded up some theories, which I’d like to lay out here.
-
You’ve always been able to run containers on a variety of operating systems: Zones on Solaris; Jails on BSD; Docker on Linux and now Windows Server; OpenVZ on Linux, and so on. As Docker in particular and containers in general explode in popularity, operating system companies are taking a different tack. They’re now arguing that to make the most of containers you need a skinny operating system to go with them.
-
The folks at UK retailer Cloudsto have been offering tiny desktop computers loaded with Ubuntu Linux for a little while. But most have basically been Ubuntu versions of existing Android boxes with ARM-based processors.
Now Cloudsto is introducing a line of mini PCs with x86 processors, starting with the Cloudsto X86 Nano Mini PC. It’s available with either Windows 8.1 or Ubuntu 14.04.
-
What is Linux? For many this seems like a question with an obvious answer, but the truth is there are a large number of people who would shrug their shoulders. Many have never heard of Linux (gasp!) or aren’t confident in their answer.
Here at Opensource.com, we want to help answer that question in a manner that allows others pass it around and share it with the world. So, we created a new resource page which gently introduces Linux, the world’s most popular open source operating system.
-
Here’s why I’m even bothering to write this: I’m writing to the person who is considering Linux as a desktop system. I am writing to the kid who wants to explore computer programming. I’m writing to the person who is intrigued with the look and feel of Linux on the desktop.
Should you run into this kind of person while you are asking for help or even offering to help others, just write him off as someone who had an extremely bad day and move along. He is most certainly an anomaly within the global Free Software community…within the Linux community.
-
Server
-
Cloudy Linux startup CoreOS kicked off its inaugural CoreOS Fest event in San Francisco on Monday with word that its homegrown rkt (pronounced “rocket”) container runtime software will be integrated into the Google-derived Kubernetes container orchestration software.
-
Application containerization is potentially the biggest disruptive technology in the IT infrastructure world today. Containerization not only puts at risk a number of vendors (think those who make their money from virtualization) but it fundamentally promises to enable a business transformation as well.
-
Taking a major step forward in its quest to drive a Linux container standard that’s not created and controlled by Docker or any other company, CoreOS spun off management of its App Container project into a stand-alone foundation. Google, VMware, Red Hat, and Apcera have announced support for the standard.
Becoming a more formalized open source project, the App Container (appc) community now has a governance policy and has added a trio of top software engineers that work on infrastructure at Google, Twitter, and Red Hat as “community maintainers.”
-
It is well known that the term “high performance computing” (HPC) originally describes the use of parallel processing for running advanced application programs efficiently, reliably and quickly. The term applies especially to systems that function above a teraflop or 10^12 floating-point operations per second, and is also often used as a synonym for supercomputing. Technically a supercomputer is a system that performs at or near the currently highest operational rate for computers. To increase systems performance, over time the industry has moved from uni-processor to SMP to distributed-memory clusters, and finally to multicore and manycore chips.
However, for a growing number of users and vendors, HPC today refers not to cores, cycles, or FLOPS but to discovery, efficiency, or time to market. Some years ago, IDC came up with the interpretation of HPC to High Productivity Computing, highlighting the idea that HPC provides a more effective and scalable productivity to customers, and this term fits really well for most commercial customers.
-
Linux is a reliable and popular operating system – and this is quite fair. Any contemporary Linux dedicated server offers the best performance, maximum security, and reliability on the market without breaking your pocket book.
-
Kernel Space
-
Linux kernel 3.14.40 LTS arrived a few days ago, as announced by Greg Kroah-Hartman on the kernel mailinglist, and it brings a number of important improvements to the ARM and PowerPC architectures, as well as several updated drivers.
-
Someone at work recently asked me about code coverage tooling for the kernel. I played with this a little last year. At the time I was trying to figure out just how much of certain syscalls trinity was exercising. I ended up being a little disappointed at the level of post-processing tools to deal with the information presented, and added some things to my TODO list to find some time to hack up something, which quickly bubbled its way to the bottom.
-
Mark Shuttleworth has just announced the name of the Ubuntu 15.10, the next iteration of the Linux distribution from Canonical, and it’s Wily Werewolf.
The founder of Canonical used to make these announcements on this personal blog, but he has chosen the Ubuntu Online Summit keynote to make this one. What’s interesting about this particular name is the fact that it makes a full circle (almost) to the first Ubuntu release Ubuntu 4.10 (Warty Warthog), that dates back to October 2004.
-
Mark Canonical has announced that a pocket PC powered by Ubuntu will be released this year, but he just teased about it, and he didn’t reveal any additional details.
-
Today, May 3, Linus Torvalds had the pleasure of announcing the immediate availability for download and testing of the second Release Candidate (RC) version of the upcoming Linux kernel 4.1, due for release in summer 2015.
-
Applications
-
uGet 2.0 was released recently, bringing support for multi-thread downloading and mirrors for the curl plugin, individual download speed limiting, new settings dialog and more.
-
Guake is a drop-down terminal inspired by computer games consoles such as the one used in Quake, which slides down from the top of the screen when a key is pressed (F12 by default in Guake).
-
4MPlayer is new interesting Linux distribution that has been built with a single use in mind, to play any kind of video files, including CDs and DVDs, without having to boot an entire distro and its desktop environment.
-
A few days ago, Erik released a new version of his Annoy library — a small, fast, and lightweight C++ template header library for approximate nearest neighbours — which now no longer requires Boost. While I don’t mind Boost (actually, quite the opposite), it appears to have been a blocker in getting the Python part of Annoy over to the world of python3.
-
Today I released virt-manager-1.2.0. You can read the release announcement here…
-
After a bogus Calligra 2.9.3 release, the developers of the number one open source office suite for the KDE desktop environment released Calligra 2.9.4, which brings multiple improvements to the popular Krita digital painting software.
-
On May 4, the Kubuntu developers had the pleasure of informing their users about the immediate availability of the recently announced KDE Applications 15.04 software suite for the Kubuntu 15.04 (Vivid Vervet) operating system.
-
Proprietary
-
The modern and powerful Plex Media Server, a free and cross-platform media server software for GNU/Linux, BSD, OS X, and Microsoft Windows platforms, has been updated recently to version 0.9.12.0.
-
Instructionals/Technical
-
-
-
-
-
-
-
Elasticsearch has offered Hadoop InputFormat and OutputFormat implementations for quite some time. These made it possible to process Elasticsearch indices with Spark just as you would any other Hadoop data source. Here’s an example of this in action, taken from Elastic’s documentation:
-
Tony Northrup is an Award-winning author and photographer who has published more than 30 how-to books and sold more than a million copies around the world. He has created a video tutorial, that is over an hour long, for beginners and more advanced users that aims at getting you familiar with your Samsung NX1 Compact Systems Camera (CSC).
-
Firejail is a generic Linux namespaces security sandbox, capable of running graphic interface programs as well as server programs. The sandbox is lightweight, the overhead is low. There are no socket connections open, no daemons running in the background. All security features are implemented directly in Linux kernel and available on any Linux computer.
-
Games
-
While we didn’t expect any big gains for the Linux gaming market-share over the past month, it does come as a surprise there’s a significant drop.
-
When Valve first announced that the Steam gaming platform was going to be made available on Linux computers back in 2012, few expected the OS to become the first choice for gamers. However, even despite the many hundreds of titles that have been made available via the service since then, the share of Linux users on Steam struggles to remain relevent.
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Packages for the release of KDE Applications 15.04 are available for Kubuntu 15.04. You can get it from the Kubuntu Backports PPA.
Bugs in the packaging should be reported to kubuntu-ppa on Launchpad. Bugs in the software to KDE.
To update, use the Software Repository Guide to add the following repository to your software sources list:
ppa:kubuntu-ppa/backports
-
Krita, an open-source digital painting software that proved to be a very powerful and useful solution, is once more present on Kickstarter and this time it wants to become faster than Photoshop.
-
I meant to have a post about Gardening efforts next, but KMouth is improving lately, so I’ll throw out a quick post about progress.
KMouth master branch is now Qt3 free. It’s still using K3Process for the speech synthesizer command-line calls, but all Qt3Support is gone.
-
In my last blog posts, I explained the KDE Free Qt Foundation, which guarantees the free availability of the Qt Toolkit. Today, The Qt Company introduced a new Qt online installer that requires users to accept additional license terms. Many people have contacted me with concerns about this change. I share this concern. Even before this, I have already been concerned about the structure of the qt.io download page, since it blurs the lines between the Qt Toolkit itself and additional, proprietary products.
-
GNOME Desktop/GTK
-
As we reported last week, the GNOME development team started work on the next major version of the acclaimed desktop environment, GNOME 3.18, and they’ve just released the first snapshot, GNOME 3.17.1.
-
Mutter, the default window manager and compositor of the acclaimed GNOME desktop environment received an update as part of the first development release of the upcoming GNOME 3.18, due for release on October 23, 2015.
-
-
Linux offers a tremendous amount to any computer user, but the proliferation of distributions can sometimes be confusing to newer folks. A Linux redditor asked what the differences were and got some helpful answers.
-
New Releases
-
Jacque Montague Raymer, the lead developer and founder of the MakuluLinux distribution based on the world’s most popular free operating system, Ubuntu, had the pleasure of announcing the release of MakuluLinux 9 Xfce.
-
Ultimate Boot CD, an ISO image that gathers together all the necessary tools for helping users with advanced system repair tasks and general system maintenance, reached version 5.3.4.
-
Screenshots/Screencasts
-
Today, we have the great pleasure of introducing you to the first ever openSUSE Live CD built around the MATE desktop environment, as it looks like the openSUSE team plans on delivering a MATE flavor as well, after Ubuntu got its own.
-
Ballnux/SUSE
-
The openSUSE development team, through Dominique Leuenberger, had the pleasure of informing openSUSE users about what happened last week on Tumbleweed, the rolling-release branch of the openSUSE Linux operating system.
-
Red Hat Family
-
Docker has certainly gathered most of the headlines in the container space, but the team behind CoreOS deserves some praise for creativity, too. We’ve been covering their creation, dubbed Rocket, extensively. Rocket is a new container runtime, designed for composability, security, and speed, according to the CoreOS team.
-
-
-
The short answer appears to be yes. To varying degrees, Google, Red Hat, VMware, and Apcera have joined the list of App Container (AppC) adoptees. But preemptively replacing Docker doesn’t seem to be on the agenda; it’s more about increasing the list of container options available to customers and letting the market decide.
-
Before we declare Docker the champion of the container wars, CoreOS begs to differ. If CoreOS was just doing this alone, it might not matter much. But, CoreOS has some big friends, Red Hat, Google, VMware and Apcera, that will make its efforts count.
-
-
Today, the EVP, Chief People Officer of Red Hat, Delisa Alexander, sold stocks of RHT for $815.6k.
-
-
Even though RHEL 7 is the latest version, the Linux vendor continues to add new features to RHEL6.x.
Linux vendor Red Hat on May 5 released its Red Hat Enterprise Linux (RHEL) 6.7 beta, providing users with a preview of features and capabilities that will become generally available later this year.
-
We are pleased to announce the beta release of Red Hat Enterprise Linux 6.7, the latest version of our Red Hat Enterprise Linux 6 platform. Nearly five years into its lifecycle, Red Hat Enterprise Linux 6 continues to provide a stable, proven, and predictable foundation for organizations seeking to build and deploy large, complex IT projects with confidence.
The beta release of Red Hat Enterprise Linux 6.7 includes a number of new and updated features to help organizations preserve investments in existing infrastructure, bolster security, stability, and systems management/monitoring capabilities, and embrace the latest Linux innovations.
-
Fedora
-
The Korora Project had the pleasure of announcing the general availability of the MATE edition of the Korora 21 Linux distribution, based on the popular Fedora 21 operating system.
-
Hey everyone! Fedora 22 is on the cusp of being released and the Fedora Cloud Working Group has elected to organize a test day for May 7th in order to work out some bugs before shipping it off to the rest of the world.
-
All this issues fixed in RussianFedora always (we release alpha, beta versions of RFRemix with 1-2 days delay after Fedora), so we support devel branches of Fedora. Also we’re using Koji to build packages and git to store RPM specs, patches.
Today I did copy and update of ffmpeg and mpv packages from rpmfusion to RussianFedora. They already in F22 and rawhide repos. Tomorrow I will do the same for F21.
-
Debian Family
-
Something I was used to and which came as standard on wheezy if you installed acpi-support was screen locking when you where suspending, hibernating, …
-
Derivatives
-
The Tails development team announced the immediate availability for download and testing of the first Release Candidate (RC) version of the upcoming Tails 1.4 amnesic incognito Live CD distribution that has been used by Edward Snowden to stay invisible online and browse websites anonymously.
-
The development team behind the popular UBCD (Ultimate Boot CD) project have announced recently that they are working on a Live version of Ultimate Boot CD, which is currently based on the Debian GNU/Linux operating system and has the ultimate goal of becoming a Parted Magic replacement.
-
At this year’s CeBIT trade show in Hanover, Germany, Christopher von Eitzen sat down with Linux legend Klaus Knopper to discuss his popular Knoppix Linux distribution as well as Linux and accessibility in open source software.
Designed to boot and run directly from a CD, DVD or USB flash drive without needing to be installed on a computer’s hard drive, Knoppix incorporates automatic hardware detection with support for a wide range of video and sound cards, USB devices and other peripherals and uses and on-the-fly decompression to run entirely in a computer’s memory. The CD version carries up to 2GB of executable software, while the single-layer DVD edition stores up to 10GB of data. The operating system can be used, for example, as a rescue system, to demonstrate Linux, as an educational CD, or installed directly to a system.
-
Canonical/Ubuntu
-
Canonical released Ubuntu 15.04 a couple of weeks ago, and it seems that it’s been a success. The community is mostly reporting a nice experience, which is important since this is the first Ubuntu release that uses systemd instead of upstart.
-
Canonical has announced that Git repositories can now be hosted directly on Launchpad, which was one of the most requested features of the community.
-
Ubuntu Touch is working great on the Bq Aquaris and Nexus 4 devices, especially after the previous update, and now the developers are focusing on a new OTA upgrade that should also bring some interesting fixes.
-
After introducing the Erle-Copter drone powered by Ubuntu Snappy Core back in February 2015, Erle Robotics, a Spanish company known for all sorts of Linux-powered robots, launched on May 3 the world’s first Ubuntu-powered drone.
-
The first ‘production’ smartphone running the Ubuntu operating system is finally here. Designed and marketed by the Spanish company BQ (not to be confused with the Chinese company BQ Mobile) and made in China, the first Ubuntu Phone is based on the 4.5-inch BQ Aquaris E4.5, which normally ships with Android 4.4. Included with the BQ Aquaris E4.5 Ubuntu Edition are two copies of the quick-start guide (in four languages each, one of the eight being English), a charger (with a built-in two-pin continental mains plug) and a 1-metre USB-to-Micro-USB cable. A comprehensive User Manual is available for download from the BQ website. The list price for the Aquaris E4.5 Ubuntu Edition, which is only available in the EU, is €169.90 (~£125).
-
Ubuntu also aims to offer a phone that would provide a middle ground between mobile and desktop before the year is out, according to the founder of the company behind the OS, Mark Shuttleworth. Shuttleworth confirmed that the device will launch in 2015 in a YouTube Q&A earlier this morning, according to a report by Liliputing.
-
-
In case you didn’t have the time to watch today’s live keynote video with Mark Shuttleworth, founder of Canonical and the famous Ubuntu Linux operating system, you can watch the recording right now (see the video at the end of the article).
-
-
In the online Ubuntu summit on Monday, Mark Shuttleworth announced that the 15.10 release of Ubuntu, due out in October, will be codenamed Wily Werewolf. Other names that I liked were Wooley Wammoth and Wicked Wabbit. The 15.10 release will see more work on convergence ready for the LTS release next year.
-
Canonical wanted to have Unity 8 and Mir ready for Ubuntu 16.04 LTS in order to provide them by default, but it looks like that is not going to happen. Instead, the community will be able to choose the default desktop they want for that particular LTS release.
-
Ubuntu dominated the headlines today with its Ubuntu Online Summit for 2015 beginning today. Mark Shuttleworth gave the keynote and informed a loyal public of the new 15.10 lsb_release -a. Elsewhere, Ubuntu 15.04 gets a thumbs-up and Ebuyer.com is now selling Ubuntu laptops.
-
Developers from Canonical explained last week that they intended to rebase the Ubuntu Next flavor (featuring Mir and Unity8) on Snappy, which means that they were also considering moving to a rolling release model, even if it was just for this branch.
-
Wow! What wonderment! The Ubuntu 15.10 has has been revealed as ‘Wily Werewolf’.
-
-
-
Most users will notice very little overall difference in this latest Ubuntu release, but it’s this change that packs the biggest punch.
There are a couple of new things that make 15.04 worth the upgrade from previous versions, but the really big changes – like the move to Unity 8 and the whole “convergence” of the desktop and mobile versions – remain in the future.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
The Ubuntu community is having a vivacious discussion regarding the placement of the window buttons on the left side. From the looks of it, some users would prefer to have the option of moving the buttons to the right side.
-
Snow melts and trees blossom, but nothing really says spring around the Ars Orbital HQ like the arrival of a new version of Ubuntu Linux. Right on schedule, Canonical has recently released Ubuntu 15.04, also known as Vivid Vervet.
Ubuntu 15.04 arrived in late April and has, judging by other reviews, largely underwhelmed. According to the popular storyline, there’s not much new in 15.04. Of course, a slew of changes and unforeseen features in 15.04 could have just as easily earned a negative reaction, probably from the same people calling the actual release boring. The top of the Linux mountain is a lonely, criticism-strewn place.
The truth is, this line of thought is partially correct. There isn’t much new in 15.04, at least not in terms of visible changes to the Unity desktop.
-
Erle Robotics has launched an Ubuntu Core “Snappy” version of its open source Linux and ROS-based Erle-Copter quadcopter, with Erle-Copter app store access.
-
Canonical has published details in a security notice about a Dnsmasq vulnerability in Ubuntu 15.04, Ubuntu 14.10, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS, that has been found and fixed.
-
The Bq Aquaris e4.5 Ubuntu Edition has been out for some time and is available for purchase right now. It’s the only Ubuntu phone on sale, and one of the users found out how to access a hidden Factory Mode that gives access to all kinds of cool stuff.
-
Mark Shuttleworth has announced today that Ubuntu 15.10, scheduled for release in October 2015, will be named Wily Werewolf.
-
After announcing that the code name of Ubuntu 15.10 will be Wily Werewolf, Mark Shuttleworth has also announced that a new Ubuntu phone will be released this year, its vendor being still unknown for now.
-
-
Mark Shuttleworth has announced yesterday that the codename of Ubuntu 15.10 will be Wily Werewolf and that a new Ubuntu phone will get released this year.
-
-
Flavours and Variants
-
The Ubuntu MATE project is known for the fact that it contributes back, and it rewards developers for their work. It happened a few times already, and the latest projects awarded are Ubuntu and Debian.
-
Today, We have come up with an interesting news for both Ubuntu and Chrome OS users. Meet Chromixium – the new modern desktop operating system based on Ubuntu that has the functionality, look and feel of Google’s “Chrome OS”. Chromixium has brought the elegant simplicity of Chromebook and flexibility and stability of Ubuntu together. Chromixium puts the web front and center of the user experience. Web and Chrome apps work straight out of the browser to connect you to all your personal, work and education networks. Sign into Chromium to sync all your apps and bookmarks. When you are offline or when you need more power, you can install any number of applications for work or play, including LibreOffice, Skype, Steam and a whole lot more. Security updates are installed seamlessly and effortlessly in the background and will be supplied until 2019. You can install Chromixium in place of any existing operating system, or alongside Windows or Linux.
-
-
Raspberry Pi, when first launched about two years ago, became an instant phenomenon. After all, who could have thought of a $35 computer that lets you browse the web and does most of your office work? What is even more surprising is the reception it got from average users. Usually, one would expect a bare-minimum $35 board computer that runs Linux to be popular only among developers or geeks. However, as many as 100,000 Raspberry Pi units were sold on the day of its launch eventually selling more than 2.5 million units till date.
-
Gateworks unveiled a tiny, UAV-oriented SBC that runs Linux or Android on an i.MX6 SoC, and offers HDMI in/out, USB, serial, GPIO, CAN, mini-PCIe, and more.
Like other Gateworks Ventana boards, such as the recent Ventana GW5200, the tiny “Ventana GW5510″ runs Linux or Android on a Cortex-A9-based Freescale i.MX6 SoC clocked to 800MHz, and offers a wide-range power supply and -40 to 85°C temperature support. Other Ventana-like features include a programmable pushbutton switch, as well as programmable board shut-down and wake-up for remote sensor applications.
-
Armadeus has launched a Linux-equipped module that integrates a Freescale i.MX6 SoC with a Cyclone V GX FPGA, and offers SATA, CSI, DSI, and optional WiFi.
French technology firm Armadeus Systems has been selling Freescale i.MX based modules for years, including the circa-2009, i.MX27 based APF27. For the new “APF6_SP” computer-on-module, Amadeus has turned to Freescale’s Cortex-A9 i.MX6 SoC, which it had previous adopted for its APF6 COM. The feature set on the APF6_SP is very similar, with one major exception: the addition of an Altera Cyclone V GX FPGA.
-
-
Phones
-
Tizen
-
-
We have mentioned previously about the rumoured upcoming Samsung Z2 Smartphone and an un-named Global Tizen Smartphone. Well today these are allegedly leaked images of the Samsung Z2, a Tizen based Quad core Smartphone with 1Gb memory, 540 x 960 Screen to be released 1H 2015, which is potentially only a few weeks away.
-
The new line of Tizen 4K Samsung SUHD TVs has now officially been launched in the Philippines at an event held a few days ago. The new line-up of TVs includes the JS9500, JS9000 and JS8500 models, supporting screen sizes ranging from 55 to 88 inches. Samsung boasts that their TV technology, which uses nano-crystal semiconductors, leads in color and brightness compared to its competitors.
-
Android
-
-
-
-
-
Samsung started pushing the Android 5.0 Lollipop update to the Galaxy S5 flagship smartphone late last year.
Soon after the update rolled out, users began reporting various bugs in the final Android 5.0 Lollipop build for the Samsung Galaxy S5. This even led the company to pause the Android Lollipop update in European regions for a major period. Samsung Norway back in March while replying a user on Facebook had confirmed that the update caused various bugs.
-
-
Android has had an unfortunate reputation over the years. There have been numerous criticisms that the open source mobile operating system is unsafe; that it’s riddled by constant security threats and malware.
-
Moto X 2014 owners will soon be able to update their smartphone to the latest Android 5.1 Lollipop software. Motorola announced that the update is set to make its way to the units next week.
-
The Android platform will soar past iOS in terms of revenue in a few years, but that doesn’t necessarily mean more money for Google.
-
Cupcake, Donut, Eclair, Froyo, Gingerbread, Honeycomb, Ice Cream Sandwich, Jelly Bean, KitKat, Lollipop. No, these aren’t just the names of various delicious treats – they’re also the names of each consecutive, major Android release after Alpha and Beta.
-
Last week, Google’s Android 5.1.1 Lollipop update finally started to pick up steam. With Android 5.1.1 Lollipop updates finally on the move, we want to take a look at five things Nexus users need to know now about Google’s Android 5.1.1 update and its release.
-
Security researchers have developed an Android application that’s capable of alerting when other apps on a phone or tablet are covertly tracking users and connecting to ad networks.
The team at France’s Eurecom and Technicolor Research – explained in a paper published in the Cornell University Library archive that their prototype NoSuchApp application* functions as an on-board proxy: it monitors traffic and compares URLs silently requested by apps to a list of known ad-serving and user-tracking domains.
-
It took a while for Android Lollipop to even get its own slice on the OS pie chart Google releases regularly, but it now seems to be steadily gaining popularity. According to the latest Android stats collected from April 28th to May 4th, nine percent of devices are now running Lollipop. While that’s still quite small, it’s almost double last month’s percentage (five percent). KitKat’s stat slid down to 39.8 percent from last month’s 41.4 percent, so a number of stragglers might have finally upgraded. However, we’re sure the new flagships that recently started shipping with Lollipop out of the box (such as the Samsung Galaxy S6 and S6 Edge) helped boost the version’s usage. All the older versions’ percentage are slightly down from last month’s, as well, but Froyo’s impressively still hanging on at 0.3 percent.
-
Last week Google finally released the latest Android 5.1.1 Lollipop update aimed at fixing a few last outstanding bugs and issues since the initial Lollipop release back in November. This is the fourth update, however, the Nexus 9 hasn’t received anything past Android 5.0.1 back in November, but we’re hearing the Nexus 9 Android 5.1.1 Lollipop update could be here any day now.
-
Users of the LG G2 and G3 smartphones are experiencing widespread performance issues after receiving the Android 5.0 Lollipop update. LG G2 and G3 owners report various problems involving battery drain, slow charging and Wi-Fi connectivity, among others.
-
Back in January, the news came out that after just three months, the brand new Android 5.0 Lollipop was installed on roughly 1.6% of active Android devices. Since then, it has been slowly but surely climbed upward. In the latest distribution numbers, Google’s tasty sweet treat has reached 9.7 percent market share.
-
Valve has recently gone through a major PR debacle after the company announced that it’s implementing paid mods for games and Skyrim in particular. Their decision was short-lived, and it was retracted, but they have managed to incur the rage of the community. Independent developers are now working on a new game launcher that will make Steam obsolete.
-
After the announcement, our community growth skyrocketed. Our investors were so impressed by the welcoming of our open source announcement that they let us go ahead with open sourcing biicode early. We worked hard to release most of it in biicode 3.0.
-
Singaporean prime minister Lee Hsien Loong has decided to reveal the source code of the Sudoku-solving app he personally coded.
The PM revealed he likes to program in his spare time last month and mentioned the Sudoku-solver. He’s since taken to Facebook to announce the source code dump.
“The program is pretty basic,’ the PM writes, “it runs at the command prompt, in a DOS window. Type in the data line by line (e.g. 1-3-8—6), then the solver will print out the solution (or all the solutions if there are several), the number of steps the program took searching for the solution, plus some search statistics.”
-
Welcome to the third installment of my monthly column, where I explore how open source software and the open source way are used in the digital humanities. Every month I take a look at open source tools you can use in your digital humanities researc, as well as, a few humanities research projects that are using open source tools today. I will also cover news about how transparency and open exchange, and principles of the open source way, being applied to the humanities.
-
-
-
-
-
-
-
-
ViPR is software storage controller tech that separates the control and data planes of operation, enabling different data services to be layered onto a set of storage hardware products – such as EMC’s own arrays, Vblocks, selected third-party arrays, JBODs and cloud storage. The data services are typically ways of accessing data, such as file services,
The open source software will be called Project CoprHD* and be made available on GitHub for community development. It will include all the storage automation and control functionality and be supplied under the Mozilla Public License 2.0 (MPL 2.0). Public supporting partners for CoprHD are Intel, Verizon and SAP.
-
When Kurt Rohloff was working as a senior scientist at Raytheon BBN Technologies, he quickly realized the value of encryption when storing data in the cloud. However, he viewed the fact that the data couldn’t be computed on after encryption as a major obstacle in what he needed to accomplish.
-
-
-
Netflix has released source code for its automated incident response tool to help organisations cut through the noise of security alerts.
Project lead and security boffin Rob Fry together with Brooks Evans, and Jason Chan announced the unleashing of the Fully Integrated Defense Operation (FIDO) saying it has chewed the time to respond to incidents from weeks to hours.
-
-
I recently attended the Intel Developer Forum (IDF) in Shenzhen, China, to promote Intel’s software defined networking (SDN) and network functions virtualization (NFV) software solutions. During this year’s IDF, Intel has made several announcements and our CEO Brian Krzanich showcased Intel’s innovation leadership across a wide range of technologies with our local partners in China. On the heel of Krzanich’s announcements, Intel Software & Services Group Senior VP Doug Fisher extended Krzanich’s message to stress the importance of open source collaboration to drive industry innovation and transformation, citing OpenStack and Hadoop as prime examples.
-
A recent article by Gizmodo’s Alissa Walker gives a great overview of how these massive projects have benefitted from recent advances in technology. One of the bigger innovations of the last 10 years has been the open-source software Arches. Developed by The World Monuments Fund (WMF) and the Getty Conservation Institute (GCI), the software provides collaborative tools to document and analyze the “before” data for a damaged site. A group, whether of historians, architects, or a whole city, can contribute information they have from the site, like aerial photos or video, among other documentation.
-
Events
-
The open source community lives and grows through collaboration. That collaboration is driven online but we’ve witnessed first hand how much can be done and quickened by face-to-face meetings. This is due, in part, to the session speakers at events like LinuxCon, CloudOpen, Embedded Linux Conference and more. Speakers at our events represent the leaders and subject matter experts across a diverse range of technology areas and lend so much more to the event experience than just speaking. They help grow the community through their contribution; they make the experience for attendees so much more rich; and they represent the passion and genius that Linux and open source are known for.
-
-
Web Browsers
-
Chrome
-
Google has taken another step toward protecting users from fishing attempts by releasing a new Google Chrome extension ‘Password Alert’. The extension protects users from being gmail account overused with other non-google websites. As soon as it detects that the password has been exposed to any non-google website/service, it prompts to reset password immediately.
-
Mozilla
-
We’ve been writing about the benefits of HTTPS (HTTP Secure) connections, as opposed to basic HTTP connections, for years. The Electronic Frontier Foundation even endorses a browser extension called HTTPS Everywhere that uses it to encrypt communications on the web.
-
SaaS/Big Data
-
-
Chris C Kemp, the former NASA CIO credited with originating OpenStack, has predicted stacks-in-a-box that make the cloud platform more accessible and easier to use aren’t far off.
Speaking at CeBIT Australia, Kemp responded to a Register question about OpenStack usability by saying “in 1996 Linux was no fun either, but it provided a lot of value.” That value, and the fact the platform was open, led to innovation and the more polished Linuxes available and widely-used today.
Kemp reckons that cycle will repeat for OpenStack.
-
-
Oracle/Java/LibreOffice
-
The Document Foundation has just announced that the second RC (Release Candidate) for the LibreOffice 4.4.3 branch has been released and is now available for download and testing.
-
The GSOC 2014 Color Selector is in LibreOffice 4.4, but it’s not used for the “area fill” dropdown in impress or draw. So I spent a little time today for LibreOffice 5.0 to hack things up so that instead of using the old color drop down list for that we now have the new color selector in the toolbar instead. Gives access to custom colors, multiple palettes, and recently used colors all in one place.
-
CMS
-
WordPress issued an emergency update last week to patch a fresh zero-day vulnerability that could have enabled commenters to compromise a site. The previously unknown and unpatched weakness affected current versions of WordPress, according to Finnish company Klikki Oy.
On April 26 — just three days after WordPress released it’s latest version, 4.2 — Klikki Oy released a video and proof of concept code for an exploit of the flaw, which allows a hacker to store malicious JavaScript code on WordPress site comments. The script is triggered when the comment is viewed.
-
I’m very excited about Joshua Lee’s talk on the Drupal-powered International Biosecurity Intelligence System (IBIS) at DrupalCon 2015. Though I’m no biosecurity expert, the aggregation methods and process workflow for gathering biosecurity information is relevant to many industries. In his talk, the technology for creating this data aggregation system will be covered, as well as how the Drupal community can both benefit and contribute to this project.
-
FSF/FSFE/GNU/SFLC
-
The European Commission has published a new version of its strategy for the internal use of Free Software. The FSFE provided input to the Commission during the update phase and while the strategy is broadly similar to the previous version, there are some improvements.
Unlike previous versions, this time the strategy is accompanied by an action plan aimed at putting it into practice. However, the action plan is not public, so it is not possible to assess the Commission’s progress towards its own goals. We would welcome it, if the Commission would soon publish its action plan.
-
Public Services/Government
-
The city administration of Helsinki (Finland) will prefer open source software solutions for new IT solutions. The city council on 13 April adopted a new IT strategy, emphasising a preference for open source, especially when developing or commissioning the development of software solutions.
-
Switzerland’s public administrations are increasingly turning to using open source, according to the country’s IT trade group SwissICT and the open source advocacy group /ch/open. Like in 2012, the two groups have surveyed public administrations and companies in the country. They notice a “high increase in the use of open source software.”
-
Openness/Sharing
-
The Turkish government will restart the process of participating in the Open Government Partnership, after having been found “acting contrary to the OGP process for two consecutive Action Plan cycles”.
-
People in tech companies and particularly in open source communities believe in and value meritocracy—letting the best ideas win. One thing that’s become increasingly clear to me over the past few years is this: meritocracy is a great driver of innovation, but if we want to get to the best ideas, we need diversity of thought and an inclusive environment where everyone feels welcome to participate and offer different perspectives. Indeed, to live up to our ideal of meritocracy, we must consistently question and seek to improve it.
-
Open Data
-
A group of Cambridge computer scientists have set a new gold standard for openness and reproducibility in research by sharing the more than 200GB of data and 20,000 lines of code behind their latest results – an unprecedented degree of openness in a peer-reviewed publication. The researchers hope that this new gold standard will be adopted by other fields, increasing the reliability of research results, especially for work which is publicly funded.
-
Open Access/Content
-
A new gold standard has been set for openness and reproducibility in research – and it was done by Cambridge computer scientists. At a talk today at the 12th USENIX Symposium on Networked Systems Design and Implementation in Oakland, they are going to unveil peer-reviewed results with 200 GB of data and 20,000 lines of code.
-
Open Hardware
-
Now the design the engineering team came up with is available as an open source device for anyone who wants to help a handicapped animal. The construction plan, the print data, and parts lists can all be downloaded from the Multec website or this Instructable the company published.
-
This low cost magnetic resonance imager isn’t [Peter]’s first attempt at medical imaging, and it isn’t his first project for the Hackaday Prize, either. He’s already built a CT scanner using a barium check source and a CCD marketed as a high-energy particle detector. His Hackaday Prize entry last year, an Open Source Science Tricorder with enough sensors to make [Spock] jealous, ended up winning fourth place.
-
Programming
-
Facebook today announced the public release of HHVM 3.7.0, the latest version of the HipHop Virtual Machine that powers their Hack language and PHP implementation.
-
Security
-
-
-
Linux has a well deserved reputation as being one of the most secure platforms for individuals and businesses. This is largely due to the way security is integrated into the system, but there is a great risk in being too complacent. Recent events serve to remind us that there is no such thing as an uncrackable system.
-
“It’s more a question of an uptick in publicity,” suggested Bill Weinberg, senior director of open source strategy at Black Duck Software.
-
-
-
Defence/Police/Secrecy/Aggression
-
Britain and Nato have launched their biggest war games on Russia’s doorstep amid growing tensions over Vladimir Putin’s military aggression.
The largest ever Nato anti-submarine exercise, including the Royal Navy, is under way off the coast of Norway just weeks after reports of Russian submarines encroaching in to foreign waters.
-
Finance
-
The UK Supreme Court recently ruled on the law relating to prosecutions for entering into, or becoming concerned in, an arrangement which facilitates the acquisition, retention, use or control of criminal property for, or on behalf of, another person – contrary to s328 Proceeds of Crime Act 2002.
-
It’s USA Today, not the unions, who are being simplistic here. The data they are relying on refers to gross output. This would include the full value of a car assembled in the United States, even if the engine, transmission and the other major components are imported.
It also doesn’t adjust for inflation. If USA Today used the correct table, it would find that real value added in manufacturing hasn’t “nearly doubled”–it’s risen by a bit less than 41.0 percent since 1997, compared to growth of 45.8 percent for the economy as a whole.
The story here is a one of very basic macroeconomics. The $500 billion annual trade deficit ($600 billion at an annual rate in March) implies a loss of demand of almost 3.0 percent of GDP. In the context of an economy that is below full employment, this has the same impact on the economy as if consumers took $500 billion every year and stuffed it under their mattress instead of spending it. USA Today might try working on its numbers and economics a bit before calling people names.
-
PR/AstroTurf/Lobbying
-
The male gaze theory posits that because men control the creation of media; the media messages are dominated by a male point of view. The CEOs of the six companies that own 90% of media are all white males. Those same corporations are also heavily invested in the entertainment industry.
-
The Guardian reflects the metropolitan London world of New Labour, and nothing else. Its coverage of the referendum, particularly by Severin Carrell, achieved the remarkable feat of being even less fair and containing even more lies than the Scotsman. But if you want really to get inside the mind of Labour, the Guardian remains the place to go to know what the Labour elite – London’s Balls, Cooper, Miliband, Harman, Umunna, Jowell etc. are thinking.
-
-
-
-
Meet the Press host Chuck Todd can’t seem to get enough of the 2016 presidential race. Yet the one major candidate who announced he was running last week–Vermont Sen. Bernie Sanders, an independent who declared on April 30 he was running for the Democratic nomination–was strikingly ignored on Meet the Press‘s May 2 broadcast.
-
Todd may think seeing whether or not someone has been mentioned on Meet the Press is “some arbitrary way to judge the show,” but it seems to us to be a fairly straightforward way to gauge who the show thinks is an important part of the political discussion and who is not. And a tally of the show’s mentions of potential presidential candidates so far in 2015 is revealing.
-
How the European Commission gave lobbyists pretty much what they wanted
-
-
Censorship
-
Two people were fatally shot Sunday outside a Garland, Texas, community center that was hosting an event displaying cartoons of the prophet Muhammad, local officials said.
Garland police spokesman Joe Harn said that two men drove up to the community center and “opened fire on the security officers” hired to protect the event before being shot themselves.
-
Privacy
-
French MPs are due to approve a bill reforming French intelligence law to counter terrorist threats. But critics warn that the draft law is a license to spy on citizens’ private lives. Erin Conroy reports from Paris.
-
The Intelligence Bill, which was presented on the fast track on 19 March by French Prime Minister Manuel Valls, rallied a very large, argued and vigorous opposition, from a number of civil rights associations, collectives, lawyers’ and magistrates’ unions, but also administrative authorities such as the CNIL (French Data Protection authority) and the CNCDH (French National Consultative Committee for Human Rights).
-
As we’ve noted, there’s a new USA Freedom Act in town, and it’s on the fast track through Congress. It has some good stuff in there, and is generally a step forward on surveillance reform and ending certain forms of bulk collection — though there are some concerns about how it can be abused. But one thing that plenty of people agree on, is that even if it’s a step, it doesn’t go nearly far enough. Last Thursday, there was a markup in the House Judiciary Committee, to help move the bill to the floor, and some amendments were proposed to improve the bill — all of which got rejected.
What was especially frustrating, was that for at least one key amendment, everyone agreed that it was important and supported it, and yet they still refused to support it. The reasoning, basically, was that the existing bill was the work of many, many months of back and forth and compromises, and the administration and the House leadership had made it clear that it would not approve a single deviation, even if it was really important. The amendment in question was basically a replica of an appropriations amendment from Reps. Ted Poe, Zoe Lofgren and Thomas Massie that we wrote about last year, which surprised many by passing overwhelmingly in the House, only to be stripped out by the Senate.
-
Civil Rights
-
If you were holding onto the faint hope that federal election campaigns were ever going to be anything but “buy your way into office” spending sprees, you may as well kiss it goodbye. The Federal Election Committee’s head has just admitted her agency is completely powerless to do the one thing it’s supposed to be doing.
-
The idea that police officers should use handcuffs and leg shackles to control an unruly individual is hardly unusual in the US, where fondness for the use of metal restraints runs through the criminal justice system.
What is unusual is when the individual in question is five years old, and the arrest takes place in an elementary school.
New York state police were called last week to the primary school in Philadelphia, New York, close to the Canadian border, after staff reported that a pupil, Connor Ruiz, was disruptive and uncontrollable. When officers arrived at the premises, they placed the five-year-old boy in handcuffs, carried him out to a patrol car and put his feet into shackles before taking him to a medical center for evaluation.
-
Internet/Net Neutrality
-
Facebook’s Internet.org, which aims to give impoverished people around the world free mobile access to a selection of Internet services, is opening the platform to developers after facing criticism that the program’s restrictions violate net neutrality principles.
-
Facebook CEO Mark Zuckerberg is opening up his Internet.org platform to developers to help bring new types of content to the more than four billion people who lack Internet access.
The move comes weeks after several Indian firms decided to pull out of the project due to concerns that the app does not provide equal access to information, one of the principles of net neutrality.
-
DRM
-
Today, a wide variety of community groups, activist organizations, and businesses are taking part in the ninth International Day Against DRM (dayagainstdrm.org).
-
Intellectual Monopolies
-
Trademarks
-
Techdirt has covered its fair share of idiotic legal threats over trademarks, but the following example is spectacular even for a field that has many superb examples of corporate bullying. It concerns the village of Copthorne (population 5,000), in the English county of West Sussex. It’s rather well established: it’s been around for a thousand years, and is mentioned in the Domesday Book, which was compiled in 1086. Recently, though, its village association was threatened with legal action for using the name ‘Copthorne’ on its Web site, as the Plymouth Herald newspaper reports…
-
Copyrights
-
A presumed pirate with an unusually large appetite for activating Windows 7 has incurred the wrath of Microsoft. In a lawsuit filed at a Washington court, the Seattle-based company said that it logged hundreds of suspicious product activations from a Verizon IP address and is now seeking damages.
-
A couple of years ago in the Svensson case, the European Court of Justice (CJEU) made it clear (finally) that merely linking to content is not infringement. That was a case involving a news aggregator linking to official sources. However, in a new case that has been referred to the CJEU, the court will examine if links to unauthorized versions of content is infringing as well. The excellent IPKat has the details of the case which involves a blog that linked to some pre-publication Playboy photos in the Netherlands. A lower court had said that it wasn’t copyright infringement, but still broke the law, by facilitating access. On appeal, the court found that the free speech concerns outweighed the copyright concerns. From the description by the lawyer representing the blogger (“Geen Stijl news”):
-
Remember, just last week, when HBO and Showtime were flipping out about a couple of streaming sites promising to broadcast live streams of the big Floyd Mayweather/Manny Pacquiao fight? Apparently, they had the wrong target.
-
As Kim Dotcom remains stuck in legal limbo, his once-extravagant life keeps moving on and costing plenty of money. Auckland Now reports that Dotcom will theoretically be able to keep the balancing act up for a while longer, as this week a New Zealand court released some of Dotcom’s frozen financial assets to specifically allow the Mega mogul to pay for his continual monthly expenses.
-
A few months ago the UK Government legalized copying of MP3s, CDs and DVDs for personal use, as that would be in the best interest of consumers. A common sense decision for many, but leaked emails now show that Hollywood fiercely protested the changes behind the scenes.
Permalink
Send this to a friend
05.04.15
Posted in News Roundup at 11:32 am by Dr. Roy Schestowitz

Contents
-
Gnome 3.16 user interface packages are being rolled out to Linux in the month of April. Usually, it takes at least three weeks for the packages to reach everyone, but it is expected to be much quicker this time. The maintenance releases are out already and they fix a wide range of bugs found in the Linux platform. Compared to Windows or Mac, Linux is always stable and is a reliable solution for users. It is being upgraded in terms of visuals so as to make it more user friendly. Gnome also supports both 32-bit and 64-bit versions of the operating system.
-
Gnu/Linux distributions provide great advantages over proprietary alternatives for people with disabilities. In this article, I’ll discuss some of the advantages, as well as areas that need improvement. Because I use Fedora, my article is written based on my experience with that Linux distribution.
-
Desktop
-
Consider James Anderson. He’s an 84 year-old volunteer at Free Geek, a Portland, Oregon non-profit organization, which rebuilds old computers for users who need them. As shown in a Linux Foundation video, he works there every Friday to rebuild laptops using Linux that can be sent to Africa.
Anderson has been playing with electrical equipment since he blew out his grandmother’s fuses and has been using computers since the “luggables” of the 80s. He’s never worked in IT, though, until he came to Free Geek. He had spend 13-weeks in Zimbabwe and saw how students there needed computers.
-
The Gnome desktop version can also be made to look stunning too, so users shouldn’t think that choosing Linux will make things ugly or clunky, as this is not the case.
In conclusion, Windows adding a Start button, which the company axed two years ago, and multiple desktops (a long established Linux feature) will not make the transition and subsequent day-to-day usage much less frustrating than the Windows 8 experience.
However, one of the main downsides about the Linux operating system is that by being free, this means that there is no huge marketing budget to get the message out.
-
Kernel Space
-
So the -rc2′s have lately been pretty small – looking more like late -rc’s than early ones. It *used* to be that I couldn’t even post the shortlog, because it was just too big. That’s not been the case for the last few releases.
-
-
Graphics Stack
-
The accepted projects for this year’s Google Summer of Code have been revealed. The accepted X.Org projects are once again particularly interesting.
-
Applications
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
The mundane way to submit a patch is by using git to make a patch file (using format-patch) and attaching it to the bug. But this is way to tiresome ! Here we use the git bz utility (gnome’s recommended way of doing this) to automatically send the patch to bugzilla which is a lot easier. Later, this same patch can be updated
-
Games
-
A new Steam Hardware Survey has been released for the month of April, and it doesn’t bring good news for Linux users. This is probably one of the worst months for the Linux platform in a long time.
-
Shadowrun Chronicles: Boston Lockdown, formerly known as Shadowrun Online, came out of Early Access last week. The tactical turn-based game is the latest set in the cyberpunk Shadowrun universe and the second that takes a crack at multiplayer. As a fan of the setting, I decided to take a close look at the game and see if it was any good.
-
Middle-earth: Shadow of Mordor, a game developed by Monolith and ported by Feral Interactive for the Linux platform, is now showing in the Steam library, and it might be launched soon.
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Before to increase version to 1.0 I moved it from kdereview to kdeutils.
-
That is the first time that I use a distro-shipped Kate that is based on KF5 (and no other Kate 4.x is installed any more as escape route).
-
It has only been a few days since Plasma 5.3 was released, now work has begun on the 5.4 release. Plasma 5.4 is scheduled for launch in August, in time for the next Kubuntu release.
-
-
Last year’s kickstarter was a big success and all the support resulted in the biggest, best Krita release ever, Krita 2.9, with a huge number of exciting features. In fact, this week we’ll be releasing Krita 2.9.4, the first version of Krita with the Photoshop-type layer styles feature included! (As well as speed-ups and dozens of bug fixes…)
-
This summer Krita is going all in for animation. Not only do we have a Google Summer of Code project focusing on it, but it will also be a major point in this year’s Kickstarter campaign, alongside with major performance improvements.
-
On the first day of the Kolab Summit we announced that Kolab is getting full extended MAPI support. That was in itself a pretty fantastic announcement, but it was accompanied by announcements of instant messaging, WebRTC and collaborative editing.
-
-
GNOME Desktop/GTK
-
-
Gnome Shell, besides providing the main user interface for GNOME 3, is a Javascript shell with bindings to many native interfaces that allow e.g. Window manipulation, graphics rendering and animations, compositing, etc. It also allows developers to write extensions changing Gnome Shell’s behavior.
-
The development of the next GNOME release, 3.17, has started, and the first snapshot, 3.17.1, is now available.
-
-
-
New Releases
-
It’s been almost a year and SMS-2.0.8 comes with LTS Linux Kernel 3.14.40 and many server packages upgrades.
-
The New 9 Series Kicks off with the Release of the new Xfce Edition which comes in 2 flavors…
-
This is minor fix of Kwort 4.2, involving kpkg and including some small updates too.
-
Arch Family
-
Great news for Arch Linux users! From a few minutes, Kde Plasma 5.3 stable packages are officially available on Arch Linux repositories.
In fact, after running the pacman -Syu command I finally noticed, listed on my terminal, the new packages of Plasma 5.3.0 with all the relative dependencies.
-
On March 3, the Manjaro development team had the pleasure of announcing the immediate availability for download and testing of the second Preview release of the upcoming Manjaro Linux 0.8.13 operating system.
-
Red Hat Family
-
Fedora
-
The Korora Project is very pleased to announce that the final release of the MATE edition of version 21 (codename “Darla”) is now available for download in both 32- and 64bit, (we strongly recommend using BitTorrent).
-
Aside from the other features proposed thus far for Fedora 23, the update of the popular Red Hat sponsored Linux distribution due out in late 2015, you can add Mono 4.0 to the list.
-
Debian Family
-
Debian Jessie has been released on April 25th, 2015. This has opened the Stretch development cycle. Reactions to the idea of making Debian build reproducibly have been pretty enthusiastic. As the pace is now likely to be even faster, let’s see if we can keep everyone up-to-date on the developments.
-
I filed a few bugs, and I even uploaded my fixes to Github. Some of that went unnoticed, because Sean Owen of Cloudera decided to remove all Debian packaging from Spark. But in the end, even with these fixes, the resulting packages do not live up to Debian quality standards (not to say, they would outright violate policy).
-
Derivatives
-
Canonical/Ubuntu
-
Electronic Commerce Retailer Ebuyer has launched a series of AMD-based HP laptops preloaded with Ubuntu. These devices are perfect for business and home users and are now available for pre-order on Ebuyer.com; fully available at the end of May 2015.
-
Mark Shuttleworth is hosting his virtual keynote today for Ubuntu 15.10 with the Ubuntu Online Summit happening this week.
Shuttleworth posted to his blog that he’s holding off on revealing the “W” codename for Ubuntu 15.10 until this keynote. The keynote is taking place at 14.00 UTC.
-
Those who are partial to Ubuntu know that every six months the good people at Canonical, the people behind Ubuntu, release a new version to its popular Operating System. Well if you somehow missed the big event, the latest iteration of Ubuntu and all its cousins like Kubuntu, Ubuntu Mate, Lubuntu, Xubuntu and Ubuntu Gnome, were released on the 24th of April.
As usual, you get to decide which flavor you prefer depending on your hardware some of the flavors like Lubuntu are to be recommended over the default Unity based installation especially if your hardware is dated.
-
It seems world is slowly and steadily moving towards Linux powered devices. After Linux was used to power destroyers for US Navy, now Erle Robotics has used Ubuntu to power a drone.
-
-
The Raspberry Pi 2 Model B launched earlier this year, offering a more powerful machine capable of running a wider variety of software.
The new $35 Linux board has double the memory of first generation Pis, a quad-core 900MHz processor and the ARMv7 architecture used by many mid-range smartphones.
In the months since the Pi 2 launched developers have ported an increasing number of operating systems to the board.
-
Phones
-
Android
-
This week the latest Android 5.1.1 Lollipop update has finally arrived for the Nexus 7 and Nexus 10 tablets, and even a few lucky Samsung Galaxy S6 and Galaxy S6 Edge owners are getting the absolute latest version of Android with loads of bug fixes from Google. However, the Nexus 9 hasn’t seen an update since November, and is the only device still on Android 5.0.1 Lollipop.
-
Wearable tech is fast becoming the next big thing. We’ve seen fitness trackers gain popularity, smart jewellery take off, and even luxury brands start to sit up and take notice. However, it’s smartwatches which are one of the most popular choices amongst early adopters of wearable tech. The affordable Pebble works regardless of what phone you use, while big names such as Samsung, Motorola, Sony, and LG all have Android-based products on sale. Now, Apple is taking them all on with the Apple Watch.
-
Videostream for Chrome already makes it easy to play any video on your computer or network through your Chromecast, but the new Videostream app for Android gives you a remote control to stream movies on your PC, monitor downloads, and control playback without installing a special media server.
-
Good news for Android users who want to get involved in the livestreaming craze that’s sweeping Twitter: Meerkat has officially made it to the Google Play Store with a beta app. Its main rival, the Twitter-owned Periscope, remains iOS-only for the time being.
-
Earlier in the week, HTC announced that their 2014 flagship smartphone One (M8) would get the new Android 5.1 Lollipop firmware in August, which means device owners would have to wait for more than two months to savour the new update.
-
Motorola has announced that the Moto X 2014 will receive the long awaited Android 5.1 update next week, as reported in this article at Load the Game. The software update will first be made available to users in Brazil, and a United States rollout is expected in the week thereafter. An exact release date for European users has yet to be announced but is expected to be released around the middle of May.
-
One of our more frequent requests from readers is to tell them how to record your screen on Android. The functionality has been around for quite some time but usually requires some tinkering and adjustment to get it. In Android Lollipop, they have a screen recording method building into the OS and that’s how most people do it these days. Let’s take a look at a few Android apps and some other methods to get you screen recording.
-
Every one of us has already had this fight at some point: Apple or Android? The two dominant players in the mobile space carry with them very loyal fanbases who, for some reason, like to spar off with one another over whose tech-daddy could beat up the other. The companies compete with the same level of petty at times, which doesn’t help. Apple screws around with text messages from Android users, Android pokes back at Apple over the controlling hand it has in its app store, and the two companies spend a great deal of time in legal battles because of course they do. C’mon, guys, can’t we all just spend our time pointing and laughing at Windows Mobile?
[..]
Yeah, no kidding. I have my brand loyalty, too, but I’m pretty sure I wouldn’t feel so offended at a roommate’s opinion of my phone that I felt I had to avenge the inanimate object by getting all stabby. Both men ended up getting arrested and were sent to the hospital to have their wounds treated. In a perfect world, they would be laid up next to each other, Instagram-selfying from their beds with comments about how awesome the pictures from their respective phones looked.
-
Web Browsers
-
Chrome
-
In April 2015, we saw the naming of Microsoft Edge, the release of Chrome 42, and the first full month of Firefox 37 availability. Now we’re learning that Google’s browser has finally passed the 25 percent market share mark.
-
SaaS/Big Data
-
Interested in keeping track of what’s happening in the open source cloud? Opensource.com is your source for news in OpenStack, the open source cloud infrastructure project.
-
CMS
-
Greg Knaddison has worked for big consulting firms, boutique software firms, startups, professional service firms, and former Drupal Security Team leader. He is currently the director of Engineering at CARD.com and a Drupal Association advisory board member.
-
Now that the Wagtail CMS is gearing up for its 1.0 release, I wanted to take some time to introduce you to the all around best and most flexible Django CMS currently available. Wagtail has been around for a while, but doesn’t seem to get the attention I believe it deserves.
At Revolution Systems, we’ve used Wagtail recently on a number of projects, and the overall experience has been great. It strikes the right balance of making the easy things easy, and the hard things not only possible, but relatively easy as well.
-
BSD
-
OpenBSD a free, multi-platform BSD-based UNIX-like operating system that aims to have a few important features such as portability, standardization, correctness, proactive security, and integrated cryptograph has been upgraded to version 5.7 and is now available for download.
-
FSF/FSFE/GNU/SFLC
-
After a 25 year gestation, Hurd has finally been born. It was a difficult birth and it’s now being kept in an incubator under the care of Debian.
For many years GNU’s always almost ready to be born operating system microkernel, Hurd, has been the butt of many jokes and Facebook memes, so it came as something of a surprise to read in Larry Cafiero’s Friday column that it’s now ready enough for Debian, which is offering a somewhat experimental and unstable release of Debian/GNU Hurd. An earlier attempt at a Hurd based distro, by Arch, seems to have died on the vine back in 2011, although a 2013 posting promises that development is still underway, with no news since.
-
It is with huge pleasure that the Debian GNU/Hurd team announces the release of Debian GNU/Hurd 2015.
-
-
Andre Saraiva is an internationally known graffiti artist. He owns nightclubs in Paris and New York, works as a top editor of the men’s fashion magazine L’Officiel Hommes and has appeared in countless glossy magazines as a tastemaker and bon vivant.
-
The Mainstream Media are anxious to invoke the “violent nationalists” meme at every opportunity. Today Jim Murphy and Eddie Izzard ran away in Glasgow because evil nationalists shouted back when he was haranguing them. That’s what they did – shouted back. Nobody punched anyone. Nobody shoved anyone. Nobody threw anything. But people had the gall not to listen in hushed silence to Murphy.
-
…likely the deciding vote for approval of government business will be from the SNP.
-
Mike Huckabee And Ben Carson Used Fox News As A Political Springboard
-
Security
-
CBI on Friday got a new specialised forensic lab to access and recover data from Apple and Android devices seized from suspects during investigation of cases.
The new lab, inaugurated at the CBI academy in Ghaziabad, will be fully equipped with latest workstations and software to decrypt the data stored in Apple and Android devices, CBI sources said.
-
Finance
-
Earlier that week, I had moved into my office. Secretly. I rented out my Venice Beach apartment for the month, packed a few duffels with my clothes and prized belongings, and started taking up residence behind my desk, carefully using each square inch of out-of-sight real estate to store my stuff. Not everyone aspires to have their co-workers catching them at their desk in their tighty-whities—at 6 in the morning. Believing the absolute best-case-scenario reaction to my being there would be supreme awkwardness, I kept the whole thing to myself. Every morning I’d neatly pack away my personal belongings, turning the lights back on and lowering the air conditioning to its too-chilly-for-me 72 degrees—the way they always left it overnight. I’d leave for a morning workout and shower, simultaneously keeping clean and in shape while ensuring I wasn’t always the first to arrive. Occasionally I’d even make myself late to work, blaming the awful L.A. traffic. Just to fit in.
-
The fight to raise the minimum wage to $15 has already had an enormous impact on American politics. It hasn’t been reflected in national legislation, of course. With Congress in the hands of flat-earthers, the federal minimum wage is still stuck at less than half that—$7.25, the level it reached in 2009, as a result of legislation passed in 2007.
But what first registered as a surprising anomaly—a one-day strike in New York City involving just over 100 workers on Black Friday, Nov. 29, 2012—has come to serve as a focal point for articulating demands for a dignified living wage, not just for fast-food workers, but for everyone who works for a living. What began as a movement of those holding “McJobs” is now brimming over with new participants making the point that virtually all jobs nowadays are, or at least can be, McJobs—even the latest to join in with demonstrations held on April 15: adjunct college professors.
-
If you deposit more than $10,000 in cash, your bank is required to file a form with the authorities reporting the transaction. But the law also makes it illegal to “structure” deposits — depositing cash in amounts under $10,000 to avoid triggering the reporting requirement.
But aggressive enforcement of these laws can ensnare small business owners whose only crime is dealing in cash. This video tells the story of Lyndon McLellan, a convenience store owner in rural North Carolina who had $107,702 seized by the IRS. The agency hasn’t charged McLellan with any crime, but under controversial civil asset forfeiture rules the burden of proof is on him to prove he didn’t violate the “structuring” laws. The video was made by the Institute for Justice, a libertarian public interest law firm that is representing McLellan.
-
Privacy
-
Many publishers now post links to their content on Facebook, which has become an important source of online traffic for news sites. But opening those links on a mobile device can be slow and frustrating, taking around eight seconds.
-
Intellectual Monopolies
-
Copyrights
-
…the Green Party appears to be almost alone in its desire to alter the current framework for copyright protection (though the Pirate Party would reduce the term still further, to 10 years). It will be interesting to see whether the views expressed by authors and writers have any bearing on the Green Party’s position on reforming copyright in the UK.
-
While entertainment companies and authorities believe they are necessary to stem the tide of online infringement, many current anti-piracy strategies are putting Internet users at risk. Domain suspensions, seizures, plus search engine down-rankings are all playing a part in creating a less-safe online environment.
-
This week the MPAA opened applications for a new round of research grants, hoping the result will be “pro-copyright” academic papers. In an email leaked in the Sony hack the movie industry group further says it’s looking for pro-copyright scholars who they can cultivate for further public advocacy.
-
We talk a lot about how fair use is under attack these days, and I’ve discussed in the past my concerns about freedom of expression when we always have a company (or a few companies) standing in the middle of our decisions on whether or not we can speak. NiemanLabs has a great example of where this becomes problematic in a story about how SoundCloud will not even consider fair use in making decisions about whether or not to take down content, and how that’s harming journalism…
-
Every day thousand of Internet subscribers receive a piracy warning from their Internet provider. Increasingly, these notifications also include a settlement request ranging from $20 to hundreds of dollars. According to the Electronic Frontier Foundation, ISPs should protect their customers from these invasive tactics.
Permalink
Send this to a friend
05.03.15
Posted in News Roundup at 11:57 am by Dr. Roy Schestowitz

Contents
-
The specialised lab is focussed on extracting information from Apple devices using forensic softwares from devices such as iMAc, Mac book pro, iPad, iPhone and iPods as well as from Linux devices which are basically Android-based devices
-
The CBI says that training is being imparted in cracking these devices. We are also giving emphasis to Linux based systems as well.
-
CBI today got a new specialised forensic lab to decipher and recover data from Apple devices seized from suspects during investigation of cases.
-
-
Kernel Space
-
Graphics Stack
-
We’ve known since March that Mir 0.13 would be a very large release and it’s certainly panning out that way.
-
For anyone still using the ATI Rage 128 graphics card, there’s been a rare update to the xf86-video-r128 X.Org driver.
-
Bryce Harrington has delayed the Wayland/Weston 1.8 Alpha release by a few days.
-
Applications
-
-
-
Junio Hamano has ended out the month by releasing Git 2.4.0, the latest feature update to the popular distributed version control system.
-
GNOME 3.18 is shaping up to be another super exciting GNOME 3 update. Aside from GTK+ improvements, better Wayland support, and various other additions being worked on for GNOME 3.18, there’s also significant improvements planned for the Nautilus file manager.
-
Instructionals/Technical
-
Wine or Emulation
-
Wine 1.7.42 was released this morning as the latest bi-weekly Wine development release.
-
Games
-
One month after Godot 1.1 went into public beta, the release candidate of this open-source game engine is now available.
-
Valve Software today released the OpenVR SDK, an API and runtime that allows accessing virtual reality hardware from multiple vendors without requiring the applications be specifically targeting that platform.
-
Canabalt was originally released as a Flash game on developer Adam Saltsman’s website in 2009, and is the game that popularized the endless runner platformer genre. The game is now available on Steam for the first time, with a new engine and 8 new game modes.
-
Hero Siege is a good looking 2D hack ‘n’ slash RPG that recently released for Linux, I took a quick look so you know what to expect.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Now that KDE Plasma 5.3 was released this week, KDE developers are starting to plan out and work on the new material intended for KDE Plasma 5.4.
-
My name is Wolthera, I am 25, studied Game Design and currently studying Humanities, because I want to become a better game designer, and I hope to make games in the future as a job. I also draw comics, though nothing has been published yet.
[...]
After I played a lot with MyPaint, I heard from people that Krita 2.4 was the shit. When I went to the website at the time (which is the one before the one before the current) it just looked alien and strange, and worse: there was no Windows version, so I couldn’t even try it out. So I spent a few more years having fun with MyPaint alone, but eventually I got tired of its brush engine and wanted to try something more rough. When I checked Krita again, it had two things: a new, considerably more coherent website (the one before this one) and a Windows build. Around that time it was still super unstable and it didn’t work with my tablet. But MyPaint also had tablet problems, so I had no qualms about dual booting to Linux and trying it out there.
-
So, my project is titled: Better Tooling for Baloo. Let me begin by explaining what Baloo is. According to its wiki page it is “Baloo is a metadata and search framework by KDE.” What exactly does it mean? Baloo is responsible for providing full text search capabilities to KDE applications. It doesn’t end there it also provides searching on basis of metadata of various types of files. To acomplish this it indexes file contents and metadata using various plugins ,called extractors, to handle different types of files. It then exposes the data it has indexed with the help of various API’s. So thats a very high level view of how it works. Now, my project, as the title states will provide better tools for Baloo. These tools will mainly be:
-
GNOME Desktop/GTK
-
The GNOME Project is about to release the first development version towards the GNOME 3.18 desktop environment, due for release on October 23, 2015, and various package managers have started to update their projects with new features and improvements.
-
-
New Releases
-
Roberto J. Dohnert, the lead developer of Black Lab Linux and owner of Black Lab Software, announced the immediate availability for download and testing of the second and last Release Candidate (RC) version of the forthcoming Black Lab Enterprise Desktop 6.5 computer operating system based on Ubuntu.
-
-
Entroware introduced today, May 2, their first mini-PC called Aura and powered by Canonical’s recently released Ubuntu 15.04 (Vivid Vervet) computer operating system, or the popular Ubuntu MATE 15.04 flavor.
-
Robolinux is an open-source, Debian based operating system that permits the users to run Windows software inside a virtual machine, being among the first Windows compatible Linux systems (without having to use compatibility layers as Wine).
-
Screenshots/Screencasts
-
Red Hat Family
-
Fedora
-
Last week Fedora 22 beta was released for the primary architectures while out now are the spins for the alternative architectures: 64-bit ARM (AArch64) and POWER.
-
-
Events
-
OSCAL (Open Source Conference Albania) is the first annual international tech conference in Albania organized by the open source community in Albania to promote software freedom, open source software, free culture and open knowledge, a global movement that originally started more than 25 years ago.
-
-
Today, the Kolab Summit began. Georg Greve kicked things off by sharing the vision for Kolab this year (slides here).
-
Web Browsers
-
Mozilla
-
Today we take a closer look at the number one feature of the upcoming Mozilla Firefox 38.0 web browser, due for release on May 12, 2015, an all-new tab-based Preferences page that many other modern browsers already have for some time now.
-
Earlier this month I wrote about plans being drafted for Mozilla to deprecate non-secure HTTP support moving forward. Those plans have been firmed up and they announced their intent to phase out non-secure HTTP support.
-
BSD
-
The PC-BSD team is pleased to announce the availability of RC1 images for the upcoming quarterly 10.1.2 release.
Please test these images out and report any issues found on our bug tracker.
-
PC-BSD developers have worked out some May Day releases of the first release candidate to PC-BSD 10.1.2 and they’ve also released a new version of their custom Lumina Desktop.
-
While not a Linux kernel-based operating system, PC-BSD is one of the coolest and user-friendly BSD distributions around. The latest version, 10.1.2, is in the works, and PC-BSD development team just announced that the first Release Candidate (RC) version is now available for download and testing.
-
OpenBSD developers are celebrating May Day by releasing OpenBSD 5.7, as previously planned.
-
FSF/FSFE/GNU/SFLC
-
GNU Guix got 3 slots for the Google Summer of Code (GSoC), as part of GNU, which participates as an organization.
-
Openness/Sharing
-
-
Open Hardware
-
Arduino makers, developers and hobbyists that have been searching for a development board that is smaller than the Arduino Zero, are sure to be interested in the Neutrino that has been created by Rabid Prototypes.
-
Jon Wilson, Kevin Mackett, Bruno Freitas have created a new open source of retro gaming device called the KADE miniConsole+ that is open source and capable of allowing you to play retro games on a wide variety of platforms using your preferred game controller.
-
Defence/Police/Secrecy/Aggression
-
-
-
-
-
“I would not have it in the CIA. I would have it located in the Pentagon,” Kasich, a second-term Republican, said Friday during a moderated interview at the New America conference in Washington. “They’re not the target experts. The experts in targeting is the Pentagon, the Air Force. The CIA’s supposed to give us the intelligence to figure out whether the targeting makes sense.”
-
The New York Times reported across the top of Sunday’s front page that Congress is doing little to oversee the CIA’s targeted killing program. In the process, the paper identified three high-ranking CIA officials with key roles in secret drone operations.
The CIA asked the Times to withhold the names in its report, a request that executive editor Dean Baquet told The Huffington Post on Monday that he took seriously, but decided not to honor.
-
A wide-sweeping story on the CIA’s drone programme and its deep congressional support in Washington has made waves, after the New York Times named top officials linked with the operation – despite requests the agency that it not do so.
At the centre of the story was former counter-terrorism chief Michael D’Andrea. Mr D’Andrea, in addition to overseeing the growth of the drone programme, was also heavily influential in the creation of the agency’s detention and interrogation operations.
-
Vietnam unfurled a massive celebration on Thursday to mark the 40th anniversary of the end of its long war with the United States. Thousands of soldiers, sailors, police, firefighters and students marched through the streets of Ho Chi Minh City, formerly Saigon, brandishing flags and flowers. On the steps of Reunification Palace, once the grandiose home of South Vietnam’s U.S.-backed president, honors were bestowed on aging “heroes of the revolution.”
-
It was all a lie. North Vietnam never attacked the rights and freedoms of the American people. Its military actions were limited to their own country in an attempt to unify their country. And no, North Vietnam never had any interest — or even the financial or military means — in crossing the Pacific and invading, conquering, and occupying the United States.
-
In a new memoir Jamie Smith claims to have worked for the CIA and help found Blackwater. Even as CIA veterans question his tale, his publisher is doubling down.
-
With the United States struggling to find capable “moderate” rebel forces that it can support in Syria, Washington has secretly started backing brigades that fight alongside al-Qaeda groups against President Bashar al-Assad’s forces.
-
Hardline Islamists fighting side-by-side with groups backed by the United States have made gains in northern Syria in recent weeks while showing rare unity, which some fear may be short-lived.
An Islamist alliance calling itself Army of Fatah, a reference to the conquests that spread Islam across the Middle East from the seventh century, has seized northwestern towns including the provincial capital Idlib from government forces.
-
In 2013, President Obama tightened rules for drone strikes in order to reduce civilian casualties. NPR’s Audie Cornish talks to Wall Street Journal correspondent Adam Entous who learned that the president secretly waived the new rules for CIA operations in Pakistan.
-
Dolgov, the Foreign Ministry’s Special Representative on Human Rights, Democracy and the Rule of Law, tweeted Tuesday about Polish MEP Janusz Korwin-Mikke’s remarks that the Maidan snipers were trained in Poland:
“A Polish Member of European Parliament has acknowledged that the Maidan snipers were trained in Poland, and not in Russia. The truth is finding its way!”
-
-
Adam Entous has an important story in the Wall Street Journal tonight, one that I suspect will get a lot of attention Monday morning. It certainly should. He reports that a much-discussed May 2013 Presidential Policy Directive adopting various policy constraints for the use of lethal force outside areas of “active combat operations” also included a classified annex exempting CIA drone operations in Pakistan from at least one of those constraints. Specifically, it exempted CIA from the requirement that force be used in such places “only against a target that poses a continuing, imminent threat to U.S. persons.”
-
Transparency Reporting
-
A former CIA officer is disputing the U.S. government’s claims that a fellow CIA spy’s leak of an agency operation targeting Iran’s nuclear program did grave damage to U.S. national security.
-
Why should you be grateful to lying liar David Petraeus? The barely-there slap on the wrist he received for leaking classified information to his his mistress Paula Broadwell reveals how extreme the double standard of justice is for the handling of classified information.
-
On Friday, April 23, General David Petraeus, former Director of the CIA was fined $100,000 and given two years probation for leaking several ‘black books,’ containing important military information, to his biographer, Paula Broadwell with whom he was also having a relationship. The books included code word information, intelligence capabilities, war strategy and details of classified White House meetings.
Civil liberties organisations say his sentence is too lenient and amounts to a double standard when compared to the fate of whistle-blowers like Edward Snowden, Jeffery Sterling, John Kiriakou and Chelsea Manning.
-
The Obama administration is notoriously hardline on whistleblowers. CIA officer John Kiriakou revealed the CIA’s use of torture, and served two years’ jail, having been released in February. He remains the only person in the US government to be punished for the CIA’s illegal use of torture.
-
-
-
-
-
-
-
-
Former CIA Director David Petraeus was sentenced Thursday to two years probation for leaking highly classified information to a biographer with whom he was having a sexual relationship – exposing what attorneys for whistleblowers prosecuted by the Obama administration say is a glaring double standard.
The U.S. “clearly has a two-tiered justice system when it comes to classified information,” says Jesselyn Radack, a Government Accountability Project lawyer who has represented several people prosecuted during the administration’s crackdown on leaks by low-level officials. “If you’re a person in a position of power or you’re politically well connected, you can leak with impunity.”
Petraeus acknowledged last month in plea deal documents that he gave mistress Paula Broadwell – author of his biography, “All In” – access to eight “black books” that contained classified information from his time leading military efforts in Afghanistan, and that he then lied about it to the FBI.
-
It’s obvious that Petraeus only got this deal because of his position. If he had simply been a lower-ranking soldier – as evident by the prosecution of Manning, he would be facing decades in jail too. At least the whistleblowers were disclosing information for public interest, not just sharing secrets with their mistresses.
-
What makes the light sentence even more striking is that President Barack Obama’s Justice Department is notorious for hunting down leakers and whistleblowers and sending them to prison. Despite a fervent campaign from some quarters to equate them, Petraeus’ actions don’t rise to those of Chelsea (formerly Bradley) Manning or Edward Snowden. Manning, an army soldier who released material about the Iraq War, is serving 35 years in prison. Snowden, a system administrator who revealed how the National Security Agency was constantly collecting private data from cellphones and the Internet, fled America and is now living in Russia.
-
-
-
The McClatchy Washington Bureau’s coverage of the CIA interrogation program and ensuing Senate investigation earned accolades Monday, with three bureau reporters getting the nod as a finalist for the Pulitzer Prize for National Reporting.
-
The CIA Information Act of 1984 authorizes the Director of the Central Intelligence Agency to designate certain Agency records as “operational files.” Doing so makes them exempt not only from disclosure, but even from search and review under the Freedom of Information Act.
The 1984 Act also requires the Agency to perform a “decennial review” at least every ten years in order to determine whether any of the designated operational files exemptions can be rescinded, so that the affected files would become subject to a regular FOIA search and review.
The third such decennial review is now underway.
-
Finance
-
Like many other countries in the world, Thailand has been treated by the US as a market rather than as a sovereign country.
-
PR/AstroTurf/Lobbying
-
Rupert Murdoch berated journalists on his tabloid papers for not doing enough to stop Labour winning the general election and warned them that the future of the company depended on stopping Ed Miliband entering No 10.
-
United States documents show that the CIA paid a Chilean media mogul to smear President Salvador Allende in the run-up to the September 11, 1973, military coup in which Allende died, the country’s journalist union alleges.
On Tuesday, Chile’s National Journalists Association cited the documents in kicking out Agustín Edwards Eastman, the 87-year-old owner and columnist of El Mercurio, the country’s largest newspaper. His family’s media group owns dozens of papers, magazines and other outlets, making him one of the richest people in Chile.
-
After a whistleblower stepped forward, DHS’s inspector general looked into whether Mayorkas, former director of United States Citizenship and Immigration Services, gave special treatment to politically-connected applicants and exerted improper influence in the adjudication of the EB-5 program. A core part of the investigation looked into Mayorkas’ order reversing a decision denying funding of Sony movie projects. He’s also said to have handpicked a review board to review a separate series of Time Warner movie projects.
-
Censorship
-
There were a lot of bad days during the Cold War, but 54 years ago this weekend was one of the worst, at least for the United States. President John F. Kennedy sent an army of anti-Castro exiles backed by the CIA onto the beach at Cuba’s Bay of Pigs to suffer bloody, catastrophic defeat. It was “the beating of our lives,” the despondent Kennedy would say a few days later as he wondered aloud why nobody had talked him out of it.
-
Privacy
-
On a dark night in 1972, a special helicopter operated by the Central Intelligence Agency slipped into North Vietnam. The crew’s mission was to tap phones lines to key government buildings.
-
Merkel’s take on Ukraine and Russia is so completely at odds with reality and against the national interests of her own people, the question of just who is she serving comes to the fore. The recent industrial spying scandal on German companies carried out by the US — with German federal collusion — and the long-time surveillance of the chancellor’s personal life points to Merkel being a compromised leader. Or, in a word: bought.
-
Considering Facebook’s record regarding users’ privacy, the social network giant’s claims ring a little hollow.
-
-
The revelation, which was made by the Bosnadev-Code Factory, is reported to have come about accidentally. According to a Bosnadev blog post, a group of developers were attempting to test a new application that was being developed when they sent a link for the app via Facebook chat and noticed that the IP address was unusual, Sputnik News reported.
-
Most of the noise in the press and social media about the lenient sentencing of disgraced former four-star U.S. Army general and CIA director David Petraeus for revealing classified information to his biographer (and lover) has focused on the inequality of it all.
That issue is worthy of some noise. But there ought to be a lot more noise about how this case and others are evidence that government power, combined with our modern digital world, is eliminating personal privacy. That is going to have a much more profound effect on everybody in America than whether Petraeus spends time in prison.
-
-
Civil Rights
-
“Social media functioned as a sort of virtual riot gear,” Carpenter wrote—“manufacturing the narrative of violence in the digital realm as the police were escalating it on the ground.”
-
The defense for former CIA officer Jeffrey Sterling, who was convicted of violations of the Espionage Act and other offenses, has asked a court in Alexandria, Virginia, to “see” Sterling “not as a spy or a communist who committed espionage” but as someone who leaked information to a reporter.
Sterling’s defense requests that he be treated similarly to other leakers, who have been prosecuted like Stephen Kim, John Kiriakou and, most recently, David Petraeus. How the government has exaggerated the harm done by the leak he was convicted of committing is rebutted by a twenty-year CIA veteran as well.
-
A few years ago, David Petraeus, then the director of the Central Intelligence Agency, spoke out after a CIA officer was charged with disclosing sensitive government information.
“Oaths do matter,” he said, “and there are indeed consequences for those who believe they are above the laws that protect our fellow officers and enable American intelligence agencies to operate with the requisite degree of secrecy.”
At the time, Petraeus was fully aware that he was under investigation for providing classified information to his biographer, with whom he was having an affair. Evidently, the retired four-star Army general realized that people at his level don’t need to worry much about “consequences.”
-
The problem with the lenient treatment of former CIA Director, David Petraeus, isn’t that he was lightly punished for his leaks. It is that other whistleblowers are punished at all.
It’s a tale of two CIA employees. The first, Jeffrey Sterling, has just been convicted of leaking information about a bungled agency sortie to James Risen, a reporter. The operation took place almost 20 years ago, around the time everyone was doing the Macarena and Tom Cruise’s first Mission Impossible movie was released. Federal prosecutors are calling for a 24-year prison sentence for Sterling.
-
The problem with the lenient treatment of former CIA Director, David Petraeus, isn’t that he was lightly punished for his leaks. It is that other whistleblowers are punished at all.
It’s a tale of two CIA employees. The first, Jeffrey Sterling, has just been convicted of leaking information about a bungled agency sortie to James Risen, a reporter. The operation took place almost 20 years ago, around the time everyone was doing the Macarena and Tom Cruise’s first Mission Impossible movie was released. Federal prosecutors are calling for a 24-year prison sentence for Sterling.
-
A top manager at the Central Intelligence Agency who had been removed from his position for abusive behavior has been relocated to a senior position in the drone strike program, the Associated Press reports.
-
A top CIA manager who had been removed from his job last year for abusive management has been named to a senior role in the agency department that conducts drone strikes.
-
-
Former Romanian President Ion Iliescu allowed the Central Intelligence Agency (CIA) to operate torture sites within his country because he was the leader of a puppet state whose marching orders came from Washington, former CIA analyst Raymond McGovern told Sputnik.
-
-
-
A former Romanian president has acknowledged approving the CIA’s request for a site in Romania, but said he would have refused had he known how it would be used.
Ion Iliescu, president from 2000 to 2004, wrote on his blog on Monday that he believed Romania had hosted CIA “black sites” where prisoners were held and subjected to torture.
-
-
Ion Iliescu, president from 2000 to 2004, suggested he believed Romania had hosted CIA “black sites” – prisons outside the U.S. where suspected terrorists were held and subjected to harsh interrogation.
-
A former Romanian president has acknowledged approving the CIA’s request for a site in Romania, but said he would have refused had he known how it would be used.
Ion Iliescu, president from 2000 to 2004, suggested he believed Romania had hosted CIA “black sites” — prisons outside the U.S. where suspected terrorists were held and subjected to harsh interrogation.
-
-
Romania’s former President Ion Iliescu on Monday firmly denied that he had confirmed the existence of a CIA secret prison in his country in his recent interview given to a German magazine.
-
Romania’s former President Ion Iliescu on Monday said he has in no way confirmed the existence of an illegal CIA prison in Romania in an interview he has recently given to the German publication Der Spiegel.”I am unpleasantly surprised by the way in which my statements in a recent interview to German publication Der Spiegel are being reflected and especially commented on. I want to be as clear as possible: in no way have I confirmed the existence of an illegal CIA prison in Romania, a prison where illegal interrogation techniques such as torture would have been used. I was equally clear when I said that had I known the destination of the facility asked of us by the US I would have certainly taken a different decision. Knowing what I had approved, namely headquarters for a CIA representation office in Romania, justifies that fact that all these years I have denied the existence of any CIA prison in Romania. I am firmly rejecting the interpretation of my gesture, which is a natural one among partners and allies, would have been my bribing the US into NATO welcoming Romania in. So far as I remember, the approval was issued AFTER the November 2002 NATO Summit meeting in Prague decided to let Romania in the North Atlantic Treaty Organization,” Iliescu says in a post on his blog.
-
Pakistani police dropped a case that was recently registered against a former CIA station chief and a former agency lawyer over a 2009 drone strike that killed two people in a tribal region, police said Thursday.
-
-
The capital police on Thursday registered a murder case against former CIA station chief Jonathan Banks, who is currently heading the US agency’s counter terrorism programme in Langley, Virginia.
-
Newly released emails show a close relationship between the American Psychological Association and the psychologists who helped create the architecture of the CIA’s torture program.
One email between CIA psychologist Kirk Hubbard and an executive from the American Psychology Association, or APA, makes a thinly cloaked reference to the role in interrogations of the now-infamous CIA contractors James Mitchell and Bruce Jessen.
-
The leading American professional group for psychologists secretly worked with the Bush administration to help justify the post-9/11 US detainee torture program, according to a watchdog analysis released on Thursday.
-
The American Psychologists Association, the largest professional scientific organization of its kind, was secretly complicit in the adoption of torturous interrogation tactics used by the United States against detainees, a new report suggests.
A study released this week by noteable anti-torture critics reveals that an analysis of emails from the inbox of a deceased US government contractor demonstrates compliance on behalf of the APA with regards to the drafting of so-called enhanced interrogation techniques, or EITs, developed under President George W. Bush.
-
The American Psychological Association secretly collaborated with the administration of President George W. Bush to bolster a legal and ethical justification for the torture of prisoners swept up in the post-Sept. 11 war on terror, according to a new report by a group of dissident health professionals and human rights activists.
The report is the first to examine the association’s role in the interrogation program. It contends, using newly disclosed emails, that the group’s actions to keep psychologists involved in the interrogation program coincided closely with efforts by senior Bush administration officials to salvage the program after the public disclosure in 2004 of graphic photos of prisoner abuse by American military personnel at Abu Ghraib prison in Iraq.
“The A.P.A. secretly coordinated with officials from the C.I.A., White House and the Department of Defense to create an A.P.A. ethics policy on national security interrogations which comported with then-classified legal guidance authorizing the C.I.A. torture program,” the report’s authors conclude.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
The primary Law Enforcement Agency (LEA) of federal capital, Islamabad Police on Thursday dismissed the high profile case as discarding the First Information Report (FIR) registered Against Jonathan Banks was Central Investigation Agency (CIA) station chief in Islamabad.
-
Complying with the court orders, Islamabad police on Wednesday registered a case against former CIA station chief Islamabad Jonathan Banks over the death of three Pakistanis in a US drone strike in North Waziristan Agency (NWA) back in 2009 but immediately referred the matter to the concerned police station in NWA for registration of the same case and subsequent investigation over there, arguing the incident in question did not occur in its jurisdiction.
-
Police subsequently transferred the case to the Federally Administered Tribal Areas (Fata) Secretariat.
The case against Banks was registered at the Secretariat police station upon directions of the Islamabad High Court (IHC) last night.
-
The United States Congress continues to support the White House’s lethal drone program, Defense One reports. Despite the repeated killing of innocent civilians, including recently an American citizen, the controversial counterterrorism tactic is facing little public criticism or scrutiny from U.S. lawmakers.
-
When President Barack Obama created a new set of rules for Central Intelligence Agency (CIA) drone strikes in an effort to reduce the killing of innocent people, he exempted the agency’s operations in Pakistan from the new restrictions.
The Wall Street Journal has reported Obama “secretly approved a waiver” that gave the CIA “more flexibility in Pakistan than anywhere else to strike suspected militants.”
Under the 2013 rules the president created, the CIA was required to show that the proposed target of a drone strike represented “an imminent threat to the U.S.” This standard, however, was not imposed when it came to Pakistan.
-
If it looks like a terrorist from thousands of feet above, FIRE! Last year, of 41 people targeted by drones, 1,147 were killed. A ratio like that is not going to go a long way in winning over hearts and minds. With drones on the rise, it’s time to investigate if this sort of warfare actually works or is beneficial in the long run— a decidedly difficult task with so much of the US drone program shrouded in secrecy. Enjoy your Commander in Drone, like, share and check out the links behind the cartoon!
-
Last week, President Obama expressed regret for two western hostages held by Al Qaeda and accidentally killed in an “anti-terrorist operation.”
The deaths of these two men — American consultant Warren Weinstein and Italian aid worker Giovanni Lo Porto, both of whom had been held by Al Qaeda for several years — were indeed tragic.
It would be bad enough if they were the only innocent victims killed by the US in the war on terror. But they aren’t.
Over a thousand civilians – including dozens of Westerners – are among the thousands of people who have died in US drone strikes conducted outside its declared war zones of Iraq and Afghanistan, according to independent estimates.
-
Amnesty International on Tuesday accused President Barack Obama’s administration of granting “de facto amnesty” to people involved in a CIA program that detained and tortured militants captured after the Sept. 11 attacks on the United States.
The human rights group said that since the release in December of a Senate report on the use of what the Central Intelligence Agency called “enhanced interrogation techniques,” the administration had done nothing to end impunity for those who mistreated prisoners.
Amnesty researcher Naureen Shah said the administration was effectively granting immunity from prosecution by failing to thoroughly investigate conduct that came to light in the five-year investigation.
-
Amnesty International has strongly criticised the Obama administration’s silence in the wake of last year’s Senate torture report and has called on the US Department of Justice to reopen and expand its investigation into CIA interrogations.
In a 140-page report – Crimes and Impunity: full Senate Committee report on CIA secret detentions must be released – the organisation calls for the full version of the Senate Committee’s report to be published. The full version – some 13 times longer than the 500 page summary version published (with redactions) in December – remains unpublished and is instead still marked “Top Secret”.
-
Amnesty International released a report on April 21 (see PDF) criticizing the Obama administration’s silence in the wake of the Senate torture report, calling it de facto amnesty for those responsible for CIA torture. The government inaction following the December publication of the summary report on the CIA’s secret detention program is outlined in detail in the new report, Crimes and Impunity. The document also highlights the lack of accountability for enforced disappearance and the failure to recompense victims of the CIA’s programs.
-
More than four months after publication of the Senate Select Committee on Intelligence’s summary report on the secret detention program operated by the Central Intelligence Agency (CIA), the US administration has done nothing to end impunity for the torture and enforced disappearances committed in the program. Indeed, it has failed to meaningfully respond to the report in any way whatsoever.
-
The Amnesty International USA (AIUSA) cites these incidents in its campaign against tortures.
-
Amnesty International blasted the Obama administration on Tuesday for failing to act months after receiving a Senate report on the CIA’s secret interrogation techniques, saying that the silence constitutes de facto amnesty for torture.
-
“Rather than another reason to refight old arguments, I hope that today’s report can help us leave these techniques where they belong—in the past.” That was President Obama, last December, after the release of a Senate panel report on the CIA’s use of torture against terrorism detainees. Obama’s statement encapsulated both his confidence that the brutal interrogation techniques of the Bush era had been brought to an end by the executive order he issued banning them upon taking office, and his reluctance to probe more deeply into abuses that occurred or prosecute any of the offenders.
-
It has been more than four months since the Senate Intelligence Committee (SSCI) published the summary of its report on the secret detention program operated by the CIA after the 9/11 attacks. Yet today, the official record of what happened in the CIA’s “black sites” is still under wraps. The Committee’s full report sits gathering dust in secure facilities, with even the Justice Department failing apparently to read it, let alone act upon it.
-
Amnesty International has accused the Obama administration of continuing a policy of shielding people who tortured detainees at secret CIA sites from prosecution.
-
“Failure to end the impunity and ensure redress not only leaves the USA in serious violation of its international legal obligations, it increases the risk that history will repeat itself when a different president again deems the circumstances warrant resort to torture, enforced disappearance, abductions or other human rights violations,” the authors concluded.
-
DR SAM RAPHAEL wants to know if the flights which landed at Prestwick and Glasgow Airports violated Scottish law and if Holyrood or Westminster was aware of what was going on on board.
-
The investigation appears to have been very unorthodox and the details are still murky. The sheriff and his chief deputy’s testimony seemed to describe it as an attempt to expose alleged bank fraud, computer tampering and surveillance by the Central Intelligence Agency and DOJ.
-
In the long debate over torture, there remains only one instance when a CIA interrogator ever faced trial for torture – and he was convicted. That CIA contractor, David Passaro, is now speaking out in a new Retro Report documentary.
-
-
-
The analysis, which is summarised in our first quarterly report, reveals 101 of the detainees were held by the CIA for more than a month, and 47 of these for more than a year. All detainees were held without access to lawyers, their families or the International Committee of the Red Cross.
-
CIA whistleblower John Kiriakou, who exposed the treatment of al Qaeda suspects held in secret prisons, told the Bureau today it was now down to journalists to “tell the full story” about the intelligence agency’s torture programme because politicians did not have the will.
In a video interview on the last day of his house arrest recorded for the Bureau by film-maker Tarquin Ramsay, the former CIA counter-terrorism analyst called on the Senate Select Committee on Intelligence to release more details from its 6,000-page report on CIA torture completed last December.
-
A public lecture by Mark Fallon, expert in security and counterterrorism investigations and Chair of the US Government’s High Value Detainee Interrogation Group (HIG) Research Committee
-
It’s official, at least according to Chinese authorities: Officers for the People’s Liberation Army (PLA) did not kill several CIA agents sent to Macau and Hong Kong to assassinate NSA whistleblower Edward Snowden.
Wait, what?
Over the last year or so — it’s difficult to date the rumor’s exact beginning — a segment of the Chinese Internet has been trying to figure out why in March 2014 China’s military bestowed a top honor on a group of special forces soldiers stationed in Macau in peacetime. And so one of the more popular explanations is that this group of soldiers earned the honor by dispatching a group of CIA operatives sent to kill the world’s most famous whistleblower.
-
-
Since the US is clearly not pursuing prosecutions for the torture perpetrated by its citizens in Afghanistan, in detention centers such as Bagram or the CIA black site known as the “Salt Pit”, the US will face difficulties in demonstrating otherwise before the ICC. The Office of the Prosecutor of the ICC has already initiated the preliminary examination stage, using its proprio motu powers, with a view to opening a full formal investigation in the future. The examination phase includes allegations of crimes under the jurisdiction of the ICC committed by all parties to the conflict, including the Taliban and Afghan government forces as well as international forces. Regarding the US, the Office of the Prosecutor is currently focusing on torture and ill-treatment of conflict-related detainees by US armed forces between 2003 and 2008.
-
-
-
-
Oh, good. As if there was ever any doubt that the exposure of CIA torture was never going to result in anyone involved being held responsible, the current push to knock a former Senate staffer off her career path further confirms the government’s preference for shooting messengers.
-
Five months after the Senate Intelligence Committee released its gruesome report on the CIA’s post-9/11 torture program, someone is finally paying steep professional consequences. Except it’s not the former torturers. Or their superiors. Or even the CIA officials who improperly searched the computers that Senate investigators used to construct the study.
-
Senator Richard Burr (R-N.C.) is chairman of the Senate Select Committee on Intelligence, which oversees the CIA. He is also that agency’s most devoted lapdog in Congress. Since he failed to prevent the 2014 release of the Senate report on the CIA’s torture program, he’s been looking for some way to punish the people responsible for embarrassing his beloved cabal of incompetent torturers. And he seems to have found his victim.
-
Sen. Richard Burr of North Carolina, the Republican chairman of the Senate Intelligence Committee, declined on Wednesday to discuss whether during a closed-door hearing he called for a suspected terrorist to be killed.
But Burr, who took over the committee in January, said it was better to capture terrorists when possible.
-
According to the April 28 news story “N.C.’s Burr chided after terror report,” in 2013 Sen. Richard Burr wanted the CIA to find and kill a U.S. citizen, Muhanad Al Farekh.
One would think that a U.S. senator would believe in the rule of law and recognize that extrajudicial killing is illegal. He must know it is unlawful to target for killing persons who have not been accused and convicted of a crime. It violates International Human Rights Law and International Humanitarian Law. For a U.S. citizen, it also violates the U.S. Constitution, Amendment V.
-
China is being purged. An aggressive anti-corruption campaign that began after Xi Jinping became chief of the Chinese Communist Party in 2012 and the nation’s president the following year has shaken institutions from the army to the state television broadcaster. Hundreds of thousands of officials have already been detained. Unlike similar crackdowns of the past, the effort shows no signs of slowing.
“China’s anti-graft campaign has moved beyond setting warning examples to deter others,” said a 2014 year-end report from state press agency Xinhua. “The scale of the investigations, as well as new initiatives and legal reform, indicate that the country intends to fight a protracted war.”
Xi’s promise to eliminate both “tigers and flies” — the high-ranking officials who have stolen billions and the petty corruption that plagues everyday life — is genuinely popular among ordinary Chinese who saw graft worsen over the past decade. The president and his allies fear that corruption could lead to the overthrow of the Party itself if left unchecked. But while cleaning up, Xi also seems to be cleaning house, eliminating the power networks of former or potential rivals while preserving his own power bases.
Permalink
Send this to a friend
05.02.15
Posted in News Roundup at 7:41 pm by Dr. Roy Schestowitz

Contents
-
The Central Bureau of Investigation has got a new specialized forensic lab to decipher and recover data from Apple devices seized from suspects during investigation of cases. The new lab, inaugurated at the CBI academy in Ghaziabad, will be fully equipped with latest workstations and software to decode the digital information stored in Apple devices, said sources.
-
One of the areas I’m currently working on is what Google calls Lucid Sleep, which is basically the ability of performing work while the machine is in a low power state such as suspend. I’m writing this blog post because there has been interest on this in different communities and the discussion is currently a bit dispersed.
-
Much as I hate to admit it, sometimes I still have to turn to Mac OS X or Windows to do things my Linux box can’t do. None of this is due to any limitations of Linux as a platform. The problem lies with software developers and content providers.
-
At the Linux Foundation we focus many of our programs on personalizing and connecting the talented network of Linux developers and users in all corners of the globe. Everyday we are witness to the Linux community innovating irrespective of geographic boundary; that is why this week we were moved by an email we received from one of our community asking for help.
-
Desktop
-
Chrome OS devices have proven to be quite popular with Chromebooks, Chromeboxes and Chromecast devices all regularly showing up in Amazon’s various bestseller lists, and also getting good ratings and reviews by the people who have bought them.
-
Kernel Space
-
Immediately after announcing the first point release of Linux kernel 4.0, Greg Kroah-Hartman has informed us about the immediate availability of the Linux 3.19.6 kernel, a maintenance version that brings updated drivers and fixes bugs discovered in Linux kernel 3.19.5.
-
Applications
-
Kodi, a media player and entertainment hub that was named XBMC until a few months ago, has been upgraded to version 15.0 Beta 1 and is now ready for download and testing.
-
A new minor release 5.100.1 of Armadillo was released by Conrad yesterday. Armadillo is a powerful and expressive C++ template library for linear algebra aiming towards a good balance between speed and ease of use with a syntax deliberately close to a Matlab.
-
Instructionals/Technical
-
Games
-
Wine developers have announced that a new version of their application has been released, bringing a few new features and various improvements for Windows apps and games, including one for Hearthstone from Blizzard.
-
SuperTuxKart is a free 3D kart racing game, similar to Mario Kart, with a focus on having fun over realism. The characters in the game are the mascots of free and open source projects, except for Nolok, who does not represent a particular open source project, but was created by the SuperTux Game Team as the enemy of Tux.
-
Savage Lands is an interesting take on the survival genre with a fantasy setting, so I took a look so you know what to expect.
-
For fans of the board game ‘Risk’ you may want to try out Lux Delux which is now available on Steam for Linux.
-
Today I had the pleasure of speaking to Aaron, the one man porting machine from Knockout Games. If you don’t recognise the name, you may recognise the porting work in Shadow Warrior (the new one), Outland and more!
-
It’s that time of the month again Linux gamers! The new GOL survey for May is now available, so please make sure to fill it in if you have the time.
-
With the news of a Game of the Year edition to come for Shadow of Mordor, it looks like the time is ripe for a Linux release. We already know it’s coming, and it’s started appearing in people’s Steam library too in the last day.
-
Banished is a highly rated city-builder from Shining Rock Software that is coming to Linux, and the developer has a new blog post detailing how it’s going.
-
Desktop Environments/WMs
-
GNOME Desktop/GTK
-
-
Before getting our hands into works, we needed mockups. Good ones, since we’re dealing with the most expected feature. And here he came to save the day again, the all mighty Allan Day. And his work was amazing:
-
This summer, I’m about to start a great learning experience. I’ll be busy as a bee working on GNOME’s IRC client, Polari.
-
My project will be aimed at making gedit better suited for programmers – giving them better messages and warning regarding their code (in the editor). It consists of making a static code analysis plugin for gedit using coala-analyzer. I will be mentored by Lasse Schuirmann (blog), and co-mentored by Mischa Krüger.
-
-
New Releases
-
Robolinux, an easy-to-use Linux distribution based on Debian that features various flavors and that allows its users to run Windows apps via a virtual machine solution, has been upgraded to version 7.9.1 and is now ready for download.
-
Red Hat Family
-
Fedora
-
The Fedora booth was extra fun this year. As well as the OLPC XO systems we usually have there (which always do a great job of attracting attention), Brian Monroe set up a whole music recording system running out of a Fedora laptop, with a couple of guitars, bass, keyboard, and even a little all-in-one electronic drum…thing. He had multitrack recording via Ardour and guitar effects from Guitarix. This was a great way to show off the capabilities of Fedora Jam, and was very popular all weekend – sometimes it seemed like every third person who came by was ready to crank out a few guitar chords, and we had several bass players and drummers too. I spent a lot of time away from the booth, but even when I was there we had pretty much a full band going quite often.
-
The Fedora 22 Beta release for aarch64 and POWER secondary architecutres has arrived, with a preview of the latest free and open source technology under development. Take a peek inside!
-
Debian Family
-
Common Lisp users are very happy to use Quicklisp when it comes to downloading and maintaining dependencies between their own code and the librairies it is using.
-
Hi everyone! As you might know Qt4 has been deprecated (in the sense “you better start to port your code”) since Qt5′s first release in December 19th 2012. Since that point on Qt4 received only bugfixes. Upstream is about to release the last point release, 4.8.7. This means that only severe bugs like security ones will get a chance to get solved.
-
Derivatives
-
Canonical/Ubuntu
-
Canonical and the hard working people behind the Ubuntu development team announced the dates for the upcoming Ubuntu Online Summit event where they will reveal the plans for Ubuntu 15.10, due for release in October 2015.
-
Ebuyer, an eCommerce hardware retailer, has announced the launch of AMD-based HP laptops powered by Ubuntu and certified to run with this operating system by Canonical.
-
A security flaw in a common Unix software component remains unpatched in one of the most popular Linux distributions, more than a year after an official fix was published.
-
Ubuntu’s latest edition contains a local access escalation flaw first reported a year ago that allows users to tinker with the system clock to become a root user.
-
Flavours and Variants
-
Kubuntu 15.04 has recently been released with quite a bit of fanfare. It introduces the visually apealing Plasma 5 along with many application upgrades.
While I am a huge fan of Kubuntu, KDE, and the slick look of Plasma 5, I will give a few reasons while you might want to wait just a little longer before you decide to upgrade.
Before I begin, I just want to reiterate how much I love Kubuntu and KDE. I have been using Kubuntu for 10 years now. Sadly, this will be the first time in that span that I wait an extra 6 months before I upgrade. After using Kubuntu 15.04 for the week, last night I decided to redo my desktop and go back to version 14.10 (I will continue to use 15.04 on my laptop thought).
-
-
Diamond’s “Aries” is a Linux-friendly, Atom E3800 based PC/104-Plus SBC for data acquisition, featuring SATA, mSATA, mini-PCIe, and -40 to 85°C support.
-
Phones
-
Android
-
-
-
Non-game Android apps are normally written in Java, but a group inside Google is experimenting with a whole new way of writing Android apps using Dart, Google’s in-house Web development language. It’s Android apps with no Java, a focus on speed, and deep integration with the Web.
-
Okay, so maybe we were a little premature with our bright outlook last time around.
After a remarkably sunny start, April turned into a bit of a chilly wash-out.
It didn’t matter too much, as it turned out. Not if you had an Android phone with you, at least.
-
Last night we saw Android 5.1.1 Lollipop factory images made available for the Nexus 7 WiFi (2013 and 2012) as well as Nexus 10. But strangely missing from that group was the more recently launched Nexus 9 which, as it turns out, has yet to receive even the initial 5.1 update.
-
-
-
Android: VLC has slowly but surely been working to become as well-known for its Android app as it is for the desktop version. It’s taken another step in that direction with background playback for videos on Android.
-
Almost exactly one month ago, Android Studio 1.2 was given the go-ahead to begin beta testing. It gained an unprecedented set of new features as a result of upgrading to IntelliJ 14.1, and even the Canary builds remained perfectly usable despite a few small bugs. After weeks of poking, prodding, and fixing any bugs that turn up, the Android Tools team has decided v1.2 is ready to go out to all developers through the Stable channel.
-
The live streaming wars are well underway and Meerkat has today claimed a victory over Twitter’s Periscope app; it’s the first to be available on Android.
-
-
-
-
Live video streaming app Meerkat beat Twitter’s own Periscope to market on iOS, and now it’s available on Android for all, with no Periscope app for Google’s mobile OS to be seen. The Meerkat app for Android carries a “Beta” label, as did a previous version that was locked down only to a select group of invitees, but it doesn’t appear to have that many limitations in terms of device options, and the core feature list is fairly complete relative to the iOS version.
-
-
-
We resurrected our recurring series on great Android apps that offer cool features iPhone users can’t have, and it was one of our most popular posts of the week. We read you loud and clear, Android fans, and you can now expect to see new posts in this series published about once per week.
-
Most note-takers assume they have three basic choices. They can go retro and scribble out observations with pen and paper. They can take notes on a smartphone or tablet. Or they can lug around a laptop and pound on the keys to create a written record.
-
The best thing about shopping around for a new Android phone is the dozens of choices you’re presented with.
Android phones come in all different sizes and styles, and dozens of companies from Motorola to LG and Samsung are putting out new phones each year.
But with all that choice, it can be difficult to come down to a final decision.
-
HashiCorp, the vendor behind popular Vagrant developer tool, makes a big jump into security with the open-source Vault project.
Open-source software vendor HashiCorp is getting into the security business with the initial release of the Vault project. HashiCorp is best known for its DevOps tools, particularly its widely used open-source Vagrant application that enables developers to reproduce developer environments easily.
-
Web Browsers
-
Mozilla
-
Mozilla has announced that it will finally deprecate the support for non-secure HTTP, and they are currently putting a plan in motion. Unfortunately, there is no timetable for this action, but it’s likely that will take a long time.
-
Oracle/Java/LibreOffice
-
Schulz said this discussion would probably take a while, so a decision won’t be made quickly. Those wishing to join in could probably start at his post.
-
FSF/FSFE/GNU/SFLC
-
This week I had a chance to add a NeuG, a True Random Number Generator, to the Free Software Foundation network. The NeuG exclusively uses free software and was developed in Japan by NIIBE Yutaka. A random number generator (RNG) is a device used to generate random numbers for computers. Without getting into a philosophical argument, we humans tend to take the concept of entropy (randomness) for granted. If we wish to produce random data, we simply do so. Computers, on the other hand, do as we tell them to do. They follow a set of instructions provided by a programmer and follow each instruction precisely. So there is no way to ask a computer to give us a random number because we would have to tell the computer in advance what the number is. There are some ways around this. For example, we could use a system’s current timestamp as a seed, or starting point, for producing random-seeming numbers by using an algorithm. This approach will create the illusion of entropy, but if someone else knows both the timestamp used for the seed and the algorithm used to generate the random numbers, the sequence of the random number generator can be calculated and predicted.
-
Project Releases
-
-
We are thrilled to announce today that the final version of the uGet 2.0 download manager has been released for GNU/Linux operating systems, available for download right now for Ubuntu, Debian, and Fedora-based distributions.
-
Openness/Sharing
-
The idea behind Charleston Open Source isn’t about competition for technology talent, even though the employers involved in it might be looking for workers with similar skills and backgrounds.
The new group, which made its debut Wednesday at the annual Dig South tech event, aims to do a couple of things: tell people about working in Charleston and recruit new employees, said Claire Gibbons, spokeswoman for the Charleston Regional Development Alliance, which markets the tri-county area to businesses.
-
-
Standards/Consortia
-
On 22nd of April 2015, I got an opportunity to attend W3C India Community Meet-up held in the CDAC office based in Mumbai. People from all over India and of different domains came Mumbai to participate in the event. Organised by W3C India, the event was of interactive in nature. The whole day event was divided in two parts – the first one was concentrated on ‘Digital Publishing in India – Next Steps’. ‘Web Payments landscape in India’ was the topic for second session. In the CDAC’s Juhu based beautiful office, the event was very much engaging and interactive.
-
Science
-
In addition to the well-known challenge in supercomputing — China’s Tianhe-2 supercomputer has won top ranking for three years running — MIT researchers looked at 15 different fields and highlighted the potential benefits of increased federal support for research in each area. “Investing in basic research has always paid off over time,” Kastner said. “And even if the future payoffs are not as large, there is no doubt that we will suffer if we do not keep up with those nations that are now making bigger investments than we are.”
-
Security
-
Defence/Police/Secrecy/Aggression
-
If the US military base in Okinawa is relocated to Henoko, the habitat of the endangered Okinawa dugong sea mammal, will be wiped off the map, said Peter Galvin of the Center for Biological diversity. The species is already down to a few dozen, he added.
-
The headline on the Associated Press story is unambiguous: “AP Poll: Americans approve of drone strikes on terrorists.” And that’s true! According to the AP’s poll, 60 percent of Americans support the use of drones to “target and kill people belonging to terrorist groups like al-Qaida.”
The problem is the U.S. drone program does much more than kill members of al-Qaida: it also kills a significant number of civilians, and drone operators often don’t even know exactly whom they’re targeting. So the AP’s own poll doesn’t show, as the story claims, “broad support among the U.S. public for a targeted killing program begun under President George W. Bush and expanded dramatically under Obama.” What it does show is broad support for a drone program that doesn’t exist.
-
The shroud of government secrecy prevents meaningful congressional oversight over the executive branch and military. In addition, the secrecy associated with drones also prevents public discussion. Because of the lack of “boots on the ground,” the American public isn’t invested in drone strikes; the average American doesn’t know that the United States kills people everywhere from Pakistan to Yemen. Few Americans mention the “Pakistani War” — although the implications of American violence is just as important in Pakistan as it was in Iraq and Afghanistan. Drones let the United States kill people without the American public caring.
-
That makes eight American citizens who have been killed by drone strike during the Obama presidency. Weinstein isn’t even the first innocent killed by mistake — that was the 16-year-old Abdulrahman al-Awlaki, son of Anwar al-Awlaki, the American al Qaeda propagandist and the only one of the eight who was killed deliberately. Obama did not even address Abdulrahman’s extrajudicial killing, though former Press Secretary Robert Gibbs suggested he “should have had a more responsible father.”
-
Since drones have been employed to kill terror suspects overseas, at least eight Americans have died in such attacks, seven during the Obama administration. Only one was specifically targeted, according to the U.S. government.
-
American politicians and pundits genuflect to the theory of exceptionalism, which holds that the U.S. can do pretty much whatever it wants, but this lawlessness – best exemplified by drones raining down death on “terrorists” and civilians alike – makes more enemies than it kills, writes Marjorie Cohn.
-
If Americans were still under the impression that drone warfare doesn’t pose risks to our national security, new revelations about the accidental killing of U.S. citizen and aid worker Warren Weinstein in a January drone strike over Pakistan should quickly end those delusions.
President Obama properly has said that he accepts full responsibility for the death of Mr. Weinstein — a hostage of al-Qaeda — and that Americans deserve to know why he was mistakenly killed. But taking responsibility should mean more than apologizing for civilian deaths, American and foreign, after the fact.
-
People in Pakistan who live under the threat of U.S. drone strikes see a double standard at work in Washington.
Last week, President Barack Obama took the unusual step of acknowledging and apologizing for a highly secret US drone strike that accidentally killed an American and an Italian aid worker held captive by al Qaeda in Pakistan. The US government said their families would be compensated.
-
When Hamas sends a rocket into an Israeli city, it’s labeled terrorism and deplored by all. A terrorist bomber in Boston receives a huge press following when he goes to trial for killing people during the Boston Marathon. That’s terrorism. When President Obama orders “Team CIA” to take out a target, it’s also terrorism. Historically, there has never been a drone strike where innocents were not killed. Maybe the administration feels that some lives are of little importance since they live in the Third World.
-
Last week President Obama publicly apologized for the deaths of two Western hostages – one American and one Italian – killed accidentally by a U.S. drone attack on an al Qaeda camp in mid-January, somewhere in Pakistan. The widely publicized apology was heartening and disappointing at the same time. While American drones have so far killed thousands of innocent civilians and a handful of terrorists since 2004, the apology was disappointingly selective.
-
Instead of using drones to combat men who kidnap aid workers, let’s support local movements that seek to prevent the men from taking such actions in the first place.
-
The controversy over the CIA’s secret drone programme went from bad to worse last week. We now know that many of those running it are the same people who headed the CIA’s torture programme, the spy agency can bomb people unilaterally without the US president’s explicit approval and that the government is keeping the entire programme classified explicitly to prevent a federal court from ruling it illegal. And worst of all, Congress is perfectly fine with it .
-
-
Last week, US President Barack Obama acknowledged and apologised for a highly secretive drone strike that accidentally killed an American and Italian aid worker held captive by al Qaeda in Pakistan.
-
Earlier this year, American drones equipped with heat sensors spent hundreds of hours scrutinizing a house in Pakistan’s remote tribal areas. But despite the technology and time, the unmanned aircraft could only “see” so much before one finally attacked the house in January.
“They thought there were four militants in the house, and the heat sensors only showed four militants,” says Reuters investigative reporter David Rohde. “After the strike occurred, they watched the house, and I guess the CIA operators were stunned to see them pull out six bodies.”
The two unexpected bodies were those of American aid worker Warren Weinstein and his fellow captive, Italian Giovanni Lo Porto. Both were being held by al-Qaeda, and analysts now think the two captives might have been hidden in a basement or some sort of underground tunnel.
-
The recent announcement by President Obama that the Central Intelligence Agency accidentally killed two hostages, an American and an Italian, in a drone strike carried out in mid-January on a Taliban compound in Pakistan’s remote tribal region where they were being held captive has caused a firestorm of controversy vis a vis the CIA’s murky drone campaign. Critics have cited the fact that the CIA fired on the compound where the hostages were being held, seemingly without knowing exactly who was inside it, as evidence that the program is indiscriminate and creates widespread “collateral damage” among civilian bystanders. Lost in the furor is an objective analysis of who is actually being killed in the covert drone campaign and what sort of intelligence and tactics/weapons are being deployed by the CIA and Joint Special Operations Command in drone operations. Instead, anti-drone voices seem to dominate the debate with wild claims that the majority of those who are killed by the drones are innocent civilian bystanders.
-
Why has a Pakistani judge recently filed criminal charges against a former top CIA lawyer who oversaw its drone program and a former station chief in Islamabad over a 2009 strike that killed two people? The Islamabad High Court ruled CIA officials must face charges including murder, conspiracy, waging war against Pakistan and terrorism.
-
Despite admitting to killing three American citizens, at least one of whom was absolutely innocent and the victim of a drone strike, President Obama has no intention of dialing back on the deadly attacks that are the prime tactic in the “War on Terror.”
-
There’s a reason for the recent dearth of news about drone strikes: There are far fewer of them now.
-
America is waging a war. And, for the most part, Americans are in the dark about it. We hear about it only on rare occasions, usually when the government chooses to let us know of a spectacular victory or when a tragic error forces authorities to break their silence.
That happened when President Obama expressed regrets for the killings of two aid workers, one an American and the other an Italian. They were killed in Pakistan in January when a missile from a CIA drone came crashing through the roof. Warren Weinstein, the American, and Giovanni Lo Port, the Italian, were al Qaeda hostages. The CIA did not know they were in the building. President Obama told reporters, “I profoundly regret what happened. On behalf of the United States government I offer our deepest apologies to their families.”
-
The program is secret, lawless, and unaccountable to Congress, the Supreme Court, and the American people.
-
Conditions at an African base used by U.S. military pilots flying missions over Yemen and Somalia have become chronically dangerous, with fliers relying on local air-traffic controllers who sleep on the job and commit frequent errors, the Washington Post reported on Thursday.
-
A published report says aircraft at the U.S. military base in Djibouti are often placed in danger because of hostile or lax civilian air traffic controllers who oversee the camp’s runways.
-
The debate over America’s use of drones to kill its own citizens has never been as intense. Last week in an unprecedented announcement, President Barack Obama admitted that CIA drones had killed three Americans in Pakistan in January, including al Qaeda hostage and aid worker Warren Weinstein.
It is not just Americans who have been killed. As new research by the Bureau shows, Weinstein is one of at least 38 Westerners to have been killed in the US’s covert drone war on terror. Citizens of some of America’s closest allies – the UK, Germany, Australia and Canada among them – are among the dead.
-
From signature strikes in Pakistan to police violence in Baltimore, the state is seemingly uninterested in even counting how many people it kills.
-
They then moved on to the drone strikes and how Judge Napolitano thinks all Presidents of the United States should be charged with war crimes if an American is killed by a drone strike.
-
-
Thomas Cromwell was the principal behind-the-scenes fixer for much of the reign of King Henry VIII. He engineered the interrogations, convictions, and executions of many whom Henry needed out of the way, including his two predecessors as fixer and even the king’s second wife, Queen Anne.
-
For all the macho posturing of the late Chris Kyle, gunned down at a shooting range by a PTSD-afflicted veteran, his prolific killing has nothing on the death and destruction rained from above by those who carry out US drone strikes in the Middle East. For all intents and purposes, former drone operator Brandon Bryant has Kyle beat by a long shot. According to Bryant, over 1,600 deaths were dealt by him through the technological terror that patrolled the skies of the Middle East for the past decade. Unlike Kyle, though, Bryant isn’t flaunting his skill as a State-sanctioned murderer: he regrets it. For six years, he flew the missions on orders from on high. Now he’s retired from it and is speaking out. Bryant was diagnosed with PTSD shortly after leaving the program, odd only because normal diagnoses involve situations of prolonged mortal terror. Air Force psychologists have referred to conditions similar to Bryant’s as “existential conflict”, or “moral injury”.
-
Militarily, killing people in foreign nations without Congress’ declaration of war or authorization of force violates the Constitution and Law of Nations. Using drones makes matters worse for diplomacy considering the secretive and distant approach to such unlawful intrusions. Controlling this, however, is difficult because the people have virtually no power in these matters. Perhaps Congress can – not a promising thought.
-
Every weapons system, from the bow and arrow to the intercontinental ballistic missile, sometimes kills the wrong people. So why has the revelation that a U.S. drone strike accidentally killed two al-Qaida hostages — a U.S. citizen and an Italian aid worker — created such a storm of drone “rethinking”?
Part of the answer is that liberal critics of drone strikes, who’ve questioned their legality, are using the opportunity to repeat and reframe their criticisms. I’ve joined in some of that criticism in the past and stand by it.
-
According to a 2013 study, while most Americans approve drone strikes targeting high-level terrorist targets, they disapprove that recourse when there is the possibility of civilian deaths. In short, most Americans would disapprove the current use of drones if it were ever properly aired.
-
The American hostage died in a “signature” drone strike. Those strikes should end.
-
Drone strikes, by their nature, are bound to kill innocent civilians. It is all too easy to ignore this ugly fact – and the dubious morality of the whole enterprise – until the unfortunate victims happen to be Westerners.
-
The hostages were aid workers who had been kidnapped several years ago, one of them a 72-year-old man from Maryland who was working as a contractor for the U.S. Agency for International Development and had been captured in 2011, and the other being a 39-year-old Italian man who was captured in 2012, according to a McClatchy report.
[...]
The paper pointed out that of nine Americans that have been killed by drone strikes since 2002, only one was actually a target. Although no hostages have ever been killed by a drone strike until now, unintended victims are not a new phenomenon, the paper wrote.
-
In 2013 David Rohde of Reuters reported that “Drone strikes do kill senior militants at times, but using them excessively and keeping them secret sows anti-Americanism that jihadists use as a recruiting tool.” As discussion continued over “How Drones Create More Terrorists,” Hassan Abbas remarked that in targeted areas, “Public outrage against drone strikes circuitously empowers terrorists.”
-
As independent Senator Bernie Sanders of Vermont announces his bid for the Democratic presidential nomination, we continue our conversation with former presidential candidate Ralph Nader, author of the new book, “Return to Sender: Unanswered Letters to the President, 2001-2015.”
-
In these early stages of the 2016 presidential election cycle in the United States, the race to proclaim America’s place at the zenith of “exceptionalism” among the nations of the world has only just begun.
-
At this point, the U.S. continues to refuse to recognize the impact of its drone program on civilian populations. But, at the very least, it should not export to other countries the secretive and possibly illegal model of drone warfare that it is using in Yemen.
-
But what if the basic premise behind so-called “decapitation programs” (attacks that target the leaders of an organization) is wrong? What if drone attacks or other forms of targeted assassination using special operations hit teams leads to more terror attacks on civilians?
-
Whether opponents realize it or not, weapon autonomy — to include the choice to kill — will win, and in some cases has already won, the drone debate. The false wall in the public’s understanding between “drones” and existing weapons is publicly cracking. Before long, military necessity will take over. In fact, it already has.
-
Before 2001 the U.S. had long pursued policies that supported a range of unpopular Middle East dictatorships.The spectrum ran from the Saudi Monarchy with its fanatical fundamentalist worldview to more secular dictatorships such as the one in Egypt. This practice identified us in the popular mind with bad people and bad governments and made us the enemy of those seeking liberty and democracy. In addition, we supported the Israeli oppression of the Palestinians and that made us unpopular with, among others, almost every Muslim on the planet. None of this was in the America’s genuine national interest but it certainly was in the interest of special interests such as Zionists, oil companies and arms manufacturers.
-
American exceptionalism reflects the belief that Americans are somehow better than everyone else. This view reared its head after the 2013 leak of a Department of Justice White Paper that describes circumstances under which the President can order the targeted killing of U.S. citizens. There had been little public concern in this country about drone strikes that killed people in other countries. But when it was revealed that U.S. citizens could be targeted, Americans were outraged. This motivated Senator Rand Paul to launch his 13-hour filibuster of John Brennan’s nomination for CIA director.
-
The question is not why people are outraged by the killing of Chan and Sukumaran, but why aren’t people outraged more often about other injustices and unjustified killings?
-
Many Australians are understandably appalled by the brutal and pointless executions of Andrew Chan and Myuran Sukumaran. The death penalty looks anachronistic and ineffective at the best of times, but to kill two people who had clearly made the most of their long periods of incarceration to transform themselves and make amends for their actions looks gratuitous and cruel.
-
-
-
It was 40 years ago today, April 30, 1975, that the Vietnam War ended with the fall of Saigon, today known as Ho Chi Minh City. North Vietnamese tanks smashed through the gates of the presidential palace in the South Vietnamese capital, and Communist soldiers hoisted their flag atop the building. Meanwhile, March marked the 50th anniversary of the first teach-in against the Vietnam War called “End the War Against the Planet.” The 1965 event brought together professors and activists at the University of Michigan to discuss what they called the truths and mistruths of the U.S. government’s involvement in the Vietnam War. Our guest, Tom Hayden, was there and brought with him a long history of antiwar activism. He was one of the founders of Students for a Democratic Society, and in 1962 he was the principal author of the Port Huron Statement, considered a seminal document of the New Left. As many of this year’s events marking the end of the Vietnam War are being organized by the Pentagon, this Friday and Saturday Hayden other longtime antiwar activists will join youth organizers for a conference in Washington, D.C., called “Vietnam: The Power of Protest. Telling the Truth. Learning the Lessons.”
-
After decades of struggle against French and U.S. intervention, Vietnam was finally independent and at peace.
-
As the war on terror nears its 14th anniversary — a war we seem to be losing, given jihadist advances in Iraq, Syria, and Yemen — the U.S. sticks stolidly to its strategy of “high-value targeting,” our preferred euphemism for assassination. Secretary of State John Kerry has proudly cited the elimination of “fifty percent” of the Islamic State’s “top commanders” as a recent indication of progress. Abu Bakr al-Baghdadi himself, “Caliph” of the Islamic State, was reportedly seriously wounded in a March airstrike and thereby removed from day-to-day control of the organization. In January, as the White House belatedly admitted, a strike targeting al-Qaeda leadership in Pakistan also managed to kill an American, Warren Weinstein, and his fellow hostage, Giovanni Lo Porto.
-
No one can claim that plotting assassination is new to Washington or that, in the past, American leaders and the CIA didn’t aim high: the Congo’s Patrice Lumumba, Cuba’s Fidel Castro, the Dominican Republic’s Rafael Trujillo. The difference was that, in those days, the idea of assassinating a foreign leader, or anyone abroad, had a certain element of the taboo attached to it. Whatever they knew, presidents preferred not to be officially involved. The phrase of the era was “plausible deniability.” Top officials, including presidents, might approve assassination plots, but they didn’t brag about them.
-
Story 2: David Petraeus, former hotshot media-darling general of the Bush and early Obama years, received a slap on the wrist — probation plus a $100,000 fine — for improperly passing on classified military documents to unauthorized people and lying about it to federal agents when they questioned him about it.
Here we go again: more proof that, in the American justice system some people fly first-class while the rest of us go coach.
-
-
The simply named Norwegian documentary Drone takes a serious and unflinching look at one of the things that truly changed the face of warfare: unmanned aerial devices, or, as they’re more commonly known, drones. It should go without saying that director Tonje Hessen Schei isn’t a fan. Ask the average person about drones, and you’ll probably get some mixed feelings on their use and the morality of using machines to rain fire on people by pilots who are safely ensconced in bunkers several thousand miles away. Schei wants to make the case that not only is drone warfare immoral, but it’s another example of how we’re letting technology outpace the legal and ethical framework to govern their use.
-
When the U.S. invaded Iraq, a group of concerned Chelsea residents gathered at the corner of Eighth Ave. and W. 24th St. to protest the military action. Ten years later, Chelsea Neighbors United to End the War continues their weekly protest. Known as Chelsea Stands Up Against the War, it takes place every Tues. from 6–7 p.m. as the group holds banners, hands out newsletters and tells passers-by why war is ruining our country.
“After the invasion of Iraq, a few of us said, ‘This is awful, we need to do something to speak out,’ ” recalled longtime member Bob Martin. “We got together for coffee at Paradise, and that’s when the idea of our weekly ‘stand-up’ started.”
-
The botched drone strike resulting in the death of two foreign hostages has once again brought the controversial nature of this tactic to the forefront. It is very sad that the death of two US men in a drone attack made headlines but other civilian deaths were swept under the carpet by describing them as collateral damage. The US does not realize the cost of these drone strikes and the resultant civilian causalities. These drone attacks are fueling the fire of radicalism in the Muslim world. Washington on and off expresses concern over the growing anti-America sentiments in the Muslim world but fails to identify the factors that lead to such a situation.
-
In 1997 Jody Williams won the Nobel Peace Prize for her work with the International Campaign to Ban Landmines. In 2013 she helped launch the Campaign to Stop Killer Robots. “Who is accountable? Is it the man who programmed it? Is it Lockheed Martin, who built it?” Williams asks in an interview at The Hague, where she has joined 1,000 female peace activists gathered to mark the founding of the Women’s International League for Peace and Freedom. Williams notes how some “spider-like” robots that spray tear gas are now used for crowd control, but could be stopped before they become widespread. She recalls how she was previously able to “force the governments of the world to come together and discuss [landmines]. They thought they would fly under the radar … A small group of people can and do change the world.”
-
When President Barack Obama issued a public apology Thursday to the families of Warren Weinstein and Giovanni Lo Porto after a U.S drone strike accidentally killed the two al-Qaeda hostages in January, it provided a rare opportunity for the American public to see the faces of civilians who are killed in such incidents.
-
-
Friends of Giovanni Lo Porto, the Italian hostage killed in a US drone strike in January that targeted an al-Qaida compound, are pleading for his remains to be returned to Italy and demanding information about his death.
-
The recently revealed deaths of two al-Qaida-held hostages killed by an American drone strike were a terrible tragedy. The hearts of Americans go out to the victims’ families.
-
An American citizen was among the victims of a US drone strike abroad. President Barack Obama did not take to the podium, did not give a laudatory obituary for the dead American, did not express his regret. In fact, the Obama administration took almost two years to even acknowledge its role in the death, but without any explanation other than to suggest, in anonymous comments to the press, that the American was collateral damage in a legitimate attack.
-
Obama, McCain, Feinstein, and Boehner all know that U.S. drone strikes have killed many hundreds of innocent people, often in circumstances far less defensible than this.
-
The FBI’s previously undisclosed role reveals a contradiction in the U.S.’s longstanding position against paying ransoms for hostages. While the White House sharply criticizes the practice in public and private, new details about the Weinstein case show how the FBI provides some families with guidance towards that end.
-
Sen. John Delaney (D-Md.) is planning to introduce legislation that would create a new “hostage czar” position in the federal government, in an effort to try harder to locate and recover American hostages.
-
-
On Thursday, Barack Obama announced that a U.S. drone strike accidentally killed two hostages, prompting a congressional democrat to call for a “hostage czar,” a single point person who can coordinate with various agencies on hostage issues. Obama’s press secretary wouldn’t rule out the possibility.
-
-
-
Sen. Richard Burr of North Carolina, the Republican chairman of the Senate Intelligence Committee, declined on Wednesday to discuss whether during a closed-door hearing he called for a suspected terrorist to be killed.
-
Mamana Bibi was picking produce from her garden in North Waziristan, a remote, tribal corner of Pakistan, when her family says they watched a drone strike kill their 68 year-old grandmother.
-
While all death is tragic, one of the greatest tragedies is the killing of people who are completely innocent, so it was with much soul searching and question that we ponder the deaths of two innocent Americans killed in a US drone strike in Pakistan. The President has said he assumes all responsibility, but families have been shattered, lives have ended, and questions are being raised, as well they should. News stories indicate no individual was targeted in this strike; it was the specific building that drew the interest of the drone strike. This means we have no idea of who, or how many individuals were in the building, nor was it important; it is the building that was targeted and apparently everything else was irrelevant. Recently it was also disclosed that cell phones are frequently targeted by drones. Certain cell phones are targeted and we have no idea who is using the phone at the time of death. If an innocent somehow is using the targeted phone, he or she, is simply vaporized and blown to tiny bits. Every time an innocent person dies there should be in inquiry, investigation, and someone should be held accountable and punished. Mr Obama took full responsibility for the two dead Americans, so how can he not be responsible for the thousands of dead innocents that occur from drone strikes he ordered? The latest drone strike that killed two Americans demonstrates the complete hypocrisy of the American people and the President, for their total lack of empathy for any lost lives of innocents, be they children or women, except Americans.
-
But there was no challenge to the basic premise of the drone missile program: that the CIA and Pentagon have the right to kill any individual, in any country, on the mere say-so of the president. Drone murder by the US government has become routine and is accepted as normal and legitimate by the official shapers of public opinion.
-
A day after revealing that the United States killed two Western hostages in a botched operation against al Qaeda, a mournful President Barack Obama assembled intelligence staff to pay tribute to their work and patriotism.
“There may be those outside who question or challenge what we do,” a resolute Obama told officials at the Office of the Director of National Intelligence as he addressed the deaths of 73-year-old American Warren Weinstein and 39-year-old Italian Giovanni Lo Porto.
-
In fact, drones may have led to an expansion of terrorism activity domestically and abroad.
-
The killing of an American aid worker Warren Weinstein and Italian Giovanni Lo Porto, who were held hostage by Al Qaeda in Pakistani tribal area, in an American drone strike in January this year has again brought to limelight the issues related to such attacks. It has given birth to several questions regarding the legality of drone strikes in tribal areas as well as the intelligence gathering involved in it. An Al Qaeda leader, Ahmad Farouq, was also killed in that strike on Jan 15.
-
Obama-authorized drone killings are cold-blooded murder by any standard – mostly affecting noncombatant civilians, innocent men, women and children in harm’s way.
Former Obama White House press secretary Jay Carney lied calling drone strikes “precise, lawful and effective.”
-
The unusual announcement by President Barack Obama last week that a U.S. strike on an al-Qaida compound in Pakistan inadvertently had killed two hostages — one a U.S. citizen, the other Italian — came with an apology and the speedy pledge of monetary compensation for the families.
-
-
But there was no challenge to the basic premise of the drone missile program: that the CIA and Pentagon have the right to kill any individual, in any country, on the mere say-so of the president. Drone murder by the US government has become routine and is accepted as normal and legitimate by the official shapers of public opinion.
-
Covert actions, by definition, are not allowed to violate U.S. law or the Constitution, though the agency’s post-9/11 torture program — which functioned under secret legal memos justifying techniques that were later qualified as torture — illustrated the delicate legal tap dances that can skirt those requirements.
-
-
President Barack Obama tightened rules for the U.S. drone program in 2013, but he secretly approved a waiver giving the Central Intelligence Agency more flexibility in Pakistan than anywhere else to strike suspected militants, according to current and former U.S. officials.
The rules were designed to reduce the risk of civilian casualties. Mr. Obama also required that proposed targets pose an imminent threat to the U.S.—but the waiver exempted the CIA from this standard in Pakistan.
-
Anti-Flag have just released a lyric video for their song “Sky Is Falling” off their upcoming album American Spring, out May 26 on Spinefarm Records. The leftist Pittsburgh punk quartet posted the video to express its concerns over the killing of civilians by drone strikes ordered by the Obama administration.
-
The Australian government should come clean on its role in the U.S. drone program, before buying its own.
-
But the continued use of signature strikes goes against what President Barack Obama said he was going to do, said ABC News security consultant Richard Clarke, who spent 30 years working in government, including 10 years in the White House, before leaving in 2003.
-
Sales figures in November 2014 showed that Britain approved an arms sales trade with Israel worth £7 million in the six months before its offensive on Gaza last summer, including drone parts, combat aircraft and helicopters.
-
As Israel faces mounting criticism over its killings of at least 44 Palestinians in six UN shelters and 547 children overall last summer, 100,000 in Gaza remain displaced as “not a single destroyed home has been rebuilt.”
-
There is an eerie Orwellian cost to the Obama administration’s refusal to use the term “War on Terror” to describe its … war on terror. In his briefing after the White House’s admission that two hostages — one American, one Italian — were killed in a U.S. “operation,” press secretary Josh Earnest struggled mightily to avoid the word “war” to describe exactly what the U.S.is up to. Finally he gave in and stated that under the Authorization for Use of Military Force Against Terrorists, the nation is “at war” with al- Qaida.
-
In one camp are those who argue that drones are much more cost-effective than putting boots on the ground and are in general accurate and effective. The opposite camp maintains that the whole counterterrorism program needs to be revamped in favor of a “root causes of terrorism” method. Instead of spending billions of dollars on fighting terrorism, this camp argues that fighting the root causes of radicalization would be much more effective and cost-efficient.
-
Transparency Reporting
-
Taking a stand in Berlin’s Alexanderplatz are whistleblowers Chelsea Manning, Julian Assange and Edward Snowden.
-
Environment/Energy/Wildlife
-
Hostilities between Azerbaijan and Armenia are mounting 21 years after a cease-fire froze a conflict that flared in the dying days of the Soviet Union. During the relative calm, companies including BP poured billions of dollars into producing oil and gas in Azerbaijan and building pipelines to link the country with Turkey, Italy and the rest of Europe.
-
Censorship
-
According to the CPJ’s report published in December of 2014, seven journalists remain behind bars. Since then, STV network executive Hidayet Karaca and Taraf journalist Mehmet Baransu have been locked up for critical reporting, drawing international condemnation.
-
In its annual assessment of the media freedom worldwide, the Committee to Protect Journalists (CPJ) has argued that Turkish authorities now consider declaring critical journalists as “unwanted” is a more efficient, cunning method of stifling the free press, rather than jailing them for their reporting, as daily Today’s Zaman reports. “Erdogan seems to have realized that he no longer needs to resort to jailing journalists,” the report entitled “Attacks on the Press” said, referring to Turkish President Recep Tayyip Erdogan. According to the CPJ’s latest report, there are seven journalists remain behind the bars. The Turkey section of the CPJ report, said the Turkish media has fallen into “full compliance with the structures of power,” most notably those of Erdogan in the past five years.
-
-
The Thomas Jefferson Center for the Protection of Free Expression in Charlottesville, Virginia, on Monday released its annual rogue’s gallery of those who sought to snuff speech over the past year. The center said many violent attempts to still speech happened on the global stage, including the bloody attack on the satirical magazine Charlie Hebdo in Paris and violent threats against the opening of the movie parody “The Interview.”
-
Eritrea and North Korea were named as the first and second most censored countries.
-
Cuba, Iran and China are among the 10 countries with the greatest censorship, according to a list prepared by the Committee to Protect Journalists, where Eritrea, North Korea and Saudi Arabia occupy the three top spots.
The study was prepared by the New York-headquartered organization based on research into tactics that range from imprisonment and repressive laws governing reporting to harassment of journalists and restrictions on Internet access.
-
Workers, students, academics, and young people from across Australia and internationally have sent letters of protest to Sydney University and Burwood Council, opposing the attempts by both institutions to block an anti-war meeting called by the Socialist Equality Party (SEP).
-
The steamroller that is the copyright enforcement machine continues to trundle along around the world, flattening obstacles such as fair use, privacy and freedom of expression in its path. One of its latest stops has been in Australia, where that country’s copyright site-blocking laws, first seriously mooted last year, were introduced into the Australian Federal Parliament last month. A public comment period on the legislation, the Copyright Amendment (Online Infringement) Bill 2015, closed two weeks ago, and EFF was amongst 49 experts, organizations and government departments who submitted comments.
-
What goes through a Chinese web user’s head the moment before he or she hits the “publish” button? Pundits, scholars, and everyday netizens have spent years trying to parse the (ever-shifting) rules of the Chinese Internet. Although Chinese authorities have been putting ever more Internet rules and regulations on the books — one famously creates criminal liability for a “harmful” rumor shared more than 500 times — the line between what’s allowed and what isn’t, and the consequences that flow from the latter, remains strategically fuzzy. And that’s just how Chinese authorities like it.
-
As countries such as Turkey, China, Ethiopia, and Bahrain block online content, people are discovering ways to get around Internet censors. Their methods depend on the kind of censorship they face and what they are doing online.
-
Here is the situation: the threat of aggressive public protests against those assembling to critically discuss the behaviour of Israel has become an excuse to shut down such gatherings. The latest example of this tactic, which is really a form of blackmail to impose censorship, took place last week at the University of Southampton in the UK.
An international conference entitled “International law and the state of Israel: Legitimacy, responsibility and exceptionalism” was scheduled for 17-19 April 2015 at the University of Southampton. It was to bring together lawyers and scholars to examine the legal basis for the establishment of the state of Israel and the rationales (or lack thereof) for its historical treatment of the Palestinian people. The standard by which these issues were to be judged was international law. The conference would also have examined the issue of exceptionalism when it came to the inadequate legal and diplomatic response to Israeli policies and behaviour. Conference participants were to include both those critical of Israel and those who would present a defence of Israeli practices.
-
CLAIMS of censorship, levelled against the BBC after it asked for footage of Tory election candidate Andrew Turner to be taken off YouTube, have been rejected by the broadcaster.
-
The whole thing began very quickly to look and feel like censorship, and people said as much. But was it actually limited to stories about Baltimore, or are stories about Baltimore just what many of us are sharing on Facebook right now? Some others soon chimed in with reports of being unable to post pictures of their kids, wedding photographs, and “completely unrelated science articles.” Social media company SocialFlow tweeted: “Facebook confirmed API issue starting at 5:15 EST. Looks like it’s now resolved and publishing is going back to normal. We are monitoring.” So, it wasn’t censorship after all — just Facebook being extremely glitchy. And lo and behold, by the time I finished writing this, my post with #BaltimoreUprising had been restored to my page.
-
The session Free the Word, that began at 10.30am, saw filmmaker Anand Patwardhan and writers/journalists Manu Joseph, CP Surendran and Naresh Fernandes discuss the changing dynamics of the published word, freedom of expression and the increasing prevalence of censorship.
-
A “wonderful” book for teenagers is going to waste due to censorship, a former teacher says.
Betty Robb, 76, borrowed Into the River by Ted Dawes from Glenfield Library in Auckland and was told by staff it was restricted to readers aged over 14.
Betty says the librarian then added insult to injury by telling her she was not allowed to lend it to anyone under 14.
“It is probably easier to steal a car and go for a joy ride than borrow a restricted book.”
Into the River is a coming-of-age novel that sees a 14-year-old Maori boy struggling to find his own way while battling with his cultural identity.
He moves from small-town rural New Zealand to a prestigious boarding school in Auckland after winning a scholarship.
-
A new Cayman Islands film censorship board, with responsibility for rating movies to be shown in the territory, is being set up.
The board will principally be responsible for censoring independent unrated movies, but also has the power to ban films and to reclassify mainstream movies already rated by international censors.
-
-
-
-
Luckily, one such social media site, Twitter, has been putting a strong focus on curtailing bullying and offensive tweets. Today, the company is stepping up its efforts, but it seems to be going too far. What can only be described as heavy-handed censorship, Twitter will be deciding what is offensive and even forcing users to delete tweets. In other words, the company is attempting to unring a bell, by making users erase language that has already been communicated.
-
The move comes after leaked internal memos from CEO Dick Costolo back in February showed the social network thought it should be doing more to reduce trolling on the service.
-
Malaysia’s elder statesman, Dr. Mahathir Mohamad, used a speech at a social media conference to advocate outright censorship of the Internet, a call that may worry investors as the country’s economy falters.
-
Tun Dr Mahathir Mohamad today called for internet censorship in the country, claiming that the freedom that was granted has not been used to create “beautiful things”.
The former prime minister, who made a pledge to never censor the internet during his 22-year tenure, said there are too many avenues where internet freedom can be abused to access “filth” such as pornography or learn how to build bombs and the like.
-
The publicly-funded PBS network is suffering harsh criticism over the revelation that it censored Ben Affleck‘s past in a show about ancestral roots.
-
-
It comes at an awkward time as Saturday marks the 41st anniversary of the country’s revolution, which overthrew a regime that regularly censored the press.
-
According to the artist, “Exhibit B” is meant as a nod to the so-called “Human Zoos” which are an actual artifact of colonial history. But in the present day, “Exhibit B” has drawn a huge amount of protest. When a London institution, the Barbican, planned to show it last year, it ended up canceling because of protests.
-
Queen’s University Belfast issues statement suggesting possibility of conference going ahead, after accusations of curbing academic freedom
-
Queen’s University in Belfast has cancelled a symposium on Charlie Hebdo and free speech because of the security risk and concern for the university’s reputation.
One of the main topics of discussion, which was titled “Understanding Charlie: New perspectives on contemporary citizenship after Charlie Hebdo”, was to be self-censorship after the attacks on the French magazine in January.
-
After coming under intense scrutiny, Queen’s University Belfast has reneged on its decision to cancel an upcoming conference entitled ‘Understanding Charlie: New Perspectives on Contemporary Citizenship After Charlie Hebdo’. The university called off the conference last week, citing security concerns. The original decision to cancel the conference was met with widespread condemnation, with philosopher Brian Klug, one of the prospective delegates, saying he was ‘baffled’ and ‘dismayed’ by the decision.
-
The university cancelled the event stating a risk assessment of the symposium had not been completed to allow it to proceed.
-
A conference on the Charlie Hebdo massacre will take place in Belfast after a U-turn by Queen’s University.
The university cancelled the symposium last month stating a risk assessment had not been completed to allow it to proceed.
The move sparked widespread criticism.
-
Privacy
-
The government has been accused of lying to the Bundestag (German parliament) after it emerged last week that Chancellor Angela Merkel’s office knew German spies were conducting economic espionage on behalf of the Americans.
-
European aerospace giant Airbus is promising legal action over claims its top blueprints were stolen by German spies and given to America’s intelligence agencies.
“We are aware that as a large company in the sector, we are a target and subject of espionage,” the company said in a statement to the AFP newswire.
“However, in this case we are alarmed because there is concrete suspicion of industrial espionage. We will now file a criminal complaint against persons unknown on suspicion of industrial espionage.”
-
Germany has been spying and eavesdropping on its closest partners in the EU and passing the information to the US for more than a decade, a parliamentary inquiry in Berlin has found, triggering allegations of lying and coverups reaching to the very top of Angela Merkel’s administration.
-
Accusations that Germany’s intelligence service helped the U.S. spy on European allies have rekindled German outrage over American snooping and ensnared Chancellor Angela Merkel’s government in an espionage scandal.
-
Airbus is not taking the latest NSA allegations lightly. The European aviation giant has requested information from the German government and plans to press industrial espionage charges against unknown persons.
-
Angela Merkel’s government has been accused of lying to the country’s parliament after it was alleged that it knew German spies were conducting economic espionage for the NSA. Revelations show that some spooks were even spying on German companies.
-
For years the NSA has used the incentive of paid tuition to lure talented teens into employment with the agency. But in light of the Snowden leaks, students are organizing against what they see as just another invasion of their privacy rights
-
The government built the giant facility known simply as the “Utah Data Center” on property controlled and secured by the Utah National Guard, which means the public has no access.
[...]
The city’s mayor, Derk Timothy, who helped negotiate a contract last year to sell the Utah Data Center 56 million gallons of water for $300,000, has spent more than a year defending the agency’s presence with locals, saying the NSA has brought in jobs and helped develop the rural area’s infrastructure. He said he has no idea what goes on there, but he thinks that is for a reason.
-
A law bill to mildly curb the NSA’s blanket surveillance of innocent Americans has taken an important step toward being passed.
On Thursday, the US House of Representatives’ justice committee voted 25 to two in favor of a revised version of the USA Freedom Act – the original was killed last year in the Senate.
-
The U.S. Congress should kill the section of the Patriot Act that has allowed the National Security Agency to collect millions of phone records from the nation’s residents, instead of trying to amend it, a civil liberties advocate said Friday.
Section 215 of the Patriot Act, which allows the NSA to collect phone records, business records and any other “tangible things” related to an anti-terrorism investigation, expires in June, and lawmakers should let it die, said Neema Singh Guliani, legislative counsel for the American Civil Liberties Union.
-
The House Judiciary Committee put the NSA’s phone-snooping program on the path to being scrapped Thursday when a bipartisan majority voted for major reforms to the Patriot Act.
-
After falling two votes shy of earning a floor vote in the US Senate last year, lawmakers are once again trying to pass a bill that reforms the way the National Security Agency gathers the phone records of American citizens.
-
Final push in the House for USA Freedom Act is welcomed by White House but opponents push to retain sweeping surveillance powers of pre-Snowden era
[...]
More directly related to the Section 215 debate, the USA Freedom Act will extend the Patriot Act powers until 2019.
-
Germany’s intelligence arm, the Bundesnachrichtendienst (BND), allegedly helped the US National Security Agency (NSA) in spying on hundreds of European companies, regional entities and politicians.
-
-
For years after the attacks of Sept. 11, 2001, even as the National Security Agency fiercely defended its secret efforts to sweep up domestic telephone data, there were doubters inside the agency who considered the program wildly expensive with few successes to show for it.
So as Congress moves to take the government out of the business of indiscriminate bulk collection of domestic calling data, the agency is hardly resisting. Former intelligence officials, in fact, said Friday that the idea to store the data with telecommunications companies rather than the government was suggested to President Obama in 2013 by Gen. Keith B. Alexander, then the N.S.A. director, who saw the change as a way for the president to respond to criticism without losing programs the N.S.A. deemed more vital.
-
It’s not often you walk out after having lunch with a polite and intelligent retiree and know that you’re probably now on a government watchlist.
On Wednesday, I spoke with William Binney, a former National Security Agency official turned whistleblower, at a lunch event hosted by Contrast Security founder Jeff Williams.
Binney, who spent more than three decades at the shadowy intelligence agency, left a month after the September 11 attacks in 2001 when he saw that the foreign intelligence gathering program he helped develop was being turned domestically. After blowing the whistle to Congress, his house was raided by the FBI, though he was never charged with a crime. Binney remains one of the foremost thinkers in the agency’s modern history. Edward Snowden said he was inspired in part by previous leakers and whistleblowers, a list that includes Binney.
-
A former National Security Agency official turned whistleblower has spent almost a decade and a half in civilian life. And he says he’s still “pissed” by what he’s seen leak in the past two years.
[...]
That, he said, can — and has — led to terrorist attacks succeeding.
-
The particular target of his ire is the Texas Cryptologic Center, an NSA facility located near San Antonio. He has proposed a state law cutting off the building’s access to public utilities – water and electricity – until the agency ceases what he says is unconstitutional warrantless data collection.
-
Some of the world’s best known cryptographers – veterans of the crypto wars of the 1990s – say government access to encryption keys is still a bad idea, but is an issue that will never go away because it’s something intelligence agencies crave.
-
The RSA Conference is one of the largest cybersecurity business events in the world. The conference just wrapped up on Friday in San Francisco, where it brought together a collage of industry experts, programmers, industry developers, hackers and investors, in one spot to discuss the current and future atmosphere of 21st century security. Washington, D.C.-based cybersecurity startup Thycotic was one of those companies in attendance — and they came away with a host of new answers. According to a survey conducted by Thycotic at RSA 2015, 94 percent of participants believed that citizen-targeted NSA surveillance had increased or at least remained the same since the Snowden revelations of June 2013.
-
At RSA Conference 2015, a group of more than 200 attendees were surveyed regarding their thoughts about government surveillance in the wake of Edward Snowden leaks. Among the participants, nearly half, just over 48 percent, believed that the National Security Agency (NSA) had increased its surveillance of U.S. citizens, while around 45 percent felt NSA’s surveillance efforts remained the same since June 2013, when the whistleblower Snowden began leaking classified information.
-
For many years now, we’ve been writing about the need for ECPA reform. ECPA is the Electronic Communications Privacy Act, written in the mid-1980s, which has some frankly bizarre definitions and rules concerning the privacy of electronic information. There are a lot of weird ones but the one we talk about most is that ECPA defines electronic communications that have been on a server for 180 days or more as “abandoned,” allowing them to be examined without a warrant and without probable cause as required under the 4th Amendment. That may have made sense in the 1980s when electronic communications tended to be downloaded to local machines (and deleted), but make little sense in an era of cloud computing when the majority of people store their email forever on servers. For the past few years, Congress has proposed reforming ECPA to require an actual warrant for such emails, and there’s tremendous Congressional support for this.
-
Crazy is never in short supply in Washington. Through lean times and boom times, regardless of who is in the White House or which party controls the Congress, the one resource that’s reliably renewable is nuttery.
This is never more true than when that venerable and voluble body takes up a topic with some technical nuance to it. The appearance of words such as “Internet”, “computers” or “technology” in the title of a committee hearing strike fear into the hearts of all who use such things. This is the legislative body, after all, that counted among its members the late Sen. Ted Stevens, who so eloquently described the Internet as a “series of tubes.”
-
This is the cost of buying the storage. Maintenance need to be taken into account too, but calculating that is left as an exercise for the reader. But it is obvious to me from those numbers that recording the sound of all phone calls in Norway is not going to be stopped because it is too expensive. I wonder if someone already is collecting the data?
-
U.S. intelligence agencies have “harvested” the personal and private data of “hundreds of federal officials and judges, including Chief Justice John Roberts and Justice Ruth Bader Ginsberg,” charges a legal brief filed by Larry Klayman, the attorney who has come to be known as “the NSA slayer” for his successful legal battles against the National Security Agency.
-
Last week, a Missouri House committee held a public hearing on a bill that would ban “material support or resources” from the state to warrantless federal spy programs.
Rep. Keith Frederick (R-Rolla) sponsors House Bill 264 (HB264). The Missouri Fourth Amendment Protection Act would ban the state and its political subdivisions from assisting, participating with, or providing material support or resources “to enable or facilitate a federal agency in the collection or use of a person’s electronic data or metadata without such person’s informed consent, or without a warrant, based upon probable cause that particularly describes the person, place, or thing to be searched or seized, or without acting in accordance with a legally-recognized exception to the warrant requirements.”
-
-
Bill Binney, a former director of the National Security Agency (NSA) and whistle-blower, will be the opening keynote speaker at the ITWeb Security Summit 2015, taking place at Vodacom World from 26 to 28 May 2015.
-
Bernie Sanders is running for president for many reasons, and you’re going to hear about a lot of them on the campaign trail.
Income inequality. Campaign finance reform. Universal health care and climate change.
But quietly—at least relative to his wonk-laden sermons on economic populism—Sanders has for years also been one of the Senate’s fiercest critics of the National Security Agency’s secretive surveillance operations. And, unlike Hillary Clinton, he’s been remarkably clear about where he stands.
-
Stellar Wind not so stellar? Say it ain’t so! Good heavens, are you saying that infringing on people’s constitutional rights may not only be unconstitutional but also ineffective???
-
-
A huge report (747 pages) on the NSA’s Stellar Wind program has been turned over to Charlie Savage of the New York Times after a successful FOIA lawsuit. Stellar Wind has its basis in an order issued by George W. Bush shortly after the 9/11 attacks. Not an executive order, per se, but Bush basically telling the NSA that it was OK to start collecting email and phone metadata, as well as warrantlessly tap international calls into and out of the United States.
-
Top U.S. intelligence officials struggled to determine whether one of the National Security Agency’s most treasured surveillance programs actually stopped any terrorist attacks, according to a newly unsealed report prepared by five of the highest-ranking inspectors general in the government half a dozen years ago. The officials were divided over the legality and usefulness of the program, dubbed Stellar Wind, in part because it was shrouded in secrecy.
-
As Opsahl puts it, “After 9/11, President Bush unleashed the full powers of the dark side.” A mix of existing laws to monitor foreign communications and new powers given under the Patriot Act allowed for a vast expansion of the power for the NSA to collect and store communications data.
-
The new version of the US Freedom Act will reform the process by which a secret court authorizes the US National Security Agency’s (NSA) spying activities, a digital rights watchdog organization said in a press release on Thursday.
-
Significantly, with its stipulation, the government has avoided a trial in which the 65-year-old former executive planned to air what he says was his refusal, in 2001, to allow Qwest to participate in a National Security Agency program he believed was illegal. That trial might have attracted some media attention, given revelations over the past two years about the NSA’s illegal collection of metadata on U.S. phone calls and its other once secret programs—disclosures based on documents taken by NSA contractor turned whistleblower Edward Snowden, now living in Russia. Nacchio contends he was prosecuted only because he refused to go along with the NSA and that his criminal trial was unfairly influenced by his inability to introduce certain classified information. As the combative, Brooklyn born ex-con put it in a CNBC special on white collar criminals that aired this week: “My crime was a political crime. It dealt with saying `no’ to an intelligence agency doing illegal surveillance.”
-
The National Security Agency rejected the largest number of initial applications for security clearances, while the National Geospatial-Intelligence Agency led the Intelligence Community in revoking already-issued clearances, according to a new report from the Office of the Director of National Intelligence.
-
There is no sign of an end to the erosion of Constitutional liberties that began under George W. Bush after the 9/11 attacks and continues under Barack Obama, a group of seven national security whistleblowers said Monday.
“The government chose in great secrecy to unchain itself,” said Thomas Drake, who was working at the National Security Agency in 2001 and said he saw lawlessness spread under the name of “exigent conditions” during the Bush presidency.
-
Seven prominent national security whistleblowers on Monday called for a number of wide-ranging reforms — including passage of the “Surveillance State Repeal Act,” which would repeal the USA Patriot Act — in an effort to restore the Constitutionally guaranteed Fourth Amendment right to be free from government spying.
-
“If this bill passes, the N.S.A. will continue unaddressed surveillance programs and will secretly torture the English language to devise novel justifications for spying on Americans,” said David Segal, executive director of Demand Progress, a group that has fought for more civil liberties. “We won’t even know the details until a new whistle-blower comes forward a decade or two from now.”
-
Internet Service Providers (ISPs) may be the most important public cloud providers of the next decade. Hosting your data with an ISP has a number of advantages over choosing the dominant American cloud providers: advantages that run the gamut from technical to political.
ISPs have been in the co-location business practically since the internet began. Many have offered hosted services (typically e-mail and web server space) for at least as long as the World Wide Web (and the browsers required to interpret it) have been around.
-
Germany’s BND spy agency spied on European politicians and enterprises at the behest of the NSA for over a decade.
-
Germany’s BND secret services spied on French and other European companies and officials for the US’s National Security Agency (NSA), German newspapers have reported, sparking a scandal in Berlin but no official reaction in Paris.
-
Last week we met Dunk, the NSA’s captivatingly weird Earth Day mascot, and now it looks like he’s not the only anthropomorphic creature in the NSA family. Dan Raile at Pando Daily went to the RSA security conference last week, and returned with a prize: an NSA-themed coloring book.
-
-
With the media spotlight shining on police militarization, most Americans know something about the federal 1033 transfer program that enables police departments to get military equipment like armored vehicles, high power weapons, grenade launchers, and even bayonets. But most Americans don’t realize that local law enforcement agencies can also acquire spy gear from the feds.
The NSA transfers electronic gadgets to a variety of agencies including local law enforcement, and it is as simple as catalog shopping.
This is yet another example of the tangled web of cooperation between state and local law enforcement, and the feds – a phenomenon quickly devolving America into one massive interconnected surveillance state.
These transfer programs have largely gone unnoticed. However, the most recent NSA tech catalog was recently released and sheds some light on the program.
-
Back in January, when this Congress was brand new and Mitch McConnell was taking the reins as majority leader of the Senate, he pledged “to get committees working again.”
It’s surprising, then, that, in late April, McConnell moved to bypass the committee process to fast-track a five-year extension of the government’s authority to conduct mass surveillance of U.S. citizens’ phone calls.
McConnell’s move, which seems to violate his pledge to pass bills through committee, also is a blow to a bipartisan effort in both chambers to enact some curbs on the collection of phone records.
-
Civil Rights
-
“This is a global torture regime,” Thomas Drake told Sputnik News. “It was not rogue elements, it was not people who decided to take things into their own hands, it was United States policy.”
-
But Travis Sanders said he had no idea it was illegal to fly a drone in national parks when he was confronted by a park ranger, whom he described as angry and confrontational. He said he brought the drone down and started to leave the park with his family.
-
-
In Baltimore, Maryland, thousands of people have continued to protest peacefully over the police custody death of Freddie Gray. Gray died of spinal injuries a week after he was arrested for looking a police lieutenant in the eye, then running away. His family said his spine was 80 percent severed at the neck. Overnight, thousands of police and National Guard troops continued to enforce a 10 p.m. curfew. Newly confirmed Attorney General Loretta Lynch said the Justice Department would provide whatever resources are needed to control the protests.
-
The Peshawar High Court has directed the political administration of Khyber Agency to provide complete records on the detention of a professor of Government College Peshawar and his brother. The court has also sought a detailed report by the joint investigation team in this regard.
-
-
In reality, Chapa was working with the DEA, which had paid him to load up Patty’s truck with marijuana and haul it back to Houston so the DEA could bust the prospective buyers. That’s when everything went completely, horribly wrong.
-
-
MuckRock has obtained a whole stack of Stingray-related documents from the FBI. As is to be expected, there’s not much left unsaid by the agency, which is at least as protective of its own Stingray secrecy as it is with that of law enforcement agencies all over the US.
There’s nearly 5,000 pages of “material” here, most of which contains only some intriguing words and phrases surrounded by page after page of redactions.
-
Internet/Net Neutrality
-
Four major trade associations representing broadband providers today asked for an immediate halt to the Federal Communications Commission decision to reclassify the providers as common carriers under Title II of the Communications Act.
-
Intellectual Monopolies
-
Copyrights
-
Kim Dotcom’s upcoming extradition hearing has been delayed by three months. The procedure was set to go ahead in just four weeks but the High Court says that would give the entrepreneur insufficient time to prepare his case. It will now take place no earlier than September 1, 2015.
-
Encrypted Internet traffic is surging according to data published by Canadian broadband management company Sandvine. A new report reveals that 25 percent of the encrypted downstream traffic in North America is consumed by BitTorrent transfers, second only to YouTube.
Permalink
Send this to a friend
05.01.15
Posted in News Roundup at 7:12 pm by Dr. Roy Schestowitz

Contents
-
-
Future-proofing isn’t just about investing in the latest hardware and buying into the latest technology to keep your IT team happy. There are sound business reasons to do it and sensible, cost effective strategies.
-
Desktop
-
France, Germany and Spain are 190 million people in a developed market in Europe. Germany and Spain have been heavy users of GNU/Linux desktops for years but they’ve already increased usage from about 2.75% to 3% so far in 2015. France moved up from 2.2% to 3.75%.
-
Server
-
When you’re interested in learning a new technology, sometimes the best way is to watch it in action—or at the very least, to have someone explain it one-on-one. Unfortunately, we don’t all have a personal technology coach for every new thing out there, so we turn to the next best thing: a great video.
-
This week saw the official launch of the new Core Edition of Univention Corporate Server. With this move, we are now making it possible to employ our successful Open Source system for server and IT management free of charge in companies too.
-
In the Barcelona Supercomputing Center (BSC), big data isn’t a new or revolutionary concept. The center, located on the campus of the Polytechnic University of Catalonia, has been managing huge volumes of data for companies from fields as diverse as energy and pharmaceuticals since 2005, helping them cut costs and boost returns.
-
Kernel Space
-
This time around I’m doing the Btrfs RAID benchmarks on four traditional HDDs (though separately also been working on Linux RAID tests on a 6 SAS drive server). For this testing I picked up for WD Green 1TB 3.5-inch, SATA 6Gb/s, 64MB Cache WD10EZRX drives. At Amazon they cost only $52 USD a piece and should be interesting to test in a four-disk RAID array.
-
Chrome OS supports “Lucid Sleep”, which is a mode of allowing the system to carry out various tasks while the system is in a low-power mode or even suspended, and similar to Microsoft InstantGo. This feature, which allows for tasks like checking of new emails or instant messages while the system is suspended, is being worked on for (hopeful) eventual upstreaming into the mainline Linux kernel.
-
Applications
-
The first beta of “Isengard”, a.k.a. Kodi 15.0, is now available for testing.
Kodi 15 isn’t big on the feature front but is mostly aimed at cleaning up the code-base and delivering other underlying improvements to this popular open-source HTPC software formerly known as XBMC.
-
Carlos Soriano, one of the developers behind the well-known Nautilus (also known as Files) file manager application that is used by default in numerous Linux distributions, including Ubuntu, announced plans for the next major version of the software.
-
Calibre is an eBook reader, converter, and editor, but these are just a few of the features of this great app. The developer has released a new update for the application and implemented a few new features and various fixes.
-
Instructionals/Technical
-
Wine or Emulation
-
Wine 1.7.42 adds support for dynamic timezone information, initial desktop shell window support, support for more of DIrect2D, and various bug-fixes. In total there’s 34 known bug-fixes with this latest Wine development release.
-
Games
-
Debian 8 Jesse has been released, and some folks have been wondering if Valve will update SteamOS to Debian 8. It’s possible that Valve might do so, but it probably won’t happen anytime soon.
-
Desktop Environments/WMs
-
In February 2015, Xfce 4.12 was released. The first Xfce release in nearly three years, it was greeted with enthusiasm. Yet at the same time, a few users questioned whether the new version was as light on memory as earlier releases.
It’s a good question — and by that comment, I mean, as people usually do, that it has no clear answer. Some indicators suggest that Xfce remains as efficient as ever, while others suggest Xfce is not much different from other popular desktop environments, such as KDE.
[...]
KDE Plasma 4.14 has only 1 megabyte unallocated, which means that, until recently, Xfce really did use less RAM. Nor has that greatly changed, since Plasma 5.2 has 8 unallocated megabytes. Despite KDE’s recent efforts to reduce memory requirements, it trails the new release of Xfce. Running free – m with watch confirms that, as applications are opened and closed, Xfce 4.12 consistently uses less memory.
However, these results tell only part of the story. The fact that KDE Plasma 5.2 opens with 371 megabytes of buffered and cache memory compared to Xfce’s 4.12 suggests that Plasma should open applications faster than Xfce — and that does seem to be the case. For instance, while Xfce 4.12 takes six seconds apiece to open Firefox and LibreOffice, Plasma 5.2 takes just over four seconds apiece. Apparently, what matters is not just the amount of free memory, but how the allocated memory is used.
-
K Desktop Environment/KDE SC/Qt
-
A new release of digiKam Recipes is ready for your reading pleasure. This version features completely rewritten material on using digiKam to emulate various photographic effects (including the new recipe on how to create a faded vintage look). The book features two new recipes: Geotag Photos with Geofix and Update the LensFun Database. As always, the new release includes minor updates, fixes and tweaks.
-
GNOME Desktop/GTK
-
The GNOME Project is preparing to release the first milestone towards the GNOME 3.18 desktop environment, which will see the light of day on October 23, 2015.
-
Outreachy, the program formerly known as GNOME OPW, has announced their selected participants who will be engaging with various open-source projects over the next few months.
-
-
New Releases
-
Exton|OS build 150428 is based on Ubuntu 15.04 64 bit (released April 23, 2015) and Debian Jessie (Debian 8). Exton|OS’s ISO file is a ISO-hybrid, which means that it can very easily be transferred (copied) to a USB pen drive. You can then even run Exton|OS from the USB stick and save all your system changes on the stick. I.e. you will enjoy persistence! I’ve found two scripts which make the installation to USB very simple. The scripts are quite ingenious. My tests show that they work flawlessly on USB installations of all normal Ubuntu systems. Read my INSTRUCTION how to use the scripts.
-
Screenshots/Screencasts
-
Arch Family
-
Guess what? It’s the first day of the month, and you can download yet another installation image of one of the most acclaimed, customizable, and lightweight distributions of GNU/Linux.
-
Today May 1, has been released a new installation image of Arch Linux, our favorite Linux distribution!
Arch Linux 2015.05.01 includes the updates released during April 2015 and the Linux kernel 4.0.1.
-
Red Hat Family
-
RPM of PHP version 5.6.9RC1 as SCL are available in remi-test repository for Fedora 19-22 and Enterprise Linux 6-7.
RPM of PHP version 5.5.25RC1 as SCL are available in remi-test repository for Fedora 21-22 and Enterprise Linux 6-7.
-
-
Fedora
-
Clearly an item which deserves top billing! The first batch of Fedora t-shirts sold out quickly in most sizes, and there was a little bit of trouble reordering — but now they’re back in stock in unisex and also in women’s cut. Also, since the actual store provider’s URL isn’t very memorable, we’ve created the shortcut http://store.fedoraproject.org/ — just click that and you’ll go straight to the Fedora swag.
-
Debian Family
-
Back in 2013, Lucas Nussbaum was hardly a month old in the job when Wheezy was released. And this month, Neil McGovern took over on 17 April and saw version 8.0, otherwise known as Jessie, released eight days later.
-
-
With a new version of Debian recently released, it’s an exciting time for users who long for newer applications and cutting-edge features. But for some users, the new release is a cause for concern. A new release means their current installation is reaching the end of its lifecycle, and for one reason or another, they can’t make the switch. And, this leaves them at risk from a variety of security risks and crippling bugs, but there is hope in the shape of an independent project.
-
Debian 8—nicknamed “Jessie” after the cowgirl character in Toy Story 2 and 3—debuted last week, but it feels overdue. The release was in development within the Testing channel for quite a while, and, if you recall, Debian Linux consists of three major development branches: Stable, Testing, and Unstable. In order for a new iteration of Debian to officially go public, work must progress through each stage (starting in Unstable, ending in Stable). But it wasn’t until the official feature freeze for this release in November 2014 that the contents of Testing really became what you’ll actually find in Debian 8 today.
-
Derivatives
-
Canonical/Ubuntu
-
On April 30, Canonical, through Adam Conrad, sent an email to all Ubuntu 10.04 (Lucid Lynx) users notifying them that the operating system is no longer supported starting with May 1, 2015.
-
Canonical announced today, April 30, that new kernel updates are available for its Ubuntu 14.04 LTS (Trusty Tahr) and Ubuntu 12.04 LTS (Precise Pangolin) operating systems.
-
By the time we had a chance to review Ubuntu 15.04, the final release date had passed and it had already shipped. But it’s important to point out that our final review is based on a Beta release. However, the tasks that we threw at the latest iteration of Ubuntu, were easily completed without any major issues.
The boot process of Ubuntu 15.04 was great. Even when running the operating system in Live mode, it is so responsive that you could be forgiven for thinking that it was physically installed on real metal. Read below, for a bit more of an in-depth glance at what we think of Ubuntu 15.04.
-
Canonical has partnered with AMD, HP and Ebuyer.com to launch three Ubuntu laptops designed for business buyers.
The £200 HP Probook 255, £250 Probook 355 and £300 ProBook 455 will be made available for pre-order on Ebuyer.com at the end of May.
-
-
Flavours and Variants
-
Jonathan Riddell, the lead developer and maintainer of the Kubuntu Linux operating system and also a KDE developer, announced today that the work on the next major release of the KDE Plasma 5 desktop environment has started.
-
-
Sometimes, less is truly more. When it comes to the Linksys WRT1200AC, the little brother to the WRT1900AC router introduced last year, it might be best to say less is just enough.
The 1200AC is a slimmed-down version of the 1900AC, with two fewer antennas and around $100 knocked off the list price. Despite these reductions, it’s no less versatile or powerful. All of the good aspects of the 1900AC — the expandable hardware, the feature-packed firmware, the convenient setup process — are still here.
-
Forlinx launched an SBC that runs Linux or Android on a quad-core i.MX6, and offers extras like WiFi, Bluetooth, GPS, 3G, and an image sensor interface.
China-based Forlinx Embedded Technology first appeared on LinuxGizmos last October when it released an OK335xS-II SBC with a TI Sitara AM3354 SoC. Like the OK335xS-II, the new i.MX6-based, sandwich-style SBC embeds a soldered COM, which appears to be available separately. The COM is slightly larger than the previous model, at 60mm square, and the baseboard is a sizable 190 x 130mm.
-
The race for the hearts and minds of IoT developers is in full swing and ARM has been positioning itself as the defacto standard for IoT devices. Based on its hardware alone that isn’t an unreasonable proposition, but to sweeten the deal ARM has been working hard on its software offering.
-
Advantech has launched a Pico-ITX SBC that runs Linux on an Atom E3825 or Celeron J1900, and offers modular expansion and optional -40 to 85°C operation.
Like Advantech’s MIO-2262, which offered the old Atom N2000 “Cedarview” processors, the new MIO-2263 uses the company’s MI/O-Ultra modular expansion format, which it also refers to as MIOe. The MIOe expansion interface expands upon the coastline and onboard interfaces with additional I/O including PCIe and DisplayPort.
-
Phones
-
Tizen
-
Depending on the country you live in, you may not have seen or heard about Samsung’s Tizen app store. That’s about to change. The company — which just regained the smartphone sales crown from Apple — is expanding the Tizen store from two to 182 countries around the world.
-
Tizen have been in development for several years now and we are proud to have products in the market place in the form of Smart watches, a Smart Phone, Smart TV and Smart Cameras. This is a great opportunity for application and game developers to explore a new ecosystem.
-
Android
-
The peculiar case of the Sony Xperia Z3 in the United States continues with a fresh twist: T-Mobile has gotten fresh stock of the handset and is resuming sales online and, by the end of this week, in stores. It was roughly a month ago that the Z3 made an unannounced disappearance from T-Mobile’s retail outlets, seemingly having been discontinued due to lack of consumer interest. At the time, T-Mobile tweeted in response to a disappointed customer with the simple statement that “the Z3 is no longer available.”
-
-
More Android 5.1.1 factory images are being released by Google, this time for the Nexus 7 WiFi (2012 and 2013), plus the Nexus 10. Each are receiving build LMY47V, which is the latest available.
Android 5.1.1, at least from what we have researched, is mostly bug fixes for Android 5.1. Users should not expect to see anything too crazy once updated.
-
You’ve been able to use your voice (“Ok Google”) to do all sorts of stuff on Android for a while now. But said stuff has almost entirely been built-in by Google itself; third-party developers haven’t really been able to tap into that functionality.
-
Over on the Android Developer’s Google+ page an awesome new feature for Google’s voice search was just announced. A small selection of applications will now open directly when using certain voice commands. For example, you can now say “Ok Google, find houses near me on Zillow” and Google will automatically start the Zillow app, showing a map of properties near your current location (this also works with the applications for Trulia and Realtor.com). Previously a query like this would have directed you to Zillow’s mobile site and given you a link to download Zillow’s app.
-
The Android 5.0 Lollipop update has been officially released to owners of the Samsung Galaxy S4. Users on the Verizon network are now receiving the update, leaving Sprint, T-Mobile and U.S. Cellular to follow.
-
The smokescreens are starting to settle and all 32 teams are making the final preparations for the 2015 NFL Draft, which is just a few hours away, and here we’ll explain how to watch the draft live from Android, iPhone, or online. Will the Titans use that second round pick, or trade it away? We’ll have to wait and see, and here’s how you can catch all the action live from any device.
-
The costs associated with thermal imaging systems have restricted their usage and kept it out of reach of the average consumer / impulse-buy territory. However, there have been some recent advancements in this field that have made the prices of such system more palatable to the non-professional users. Thanks to the advent of smart mobile devices, the costs associated with the storage, control and user-interface for these systems could be taken out for most markets. One of the first forays into this space was the $250 FLIR ONE personal thermal imager from FLIR Systems. Unfortunately, by restricting the hardware design to work only with the Apple iPhone 5 and 5s, they lost out on widespread market appeal. Seek Thermal entered the market with a splash by launching their first smartphone-attached infrared camera for just $199. Two distinct models carrying the same features and capabilities were launched, only differing in the connector – one with a microUSB interface for Android devices and another with a Lightning connector for iOS devices. Before talking in detail about the Android version of the camera and the associated mobile app, let us take a moment to understand how thermal imaging works – particularly since this is not something we have covered on our site before.
-
One of the ways I pay my bills is through content production for a trading card game called Magic: the Gathering. In addition to creating written content, I also produce video content in a series called “Crash Test”. Today I am going to talk about the hardware and open source software I use to produce these videos.
-
Google often decides to go about things in its own way, and is frequently found approaching common problems from a unique angle. The latest candidate to receive the Google treatment is the humble address. Not web addresses or email addresses, but regular postal addresses. So what’s the deal?
-
Events
-
The industry has had large collaboratively developed projects for some time, of course: Linux is the most obvious example. But to a large extent, projects such as Linux or more recently Cloud Foundry and OpenStack have been the exception that proved the rule. They were notable outliers of cross-organizational projects in a sea of proprietary, single entity initiatives. For commercial software organizations, Linux was a commodity or standard, and the higher margin revenue opportunities lay above that commonly-held, owned-by-no-one substrate. In other words, software vendors were and are content to collaborate on one project if it meant they could introduce multiple proprietary products to run on top of the open source base.
-
Web Browsers
-
Chrome
-
Google have just released a new extension called ‘Password Alert’. The aim of the addon is to prevent phishing attacks against your Google account, it will ensure that you only login to your Google account from the accounts.google.com site.
-
Google has developed a new extension for its Chrome browser that aims to stop people from falling prey to phishing sites.
-
Mozilla
-
Today we are announcing our intent to phase out non-secure HTTP.
There’s pretty broad agreement that HTTPS is the way forward for the web. In recent months, there have been statements from IETF, IAB (even the other IAB), W3C, and the US Government calling for universal use of encryption by Internet applications, which in the case of the web means HTTPS.
-
SaaS/Big Data
-
The new open-source cloud computing platform adds bare-metal server deployment capabilities.
-
The most popular open-source cloud program, OpenStack, may also be the hardest to use. Just ask anyone trying to find good OpenStack architects and engineers. With its latest release OpenStack 11, Kilo, the level of expertise needed to master OpenStack is getting lower.
-
Dr. Owen Rogers, senior analyst 451 Research, said: “Finding an OpenStack engineer is a tough and expensive task that is impacting today’s cloud-buying decisions.”
-
-
Shortages of skilled OpenStack engineers can help price the open-source technology higher than proprietary equivalents, new research suggests.
-
Oracle/Java/LibreOffice
-
LibreOffice started with the 3.3 release; it then added micro releases with a third number next to the first two digits. As time went forward, so did the releases: 3.4.0, 3.4.1, 3.5.0, 3.5.1, onwards to the 3.6 branch, the last one to carry the number 3 as its major release number, and to the 4.0 and the 4.x.x based releases. This summer we will be releasing the 5.0, and you will hear a lot more about the changes and improvements that are being put into it. But when you think about it, we started our version numbering exactly based on the one of OpenOffice.org . In 2010, it meant something technically and something for the community and more broadly the users of OpenOffice.org and LibreOffice. Fast forward to 2015: does anybody really know what a “4.3” release mean? What message does this numbering scheme convey?
-
CMS
-
I recently had the opportunity to interview David Strauss about how Pantheon uses containers to isolate many Drupal applications from development to production environments. His upcoming DrupalCon talk, PHP Containers at Scale: 5K Containers per Server, will give us an idea of the techniques for defining and configuring containers to get the most out of our infrastructure resources.
Having recently dove into the container realm myself, I wanted to learn from the experts about the challenges of managing containers in a production environment. Running millions of production containers related to Drupal, David is certainly an expert resource to ask about this subject. I look forward to learning more details at DrupalCon!
-
WordPress statement hints at no prior notice on disclosure, contrary to researcher claims
-
BSD
-
This is a partial list of new features and systems included in OpenBSD 5.7. For a comprehensive list, see the changelog leading to 5.7.
-
Project Releases
-
On behalf of the project, I am pleased to announce the release of Apache SpamAssassin v3.4.1.
-
Openness/Sharing
-
As I’ve noted a number of times before, one of the most exciting aspects of the world of openness is the way in which ideas are not only shared within a given domain – amongst free software hackers, for example – but across completely different domains too. Thus the GNU project inspired first Nupedia, and then Wikipedia. Wikipedia, in its turn, inspired OpenStreetMap. And now OpenStreetMap has given rise to OpenSeaMap:
OpenSeaMap is an open source, worldwide project to create a free nautical chart. There is a great need for freely accessible maps for navigation purposes, so in 2009, OpenSeaMap came into life. The goal of OpenSeaMap is to record interesting and useful nautical information for the sailor which is then incorporated into a free map of the world. This includes beacons, buoys and other navigation aids as well as port information, repair shops and chandlerys. OpenSeaMap is a subproject of OpenStreetMap and uses its database.
-
-
-
Inside a plane at Miami International Airport, baggage handlers are going on a shopping spree with passengers’ bags.
What they don’t know is that they are being recorded on a hidden camera. The Miami-Dade Police Department set up the camera as part of an ongoing police investigation into luggage thefts by the very airport workers who are supposed to get bags safely onto planes.
-
Security
-
WeLiveSecurity said victims should look for “unsolicited cronjob entries for all the users on their servers.” The backdoor will probably be found in /tmp or /var/tmp. “Mounting the tmp directory with the noexec option prevents the backdoor from starting in the first place.”
-
If one listens to the mainstream media, these are the biggest cyber security threats facing American businesses. When hackers from these regions make any move against western businesses and governments, the news is magnified ten-fold in comparison to the actual source of the attacks: human error on the part of the victim organizations.
-
2015 will yet again not be the ‘Year of the Linux Desktop’, yet behind the scenes’ Linux plays an important role in many organisations by running the servers on which files are stored centrally.
-
The OpenSSL Audit, sponsored by the Core Infrastructure Initiative, is under way and the first set of results could trickle in by early summer. Like TrueCrypt, OpenSSL developers are curious to see the vulnerabilities dredged up during the inspection, and like its file encryption cousin, have fingers crossed that a backdoor isn’t lurking.
-
Finance
-
Famed NY Times columnist Tom Friedman is pretty widely mocked for his ridiculous platitudes that are designed to sound smart (or, more directly, to make readers think that Tom Friedman is smarter than you). But, outside of corporate boardrooms and elite politicians, it seems plenty of people recognize that Friedman’s musings don’t make much sense. There’s even a Thomas Friedman OpEd Generator that does a pretty good job, showing how formulaic his articles are.
The key element in a Tom Friedman piece is to take some basic, simplified conventional wisdom, and try to gussy it up so that it sounds really profound. Often, this means ignoring all of the nuances and complexity behind the simple idea. A decade ago, he turned this into a whole book, The World is Flat, about globalization and how it was changing the world. He wasn’t wrong, but his insights weren’t particularly insightful or useful. Furthermore, he’s so wedded to his thesis, that he still fails to realize that he was focused on a very exaggerated view of things, without understanding all of the related forces and consequences of what he was selling.
-
There is no doubt that 2002 was worse for the people of Argentina as a result of the default, but by the second half of the year, the economy returned to growth and grew strongly for the next seven years. (There are serious issues about the accuracy of the Argentine data, but this is primarily a question for more recent years, not the initial recovery.) By the end of 2003, Argentina had made up all of the ground loss due to the default, and was clearly far ahead of its stay-the-course path.
-
PR/AstroTurf/Lobbying
-
The current criminal investigation into Walker involves serious allegations that the governor and his campaign disregarded the state’s campaign finance laws during the 2012 recall elections.
Indeed, when Republican and Democratic District Attorneys petitioned for the investigation, Walker was already the highest-profile politician in modern Wisconsin history and a likely presidential contender. Launching a criminal investigation into the most powerful political figure in the state could not have been an easy choice: these career politicians initiated the probe because they believed there was a strong legal and evidentiary basis for doing so under Wisconsin’s long-standing campaign finance laws.
Republican prosecutors gathered evidence of Walker secretly raising millions of dollars for the supposedly “independent” nonprofit Wisconsin Club for Growth (WiCFG), with the express purpose of bypassing campaign finance disclosure laws. Talking points prepared for the governor advised him to “stress that donations to WiCFG are not disclosed,” to call the group “his 501c4,” and to tell donors “that you can accept corporate contributions and it is not reported.”
-
Privacy
-
David Cameron has made some headline-grabbing election promises, but none so technically implausible as his vow to eliminate communications tools that “we cannot read” earlier this year. He’s not alone in proposing a ban on effective cryptographic tools. The FBI wants the same thing, and their zeal to protect the state from citizens’ secrecy has even prompted it to alter its exemplary security advice. The suggestion that Americans should encrypt their devices so as to protect their data when they inevitably lose them, have them stolen or throw them away without securely erasing them has been expunged from the FBI’s site.
It’s impossible to overstate how bonkers the idea of sabotaging cryptography is to people who understand information security. If you want to secure your sensitive data either at rest – on your hard drive, in the cloud, on that phone you left on the train last week and never saw again – or on the wire, when you’re sending it to your doctor or your bank or to your work colleagues, you have to use good cryptography. Use deliberately compromised cryptography, that has a back door that only the “good guys” are supposed to have the keys to, and you have effectively no security. You might as well skywrite it as encrypt it with pre-broken, sabotaged encryption.
-
Facebook has a help page: How do I permanently delete my account? This advises you to download a copy of your Facebook data, because you will lose it if you do delete your account. You can also do this by logging into Facebook, clicking the down arrow, and selecting Settings. Click the bottom entry that says “Download a copy of your Facebook data”.
If you really, really want to delete your Facebook account, log on, go to the Delete my account page and click the button that says “Delete my account”. After that, no one will be able to see your Facebook info, though it may take a few months for your posts and photos to be removed from Facebook’s servers. However, note that any messages or emails you have sent to other people will not be removed. These are in the recipients’ accounts, not in yours.
-
A cabinet minister has accepted a donation from a corporate investigator with a history of spying on political campaigners.
The education secretary, Nicky Morgan, who received £3,220 from Paul Mercer, is fighting to be re-elected in her marginal seat of Loughborough in Leicestershire. Mercer, who has lived in the area for many years, is taking an active part in promoting her campaign.
His covert work monitoring campaigners was exposed in 2007 when legal papers revealed that he was paid £2,500 a month by the security department of the arms manufacturer BAE.
-
Civil Rights
-
Despite the best efforts of law enforcement to convince a Congressional subcommittee that technology firms actually need to weaken encryption in order to serve the public interest, lawmakers were not having it.
Daniel Conley, the district attorney in Suffolk County, Massachusetts, testified Wednesday before the committee that companies like Apple and Google were helping criminals by hardening encryption on their smartphones. He echoed previous statements by the recently-departed Attorney General, Eric Holder.
Permalink
Send this to a friend
04.30.15
Posted in News Roundup at 7:03 pm by Dr. Roy Schestowitz

Contents
-
Server
-
One of those landmarks in the technology industry was IBM’s announcement in 2000 that it was throwing its corporate weight behind the open source Linux operating system. Up to that point, open source software had been viewed as the product of a plucky but overall irrelevant cadre of cranks, crackpots, and cheapskates. It may have been fine for a network of gamers who never left their geek caves, but “mission-critical” enterprise platforms? Please.
-
Kernel Space
-
Today, Bitdefender and Fox Technologies, Inc. said they be joining the Linux Foundation. “Backed by a global community of developers who deliver timely security fixes and regular kernel updates, Linux is the platform of choice for a growing number of security-conscious data center operators and cloud providers. From antivirus software to access management technology, today’s new members are increasing their Linux investment to address a range of security challenges.”
-
Linux has long been regarded as a stable and secure platform for enterprise applications. And the recent explosion of container technology presents yet another way for developers to build securely on top of Linux, says Mark Lambiase, CTO of Fox Technologies, Inc.
The Linux container model “will provide for the opportunity to separate and segment applications from a shared OS model, which can provide both security and performance/configuration advantages,” Lambiase said.
Fox Technologies, which helps companies manage and maintain Unix and Linux systems with its BoKS ServerControl application, is contributing to such growth and innovation in the Linux ecosystem, in part, by becoming new corporate members of the Linux Foundation.
-
The bottom line, according to TI is that the 66AK2L06 can do almost everything FPGAs can do in data acquisition, but can do it in a way that is cheaper, faster, and more power efficient. The SoC is also claimed to be easier to work with than using FPGAs.
-
Graphics Stack
-
The EGL_KHR_fence_sync, EGL_KHR_wait_sync, and EGL_KHR_cl_event2 extensions are now available in the Gallium3D world. Initially these extensions are hooked up for the R600, RadeonSI, NVC0, NV50, and Freedreno drivers. Marek also tackled the GL_OES_EGL_sync extension for all Mesa drivers.
-
Applications
-
Transmageddon is a video transcoder built to take advantage of GStreamer that can convert all types of media files with ease and without the need to have any kind of prior knowledge about the process. It’s a powerful tool and one of the simplest you can find out there.
-
Exaile is a music player that boasts all the features you would expect to find in a great app, but it’s not all that popular. It doesn’t have anything to do with the quality of the app, so we decided to take a closer look and decide whether it’s worth recommending.
-
Instructionals/Technical
-
-
-
-
This past few weeks I’ve been working on making remote debugging in GDB easier to use. What’s remote debugging? It’s where you run GDB on one machine and the program being debugged on another. To do this you need something to allow GDB to control the program being debugged, and that something is called the remote stub. GDB ships with a remote stub called gdbserver, but other remote stubs exist. You can write them into your own program too, which is handy if you’re using minimal or unusual hardware that cannot run regular applications… cellphone masts, satellites, that kind of thing. I bet you didn’t know GDB could do that!
-
Games
-
Chroma Squad is a throwback to shows like Power Rangers, and I took it for a spin to see if it’s cringe worthy, or actually fun.
-
Next week Epic Games is expected to ship the first preview version of Unreal Engine 4.8, which will come with SteamVR support.
-
In the latest of the frequent updates to SteamVR, Valve has added 64-bit Linux support.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Plasma 5.4 is scheduled for August, it’ll be a great addition to Kubuntu 15.10.
-
Plasma 5.3, new feature release of KDE workspace, has been released on Tuesday and you can get it now on Fedora.
Plasma 5.3 brings new features, improvements and almost 400 bug fixes for basically all of its components ranging from power management to various applets.
-
An update to my KDE 5 packages was overdue. Ever since the “big upgrade” in Slackware-current a week ago on 21 April 2015, there have been some stability issues in the Plasma 5 desktop. The instability was caused by the version bumps of various libraries that the KDE software is depending on – you can not dynamically link to a software library that’s no longer there because it has been replaced with a library bearing a new version number. I felt I had to recompile everything just to be sure there was no hidden “breakage” left, and so I took the opportunity to wait for the newest Plasna release and present you wilth all-new packages.
-
-
New Releases
-
Simplicity Linux, a Linux distribution based on LXPup and that uses the LXDE desktop, has been upgraded to version 15.4 and is now available for download and testing.
-
Screenshots/Screencasts
-
Ballnux/SUSE
-
Open-source software company Suse has started support for “Simpler Choice” database programme from SAP, which will provide enterprises with simple tools and discounts to simplify adoption of SAP in-memory data management solutions.
-
-
Debian Family
-
Debian is arguably the most important Linux distribution. From it springs such popular Linux distributions as Mint and Ubuntu. Outside Linux’s inner circles, it’s not that well known because it’s purely a community operating system. There is no company behind it, as there is with Red Hat and CentOS, Fedora, and Red Hat Enterprise Linux (RHEL). Without fanfare, Debian is more than just the foundation for other better known Linux distros, it is a powerful desktop and server Linux in its own right.
-
Derivatives
-
Canonical/Ubuntu
-
This is a follow-up to the End of Life warning sent last month to confirm that as of today (April 30, 2015), Ubuntu 10.04 is no longer supported. No more package updates will be accepted to 10.04, and it will be archived to old-releases.ubuntu.com in the coming weeks.
-
That seems to be the response from desktop users and reviewers of Ubuntu’s latest and greatest, 15.04 or Vivid Vervet. The server and cloud crowd are all abuzz, tearing this baby down to see what it can do. But for the desktop folks — not so much. About all you read is that the new desktop is mainly cosmetic changes: that Unity’s color scheme is now purple, which isn’t quite true — to my eyes, there’s some orange in there too — and that a few things have been moved back to where they used to be. Other than that, everyone complains that this vervet is nothing more than lipstick on a unicorn, as Utopic Unicorn was Ubuntu’s last release.
What this means, of course, is absolutely nothing. The folks at Ubuntu have made it clear that this is mostly a server/cloud release, so it’s not surprising that it offers desktop users little reason to upgrade. Besides, except for those few users who insist on living on the bleeding edge, most desktop users should be using 14.04, Trusty Tahr, anyway, because it’ll be supported until 2019, and our vervet friend will only see support through January.
-
Ubuntu is not the first distro to use systemd. Debian (Ubuntu’s daddy) recently made the switch too. Other distros have experienced bugs as a result of the switch. For instance, service managers, which configure the boot config files, must be changed to work with the new init system.
Ubuntu cleverly sidestepped this problem by keeping its old init config file formats in place alongside the new format used by systemd. The version of systemd used in Ubuntu can read both. So old tools that work with the Upstart config settings still work.
systemd does provide a boost in boot performance over Upstart, but some members of the community are concerned that the way systemd handles messages to services will reduce performance and even open the door to denial-of-service attacks.
Clearly, Canonical must have a lot of faith in systemd to abandon Upstart (its own project) in its favor. As time passes, we will see whether this was a wise decision.
-
Canonical has announced that a few vulnerabilities were found in the Linux kernel packages, affecting the kernel for Ubuntu 14.10 (Utopic Unicon) operating system, and they have been corrected.
-
-
Theobroma’s Allwinner A31 based µQseven COM offers a re-engineered Linux/Android BSP, and adds a security module, SATA, GbE, CAN, eMMC, a USB hub, and more.
Austrian engineering design firm Theobroma Systems has begun selling a “A31 µQ7″ module that expands upon the quad-core, Cortex-A7 Allwinner A31 system-on-chip using a half-size µQseven form-factor. The 70 x 40mm module supports Linux and Android, and offers optional -20 to 70ºC extended temperature support.
-
Phones
-
Android
-
The Android user interface isn’t for everyone, but what if you could turn your Android display into something that looked more like a Windows desktop? With Andromium OS, a recently released app on Google Play, you can do exactly that.
-
Fancy a sneak peek at Google’s new mobile browser? All you have to do is download Chrome Dev from the Play Store onto your Android device and voilà.
-
Google is letting hardcore Android users get their hands on the roughest, rawest, most advanced version of Chrome available, making the Dev channel for Chrome on Android available to download via the Play Store. This lets experienced users and developers try out the browser’s newest features on Google’s mobile OS before they hit the mainstream. Casual users should be warned however, this is the equivalent of riding in a supercar before the manufacturers have checked the brakes: it might look fun, but you’re going to crash. Although the Dev channel is already available for Windows, Mac, Linux, and ChromeOS, this is the first time it’s been released for Android as well.
-
As April comes to a close, Google’s Android 5.1 Lollipop update is still on the minds of many Nexus 4 users. With Android 5.1 problems plaguing some owners and with a new Android 5.1.1 update seemingly on the way, we want to take a look at what Nexus 4 users need to know as we push into the month of May.
-
Hangouts may be Android’s star messaging app at the moment, but Google is still willing to show its original Messenger client a little TLC. The company has updated its basic Android texting app with support for quick replies from notifications. While the feature isn’t quite as slick as what you get in iOS’ Messages (where the notification itself has a reply box), it’ll save you from constantly switching apps when you’re juggling a rapid-fire conversation alongside your usual phone tasks. Grab the upgrade today if you want some of Google’s latest bells and whistles without having to use Hangouts as your SMS software of choice.
-
Google’s Android 5.1 update continues to pick up steam and it appears headed for top devices like the HTC One M8, Samsung Galaxy S6 and more. With Samsung Galaxy Android 5.1 release details heating up, we want to take a look at what Samsung smartphone and tablet users need to know about the Android 5.1 update as we push into May.
-
Last week, as we were telling you to expect Android 5.1.1 at any moment, we weren’t exactly including those of you who just picked up a Samsung Galaxy S6 Edge in the conversation. No offense, but phones with OEM skins aren’t usually leading the pack when it comes to updates that feature the newest versions of Android. As it turns out, maybe we should have.
-
It’s been more than a month since its release and Google’s Android 5.1 Lollipop update is still on the minds of many Nexus 7 users. With Android 5.1 problems plaguing Nexus 7 users and with a Nexus 7 Android 5.1.1 update seemingly on the way, we want to take a look at what Nexus 7 users need to know as we push into the month of May.
-
In 2013, Apple introduced something called “iOS in the Car”, an infotainment system that could run on dashboards, mimicking the screens of our beloved iPhones. Early last year — nearly 14 months ago — Apple renamed the product CarPlay and said that it would become available on Ferrari, Mercedes-Benz, and Volvo models within days.
-
As April comes to a close, Google’s Android 5.1 Lollipop update is still on the minds of many Nexus 5 users. With Android 5.1 problems continuing to plague many Nexus 5 users and with an Android 5.1.1 update seemingly on the way, we want to take a look at what Nexus 5 users need to know as we push into the month of May.
-
Things are starting to get more exciting in the Android smartphone world these days. LG have just launched the new G4 and while it won’t be featured in this list until it hits shelves, it’ll certainly make an impact later this year. As for May however, well there are still some excellent options out there no matter what sort of Android smartphone you’re looking for, and the flagships of 2015 are here, ready and waiting for you to pick them up at your local carrier store or from Amazon. This list is of the device available in North America right now, and next month’s list should be very interesting, indeed.
-
Samsung will update some of its devices to Android 5.1 Lollipop in the near future, starting with the Galaxy S6 and Galaxy S6 edge flagships. According to SamMobile, the update will bring a major Android feature that’s currently unavailable on the phones, even though other Lollipop devices from the competition have it.
-
With the arrival of the Apple Watch, and more specifically the fancy gold edition, luxury smartwatches are officially a thing. And Android Wear is going to try its luck. According to Bloomberg, the long-rumored Tag Heuer Android Wear smartwatch finally has a pricetag. How does $1,400 sound?
-
The LG Watch Urbane is compatible with any Android 4.3 or higher smart phone and is the fist Android Wear smartwatch enabled with Wi-Fi which allows users to disconnect from their smart phone.
-
SaaS/Big Data
-
The 11th release of OpenStack is available for download today, and the event is being billed as “a turning point” for the open source project with contributions from nearly 1,500 developers and 169 organizations worldwide. Indeed, it’s only been a few short years since there was early media coverage of the cloud computing platform.
-
-
-
BSD
-
Please join us September 11-13, 2015 at the Sheraton in Reston, Virginia for the second biennial vBSDCon event. This exciting weekend will bring together members of the BSD community for a series of roundtable discussions, educational sessions, best practice conversations, and exclusive networking opportunities. Registration will open in July.
-
The Tor-BSD Diversity Project is an initiative that seeks to extend the use of the BSD Unix operating systems in the Tor public anonymity network.
-
Openness/Sharing
-
Open Hardware
-
fattelo! is an italian design studio focused on re-purposing household waste materials for unexpected uses. the ‘noctambula’ lamp is no different. created by fattelo! designers federico trucchia and mireia gordi vila, the LED light is switch-operated, battery-powered built with only a few standard components and one milk carton. no wiring, no soldering, and no big price tag. like their debut 01lamp, the design will be released under a creative commons license and freely available on fattelo!’s site.
-
Security
-
The Eset researchers still aren’t certain how Mumblehard is installed. Based on their analysis of the infected server, they suspect the malware may take hold by exploiting vulnerabilities in the Joomla and WordPress content management systems. Their other theory is that the infections are the result of installing pirated versions of the DirecMailer program.
-
-
Defence/Police/Secrecy/Aggression
-
Forty years after it won the war, the Communist Party still rules Vietnam with an iron fist. But with crony capitalism, corruption and inequality now rife, many claim its victory was a hollow one.
-
Forty years ago today, the United States lost its first war. And for the vast numbers of Americans who were deeply affected by the Vietnam debacle – including the military personnel who served there, the families of the nearly 60,000 Americans soldiers who died in Southeast Asia, and the citizens who lost faith in their country because of the events that unfolded – the conflict will remain a defining point in their lives.
-
Finance
-
Previously I discussed the use of IBLTs (on the pettycoin blog). Kalle and I got some interesting, but slightly different results; before I revisited them I wanted some real data to play with.
-
Privacy
-
Don’t look now, but much of the National Security Agency bulk metadata collection that stirred so much controversy in the wake of the Edwards Snowden revelations might — just might — be about to come to an end. While civil libertarians still worry about various aspects of the program continuing, this would be no small achievement.
-
A woman accused of being a getaway driver in a series of robberies in St. Louis has changed her plea from guilty to not guilty after finding out that a stingray was used in her case.
Wilqueda Lillard was originally set to testify against her three other co-defendants, whose charges were also dropped earlier this month. As a result of changing her plea, the local prosecutor dropped the charges against her on Monday.
-
A couple of months ago, we reported on a surprising admission by the UK government that GCHQ has been carrying out illegal surveillance by monitoring privileged conversations between lawyers and their clients. As we noted at the time, the reason for this sudden access of conscience was simply that it knew it was going to lose an imminent case before the Investigatory Powers Tribunal (IPT), the body that considers complaints about UK government surveillance. And that, indeed, is what has just happened. As the human rights organization Reprieve, which helped bring the legal action, explains, not only has GCHQ been found guilty of illegal spying, it has also been ordered to destroy the materials it collected as a result…
-
Civil Rights
-
Filmmaker Michael Moore is stirring up debate today with a series of tweets on race and police brutality in America.
In his tweets, the Michigan native demanded that all African Americans incarcerated for drug crimes or nonviolent offenses be released from prison today.
He also called for all police to be disarmed.
-
Had the Baltimore Sun sought out and published the actual social media sources, instead of cutting and pasting a screengrab from a friend on Facebook with “word” of a panic, they could have demonstrated whether the flier was being spread more in support or in disgust. Alas, in rushing to justify the police crackdown and to prop up the “both sides” parity our corporate media pathologically seek, they made assumptions about a viral orgy of violence and pinned the mid-afternoon clash entirely on the students and a barely readable “purge” flier of unknown origin.
-
Fox News’ Geraldo Rivera was confronted by a Baltimore resident frustrated by the network’s history of biased and incendiary coverage of racial issues. Rivera responded by retreating before going live on-air where he described the young black man as a “vandal,” yelling at him, “you’re making a fool of yourself!”
Permalink
Send this to a friend
Posted in News Roundup at 7:58 am by Dr. Roy Schestowitz

Contents
-
Kernel Space
-
Daniel Phillips has worked out faster fsync support within Tux3, the promising open-source file-system that continues to be developed outside of the mainline kernel.
EXT4 maintainer Ted Ts’o previously doubted Tux3 capabilities when it came to a fast and reliable fsync, but Phillips has managed to prove him wrong with the latest async Tux3 fsync code.
-
Graphics Stack
-
The latest Mesa/Gallium3D driver work by AMD’s Marek Olšák is on working out create_context_robustness work for the Gallium3D drivers.
-
Applications
-
Proprietary
-
A new stable edition of Google Chrome has been released by Google, and it brings a number of important fixes for some security problems that haven’t been detailed just yet.
-
Instructionals/Technical
-
Games
-
The developers of Terraria have recently commented on a reddit post, and they mentioned Linux is still planned for the game.
-
The Arma developers have confirmed that an external team is working on the Linux version, and that it won’t be native.
For me, I don’t really care what a game uses anymore, as long as it is stable and performs well on reasonable hardware. If it does that, then fab!
-
There’s no question that Steam has become an ubiquitous part of PC gaming. Some have hailed it as the savior of PC gaming, while others have seen it as more of a necessary evil. Whether or not you’re a fan, Steam is here to stay. Its massive storefront contains over 4,500 games, and some 125 million people actively use the service. The question we’re trying to answer here is this: How the hell did Steam get to where it is today?
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
As said in the previous post, today, the Kde team released Plasma 5.3 which come with a lot of interesting features.
-
GNOME Desktop/GTK
-
The GNOME Project announced the immediate availability for download and testing of the first development release towards GTK+ 3.18, a powerful, cross-platform widget toolkit for creating graphical user interfaces, used by default in the GNOME desktop environment.
-
-
Screenshots/Screencasts
-
Debian Family
-
With this weekend’s release of Debian 8.0 Jessie there wasn’t an adjoining Debian GNU/Hurd release, but today that release has come out.
-
Derivatives
-
Canonical/Ubuntu
-
Canonical has announced that a NetworkManager exploit has been found and fixed for Ubuntu 15.04, Ubuntu 14.10, and Ubuntu 14.04 LTS operating systems.
-
Canonical has announced and released ubuntu 15.04 vivid vervet on April 23, 2015, it now available to download and install on your PC/laptop. This release brings improvements in usability, the bug fixes, a fresh serving of software updates and adds some interesting new features. Here’s everything you’ll find in the stable release of Ubuntu 15.04 vivid vervet.
-
I looked at Ubuntu’s flagship desktop environment, Unity, but most of the technical improvements are rolled into Ubuntu’s other desktop choices as well. These include Matte, GNOME and Kubuntu.
-
Remember a couple years back when Canonical was showing us how you could transform your phone into a full-fledged Ubuntu PC? That was a more of a concept, but it’s 2015 and that hasn’t been made possible yet, at least not by Canonical. Microsoft just demoed the same thing with its Windows phone.
-
Microsoft’s ploy to transform Windows Phones into full-blown Windows PCs when connected to an external monitor may seem revolutionary, but it’s nothing new. At least not in theory.
-
Flavours and Variants
-
Xubuntu developers informed users today, April 29, that the LTS (Long Term Support) version of the Xubuntu Linux operating system is no longer supported, as it reached end of life (EOL) on April 26, 2015.
-
-
As I mentioned in passing yesterday I have a MIPS Creator CI20. It’s a tiny single board dual core 32 bit MIPS computer. The cost was £55 including tax and delivery.
-
Arrow Electronics is adding open-source hardware to its embedded design offerings and it has signed up to Linaro, the organisation which optimises open-source software for ARM processor-based designs.
-
Phones
-
Tizen
-
Samsung have sent out an email today to Tizen developers informing them that the Global Free Tizen Store in now open as they have expanded their Tizen Store service coverage to include a massive 182 countries, effective April 29, 2015 !!!! This additional countries will only offer free apps at the moment, but we suspect this is a quick way to expand the coverage of the Tizen Store with the least amount of red tape to plough through.
-
-
Android
-
So much for hopes that TAG Heuer’s first smartwatch will cost less than its conventional counterparts. Jean-Claude Biver, the head of TAG’s parent company LVMH, says that the Android Wear timepiece will cost about $1,400 when it ships in October or November. That’s in the ballpark of lower-end quartz models from the watchmaker’s Formula 1 line, but it makes even the $1,000 steel link Apple Watch seem like a relative bargain. That money will get you more than just a luxurious brand name, however. Biver estimates that the TAG Heuer device will last 40 hours on battery, so you won’t have to panic if you forget to top it up one day. This is just a friendly reminder that watch prices at this level are dictated more by the design than what’s inside — a nice steel watch won’t come cheap.
-
Razer is taking pre-orders for its $100 “Forge TV” Android TV gaming player, with options including a gaming controller, keyboard, and PC streaming service.
Razer announced its Razer Forge TV back at CES in January, where it won eight awards including Engadget’s People’s Choice award for Best of CES 2015. Razer opened pre-sales for the Android TV compatible Forge TV on Amazon.com earlier this month, and has now opened direct pre-orders from its website, with shipments due May 5.
-
The LG G4 is the latest flagship phone from the Korean manufacturer and a device that has a lot to live up to. Not only have the likes of the iPhone 6 and Samsung Galaxy S6 raised the smartphone stakes over the past 12 months, but it’s predecessor, the LG G3, was crowned TrustedReviews 2014 Phone of the Year.
-
Google is life. Well, not really, but for some people it kind of is. For many of us, a Gmail account became a gateway to an entire Google lifestyle. One password logs us into numerous services, which is super convenient, but also quite scary. Over time, it is easy to let your guard down and fall for phishing sites that pretend to be a legit Google login. If your Google credentials are intercepted, you are going to have a bad time.
-
British luxury retailer Fortnum and Mason has seen 20 percent more customers check out online thanks to its brand new open source website.
The renowned store in London’s Piccadilly has completely replaced its existing e-commerce platform, opting for the open-source, and lesser known Spree Commerce platform to avoid vendor lock-in.
The new site has already improved usability, contributing to a 15 percent customer conversion rate, a ten percent on-site search conversion rate and its former 20 percent basket abandon rate reduced to zero, the retailer revealed.
-
Web Browsers
-
Databases
-
Besides being powered by more powerful server hardware, also delivering faster response times to Phoronix and OpenBenchmarking.org is thanks to MariaDB.
-
CMS
-
When you’re publishing anything online, the way you lay out your content can be as important as the content itself. A good layout can help readers better interact and consume that content.
Users of content management systems like Drupal have a number of options that allow them to create very attractive, very usable layouts. That’s one factor that drew Murray Woodman to Drupal. He co-founded Morpht, a Drupal-based web development shop in Sydney, Australia. He found that Drupal 6 provided a level of freedom and productivity, and hasn’t looked back.
-
In everyday life, I’m a web developer. Or, to be precise, I run a business that develops websites for a wide range of clients, from small businesses to large organizations. Every one of these sites comes with a CMS of some sort. Which CMS we use to develop the sites depends on a lot of factors, including what the client wants, the size of the website, and the required functionality. In this article, I’ll cover the lessons learned when we developed our open source Bolt content management system.
-
Openness/Sharing
-
-
The idea behind Charleston Open Source isn’t about competition for technology talent, even though the employers involved in it might be looking for workers with similar skills and backgrounds.
-
Open Hardware
-
Whether these newly-established ‘communities’ and their members are working together to solve a problem with the end-goal of 3D printing the solution or are simply just sharing open source files from across the world, the conversations would have likely never happened if it wasn’t for the increase in accessibility to 3D printers.
-
Standards/Consortia
-
The United Kingdom government has commissioned a study of the feasibility of UK banks giving customers the ability to share their transactional data with third parties via an open standard API. First mentioned alongside the autumn statement back in December, the chancellor has now outlined plans for a mandatory open banking API standard during the recent budget in March.
-
Security
-
Defence/Police/Secrecy/Aggression
-
Vessels have the right of freedom of navigation through straits, on “innocent passage” under the UN Convention on the Law of the Sea. As it sounds, that amounts to a right to pass straight through on normal business. Territorial waters do not affect innocent passage. The coastal state has the right to establish sea lanes for maritime safety purposes.
So whether the Marshall Islands flagged Maersk Tigris was in Iranian territorial waters is not relevant to its right to pass through. If, as Iranian sources have indicated, it really was impounded for commercial debt, then that would have to be in territorial waters. But for that the crew could not be detained, and the debt would have to be immediately stated and the ship released if paid. Iran is not acting as though this really is for debt.
[...]
I was sorry for the two American hostages who were killdied in a drone strike, but sickened that given all the hundreds of innocent women and children he has murdered in drone strikes, Obama finally got all sackcloth and ashes over two American men.
-
Censorship
-
The Popcorn Time blocks represent the first time Section 97A orders have been used to block access to a new type of sites, namely sites that distribute software and do not link to infringing content.
-
Civil Rights
-
Rightwing nationalist Viktor Orbán threatens to defy EU law and launches anti-immigration manifesto calling for internment camps for illegal immigrants
-
The National Rifle Association used riots in Baltimore to promote controversial “Stand Your Ground” self-defense laws by citing an article from conservative website Breitbart.com that claimed such laws “are an antidote for brazen in-your-face attacks on city streets.”
-
Internet/Net Neutrality
-
BT has coughed to a crappy glitch with its Home Hub 3A router that is blocking some VPN connections.
However, the one-time state monopoly appears to have taken a long time to acknowledge customer gripes, which have been piling up for weeks.
BT said it had taken a while to respond to individual complaints because it was essentially compiling a dossier so it could pinpoint the technical blunder.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »