07.31.15
Posted in News Roundup at 5:41 am by Dr. Roy Schestowitz

Contents
-
Two years ago, TrackingPoint burst on to the scene with a Linux-powered smart sniper rifle that took the guesswork out of killshots. Now, however, a pair of hackers have figured out how to make it miss every single time.
-
Amongst the top IT trends of the moment is the development of Linux Containers. Financial and technical investors, Linux software programmers and customers believe that Linux Containers will transform the way organisations manage their Linux environments from deployment to maintenance. A recent survey by Red Hat and Techvalidate says that 56% of the respondents plan to use Linux containers as vehicles for rolling out web and eCommerce over the next two years. The respondents included a number of Fortune 500 companies and public sector organisations. Any development in the world of e-Commerce is definitely worth taking a look.
-
The internet is reeling today at the “news” that a rare make of computer-aided gunsight can under certain circumstances be hacked into, permitting a hacker to interfere with a suitably-equipped rifle’s aim.
The gunsight in question is the much-hyped but seldom purchased TrackingPoint kit, a system with a Linux machine at its heart which can be fitted to a range of different rifles.
The TrackingPoint (details on its capabilities are at the end of this article) is mainly a curiosity. People who would be interested in it – experienced long-range marksmen – basically don’t need it, and people who need it – those who have seldom or never fired a rifle – typically don’t want it. And very few in either group can afford it.
-
-
Wow, it sure was a busy Thursday in the news feeds today. Windows 10 is getting a lot of headlines, some right in Open Source World. The Free Software Foundation issued a public statement urging folks to reject Windows 10 and LinuxBSDos.com advised dual-boot upgraders. The CEO of Mozilla even posted an open letter to Microsoft CEO concerning Windows 10. Elsewhere, Christine Hall blogged about the advancement of artificial intelligence, a LibreOffice update was announced, and Swapnil Bhartiya shared his pick of top five heros of Linux.
-
Desktop
-
Chromebooks have proven to be undeniably popular, with various models getting rave reviews on Amazon’s bestselling Chromebook list.
-
Server
-
Now, before I go any further with this, I should say that LaaS (Linux as a Service) is really not one of the acknowledged ?aaS acronyms. Linux servers in the cloud are generally considered PaaS (platform as a service) or IaaS (infrastructure as a service) offerings depending on how much control you need to exert over their configuration (the more you have to do, the more likely they’re IaaS). The distinction may not matter unless you’re setting up multiple systems in the cloud that need to interract with each other. In fact, Amazon doesn’t even use these terms to describe its EC2 offerings.
-
Kernel Space
-
We’ve been covering a report from search provider Algolia pointing out a potential issue in Samsung SSDs’ TRIM implementation. More recently, Samsung itself reported that the bug actually resides in the Linux kernel, and that the company had submitted a patch for the problem.
Now, we have more details of the bug. Samsung has provided us with internal documents detailing the exact cause of the issue, and the subsequent solution. We’re geting a bit technical here, so we’ll take some liberty to simplify. When Linux’s RAID implementation receives a sequence of read or write operations, it creates separate buffers in memory for each of them.
-
Linux and open source is driven by passionate people who write best-of-breed software and then release the code to the public so anyone can use it, without any strings attached. (Well, there is one string attached and that’s licence.)
Who are these people? These heroes of the Linux world, whose work affects all of us every day. Allow me to introduce you.
-
The availability of a new project that promises to automatically swap Nvidia or AMD/ATI proprietary video drivers during the boot process of any GNU/Linux distribution that uses the controversial systemd system and service manager has been brought to our attention.
-
David Herrmann announced the release of systemd 223 a couple of days ago, informing us all about its availability for download and the new features, improvements, and bugfixes it includes.
-
Lennart Poettering, the creator of the controversial init system and service manager for Linux kernel-based operating systems, has had the great pleasure of announcing the first system conference event.
-
Prolific systemd contributor David Herrmann announced the release of systemd 223 today.
The systemd 223 release has code clean-ups, bug-fixes, and has more improvements to systemd’s networkd code.
-
Graphics Stack
-
-
-
-
-
Thus if running the fresh Mesa code that will be formally released in September, there’s now OpenGL 4.1 exposed by default in the RadeonSI driver for AMD Radeon HD 7000 series GPUs and newer… Basically any AMD GCN GPU. The only exception to the OpenGL 4.1 support is that LLVM 3.7 or newer is also needed, which will be released at the end of August but is currently available via Git/SVN. LLVM 3.7+ is needed for the latest AMD GPU LLVM back-end to enable OpenGL 4.1 otherwise OpenGL 3.3 will be advertised.
-
Benchmarks
-
Continuing on from yesterday’s first Linux review of the AMD Radeon R9 Fury, here are some more Catalyst Linux benchmarks from this $550 graphics card.
Since yesterday’s review of the R9 Fury on Ubuntu Linux I have run some more tests covering a few other test profiles as well as delivering some more 1920 x 1080 and 2560 x 1440 (rather than 4K) benchmarks for those wishing to run their own side-by-side comparisons against this air-cooled Fiji graphics card with 4GB of High Bandwidth Memory.
-
There’s also some tests that run fine under the Intel Windows 10 driver but not the Intel Linux driver at this time. As a reminder, the Intel Windows driver exposes OpenGL 4.3 and OpenCL 2.0 support while at the moment the Intel driver exposes OpenGL 3.3 (but 4.0~4.1 in the coming days) and OpenCL 1.2.
These results were interesting for our first Windows 10 benchmarks, albeit the Intel Linux driver ended up being a little bit slower than the Intel closed-source Windows driver in many of these OpenGL tests.
-
Applications
-
Finally, after many iterations, we have something that works! The ocs-server team (Claudio Desideri and Francesco Wofford) is therefore announcing the first release of ocs-server 0.1 technology preview.
-
-
-
dmMediaConverter is described by its developer as an FFmpeg frontend (GUI), but regular users only need to know that it’s an application that allows them to quickly convert files from one format to another, in a simple and intuitive way. It’s not the best looking out there, but it gets the job done.
-
On July 30, the developers of the Goggles Music Manager software, an open-source music collection manager and player that supports some of the most popular audio file formats, announced the release of version 1.0.7.
-
Proprietary
-
Three years ago, when a user would attempt to download the Google Drive Sync Client, Google would bring them to the appropriate download page, which of course, is based off of the operating system that user is running on. If a user would attempt to download the Google Drive Sync Client while running on Linux, they’d land on a page where the message reads: “Not (yet) supported for Linux.” So, what’s the deal with Google not developing a sync client for Linux users, seeing as to how they build a lot of their things using Linux? There’s one simple answer to that, unfortunately. Windows is mainstream, so a lot of their focus is put on what a majority of people use. The bigger the market, the more money in their pockets, of course. But don’t fear, change is near!
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
For various modules which use gtk-doc, it’s a bit of a rite of passage to copy some build machinery from somewhere to generate a version.xml file which contains your package version, so that you can include it in your generated documentation (“Documenting version X of package Y”).
-
Games
-
The Xoreos project did their first release of this open-source game engine seeking to re-implement BioWare’s Aurora Engine.
-
Retro City Rampage is a bit of a love letter to the 80′s and 90′s gaming, and it just had a surprise Linux release.
-
Thanks to SteamDB it seems that Bound By Flame a graphically pleasing RPG may get a Linux version. It has mixed reviews, but it may be worth a look.
If you see this entry on SteamDB, it seems Linux is currently in a “qa_test” phase. This could mean it’s close to release, but it could also be just the start of testing.
-
Shadowrun: Hong Kong now has a release date, and it’s not far off at all. The game will release on the 20th of August!
-
Feral Interactive have released an absolute whopper—Middle-earth: Shadow of Mordor is now actually available for Linux. This is a seriously good game!
-
Middle-Earth: Shadow of Mordor is the latest game ported to Linux (and Mac OS X) by Feral Games! This game is now natively available on Linux, but for now the AMD and Intel drivers are not supported.
-
The history of Skullgirls for Linux is colourful, but it’s finally nearing release, and I am sure it will make a lot of people happy. I have been cleared to post this up on it (I checked to be sure), so enjoy a small preview.
-
-
A little over 30 games are now available for between 33 and 80 percent off. No word yet on whether the games on sale will change day by day but current highlights include the recently updated Star Wars Knights Of The Old Republic 2, Outlast, Dead Island, Borderlands: The Pre-Sequal, Dying Light, Garry’s Mod, Middle-Earth: Shadow Of Mordor, Civilization 5, Bioshock: Infnite, Dying Light, Ark and Metro 2033 Redux.
-
Yesterday Feral Games released Middle-Earth: Shadow of Mordor for Linux and Mac OS X. Since its release, I’ve been very busy working to get some benchmark results produced for this AAA game that’s out for Linux one year after the Windows released. Included in these initial results for Shadow of Mordor are benchmark results for a few modern high-end graphics cards plus looking into the warning issued by Feral about the lack of AMD support.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
The Second Alpha of Wily (to become 15.10) has now been released!
-
We launched Plasma Mobile at KDE’s Akademy conference, a free, open and community made mobile platform.
-
The KDE-Solaris site has been shuttered. The subdomain now redirects to KDE techbase, which documents the last efforts related to KDE on then-OpenSolaris. From the year 2000 or earlier until 2013, you could run KDE — two, three or four — on Solaris, either SPARC or (later) x86. I remember doing packaging for my university, way back when, on a Sun Enterprise 10000 with some ridiculous amount of memory — maybe 24GB, which was ridiculous for that time. This led — together with some guy somewhere who had a DEC Alpha — to the first 64-bitness patches in KDE. Solaris gave way to OpenSolaris, and Stefan Teleman rebooted the packaging efforts in cooperation with Sun, using the Sun Studio compiler. This led to a lot of work in the KDE codebase in fixing up gcc-isms. I’d like to think that that evened up the road a little for other non-gcc compilers later.
-
-
GNOME Desktop/GTK
-
The development team of the open-source Gnumeric spreadsheet editor software used in numerous GNU/Linux distributions announced the immediate availability for download of Gnumeric 1.12.23.
-
Three years ago this week was GUADEC 2012 where GNOME 4.0 was proposed along with GNOME OS. While GNOME 4.0 was supposed to materialize in 2014, that obviously didn’t happen, but at least GNOME 3.x has matured a lot and garnered much better support than it had years ago.
-
All of these changes will appear in GTK+ 3.18 in September. And we are not quite done yet – we may still get a modernized path bar this cycle, if everything works out.
The improvements that I have presented here are not all my work. A lot of credit goes to Allan Day, Carlos Soriano, Georges Basile Stavracas Neto, and Arc Riley. Buy them a drink if you meet them!
-
-
New Releases
-
The Apricity OS team is incredibly proud to announce the release of Apricity OS 07.2015 Beta, a new Arch Linux based distribution.
-
Screenshots/Screencasts
-
Red Hat Family
-
We’re happy to announce the general availability of Oracle Linux 6 Update 7, the seventh update release for Oracle Linux 6. You can find the individual RPM packages on the Unbreakable Linux Network (ULN) and our public yum repository and ISO installation images are available for download from the Oracle Software Delivery Cloud.
-
-
Oracle, through Michele Casey, had the great pleasure of announcing the immediate availability for download of the Oracle Linux 6.7 computer operating system based on the freely available sources of Red Hat Enterprise Linux 6.7.
-
In The Open Organization, Jim Whitehurst says leaders should be “catalysts.” Jim and other Red Hat leaders frequently talk about our high-level strategy—the areas on which we need to focus in order to be successful as a company. Jim isn’t telling everyone what to do; he is simply painting the picture of how he thinks we can be successful, hoping to “light little sparks and see what passionate fires erupt from there.” Departmental leaders have the challenge of determining how their teams can most effectively contribute to that success. Nobody is telling me (a middle manager at Red Hat) what my team needs to focus on—that’s part of the open organization culture. I get hints about where to focus by looking at our company strategy, listening to our leaders, getting feedback and context from internal stakeholders, and by talking with customers. My role is then to convey to the team what I’m learning in a way that translates to the work they are doing every day.
-
-
Red Hat, Inc. (NYSE:RHT) has received a top Growth Style score from Zack’s Research. The growth score is based on company financials as well as the company’s prospects for future growth. The score is a result of analysis of various aspects of the Balance Sheet, Cash Flow Statement and Income Statement. Stocks that are given a high growth score tend to have the characteristics resulting in market outperformance.
-
-
Fedora
-
Lennart Poettering announced today that KDBUS is now in Rawhide. “Josh [Boyer] thankfully added it to the Rawhide kernel packages, and our systemd RPMs come with built-in support, too now. If you are running an up-to-date Rawhide system adding “kdbus=1″ to your kernel command line is hence everything you need to run kdbus instead of dbus-daemon. (No additional RPMs need to be installed.) If you do, things should just work the same way as before, if we did everything right. By adding or dropping “kdbus=1″ to/from the command line you can enable kdbus or revert back to dbus1 on each individual boot.”
-
It looks like reworking the Fedup upgrade tool may still happen for Fedora 23. The upgrade to this upgrade tool would involve relying on DNF and systemd functionality to provide more reliable Fedora system upgrades.
Earlier this year was talk of replacing Fedup in Fedora 23 to overcome existing problems with this upgrade tool that’s been affected by issues in the past. Because of Fedup reliability concerns is also why I haven’t upgraded to Fedora 22 on my main workstation over Fedup frights.
-
With all of the Mesa OpenGL 4 happenings — and most recently OpenGL 4.1 for RadeonSI — you may be wondering how to run this latest code prior to its official release in September.
-
-
As my first job as Red Hat design intern I received from Mo a task to create some icons for Fedora LiveUSB Creator. The liveusb-creator is a cross-platform tool for easily installing live operating systems on to USB flash drives. A Live USB system stored on flash memory, sometimes called a stick, lets you boot any USB-bootable computer into a Fedora operating system environment without writing to that computer’s hard disk.
-
-
-
And also according to the feedback it has also been suggested to use a footer similar to the one in getfedora.org. Hence the modified design of the footer is also depicted in the mockups below. And as always feedback on these are welcome.
-
One aspect of open source that appeals to many people is the idea that anyone can contribute. All it takes is a great idea, a little bit of work, and you can have fame, glory, and more conference t-shirts than you know what to do with. The reality is often not quite as simple for many reasons. A common complication is software licencing. There are plenty of other locations talking about open source software licencing and the complications there of so this one will be narrowly focused and have a simple request: When submitting patches for the Linux kernel, whether to official kernel mailings lists or to Fedora, please remember sign off your patches.
-
A couple of days ago, Dennis Gilmore from the Fedora Project posted news about some interesting aspects of the development cycle of the upcoming Fedora 23 Linux operating system, due for release later this year, on October 27, 2015.
-
Kevin Fenzi posted a new message on the Fedora devel-announce mailing list a couple of days ago, informing all users and developers about a new proposal for the upcoming Fedora 23 Linux operating system, called DNF System Upgrades.
-
Debian Family
-
We are working on getting plasma-desktop to transition to testing as soon as possible (hopefully in 2 days time), which will resolve both those issues. We appreciate that the transition to KF5 is much rougher than we would have liked, and apologize to all those impacted.
-
Like each month, here comes a report about the work of paid contributors to Debian LTS.
-
Derivatives
-
Elive, a Linux distribution based on Debian that uses Enlightenment as the default desktop environment, is now at version 2.6.8 and it’s ready for download and testing.
-
Canonical/Ubuntu
-
The second alpha of the Wily Werewolf (to become 15.10) has now been released!
This alpha features images for Kubuntu, Lubuntu, Ubuntu MATE, Ubuntu Kylin and the Ubuntu Cloud images.
Pre-releases of the Wily Werewolf are *not* encouraged for anyone needing a stable system or anyone who is not comfortable running into occasional, even frequent breakage. They are, however, recommended for Ubuntu flavor developers and those who want to help in testing, reporting and fixing bugs as we work towards getting this release ready.
-
-
-
-
-
Canonical, through Martin Wimpress, announced on July 30 that the second and last Alpha builds of the Kubuntu, Lubuntu, Ubuntu Kylin, Ubuntu MATE, and Ubuntu Cloud 15.10 (Wily Werewolf) operating systems were available for download and testing.
-
For those interested in porting HTML5 games to Ubuntu Phone, Alan Pope has written a blog post about this relatively easy process. With having a redistributable HTML5 game, the “porting” to Ubuntu Phone mostly comes down to packaging it up via creating the manifest JSON file, adding a security profile, making a standard desktop file, building the resulting Click package, and then testing it out on an Ubuntu device — followed by ultimately uploading it to the Ubuntu Store.
-
Flavours and Variants
-
Martin Wimpress has announced that Ubuntu MATE 15.10 Alpha 2 (Wily Werewolf) has been released, and it comes with some pretty interesting changes. The biggest one is the removal of the Ubuntu Software Center.
-
The development team behind the Ubuntu Kylin computer operating system have announced earlier today the immediate availability for download and testing of the second Alpha build of the upcoming Ubuntu Kylin 15.10 (Wily Werewolf) distro.
-
The development team behind Lubuntu, an open-source and freely distributed flavor of the popular Ubuntu Linux operating system, announced a few minutes ago the release of the second Alpha build for the upcoming Lubuntu 15.10 (Wily Werewolf) distribution.
-
-
-
Acrosser has introduced a pair of COM Express Type 6 Basic modules based on circa-2013 Core i7/i3 CPUs from Intel’s extended lifecycle, embedded roadmap.
-
Phones
-
Tizen
-
At the Tizen Developer Summit 2015 (TDS) event in Bengaluru, India July 30-31, Samsung has announced new Tizen SDKs for their Smartphones, Smartwatches, and Smart TVs. The Summit is focused in helping to grow the Tizen ecosystem by educating developers to the Tizen Operating System. Samsung are still offering developers 100% revenue for their apps until January 2016, making it an attractive proposition.
-
AIDA64 is a Hardware and software information utility for tizen based devices. Based on the extensive hardware knowledge of the AIDA64 for Windows application, AIDA64 for Tizen is capable of showing various diagnostic information for the phones and tablets including:
-
Android
-
The Moto X was the best smartphone of 2014, and this year’s version is getting a significant upgrade.
-
-
Soon after LG launched its Android 5.1 Lollipop-based Gentle flip phone, Samsung has followed its South Korean counterpart with the launch of the Galaxy Folder flip phone. The new Samsung clamshell smartphone has been launched in South Korea at KRW 297,000 (approximately Rs. 16,350). The smartphone is expected to go on sale next month in Korea.
-
Gionee has launched its new Pioneer-series smartphone, the Pioneer P2M, priced at Rs. 6,999. The new Gionee smartphone will be available in India via online and offline retailers.
-
-
Motorola announced three new Android 5.1.1 (Lollipop) phones on Tuesday, including a high-end model that will be sold this fall in the U.S. as the Moto X Style Pure Edition, starting at the low price of $400 unlocked.
-
-
-
-
-
-
-
-
-
-
-
-
Imagine you’re at a family get-together. For the first time all day, everyone is in the perfect position and smiling, just waiting for you to snap the picture. You position your Android’s camera and click.
-
Tablets and smartphones are invaluable parenting resources, whether it’s providing new ways of educating and informing kids or simply entertaining them. Learning apps, creative thinking games, and streaming video apps make your Android device an incredibly handy thing to have around (even if you’re trying to limit screen time).
-
At an event in California earlier today, Volkswagen officially announced that upcoming 2016 VW models will be Android Auto-ready. Which models? For now, what we know is this: most model year 2016 VWs at “SE” trim and above will likely pack the generation two MIB infotainment system, which has Android Auto (and Apple CarPlay). There are 6.5″ and 8″ versions of MIB 2, but both offer the same Auto experience.
-
HTC’s One M8 flagships will not be receiving the Android 5.1.1 Lollipop update. Instead, the Taiwanese tech giant is heavily speculated to directly roll out the Android M upgrade later this year for both the handsets.
-
Angry Birds 2, the first official follow-up to the immensely popular 2009 game, has been released on iOS and Android.
-
As we saw in previous leaks, the update brings a full fledged Android Wear app which allows users to select accounts, browse and view entire conversations, as well as reply by either voice, emoji, or canned response. What wasn’t known is whether or not Android Wear users would be able to actually initiate a message using an “Ok Google” voice command on their smartwatch. We are now able to confirm in our version, this does, in fact, work.
-
-
Motorola announced brand new Android hardware on Tuesday, including the sleek and affordable Moto X Pure Edition phablet and the significantly updated budget-friendly Moto G. But there’s also one other thing Motorola plans to do starting with these phones in order to fix the most annoying thing about Android.
-
-
-
Toyota and Telenav are announcing today that certain 2016 vehicles will be the first to support Scout GPS Link, a feature that ferries route and destination information between the dashboard and a version of Telenav’s Scout app for iPhone and Android. Scout already has an in-car turn-by-turn mode that you can use directly on your phone, but this makes it easier — all the interactions (including voice commands) happen through the car’s display and audio system instead of the phone’s.
-
The Android 5.1.1 Lollipop is gradually being rolled out to different Samsung flagships. The firmware update is not a major update but brings fixes for various bugs that came along with the previous Android builds.
-
Sony’s Z3 is a good phone, handicapped with a skinned version of Android that looks dated, and comes with a dump-truck of superfluous crap. Thanks to this quietly-leaked Sony Android Concept, which strips away all the junk and leaves a experience that looks plain fantastic.
-
Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been slow to upgrade to more secure systems.
To draw attention to the problem, at next week’s Black Hat conference, Accuvant researchers will be releasing an open source piece of hardware that can be used to circumvent these readers.
-
Veterans Affairs Department Secretary Bob McDonald voiced his support for open source technology July 30, as he outlined a broad reform plan that includes streamlining information technology and taking a more “holistic” look at customer service.
“We have over 200 databases with customer information. That means if you want to change your address, you have to go to at least nine places to change your address at VA,” said McDonald during a morning keynote July 30 at a conference in Bethesda, Md.
-
-
Dotcom’s first file locker, Megaupload, saw him accused of knowingly hosting, and indeed encouraging the upload and distribution of, stolen films and music. From his new home in New Zealand, he’s fought a long legal battle on numerous fronts, fending off extradition attempts, accusing kiwi authorities of working without warrants end even trying, and failing miserably, to promote a political part .
-
Databases
-
Oracle/Java/LibreOffice
-
-
-
Oracle is the latest company to get on the Docker bandwagon, having announced support for the application container technology to come in a future version of Solaris Unix.
Docker arose out of the Linux world, and its original implementation takes advantage of a number of Linux kernel features, including LXC, cgroups, and namespaces.
Solaris, meanwhile, has had native support for containers since 2005, in the form of Solaris Zones. Rather than aping how Docker handles containers on Linux, Oracle plans to stick with this arguably superior technology.
-
-
CMS
-
Lakhani’s current role involves promoting the use of applications like Drupal, WordPress, Magento, and Redline through free tools and services. But, this Denver-based executive’s experience shows most in forming the global, distributed team of developers and support staff inherent to success.
-
BSD
-
OpenBSD is going through something of a minimalist phase right now, but that wasn’t always the case. There was definitely an era of aggressive importation as well. Times change, priorities change, projects change. I wasn’t involved with OpenBSD during the early years, but I think I can explain the shift in attitudes. This is part three of an apparently ongoing series that started with Pruning and Polishing and out with the old, in with the less.
-
One of our new developers, Alexandr Nedvedicky (sashan@), writes in to tell us about his trip to the lovely locale of Calgary for c2k15.
-
Public Services/Government
-
The Bulgarian government has added open source as a requirement to its ‘Preliminary criteria for the eligibility of eGovernment projects’.
-
Two IT trade associations in the Slovak Republic are objecting the renewal of a proprietary software licence contract negotiated by the country’s Ministry of Finance for all government organisations. Instead of continuing to rely on proprietary office suites, the groups want the Slovakian government to explore a transition to open source alternatives.
-
Standards/Consortia
-
Through their brief webinar Marijke and Marco will share with the audience how the Dutch Government is promoting the adoption of open standards through BOMOS, a method (initiated by Dr. Erwin Folmer, TNO with contribution from Marijke) which describes how to maintain and manage open standards.
-
Security
-
-
-
-
Serialization and, more importantly, deserialization of data is unsafe due to the simple fact that the data being processed is trusted implicitly as being “correct.” So if you’re taking data such as program variables from a non trusted source you’re making it possible for an attacker to control program flow. Additionally many programming languages now support serialization of not just data (e.g. strings, arrays, etc.) but also of code objects. For example with Python pickle() you can actually serialize user defined classes, you can take a section of code, ship it to a remote system, and it is executed there.
-
-
-
The United States Federal Communications Commission (FCC) has introduced ‘software security requirements’ obliging WiFi device manufacturers to “ensure that only properly authenticated software is loaded and operating the device”. The document specifically calls out the DD-WRT open source router project, but clearly also applies to other popular distributions such as OpenWRT. This could become an early battle in ‘The war on general purpose computing’ as many smartphones and Internet of Things devices contain WiFi router capabilities that would be covered by the same rules.
-
The Jeep Cherokee brought to a halt by hackers last week exposed wireless networks as the weakest link in high-tech vehicles, underscoring the need to find fast over-the-air fixes to block malicious intrusions.
Features that buyers now expect in most modern automobiles, such as driving directions and restaurant guides, count on a constant connection to a telecommunications network. But that link also makes cars vulnerable to security invasions like those that threaten computers in homes and businesses.
-
Censorship
-
PRIME MINISTER David Cameron is looking to ensure that adult websites, the sort that MPs like, will abide by age verification standards and make sure that fumbling punters are of adult age.
Cameron has a thing about these sites, as does a huge chunk of Westminster, and would like to see adult content subjected to bondage and inspection. He would like to give it a firm political going over and a good legislative seeing to. He wants to take it in hand.
-
Civil Rights
-
Following the grisly killing of Cecil the Lion we’ve heard many tone-deaf responses from celebrities including Mia Farrow. Add one more to that list, because the gun-slinging NRA member Ted Nugent has just weighed in and he’s pretty sure everything you know about Cecil’s death is wrong.
-
In a post on his zine “True to You,” Morrissey alleged that he was sexually assaulted by a security officer at San Francisco airport on July 27th. The British singer claims that an airport officer grabbed his genitals following a security check.
-
Internet/Net Neutrality
-
The Federal Communications Commission received about 2,000 net neutrality complaints from consumers over a one-month period, according to a National Journal article today. The overarching theme of the complaints is that customers are fed up with their Internet service providers, often due to slow speeds, high prices, and data caps. In a sampling of 60 complaints, the most frequent targets were AT&T, Comcast, and Verizon.
Permalink
Send this to a friend
07.30.15
Posted in News Roundup at 2:37 pm by Dr. Roy Schestowitz

Contents
-
Desktop
-
It may be cheap but out of the box, but the HP ProBook 455 G2 Ubuntu won’t suit many users. A newer Ubuntu or Windows OS may help, but it’s not one for the typical untutored budget PC buyer.
-
Following the guest post this past weekend about Purism’s Librem laptop remaining “blobbed up”, the crowd-funded company has put out new information.
Purism posted some Librem 15 Rev2 debugging photos. Purism is getting close to production on this second revision of the Librem 15 laptop that will be in an aluminum casing.
-
Server
-
In an interview, CEO Alex Polvi claims his company invented the cloud-native OS category and discusses how CoreOS’s update strategy differs from the likes of Red Hat
-
Expanding the z Systems ecosystem means data scientists can use Apache Spark’s common programming framework and get the full use of the mainframe’s advanced analytics capabilities – without having to get sidelined by any specific format for data.
-
IBM has announced support for Apache Spark for Linux on z Systems, as part of its effort to expand the reach of its mainframe platforms. Among other benefits, the z Systems will now have a lot of appeal for data scientists that can leverage Apache Spark’s advanced analytics capabilities–all running on Linux.
-
Docker’s momentum has been increasing by the week, and from that it’s clearly touching on real problems. However, for many production users today, the pros do not outweigh the cons. Docker has done fantastically well at making containers appeal to developers for development, testing and CI environments—however, it has yet to disrupt production. In light of DockerCon 2015’s “Docker in Production” theme I’d like to discuss publicly the challenges Docker has yet to overcome to see wide adoption for the production use case. None of the issues mentioned here are new; they all exist on GitHub in some form. Most I’ve already discussed in conference talks or with the Docker team. This post is explicitly not to point out what is no longer an issue: For instance the new registry overcomes many shortcomings of the old. Many areas that remain problematic are not mentioned here, but I believe that what follows are the most important issues to address in the short term to enable more organizations to take the leap to running containers in production. The list is heavily biased from my experience of running Docker at Shopify, where we’ve been running the core platform on containers for more than a year at scale. With a technology moving as fast as Docker, it’s impossible to keep everything current. Please reach out if you spot inaccuracies.
-
In fact, history is filled with examples of great people declaring a holiday for themselves. Take Christopher Columbus, for example. Upon discovering “The New World”, Columbus immediately declared the second Monday in October to be “Columbus Day” (to be celebrated with cake… and balloons… and confetti). It took a year or two to catch on, but before the decade was through, most of the world was already celebrating this new holiday. It’s true. Look it up.
-
SysAdmins of all experience levels, then, can benefit from brushing up on their job interview skills if they want to find and land a great new job.
-
Kernel Space
-
Lennart Poettering today announced systemd.conf 2015, its inaugural conference devoted to the future of systemd.
-
The AllSeen Alliance, a cross-industry collaboration to advance the Internet of Things (IoT) through an open source software project, today announced that Philips has joined as a premier member. Philips joins more than 170 members of the AllSeen Alliance, including premier members Canon, Electrolux, Haier, LG, Microsoft, Panasonic, Qeo (a Technicolor company), Qualcomm Connected Experiences, Inc., Sharp, Silicon Image (a Lattice Semiconductor company) and Sony.
-
Graphics Stack
-
Its tests show the Tegra X1 is just a bit lower than an Intel Core i3 Broadwell system which his a thumbs up for ARMv8 hardware on Linux and Nvidia’s Tegra plans.
The X1 SoC succeeds the K1 and is a 64-bit ARM design that’s has four Cortex-A57 cores and four Cortex-A53 cores. The X1 SoC uses Maxwell-class graphics and uses less than 10 Watts.
-
-
-
When AMD announced the Radeon R9 Fury line-up powered by the “Fiji” GPU with High Bandwidth Memory, I was genuinely very excited to get my hands on this graphics card. The tech sounded great and offered up a lot of potential, and once finally finding an R9 Fury in stock, shelled out nearly $600 for this graphics card. Unfortunately though, thanks to the current state of the Catalyst Linux driver, the R9 Fury on Linux is a gigantic waste for OpenGL workloads. The R9 Fury results only exemplifies the hideous state of AMD’s OpenGL support for their Catalyst Linux driver with a NVIDIA graphics card costing $200 less consistently delivering better gaming performance.
-
Since the Linux 4.0 kernel there has been DisplayPort audio support for the open-source Radeon driver. That DP audio handling came after a big rework to the audio code in the Radeon DRM kernel driver. A half-year later it looks like all the audio code is now cleaned up and ready.
-
-
-
Applications
-
French programmer Fabien Chéreau developed Stellarium; he launched the project in the summer of 2001. It is available in RPM for Fedora and in .deb files for Ubuntu and Debian. An entire developer team produces Stellarium with the help and support of many people and organizations. And the Stellarium Wiki houses a complete user guide. You can also view a video of Stellarium in action.
-
-
As you may know, Relay is an open-source, lightweight, IRC client developed for Elementary OS and written in Vala and GTK+
-
As you may know, LyX is an open-source and multi-platform WYSIWYM/WYSIWYG document processor, using TeX / LaTeX behind some graphical user interface. It is ideal for writting academic articles, theses or books and has support for mathematical formulas.
-
Instructionals/Technical
-
Wine or Emulation
-
Wine 1.7.48 didn’t make it out last Friday for the usual bi-weekly development released, but is out there today.
Wine 1.7.48 prominently improves support for OpenGL core contexts, supports pixel snapping in DirectWrite, and the OpenMP implementation has been furhtered along. There’s 39 known bug-fixes within this newest Wine snapshot.
-
Games
-
I recently stumbled upon two websites for learning coding and programming skills: CodeCombat and Codewars. Both use a free software philosophy (all code examples are open source licensed and/or available GitHub) and help teach different computer programming languages. I tested CodeCombat and Codewars out when some of my students were seeking to learn the Python programming language.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Many of you already know that FISL (The International Free Software Forum) is one of the biggest FLOSS conferences in the world. From 8 to 11 July 2015, 5281 free software passionate people met in Porto Alegre (South Brazil) for the 16th FISL edition, enjoying activities such as talks, panels, hackathons, workshops, and community meetings. All kinds of FLOSS-related topics were in place: development, translation, artwork, education, robotics, entrepreneurship, audio-visual, women and gender, politics, academia and research … Phew! that’s tiring
KDE has a long and memorable history at FISL and it wasn’t different this year.
-
The beginning of the day was reading some social media in the morning with breakfast catching up with the times. While going though my Google+ feed I saw a post that I seen before about the a bug with a krunner plugin. The plugin in question was this which Riddell, Dan and I debugged to find some more info about the bug such as that is effects Kubuntu, Arch and openSUSE so it is upstream related.
-
-
-
The organising team have done a fantastic job: we’ve had free busses running from our accommodation to the venue, video recording of talks (which I’m sure someone will post about soon), easy to access food, two parties and people always on-hand to provide information.
-
KDE Activities are multiple desktops. While easy to understand, they open up the possibility of new methods of workspace organization as well as new ways to layout the desktop. They deserve to be recognized as an innovation as important as tabbed browsing, and should be a part of every desktop environment, yet most users have only vaguely heard of them, and even fewer have tried them.
When a feature so elegant is ignored, something has clearly gone wrong — but what, exactly?
One thing is certain: Activities are one of the least unpublicized features on any desktop. From their introduction in KDE 4.0 to their implementation in Plasma 5, Activities have never had any online help. If you go to the desktop toolkit, you can click on Activities, but nothing suggests why you should bother. How to create an Activity is reasonably obvious with a little exploration, but why you would want to is never explained.
-
While FOSS Force gave you a look at setting up KDE Plasma on the desktop in Don Parris’ article last week, KDE recently jumped into the mobile fray by announcing KDE Plasma Mobile at their Akademy conference this week in Spain.
While it joins an already crowded field, with the likes of Android, Ubuntu Touch, Firefox OS and others already in the mobile OS space, Plasma Mobile “offers a free — as in freedom and beer — user-friendly, privacy-enabling, customizable platform for mobile devices,” wrote Sebastian Kugler, a lead architect, on KDE’s website. “Plasma Mobile is currently under development with a prototype available providing basic functions to run on a smartphone.”
-
-
The original plan was to allow an extension to handle the more crazy form-factors, but as I was blueprinting the APIs on paper I quickly found the tab-bar becoming a nightmarish monster which would have made custom tab extensions painful. Ultimately as a shortcut until a nice API can be made (and many more critical APIs can be rolled out) I’ll be adding sidebar tabs as a native feature. I may look at some sort of button form-factor as well, such as the ones commonly seen in mobile browsers.
-
During Akademy I hold a session about porting applications to Wayland. I collected some of the general problems I saw in various KDE projects and want to highlight them in this blog post, too.
-
-
-
After what now seems forever on a Windows based OS (most recently, XP and 7 for desktops, Vista for laptop), I decided to move away from XP and install Zorin OS 8 core. Although I am still on a learning curve, I cannot stress enough how much I love the OS and have not had a moment of wanting to go back to any Windows version.
-
New Releases
-
Beta versions are not so optimized as the Stable ones due to debug flags and developer profiles, you can encounter errors and incomplete things, if you want a more polished system try the Stable version instead.
-
Webconverger is a Linux distribution used for deployment in places like offices or Internet cafes, which provides users only with web applications. A new important upgrade has been made available and is now ready for download.
-
PCLinuxOS/Mageia/Mandriva Family
-
Red Hat Family
-
Senior director and general manager, ASEAN, Damien Wong Yok Weng said Malaysia was an important market for the company and it had much potential for the adoption of open source technology across industries.
Speaking to reporters at the official announcement of the subsidiary here, Wong said in terms of expansion strategy, Red Hat had looked at all the surrounding factors in the information technology (IT) industry.
-
-
Debian Family
-
Parsix GNU/Linux, a live and installation DVD based on the testing packages from the Debian project that’s using GNOME as the desktop, is now at version 8.0 Test 2 and is ready for download and testing.
-
Derivatives
-
Canonical/Ubuntu
-
Canonical said through the voice of Dustin Kirkland that you can use Ubuntu with Docker without violating any copyright policy, contradicting what Matthew Garrett said in a blog post just a week ago.
-
A second Snappy Ubuntu Core 15.04 iteration has been released by Canonical, and the new version comes with a reworked boot logic for BeagleBone Black, among other features.
-
Canonical has recently released a new OTA update for Ubuntu Touch and it brought a large number of new features and improvements, but also a nasty regression that caused the telephony function to fail on BQ phones and Nexus 4. That fix has finally landed.
-
Perhaps that’s a sign that it’s time for Canonical to take the opposite tack to Microsoft and move to less frequent releases, or at least less arbitrarily timetabled ones. Ubuntu is stable enough now not to need constant updating, and in this case waiting on the Linux 4 kernel would have made for a much more compelling release. Canonical’s engineers, meanwhile, could benefit from spending more time working on long-promised upgrades, and less time patching and polishing half-baked versions of things for a biannual release.
If you’re looking for a free, friendly and powerful OS for desktops and servers, Ubuntu is still an easy Linux distribution to recommend. But even for established Ubuntu users this update is neither practically nor emotionally compelling. If Canonical seriously wants Ubuntu to make more of a mainstream impact, Ubuntu 15.04 – a barely necessary update rolled out to serve a timetable rather than a strategy – is precisely the sort of thing it needs to stop releasing.
-
Earlier this week I posted some initial benchmark figures for the NVIDIA Tegra X1 on Ubuntu Linux. Those results showed much promise for this 64-bit ARM big.LITTLE SoC that also bears a Maxwell GPU, but that wasn’t tested for the initial comparison. Here are a few more benchmark results from this Tegra X1, including an Ubuntu 15.04 installation to show the difference against the Tegra X1 on Ubuntu 14.10.
-
Alan Pope, or Popey, Ubuntu’s new Community Manager of Engineering at Canonical has proven in this article that porting HTML5 Games to Ubuntu Touch is not such a difficult task after all.
-
Flavours and Variants
-
Ubuntu MATE devs recently decided to remove the Ubuntu Software Center from the default installation. The decision was met with some resistance, but a lot of users expressed their support for the removal of the Ubuntu Software Center. Now, the team has explained what are they putting in its place.
-
-
Avnet released a carrier board for its Linux-driven, FPGA-enabled MicroZed COMs featuring an Arduino shield interface and hooks to an optional MCU board.
The MicroZed Carrier Card Kit for Arduino extends Avnet’s SBC-like MicroZed computer-on-module with Arduino and MCU expansion. The $89 kit is designed for Internet of Things applications such as industrial control, remote sensing, and embedded vision.
-
SolidRun has revamped its line of sandwich-style, community-backed HummingBoard single board computers, adding a new high-end HummingBoard Edge model. Like the other HummingBoards, it runs Linux on swappable “MicroSOM” computer-on-modules running various Cortex-A9 based Freescale i.MX6 SoCs. SolidRun’s open-spec HummingBoard placed 21st out of 53 Linux- and/or Android-friendly hacker SBCs in our recent SBC reader survey.
-
Phones
-
Android
-
Razer acquires Ouya’s software, tech, patents and dev teams Gaming hardware company Razer has acquired the carcass of Ouya, including its software, tech and its technical and developer relations teams.
-
This review might not be very long but I have spent a long time playing and experimenting with Android x86 and if you stick with it and are willing to play with settings then you may get something close to desirable.
Those who will get the most out of Android x86 will be using a computer with a touchscreen.
-
Over the past two weeks we have seen three new Android phones announced that are priced to challenge Samsung, LG, and HTC devices typically found starting at $600.
-
Remix Mini is now on Kickstarter as the world’s first true Android PC and its makers, Jide Technology, just might be the first company that takes an Android OS and makes it run like a proper desktop.
-
The XBMC Foundation’s Team Kodi last week released version 15 of its popular, open source Kodi media player and home theater framework. The “Isengard” release of Kodi (formerly XBMC) offers enhancements ranging from new chapter support to an improved add-on manager, but the biggest news is the completion of the Android version.
-
Synopsys has announced the release of its annual Coverity Scan Open Source Report, which is widely followed. The 2014 report details the analysis of nearly 10 billion lines of source code through the Coverity Scan service and commercial usage of the Synopsys Testing Platform.
For the report, the company analyzed code from more than 2,500 open source C/C++ projects as well as an anonymous sample of commercial projects in 2014. Additionally, the report highlights results from several popular, open source Java and C# projects that have joined the Coverity Scan service since March 2013. Here are findings.
-
-
OpenDaylight, the open-source, software-defined network, is moving from the lab into full-scale production.
-
Our thoughts are with everyone who loved Nóirín, everyone who worked with them, everyone who went to their talks or learned from their writing, everyone who met them at a conference, everyone for whom they made the open source and technical communities a better place.
-
-
-
-
-
-
-
-
-
-
-
Almost three quarters of OpenDaylight users plan to use the open source SDN technology for Network Functions Virtualization, while over half are looking at it for cloud orchestration.
-
-
Colin Dixon, Technical Steering Committee Chair (TSC) at the OpenDaylight Project and a Principal Engineer at Brocade, said that the thing he’s most proud of during the Lithium release cycle was that it landed on time, without too much pain. He commented that the maturity of the overall project has grown over the last two years, making a stable release cadence possible.
-
Whether you do some blogging, work as a journalist or just make use of popular social media and cloud computing tools, you probably regularly need to acquire and customize publishable graphics. The good people at NPR are out to make that job easier.
-
Continuous integration (CI) is an integral part of an agile software development setup. Sprint after sprint, teams strive to “not break the build” while delivering incremental features. But when developers focus completely on adding features, code errors can sometimes creep in and render the software unusable. To stop such errors from being integrated into the software configuration management (SCM), a CI server is the gatekeeper that helps keep a tab on code quality. Even if the code is integrated to SCM, a CI server can quickly tell you what went wrong. In this post, let’s take a look at six open source CI server tools that you can use in your agile setup.
-
After a run of bad publicity and floundering to retain and attract users, parent company DHI today announced SourceForge.net and Slashdot.org are for sale. DHi said the reason was due to a refocus on their employment services. Elsewhere, CoreOS CEO Alex Polvi spoke with InfoWorld.com’s Paul Krill about cloud strategies and OpenSource.com wants to know what is your favorite desktop environment.
It’s been a rough year for SourceForge. SourceForge began last Summer by asking users to change their passwords for now reason at all before finally admitting the database had been hacked. Then they were found to be taking over software sources that appeared to have been abandoned and adding spyware into bundled installers. Later projects began fleeing in droves and SourceForge began a campaign to soften their image by reaching out and communicating more with “the community.” Today their owner announced the immediate availability of SourceForge.net and as an added bonus, if you dial before midnight tonight, you’ll get Slashdot.org too. The announcement said the sale was due to “not successfully [leveraging] the Slashdot user base to further Dice’s digital recruitment business.” No asking price was given, but DHi paid $20 million for the sites in 2012.
-
Today I learned of some of the worst kind of news, my friend and a valuable contributor to the great open source community Nóirín Plunkett passed away. They (this is their preferred pronoun per their twitter profile) was well regarded in the open source community for contributions.
-
A $10 device capable of skimming access cards on the go is soon to be released into the open-source community.
Radio-frequency identification (RFID) cards are a quick and convenient way for businesses to track as and when their employees are on site, and also act as a way to both restrict and permit access to particular corporate locations. While RFID technology can help secure enterprise offices in this way, the ease in which these access controls can be hacked has hit the spotlight in the form of a tiny device which costs only $10 to make.
-
Martin Fowler of ThoughtWorks began the second morning of OSCON 2015 with a talk about architecture.
Fowler started his talk by defining what architecture means with regard to software. The common definition that people have come to accept is: “the fundamental organization of a system embodied in its components, their relationships to each other, and to the environment, and the principles guiding its design and evolution.”
-
A Boulder, Colorado-based startup announced today that it has raised $3.6 million in seed funding to build the commercial version of the SlamData open-source project, helping businesses visualize semi-structured NoSQL data.
SlamData, Inc. says that it’s using the SlamData project’s framework to create a native analytics platform for NoSQL information, building proprietary security and management features on top of the main feature set.
-
Events
-
-
Beck, executive board member of Drupal Camp PA, said the camp he helps organize, which teaches people how to use the open-source programming software Drupal, can help almost anyone with basic computer skills build a website.
-
-
Web Browsers
-
Chrome/Store
-
-
The Open nature of the Operating system is what has endeared it to many users. Customizations and tweaks are done easily, further allowing people to make better use of their devices.
Many third party software providers have made the market place an even better place.on the other hand, the iOS is not an open platform. You cannot tweak or change it in anyway and no third party app maker make an app for iOS without being put through the OS.
-
-
To be fair, the Chrome Web Store is not the world’s worst app store. It’s just almost the worst, ranking somewhere between the Blackberry App World and the Windows App Store. But, with some small improvements, it can be significantly better.
-
Mozilla
-
Mozilla plans to launch a new testing program next month that will let Firefox users try out potential changes to the browser, according to documents published by the open-source developer.
-
SaaS/Big Data
-
As open-source and Big Data offerings become more complex, consultants are stepping into the gap to help companies make the right choices for their IT needs. Rishi Yadav, CEO of InfoObjects, Inc., joined Juan Asenjo, lead technology architect for Rockwell Automation, Inc., on theCUBE, SiliconANGLE Media’s production team, at Hadoop Summit 2015 to talk about the maturing Big Data infrastructure market and business needs.
-
HP is growing its cloud offering with the acquisition of the Stackato Platform-as-a-Service (PaaS) business from ActiveState. Financial terms of the deal are are not being publicly disclosed at this time.
-
Databases
-
Limitations in NoSQL databases mean they are more appropriate for some use cases than others.
-
Oracle/Java/LibreOffice
-
LibreOffice 5.0 will be announced next Wednesday – August 5, 2015 – at noon UTC. It is our tenth major release, and the first of the third stage of LibreOffice development. To show the impressive amount of new features added to LibreOffice since version 3.3, released in January 2011, we have compiled a summary of all previous announcements.
-
Major release LibreOffice 5.0 is due next Wednesday with a lot of new features. Italo Vignoli today posted The Road to LibreOffice 5.0 in which he looks back at all the added features since January 2015 with version 3.3. Today’s summary shows “the impressive amount of new features added to LibreOffice since version 3.3.”
LibreOffice 3.3 was released in January 2011. This release was significant in that the development and management of LibreOffice had come together in a short time and put out a release that brought several new features. SVG support, easier title and page formatting and numbering, improved ergonomics in Calc, and Microsoft Works support were among the newest features added by The Document Foundation.
-
I have been using LibreOffice since it was called Star Office and all documents opened in a tabbed interface, as in most modern spreadsheet applications (anyone remember those days?). From those early days until now, I have considered Star Office/OpenOffice.org/LibreOffice to be an excellent, if not superior, tool compared to many on the market.
-
-
The Document Foundation announced that LibreOffice 4.4.5 has been released and is now available for download. Until the launch of the new LibreOffice 5.0, in August, this is the most advanced version of the office suite you can find.
-
CMS
-
Snubbed by local media in their infancy for being too rudimentary, news outlets are taking a growing interest in using open-source content management systems like WordPress and Drupal.
Media companies’ tech execs say they like the open-source CMS platforms because the software now offers all the extras and options that managed CMS platforms do, while also allowing them more creativity and control.
-
Executives from open source CMS vendor HIPPO and proprietary CMS vendor Kentico squared off in a friendly debate about the pros and cons of open source versus commercial content management systems on a recent episode of the web-based show CMS Connected, hosted by commentator Butch Stearns.
-
Jahia, a leading open source User Experience Platform, proudly announces collaboration with Samsung subsidiaries to support and deploy digital and e-commerce projects as a global software partner. The partnership started in 2014 with the launch of a large Samsung portal, connecting thousands of retail locations that provide Samsung devices in the United States.
-
Business
-
It is obvious that open source is much used today and plays an important role in many organizations, but how used is it in large enterprises? This question has been addressed in a recent study called The Open Source Era, conducted by Oxford Economics, a venture with Oxford University dedicated to forecasting and quantitative analysis, and WIPRO, an IT, consulting and outsourcing company.
-
Today’s CIOs absolutely must be considering open source software in their enterprises. Even if the Wild West still comes to mind when you hear the term, it honestly has been changing the way I think about technology and how CIOs run their organizations.
-
Open source software has become a critical driver for innovation at leading companies and public-sector organizations around the world, according to a new research report produced by Oxford Economics in partnership with Wipro Limited, a leading global information technology, consulting, and business process services company. The report, ‘The Open Source Era’, also shows that open source software is essential to the use of other cutting-edge technologies and that open source methodologies have spread far beyond software development.
-
It is obvious that open source is much used today and plays an important role in many organizations, but how used is it in large enterprises? This question has been addressed in a recent study called The Open Source Era, conducted by Oxford Economics, a venture with Oxford University dedicated to forecasting and quantitative analysis, and WIPRO, an IT, consulting and outsourcing company.
-
Funding
-
-
-
-
-
-
-
-
-
-
-
GitHub has received a $250m infusion of venture-capital cash that values the code-sharing website at $2bn.
-
BSD
-
Francois Tigeot’s latest effort on porting the Intel i915 DRM code from the Linux kernel to DragonFlyBSD has paid off in the form of full acceleration for Broadwell “Gen8″ HD/Iris Graphics.
Tigeot issued a call for testing a few days back of an update to the i915 DRM code that would position the DragonFlyBSD’s code at the stage of the Linux 3.16 kernel. This updated code should fix some issues that previously caused X.Org Server crashes, correct outstanding bugs, improve performance for all GPU generations, and provide much improved support for Broadwell graphics. He noted that the Broadwell GPUs on DragonFlyBSD should now be fully accelerated with this new code.
-
-
FSF/FSFE/GNU/SFLC
-
RMS founded the GNU Project, the Free Software Foundation, and remains one of the most important and outspoken advocates for software freedom. He now spends much of his time fighting excessive extension of copyright laws, digital restrictions management, and software patents. RMS has agreed to answer your questions about GNU/Linux, how GNU relates to Linux the kernel, free software, why he disagrees with the idea of open source, and other issues of public concern. As usual, ask as many as you’d like, but please, one question per post.
-
Public Services/Government
-
Italian proponents of the use of free and open source software by public administrations are protesting a decision by the town of Pesaro to switch from using OpenOffice to a proprietary cloud-based office solution. They say the city has garbled the cost calculations and omitted a required software assessment study.
-
When it comes to identity management, major advances around a User-Managed Access (UMA) standard based on the OAuth protocol have made it possible for end users to define what level of permission and access they want to provide others with when accessing documents they create.
-
-
-
-
-
-
Openness/Sharing
-
This year’s Open Science series features great stories like Elon Musk’s Hyperloop transportation system and the future of drones and open source at the Dronecode Foundation. And, our team answers the question, “What is open science, anyway?”
But you want even more open science goodness, don’t you? Of course! So, here are 16 awesome open science projects you may have missed. Plus, three bonus reads. These are bookmark-worthy, folks.
-
Brent Picasso is CEO and co-founder of Autosport Labs (ASL), a company that develops open source motorsports technology. Their innovations allow enthusiasts to explore and enhance auto systems and to contribute back to the community.
-
-
Open Access/Content
-
According to the College Board, the average cost for books and supplies for the 2014-2015 school year was between $1,200 and $1,300. Because of the high costs, some students will wait to buy the books until they can afford them, missing assignments and having to start a course without all of the materials.
-
-
Open Hardware
-
You’ve heard of open source software. Linux is perhaps the best-known example. But what about open source hardware? It’s not a new idea, but it’s now in New Hampshire proving itself valuable to one of the town of Merrimack’s biggest employers. David Brooks, a columnist for the Nashua Telegraph and writer at Granite Geek.org, spoke with NHPR’s Peter Biello.
-
When you develop software, you need some kind of toolchain. For example, to develop for an ARM processor, you need a suitable C compiler, a linker, a library, and a programmer. FPGAs use a similar set of tools. However, instead of converting source code to machine language, these tools map the intent of your source code into configuration of FPGA elements and the connections between them.
-
Standards/Consortia
-
If you’ve watched television recently, you’ve probably noticed that Kate Upton’s tits really want you to play a smartphone game called Game Of War: Fire Age. That ad campaign cost approximately 40 million dollars, or about 5 million more than the entire development cost of Borderlands 2. They can afford their “it’s like Game Of Thrones, but, somehow, even more sexual!” marketing because, as we write this, Game Of War is raking in more than a million dollars each day. Jason Croghan has spent several thousand dollars on it, and he told us all about how games like Fire Age sink their claws into you — and don’t let go.
-
British Gas Business has suffered a 95 percent loss in operating profit during the first half of this year, following a transition to a new SAP billing and CRM system.
The utility firm said in its profit announcement this morning: “British Gas Business was impacted by issues following the implementation of a new billing and CRM system in 2014, which has resulted in significant delays to issuing customer bills.
-
Hardware
-
Flash-based SSDs have revolutionized enterprise storage. But SATA SSDs have serious problems that show that after more than 50 years of disk-based storage, our ancient I/O stack must be rebuilt. Here’s why.
-
Security
-
Yosemite, aka version 10.10, is the latest stable release of the Mac operating system, so a lot of people are affected by this vulnerability. The security bug can be exploited by a logged-in attacker or malware on the computer to gain total unauthorized control of the Mac. It is documented here by iOS and OS X guru Stefan Esser.
It’s all possible thanks to an environment variable called DYLD_PRINT_TO_FILE that was added in Yosemite. It specifies where in the file system a component of the operating system called the dynamic linker can log error messages.
If the environment variable is abused with a privileged program, an attacker can modify arbitrary files owned by the powerful user account root – files like the one that lists user accounts that are allowed administrator privileges.
-
There are a few other general security practices I put in place. First, as I mentioned before, because each host has a certificate signed by an internal trusted CA for Puppet, we take advantage of those certs to require TLS for all network communications between hosts. Given that you are sharing a network with other EC2 hosts, you want to make sure nobody can read your traffic as it goes over this network. In addition, the use of TLS helps us avoid man-in-the-middle attacks.
-
At the Black Hat hacker conference in two weeks, security researchers Runa Sandvik and Michael Auger plan to present the results of a year of work hacking a pair of $13,000 TrackingPoint self-aiming rifles. The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software. Their tricks can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing. In a demonstration for WIRED (shown in the video above), the researchers were able to dial in their changes to the scope’s targeting system so precisely that they could cause a bullet to hit a bullseye of the hacker’s choosing rather than the one chosen by the shooter.
-
Defence/Police/Secrecy/Aggression
-
Michael Moore’s new film, Where to Invade Next, explores how the US government maintains a state of “infinite war”, according to the Oscar-winning documentary film-maker.
Moore revealed rough details of the project, which he has been making “in secret” since 2009, in his first Periscope broadcast. He answered questions from fans posted on Twitter and started by saying he’d like to “say ‘Hello!’ to my NSA friends that are watching right now”. He’s been a vocal critic of the agency’s mass surveillance practices – revealed by the Guardian in 2013 – and called whistleblower Edward Snowden “the hero of the year”.
-
Environment/Energy/Wildlife
-
PacifiCorp and Berkshire Hathaway Energy should really consider a much more loftier goal but ultimately these companies are at the beck and call of shareholders so making large investments will reduce short term profits and that is why they are not going bigger. Another thing in addition to increasing these goals that PacifiCorp could do and should be doing across its grid is replacing transmission infrastructure with a smart grid where power can be stored when capacity exceeds demand. This in turn would reduce emissions significantly but also they could take steps like installing smart meters at all ratepayer locations (which PacifiCorp is behind on and only rolled out in a few small markets).
-
Finance
-
Like many other proud Greek-Americans, I’ve visited the country of my ancestors many times over the years. I even lived in Athens for two years while working for the U.S. government.
I recently returned to Athens for a week to help the Greek government draft a new whistlebIower protection law. It was my first trip to the country in nine years — and suffice it to say, a lot’s changed.
I followed the news of Greece’s financial collapse as closely as anyone. I’d heard the numbers — I knew that 40 percent of Greeks now live in poverty, for example, and that half of all young people in the country are unemployed. Seeing it in person was something else entirely.
-
A conversation about capitalism with two brilliant minds, Cornel West and Prof. Wolff, together in a rare joint appearance.
-
British Gas owner Centrica is axing up to 6000 jobs despite reporting that profits were up 44 per cent to £656 million during the first half of 2015.
Profits were boosted by higher household gas usage because of colder weather and the falling price of wholesale gas. Centrica nonetheless decided to slash its interim dividend by 30 per cent and aim to cut costs by £750 million in the next five years.
-
Normal children would be excited by a low roofed plastic wendy-house to hide away in and stew pretend tea. Some privileged toddlers may dream of a more stable wooden playhouse – big enough to host non-imaginary guests and less likely to blow away in a gust of wind. But no child other than Prince George could conceivably be the owner of a magnificent £18,000 cottage on wheels.
The royal tot was given a luxury Victorian-style outhouse as a second birthday present from Dorset based company Plankbridge that started up with the help of The Prince’s Trust. It is positioned on the edge of the Prince of Wales’s wildflower meadow at Highgrove, probably in the hope that scenic views will inspire George to inherit his grandfather’s love of botany.
While you’d expect the average wendy-house to be cluttered with plastic chairs and bowls of fake fruit, this one is fitted with a wood-burning stove, oak floors and a day bed. To make matters more laughable the souped-up shed is known as “The Shepherd’s Hut”, a title which carries with it connotations of rural poverty and humbleness.
-
Usually investing in other countries is thought to both increase returns to the country doing the investment and diversify risks, since it is unlikely that foreign countries will be subject to the same problems that may be hitting China (or the US) at the same time. It is interesting that the New York Times seems to hold the opposite perspective.
-
PR/AstroTurf/Lobbying
-
Washington lobbying by companies and groups involved in global trade boomed in the past nine months, records show, as Congress debated a landmark trade pact proposed by President Barack Obama, the 12-nation Trans-Pacific Partnership (TPP).
Lobbying expenditures by members of a pro-TPP coalition increased to $135 million in the second quarter of 2015, up from $126 million in the first quarter and $118 million in the fourth quarter of 2014, according to Senate Office of Public Records reports reviewed by Reuters.
-
When I went to work for Planned Parenthood of Wisconsin (PPWI) in 2003 as their legislative director, I was unprepared for the attacks this organization experiences on a routine basis. There are organizations solely dedicated to shutting Planned Parenthood down, and more pop up every day. Even before the 2010 tea party takeover in state Capitols around the country, including ours, the relentless legal and political attacks on Planned Parenthood were unending.
-
-
We’ve had a lot of recent success at getting the corporate media to respond to criticism, in great part due to your letters and emails. The fact that this correspondence is individually generated by you makes it all the more effective.
-
One of the most baffling elements to The New York Times botched story about a fictional “criminal” investigation bearing down on Hillary Clinton over her use of a private email account is the seemingly shrug-of-the-shoulders response from the Times editors who are ultimately responsible for the newsroom’s black eye.
-
Censorship
-
BBC journalists will be afraid of speaking out about the next big BBC scandal after seeing how those who tried to expose Jimmy Savile were forced out, according to the former head of investigations at Newsnight.
Merion Jones said the way he and other journalists who complained about the way the BBC handled the scandal were pressured to leave.
“We were told at the time that you won’t be sacked but over a year or two years you’ll realise you are being treated as an outsider, that you will never be trusted because you blew the whistle, and you will find yourself leaving,” he said. “I didn’t believe that, but I started watching what was going around me.
-
Darren, who currently sits as a Deputy District Judge and holds the title of Managing Associate with law firm Simmons & Simmons, has blown the dust of his abacus and actually totted up how many websites British browers aren’t supposed to be able to reach any more.
-
Open Rights Group has responded to David Cameron’s call to shut down porn sites that don’t have age-restricted controls.
-
O’Reilly media’s social media manager Josh Simmons further inflamed the situation by installing “GGAutoblocker,” a mass-blocking tool developed by Harper, onto the convention’s official Twitter account. The tool has been criticised in the past for labeling a vast number of innocent Twitter users as “harassers.”
This criticism is supported by peer-reviewed research on the autoblocker, which found that just 0.66% of users blocked by the tool can be accused of genuine harassment. The autoblocker operates on the basis of guilt by association, with users automatically added to the blocklist based on who they follow.
-
Privacy
-
Google will now let enterprise customers of one of its Cloud Platform services lock up their data with their own encryption keys, in case they’re concerned about the company snooping on their corporate information.
-
Recently, Congress heard testimony about whether or not backdoors should be introduced into encryption technologies, a technically problematic proposal that would fundamentally weaken the security of the Internet, according to a recent report written by eleven of the world’s leading cryptographers. But while Congress is reliving these debates from the nineties (we hear they’re in these days), the Crypto Wars are very much alive and well in other parts of the world.
The United Kingdom, Netherlands and Australia have gone farther than the proposals put forward by the FBI by introducing new regulations that seek to weaken and place limits on the development and use of encryption. These efforts, made ostensibly to protect citizens against terrorism, are likely to have severe economic, political and social consequences for these nations and their citizens, while doing little to protect their security.
According to the cryptographers’ report, encryption in fact has a critical role to play in national security by protecting citizens against malicious threats. The harm to the public that can be presented by lax digital security has been illustrated a number of times over recent months: data breaches such as the hack of the Office of Personnel Management compromised the personal information of tens of millions of Americans, while weak or flawed cryptography led to vulnerabilities such as Logjam and FREAK that compromised the transport layer security protocols used to secure network connections worldwide. Encryption is not only essential to protecting free expression in the digital age—it’s also a critical part of national security.
-
In Peru, there is an internal confrontation between ministries due to the data protection provisions of the TPP. The Ministry of Health opposes to the extension on data protection due to the effects than it can have on access over medicines for Peruvians, as many international organizations such as Medicos Sin Fronteras have claimed. Nonetheless, the Ministry of Commerce, in a document published puts this statement in doubt. The document contains 105 questions about TPP. Regarding access to medicine the document raises a question: will the TPP affect public health? Then the document states that the same concern was made during the Peru-U.S. FTA negotiation, but that to the moment those concerns have not been rejected or accepted by the Ministry of Commerce.
-
The head of the FBI has spent the last several months in something of a panic, warning anyone who will listen that terrorists are “going dark”—using encrypted communications to hide from the FBI—and insisting that the bureau needs some kind of electronic back door to get access to those chats.
It’s an argument that civil libertarians and technology industry executives have largely rejected. And now, members of the national security establishment—veterans of both the Obama and Bush administrations—are beginning to speak out publicly against FBI Director Jim Comey’s call to give the government a skeleton key to your private talks.
-
Four months from now, at the same time that the National Security Agency finally abandons the massive domestic telephone dragnet exposed by whistleblower Edward Snowden, it will also stop perusing the vast archive of data collected by the program.
The NSA announced on Monday that it will expunge all the telephone metadata it previously swept up, citing Section 215 of the U.S.A Patriot Act.
-
The White House on Tuesday ended two years of ignoring a hugely popular whitehouse.gov petition calling for NSA whistleblower Edward Snowden to be “immediately issued a full, free, and absolute pardon,” saying thanks for signing, but no.
“We live in a dangerous world,” Lisa Monaco, President Obama’s adviser on homeland security and terrorism, said in a statement.
-
Senate Majority Whip John Cornyn (R-Texas) on Tuesday said the upper chamber is unlikely to move on a stalled cybersecurity bill before the August recess.
Senate Republican leaders, including Cornyn, had been angling to get the bill — known as the Cybersecurity Information Sharing Act (CISA) — to the floor this month.
But Cornyn said that there is simply too much of a time crunch in the remaining legislative days to get to the measure, intended to boost the public-private exchange of data on hackers.
“I’m sad to say I don’t think that’s going to happen,” he told reporters off the Senate floor. “The timing of this is unfortunate.”
-
On 23th July, the French Constitutional Council adopted a historical decision, standing out by its disregard for individual freedoms, right to privacy and freedom of speech. The “elders” have decided to avoid a real analysis of the proportionality of the new surveillance laws, and have shown their will to not stand in the way of the political game, becoming a mere rubber-stamping chamber.
-
A highly-capable Russian hacker group with links to Russian intelligence and that is known for going after high-profile foreign and corporate targets is deploying a powerful new data theft tool against Western systems, according to a new report by a prominent American cybersecurity firm.
-
A REPORT published today by Common Weal proposes a new plan to ensure Scottish data security and sovereignty after the revelation in the Daily Record on 24 July that the UK Government had revoked the spying ban on devolved parliaments, leaving MSPs at Holyrood open to hacking of communications by GCHQ.
-
Civil Rights
-
The Ferguson cops charged Henry Davis with destruction of property because he bled on their uniforms when they beat him.
-
Hamilton County Prosecutor Joe Deters said Officer Ray Tensing “purposely killed” a 43-year-old motorist named Samuel DuBose on July 19. The officer, whom the university said had jurisdiction on the streets adjacent to the school, pulled over the motorist because the vehicle he was driving did not have a front license plate.
-
After University of Cincinnati police officer Ray Tensing was charged with murdering Sam Dubose, an unarmed black man who had been pulled over on a traffic stop, it was clear that the police body cam video of the shooting played an enormous role in the indictment.
-
The “shoot first, ask for immunity later” mentality of today’s law enforcement officers is perfectly highlighted in this story about a US military veteran finding himself on the receiving end of a military-style raid… all because a “helpful” neighbor reported him for being in the “wrong” apartment. (via Amy Alkon)
-
And indeed, for many, Holder’s seamless slide from theoretically prosecuting big banks to defending big banks from prosecution is a common-sense phenomenon only the hopelessly naïve would bother to decry. He’s a lawyer, what do you expect? was the substance of many a comment –of what comment there was, because, again, this latest glimpse of the porous tissue between regulator and regulated went down as no news at all for most of the press.
-
-
Intellectual Monopolies
-
Copyrights
-
Criminalisation throws up a number of questions. Do existing laws cover the area to be criminalised? (For example, trade secret theft in the US is often covered by wire fraud laws.) Will criminalisation have the desired effect on incentives? Is it an appropriate use of police and public resources? Does harm exist? Is there a victim? How do magnets work?
-
The City of London Police’s Intellectual Property Crime Unit (PIPCU) has been the subject of controversy following take-down notices sent to overseas domain registrars. We believe they need to strengthen their commitments to due process, independence and transparency.
-
Several prominent music groups including the RIAA, A2IM and ASCAP have accused CNET of hosting infringing apps on Download.com. In a letter sent to the CEO of parent company CBS, the groups urge the company to reconsider whether it’s wise to offer “ripping” software.
Permalink
Send this to a friend
07.29.15
Posted in News Roundup at 7:23 am by Dr. Roy Schestowitz

Contents
-
Many cheap WiFi routers are sold with the vendor firmware, but the most popular ones likely also support OpenWRT, which some users may prefer as it is much more customizable. However, this may soon become more difficult according to a talk at the upcoming “Wireless Battle of the Mesh” which will take place on August 3-8 in Maribor, Slovenia.
-
Kernel Space
-
Graphics Stack
-
Nvidia has released a new Linux driver in the stable branch and has fixed a few outstanding issues. The company also provides support for the latest GeForce 910M chipset.
-
Applications
-
-
On July 27, the developers of the famous Git open-source version control system were more than proud to announce the immediate availability for download of version 2.5.0 of Git.
-
The software that I decided to use is called LidarViewer. It’s open source, which means that anyone can use and modify LidarViewer for free as long as they give credit to the creator. LidarViewer is Linux specific. As a Linux user, that made me really happy, but I could only use a Windows machine while at NASA. That meant that I had to create a Linux virtual machine on top of a Windows computer. I had a lot of options for the operating system that I was going to use for the virtual machine.
-
-
Proprietary
-
On July 27, the Google Chrome developers, through Alex Mineer, were excited to announce the promotion of the Google Chrome 45 web browser to the Beta channel for all supported computer operating systems, including Linux, Mac OS X, and Microsoft Windows.
-
Google today rolled out the first beta of Chrome 45, their next major web browser version.
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
Through the years, I have settled on maintaining my sensitive data in plain-text files that I then encrypt asymmetrically. Although I take care to harden my system and encrypt partitions with LUKS wherever possible, I want to secure my most important data using higher-level tools, thereby lessening dependence on the underlying system configuration. Many powerful tools and utilities exist in this space, but some introduce unacceptable levels of “bloat” in one way or another. Being a minimalist, I have little interest in dealing with GUI applications that slow down my work flow or application-specific solutions (such as browser password vaults) that are applicable only toward a subset of my sensitive data. Working with text files affords greater flexibility over how my data is structured and provides the ability to leverage standard tools I can expect to find most anywhere.
-
Wine or Emulation
-
The Wine development release 1.7.48 is now available.
What’s new in this release (see below for details):
- Fleshed out OpenMP implementation.
- I/O stream support in the MSVCIRT C++ runtime.
- Support for pixel snapping in DirectWrite.
- More support for OpenGL core contexts.
- Various bug fixes.
-
-
Games
-
xoreos is a FLOSS project aiming to reimplement BioWare’s Aurora engine (and derivatives), covering their games starting with Neverwinter Nights and potentially up to Dragon Age II. This post gives a short update on the current progress.
-
Submerged was pointed out to us in our forum, and it seems the developers are considering a Linux version, and even testing it right now. The game looks beautiful, so I hope it does come.
-
The Raven – Legacy of a Master Thief is reasonably well rated crime adventure game, and GOG have now published it in their DRM free library.
-
Starship Rubicon instantly captured my interest with its mix of space combat, visuals from NASA, and the promise of gameplay like FTL, only you pilot your ship directly.
-
With Mesa quickly finishing up OpenGL 4.0~4.2 support and even some OpenGL 4.5 extensions, more Steam Linux games are becoming playable on the open-source drivers.
Open-source Mesa/Gallium3D driver users into Linux gaming can soon rejoice for another playable title: BioShock Infinite. BioShock Infinite was released for Linux back in March and required OpenGL 4.1~4.2 support, thereby making it off-limits to the Mesa/Gallium3D drivers of the time.
-
Last week I published the results of a 15-way AMD/NVIDIA GPU comparison for 4K Linux gaming that was centered around the proprietary AMD/NVIDIA graphics drivers. However, if you stick to using open-source Mesa/Gallium3D drivers and are a Linux gamer, here are some benchmark results comparing the open to closed-source driver performance at 3840 x 2160.
-
OlliOlli is one of the surprise success franchises of the past few years, finding a way to make skateboarding fun again (and in 2D no less). After a successful stint as a PS+ game earlier in the year, publisher Devolver Digital has announced today that OlliOlli2: Welcome to Olliwood will be released for PC, Mac and Linux via Steam, GOG and Humble on August 11 for $14.99.
-
-
-
Desktop Environments/WMs
-
-
When you install a Linux distribution, a set of programs comes along with it. It’s easy to add and delete elements of the programs that don’t fit your needs, says Meine in his article How to choose the best Linux desktop for you. But what about altering the look and feel?
-
K Desktop Environment/KDE SC/Qt
-
Move over, Ubuntu Touch and Android. There’s new competition in town. The KDE community just unveiled Plasma Mobile, a free and open-source mobile operating system.
This is nothing new for the KDE project. Before Ubuntu Touch was ever announced, the KDE community had a long-term vision of convergence. Plasma 5 on the desktop has a “converged shell” that can switch between different interfaces for different device types. KDE even attempted to release tablets with their Plasma software preinstalled, but this never worked out.
-
For KDE fans interested in the Akademy conference that started on Saturday in A Coruña, Galicia, Spain, there are a lot of daily reports coming out of the event.
-
-
Video recordings of the Akademy talks are now available in a low quality version to enable them to be released quickly. Higher quality version will be available later.
-
For most of the year, KDE—one of the largest free and open software communities in the world—works online by email, IRC, forums and mailing lists. Akademy provides all KDE contributors the opportunity to meet in person to foster social bonds, work on concrete technology issues, consider new ideas, and reinforce the innovative, dynamic culture of KDE. Akademy brings together artists, designers, developers, translators, users, writers, sponsors and many other types of KDE contributors to celebrate the achievements of the past year and help determine the direction for the next year. Hands-on sessions offer the opportunity for intense work bringing those plans to reality. The KDE Community welcomes companies building on KDE technology, and those that are looking for opportunities.
-
There are a lot of interesting developments occurring in the field of Linux smartphones right now. With so many different options popping up, fragmentation is a risk, as apps built on one platform fail to migrate to another. KDE’s new offering may help to make those apps available to a broader audience.
-
-
GNOME Desktop/GTK
-
The GNOME Project has released a new development milestone for the LaTeXila software, an open-source TeX and LaTeX editor used by default in the GNOME desktop environment.
-
-
The Solus operating system is getting closer to a stable release and its developers are showing off some of the capabilities of the distro, including the boot time, which has got to be the most impressive result out there.
-
New Releases
-
Vector Light Linux, a distribution based on Slackware that uses the IceWM window manager by default, has been released and is now available for download.
-
Gentoo Family
-
The developers of the Sabayon Linux distribution based on the well-known Gentoo operating system have released new Live ISO images for the supported editions of the Sabayon distro.
-
Red Hat Family
-
-
-
-
Fedora
-
The Cinnamon desktop is the only popular desktop environment that Fedora does not have a Spin for.
But that should change, unless something really bad happens, starting from Fedora 23, which is scheduled for release later this October.
-
I went across statistics from Fedora Package Database and what caught my attention is that the increase of number of packages in the official Fedora repository has almost stalled:
-
I was looking forward to setup a new storage box at home. The biggest two points were about being able to run Fedora, and to be in the cheaper side. After looking at the available hardware prices for the desktops, I thought I should look into something else.
-
Debian Family
-
Following years of waning popularity, the Debian GNU/Linux Project has dropped support for the Sparc architecture, effective immediately.
“As Sparc isn’t exactly the most alive architecture anymore,” Debian maintainer Joerg Jaspert wrote in a mailing list post last week, “not in [Debian 8.x] jessie and unlikely to be in [Debian 9] stretch, I am going to remove it from the archive this weekend.”
-
-
Derivatives
-
Canonical/Ubuntu
-
Proteus is a powerful laptop from Entroware that ships only with Ubuntu and Ubuntu MATE. Its makers have just announced that they are now equipping the Proteus model with a video card at no extra cost for new users.
-
Three QEMU vulnerabilities have been found and corrected in Ubuntu 15.04 and Ubuntu 14.04 LTS operating systems by Canonical.
-
On July 28, Canonical, through Marc Deslauriers, published details about the availability of a new important update for the BIND packages in the Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS operating systems.
-
Details about a couple of Apache HTTP Server vulnerabilities that have been found and fixed in Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS have now been published by Canonical in a security notification.
-
Today, July 28, Canonical published details about new Linux kernel updates for its Ubuntu 15.04 (Vivid Vervet) and Ubuntu 14.04 LTS (Trusty Tahr) operating systems, urging users to update the installations as soon as possible.
-
Ubuntu MATE recently decided to drop the Ubuntu Software Center and it will not longer be available with the upcoming 15.10 Alpha 2 release. This is interesting in itself, but this editorial is about another aspect. From the looks of it, a very large part of the Ubuntu and Linux community really hates the Ubuntu Software Center.
-
On July 28, Canonical, through Cemil Azizoglu, published the changelog of the recently released Mir 0.14 next-generation display server for Ubuntu Touch and Ubuntu Desktop Next operating system.
-
On July 28, Alan Pope, the Community Manager of Ubuntu Engineering at Canonical, published a comprehensive tutorial showing users how easy it is to port online games written in the HTML5 language to the Ubuntu Touch mobile operating system that powers several known Ubuntu phone devices.
-
The Ubuntu Touch platform might not have a lot of apps, but it’s making up by having a handy framework that can be used for webapps. In this case, it’s about a webapp for the famous wunderground.com weather service.
-
On July 27, Canonical, the company behind the world’s most popular free operating system, Ubuntu Linux, announced on one of their Twitter accounts that they launched a new campaign targeted towards movie directors.
-
-
The MakerWare I run on Ubuntu works well. I wish they were correctly signing their repositories. Even if I use non-SSL to fetch their key, as their Ubuntu/Debian instructions recommend, it still doesn’t match the packages:
-
Flavours and Variants
-
It was recently brought to our attention that someone made use of the generic Ubuntu MATE 15.04 root file system for aarch32 (ARMv7) based devices introduced a while ago, to run the famous Linux distribution on a MK808B Plus Quad-Core mini TV box device.
-
Ubuntu MATE developer Martin Wimpress announced this weekend that they’ll be removing the Ubuntu Software Center from their default install of Ubuntu MATE 15.10.
-
-
4D Systems and Newark Element14 launched a 2.4-inch, QVGA “4DPi-24-HAT” resistive touchscreen for the Pi for $35, said to be the first to use a HAT design.
Last October, the Raspberry Pi Foundation’s Eben Upton briefly demonstrated an upcoming official Raspberry Pi touchscreen. It’s unclear whether that 7-inch, VGA capacitive touchscreen is still on course, but in the meantime, there are a variety of RPi touchscreen options to choose from. The latest is a 4DPi-24-HAT screen from 4D Systems and distributor Newark Element14. It’s claimed to be the first to offer full compatibility with the Pi’s HAT (Hardware Attached on Top) add-on card standard.
-
F&S has launched an 80 x 50mm COM that runs Linux on a Freescale i.MX6, and offers optional industrial temperature support and a Pico-ITX sized baseboard.
-
Phones
-
Android
-
Lava, in partnership with Google, has launched its first Android One smartphone in India, the Pixel V1. Priced at Rs. 11,350, the smartphone will be exclusively available online via Flipkart starting Monday. Lava reveals that the Pixel V1 Android One smartphone will be also available via retail stores in the country.
-
-
-
The LG Gentle Android flip phone is a classic story of old meets new, with the odd twist here being that probably not even your new phone is up to par with this 1999-ish phone’s cutting-edge version of Android.
This clamshell handset with a 3.2-inch screen comes with Lollipop 5.1 installed — making it among the 1 percent of Android devices running Google’s latest iteration of Android.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Razer has confirmed its acquisition of Ouya, maker of the Android-based game console that started as one of Kickstarter’s biggest hits before fizzling out when it came to market with few games, limited functionality, and a bad controller. Razer has purchased Ouya’s software assets and hired its technical and developer relations teams in order to further work on its own Android TV gaming initiatives, including Forge TV and a version of Cortex designed for Android TV. Polygon reports that the deal includes about over 1,000 games that will be able to run on Razer’s device, making the purchase a quick way to prime it with content. The acquisition was made in all cash, according to TechCrunch; Ouya’s hardware was not included.
-
Google is taking steps to make Android phones safer by including a verified boot system that checks for irregularities in the platform code. And device owners will know that their phone or tablet is safe based on startup messages from the system check.
-
-
Earlier this year, data from Strategy Analytics revealed that Android’s share of the worldwide smartphone market checked in at 81.2%. Again, an impressive figure that’s hard to improve upon.
-
Experts from industry and academia gathered in Cambridge at the weekend to discuss just that as part of the city’s first Open Technology Week.
Open technology refers to items for which the source code or designs are available free of charge for users to use and modify.
-
Intel Corp. engineers from Portland will play a role in the development in a new tech development center that’s opening in San Antonio.
As the San Antonio Business Journal reports, Intel announced a significant investment with Rackspace in a new OpenStack Innovation Center that will be based at Rackspace’s headquarters in San Antonio.
-
Last July, after a full week at OKFestival, I managed to find enough energy to attend the Write the Docs EU Berlin Unconference. I only managed to attend one day of the event, but it was worth it because Paul Adams, a free software advocate and Director of Engineering at KDAB, led a discussion in which we came up with rules for helping documentation teams be more productive:
-
At OSCON this year, Red Hat’s Tom Callaway gave a talk entitled “This is Why You Fail: The Avoidable Mistakes Open Source Projects STILL Make.” In 2009, Callaway was starting to work on the Chromium project—and to say it wasn’t a pleasant experience was the biggest understatement Callaway made in his talk.
-
The helpful folks at NPR have released a collection of fully customisable, open source tools to help journalists create visually engaging images for social media.
The tools – called Quotable, Factlist and Waterbug – were announced last night by Brian Boyer, editor of the NPR visuals team, as an easy way “for you to create those fashionable social graphics for your news organisation”.
-
Overlapping scope and membership can confuse users, Miniman warns. Unlike the rules produced by standards committees, foundations don’t guarantee interoperability between implementations. IT organizations need to develop an understanding of how open communities operate, how different licensing models work and how they can become actively involved in shaping open source software.
-
Between 2005 and 2010, software development accelerated so quickly that some said open source had won the corporate market. But it didn’t stop there. In 2015, surveys showed that companies were using, supporting, and creating more open source software.
If we look at this pattern, then we can see open source will just keep growing. It’s not going anywhere. If you’re not using, contributing, or supporting it, then you’re going to be left behind.
-
DHI Group—formerly known as Dice Holdings Incorporated prior to this April—announced plans this morning to sell the combination of Slashdot and SourceForge. The announcement was made as part of DHI’s 2Q15 financial results, which were mostly positive, with DHI showing an increase in revenue over the same period last year (totaling $65.8 million) and a net income of $5.7 million.
-
Following the trend of privacy-respecting products and projects coming out of Europe (e.g., ownCloud, Kolab, and Plasma Mobile), German firm struktur AG has started a Kickstarter project called Spreedbox, which aims to offer a secure audio video conferencing service. According to the project page, “The Spreedbox is a unique device for secure audio/video conferencing, text and video messaging and file sharing. The Spreedbox is your own conferencing, meeting and file exchange service on the Internet and puts the control and security of your data into your own hands.”
-
Open source foundations are nothing new. Linux Foundation has been around since 2007, and other major projects like the Eclipse code editing tool and the Apache web server have been governed this way for even longer. Many of the most important open source projects in recent years, such as the Hadoop big data crunching platform and the database system Cassandra, are managed by the Apache Foundation. But it’s unusual to see so many new foundations created so quickly.
-
A typical summer research program—the institute’s Nanobio Research Experience for Undergraduates, for example—brings students together to one host university, where they work in different laboratories on various projects. In the new pilot training program on Computational Biomolecular, students use an open-source software called Rosetta to work together on problems in computational biology and are mentored by faculty who are part of a global collaborative team known as the Rossetta Commons. The software gives users the ability to analyze massive amounts of data to predict the structure of real and imagined proteins, enzymes, and other molecular structures.
-
FS tells me that Ars Technica reports that Dice is selling the Slashdot and Sourceforge sites. The company in their second quarter earnings announcements stated they have “not successfully leveraged the Slashdot user base to further Dice’s digital recruitment business”, and are planning to divest this business.
-
Events
-
Step 1 is very clear: Document your event. This way you have shared document that all organizers can refer to as the event progresses. We started with a sample document Kara and Francesca provided. The document is broken down is to several sections and you’re free to copy the document and use it to plan your own event. I’ll review some of the sections in more detail below.
-
SaaS/Big Data
-
DreamHost has made a name for itself over the years as being a friendly, yet low-cost hosting provider, offering both shared hosting as well as virtual private servers (VPS). DreamHost is also a major backer of the open source OpenStack cloud platform and now offers the DreamCompute cloud server as well.
-
Databases
-
Following three years of development and nine months of testing, Amazon Web Services (AWS) on Tuesday announced that its Aurora database engine is now generally available to customers.
AWS first debuted Aurora during its re:Invent conference in November 2014, positioning the database as a lower cost, higher performance alternative to the widely used open source MySQL database and other similar commercial offerings.
-
Oracle/Java/LibreOffice
-
The fourth Release Candidate for LibreOffice 5.0 has been released by The Document Foundation and it looks like the development cycle is coming to an end.
-
BSD
-
Electric Sheep Fencing LLC., through Chris Buechler, has announced the immediate availability for download of the fourth maintenance release of the pfSense 2.2 FreeBSD-based firewall software.
-
On July 28, the NetBSD Project, through Soren Jacobsen, announced the immediate availability for download and testing of the second RC (Release Candidate) version of the anticipated NetBSD 7.0 distribution.
-
In 2004, whilst at Netsight, I started looking at using OpenBSD for routing. We were using big Cisco 5505 switches with Route Switch Modules in to provide routing. The problem was, they soon became quite slow. They were great if you wanted to do very simple routing, and they could do Layer 3 switching in silicon on the linecards. But as soon as you started to do access lists then they had to route the packets on the main CPU. Not only that, but Cisco’s ACL syntax quickly became very cumbersome as you had no way of doing any kind of macros or variables in the language.
-
-
FSF/FSFE/GNU/SFLC
-
Sup peeps. So, after the slog to update Guile’s intermediate language, I wanted to land some new optimizations before moving on to the next thing. For years I’ve been meaning to do some loop optimizations, and I was finally able to land a few of them.
-
Public Services/Government
-
Croatia’s Ministry of Environment and Nature Protection has become one of the country’s major users of open source solutions. The software is making possible two geospatial service platforms on biodiversity and environmental protection, unveiled in May.
-
The Decentralized Administration of Peloponnese, Western Greece and the Ionian is recommending the use of open source software solutions for its Geographic Information Systems. A memo from the IT department wants all public administrations to start using Qgis.
-
Standards/Consortia
-
Organisations setting ICT standards should be open, as this improves their standards and contributes to their implementation in software, concludes a group of Swedish researchers. “Standards get better with contributions coming from individuals and organisations,” says Jonas Gamalielsson, lead author of a paper published in June.
-
-
Amazon is proposing that a pristine slice of airspace above the world’s cities and suburbs should be set aside for the deployment of high-speed aerial drones capable of flying robotically with virtually no human interference.
The retail giant has taken the next step in its ambition to deliver packages via drone within 30 minutes by setting out in greater detail than ever before its vision for the future of robotic flight. It envisages that within the next 10 years hundreds of thousands of small drones – not all of them Amazon’s or devoted to delivery – will be tearing across the skies every day largely under their own automated control.
-
Science
-
A new study into causes of the scarcity of women in technical and scientific fields says that it is not discrimination by men in the field keeping the ladies away. Nor is it a repugnance felt by women for possibly dishevelled or unhygienic male nerds.
No, the reason that young women don’t train in Science, Technology, Engineering and Maths (STEM) areas – and thus, don’t find themselves with jobs at tech companies, in IT etc – is quite simply that they mostly don’t know enough maths to do those courses.
“It is all about the mathematical content of the field. Girls not taking math coursework early on in middle school and high school are set on a different college trajectory than boys,” says economics prof Donna Ginther.
-
Security
-
-
Back in May was the big “VENOM” security vulnerability affect QEMU whereby VM security could be escaped through QEMU’s virtual floppy disk drive. In June was a PCNET controller buffer overflow allowing a guest to escape to have host access. Today there’s a similar security vulnerability going public about its virtual CD-ROM drive.
-
Rather than fancy zero-day exploits, or cutting-edge malware, what you mostly need to worry about when it comes to security is using strong, unique passwords on all the sites and services you visit.
You know that. But what’s crazy is that, in 2015, some websites are intentionally disabling a feature that would allow you to use stronger passwords more easily—and many are doing so because they wrongly argue it makes you safer.
-
Last week I argued that requiring backdoors in strong encryption would result in the effective end of encryption and provide a veritable buffet of sensitive data to both the government and those with malicious intents. Encryption with backdoors is not encryption at all.
-
Regular Naked Security readers will know that some security topics cause more friction that others.
Lately, artificial intelligence has provoked its fair share of excitement.
Surveillance and privacy are other topics that draw out some very varied viewpoints.
-
Defence/Police/Secrecy/Aggression
-
There are many reasons to be cautious about greater autonomy in weapons like drones, according to the men and women at the joystick.
-
Environment/Energy/Wildlife
-
The man suspected in Cecil’s death is Walter James Palmer of Eden Prairie, Minnesota, according to Johnny Rodrigues, head of the Zimbabwe Conservation Task Force.
-
A picture of Palmer posing with another lion he had killed on a previous hunting trip was widely circulated in the media yesterday after it emerged that he paid £32,000 to take part in a big game hunt in Zimbabwe.
-
Zimbabwean police said Tuesday they are searching for an American who allegedly shot a well-known, protected lion with a crossbow in a killing that has outraged conservationists and others.
The American allegedly paid $50,000 to kill the lion named Cecil, Zimbabwean conservationists said. Authorities on Tuesday said two Zimbabwean men will appear in court for allegedly helping with the hunt. The American faces poaching charges, according to police spokeswoman Charity Charamba.
[...]
Palmer, 55, pleaded guilty in 2008 to making false statements to the U.S. Fish and Wildlife Service about a black bear he fatally shot in western Wisconsin outside of the authorized hunting zone, according to court documents.
[...]
If convicted, the men face up to 15 years in prison.
-
-
A Cambridge professor has reportedly claimed three scientists investigating the effect of global warming upon melting Arctic ice may have been assassinated.
According to The Times, Peter Wadhams, a professor of ocean physics, said Seymour Laxon of University College London, Katherine Giles also at UCL and Tim Boyd of the Scottish Association for Marine Science had been murdered, after all three died within a few months of each other in 2013.
-
Finance
-
A new global trade agreement that eliminates tariffs on more than 200 kinds of IT products should result in lower prices to technology buyers around the world as it is implemented over the next three years.
-
A EUROPEAN TECHNOLOGY TRADE DEAL worth trillions of euros has been agreed between Europe, China and the World Trade Organisation (WTO).
The deal follows negotiations between the above parties and sees an accord reached on things like customs duties on items including games consoles, semiconductors and digital media.
-
The Trans-Pacific Partnership (TPP) threatens all users’ ability to access information and participate in culture and innovation online, but it’s especially severe for those with disabilities or who otherwise depend on content in accessible formats. That’s because it doubles down on broken policies that were heavily lobbied for by Hollywood and other major publishers that impede the distribution of accessible works.
-
Are any words in the English language more abused than ‘for your convenience’? As soon as you read them you know that it’s not your convenience an organisation has in mind, but its own.
Last week, my bank sent me a contactless debit card. If you don’t have one yet, the chances are you soon will have.
It looks like any other credit or debit card, but contains a tiny radio receiver which – when it is waved within a couple of inches of a ticket machine or terminal at a shop checkout – can be used to make a payment.
-
Censorship
-
An example is a tweet by freelance writer Olga Lexell (whose Twitter account is now private) – “saw someone spill their high end juice cleanse all over the sidewalk and now I know god is on my side” – which a number of Twitter users have republished without any attribution to her as the author of the original tweet.
Ms Lexell decided to submit a DMCA takedown request. Apparently not just God, but also Twitter was on her side. The micro-blogging platform decided in fact to withhold the allegedly infringing tweets. However (and incidentally), as IPKat readers can see here there is still a number of tweets that reproduce her joke in its entirety.
-
A few weeks ago, we wrote about the absolute ridiculousness of Donald Trump’s “lawsuit” against Univision, which made some bizarre claims about the First Amendment and defamation that clearly did not apply. While there may be a legitimate contractual dispute hidden somewhere in all that mess, there was so much fluff that it made you wonder who is actually advising the entertainer (pretending to be a politician) on legal issues. Apparently, it’s some guy named Michael Cohen, who isn’t just out of his depth on stuff, but he appears to be actively making things worse. In an astounding article over at The Daily Beast, which was initially over claims of “rape” by Donald Trump’s ex-wife Ivana during their divorce proceedings, Cohen not only claimed that you can’t rape a spouse, but also threatened to ruin The Daily Beast if they published an article. Lawyering by bullshit threats, apparently.
-
Privacy
-
Internet Australia and EFA have given their support to the Labor Party’s call for a review of the Data Retention Act legislation which it helped bring into law.
-
LinkedIn is dealing with some very unhappy users after making it more difficult for them to export contacts.
Business Insider reports that users can still download their contacts for the site, but it now takes longer. As of Thursday, LinkedIn users had to get an archive of their data to do the procedure, and that can reportedly can take up to 72 hours. Before, users could download user contact information immediately.
-
-
Git is a developer’s best friend… except when it’s not used properly and exposes a site’s security.
The tool is used for version control. It tracks changes to code over time, so that multiple developers can work together efficiently and roll back if they need to.
Git is also the core tool used to contribute to social coding site GitHub, though they aren’t the same thing.
It’s a glorious tool and fairly straightforward to use, but has a steep learning curve, as most of the interactions you’ll have with it are through the command line.
-
In case you were worried the National Security Agency was still probing around your phone records, soon enough they will be deleted.
The Office of the Director of National Intelligence announced that the “bulk collection” of phone data the NSA illegally collected under Section 215 of the Patriot act will be locked away starting November 29, 2015.
The data will effectively be out of reach from agency employees ad infinitum, effectively making it unusable in anti-terrorism or national security investigations. The only exception will be a three-month period, in which “technical personal” can check the data for the sole purpose of verifying records produced under the new USA Freedom Act.
-
The Peruvian President today adopted a legislative decree that will grant the police warrantless access to real time user location data on a 24/7 basis. But that’s not the worst part of the decree: it compels telecom providers to retain, for one year, data on who communicates with whom, for how long, and from where. It also allows the authorities access to the data in real time and online after seven days of the delivery of the court order. Moreover, it compels telecom providers to continue to retain the data for 24 more months in electronic storage. Adding insult to injury, the decree expressly states that location data is excluded from the privacy of communication guaranteed by the Peruvian Constitution.
-
One of the more interesting comments at the Aspen Security Forum (one that has, as far as I’ve seen, gone unreported) came on Friday when Michael Chertoff was asked about whether the government should be able to require back doors. He provided this response (his response starts at 16:26).
-
-
Unsurprisingly, the White House formally announced Tuesday that it will not be granting a pardon to Edward Snowden anytime soon.
Immediately after Snowden was formally charged in 2013 with espionage, theft, and conversion of government property, supporters began petitioning the White House to pardon the famed former National Security Agency contractor.
-
Put it online and it will live forever (Image: Aldo Sperber/picturetank)
They thought they could get away with it. The 37 million people who put nude photos and intimate details of their sexual fantasies on the Ashley Madison website (which has the slogan “Life is short. Have an affair”) had a get-out clause.
Ashley Madison, like some other sites, offers a hard delete – a guarantee that for a certain amount of money, your data will be scrubbed from all of its internal records. To permanently destroy all traces of your affiliation with the adultery social network costs £15 in the UK.
However, a hacker collective called Impact Team has revealed that customers’ details aren’t entirely deleted. Compliance with auditing requirements means that the credit card details and name used to scrub the account remain in Ashley Madison’s database, rather defeating the point.
-
Just as James Clapper’s office was officially announcing the death of the bulk phone metadata program (ending November 29th, with three months of post-wind-down wind-down for data analysts), the DOJ was filing a motion in the Second Circuit Court of Appeals basically arguing that its finding that the program was illegal really doesn’t matter anymore.
-
Civil Rights
-
Almost a decade ago, Britain’s High Court and Court of Appeal ruled that they and their descendants could return to some of the 65 islands, though not to Diego Garcia. Those decisions were challenged by the government and overturned in 2008 by the Law Lords, then Britain’s highest court.
-
In 1985, I called at Saloman Atoll, which is about 100 miles north of Diego, when crossing by yacht from Darwin to Aden. The abandoned houses and roofless church, together with the overgrown pathways were distressing to see. It is to our shame that we treated these islanders so cruelly and it is high time we made amends and repatriated them.
-
I got home from the bar and fell into bed soon after Saturday night bled into Sunday morning. I didn’t wake up until three police officers barged into my apartment, barking their presence at my door. They sped down the hallway to my bedroom, their service pistols drawn and leveled at me.
It was just past 9 a.m., and I was still under the covers. The only visible target was my head.
In the shouting and commotion, I felt an instant familiarity. I’d been here before. This was a raid.
-
It’s taken former Valdosta State University (VSU) student Hayden Barnes most of a decade and two trips to the 11th Circuit Appeals Court, but his efforts to hold the school accountable for its abusive behavior have finally paid off.
-
On the evening March 14, 2013, a heavily-armed police force surrounded my home in Annandale, Va., after responding to a phony hostage situation that someone had alerted authorities to at our address. I’ve recently received a notice from the U.S. Justice Department stating that one of the individuals involving in that “swatting” incident had pleaded guilty to a felony conspiracy charge.
-
The White House has finally responded — more than two years later — to a petition asking for a pardon of Edward Snowden. The petition surfaced soon after Snowden went public with his identity. Less than three weeks later — June 25, 2013 — it had passed the 100,000-signature threshold.
-
Intellectual Monopolies
-
Copyrights
-
The RIAA has obtained subpoenas from a federal court in Columbia ordering domain name registrar Dynadot to hand over the IP and email addresses and all other identifying information related to the operator of the unauthorized music service Soundpiff. In addition, the RIAA notes that the registrar may want to disconnect the site due to its repeated infringements.
-
Last minute evidence that completely turns a legal case on its head doesn’t come about all that often — despite what you see in Hollywood movies and TV shows. The discovery process in a lawsuit generally reveals most of the evidence revealed to everyone pretty early on. And yet… in the high profile lawsuit over the copyright status of the song “Happy Birthday,” the plaintiffs “Good Morning to You Productions” (who are making a documentary about the song and are arguing that the song is in the public domain) have popped up with a last minute filing, saying they have just come across evidence that the song is absolutely in the public domain.
And, here’s the real kicker: they discovered this bit of evidence after two questionable things happened. (1) Warner/Chappell Music (who claims to hold the copyright for the publishing, if it exists) suddenly “found” a bunch of relevant documents that it was supposed to hand over in discovery last year, but didn’t until just a few weeks ago, and (2) a rather important bit of information in one of those new documents was somewhat bizarrely “blurred out.” This led the plaintiffs go searching for the original, and discover that it undermines Warner Music’s arguments, to the point of showing that the company was almost certainly misleading the court. Furthermore, it definitively shows that the work was and is in the public domain.
-
The “smoking gun” is a 1927 version of the “Happy Birthday” lyrics, predating Warner/Chappell’s 1935 copyright by eight years. That 1927 songbook, along with other versions located through the plaintiffs’ investigations, “conclusively prove that any copyright that may have existed for the song itself… expired decades ago.”
-
WordPress has published new data on the number of piracy takedown notices the company receives. During the first half of the year copyright holders sent close to 5,000 requests to the blogging platform. Of these takedown notices a surprisingly high percentage was rejected due to inaccuracies or plain abuse.
-
This week WordPress released the latest edition of its recurring transparency report, revealing 43 percent of the Digital Millennium Copyright Act (DMCA) takedown requests it received have been rejected in the first six months of 2015. It’s the lowest six-month period shown in the report, though it only dates back to 2014. However, WordPress said this headline figure would be even higher if it “counted suspended sites as rejected notices.” That change in calculation would bump the WordPress DMCA denial rate to 67 percent between January 1 and June 30, 2015.
Permalink
Send this to a friend
07.28.15
Posted in News Roundup at 5:57 am by Dr. Roy Schestowitz

Contents
-
I wrote an interesting editorial a while ago related to the Mr. Robot TV show that runs on the USA Network channel every Wednesday, starring Rami Malek as a computer hacker that goes by the name of Elliot.
-
Desktop
-
Dual-booting Windows and Linux really sucks. It’s not because I hate Windows, either. It’s because I feel it should be unnecessary. It’s a half-measure that allows a lot of Linux users to play games or get things done.
-
Chromebooks have become incredibly popular among some users, as you can see from Amazon’s list of bestselling Chromebooks. One user decided to use a Chromebook as his primary computing device for three months, and found that it worked extremely well for him.
[...]
Debian Linux is known as a distribution that supports lots of different hardware, but now the Debian developers have announced the removal of support for the SPARC hardware architecture.
-
Kernel Space
-
I really wish that things were calming down, but it hasn’t happened
quite yet. It’s not like this is particularly big or scary, but it’s
also not at the stage where it’s really starting to get quiet and the
bugs are really small and esoteric.
So we still had some bugs due to the low-level x86 asm cleanup work,
and the 32-bit compat ‘syscall’ instruction (only used on AMD) was
subtly broken. That should be all fixed now, so if you run a 64-bit
kernel and have 32-bit user space (including things like wine etc) and
saw problems earlier, go ahead and update.
-
The rate of development for the Linux kernel is unprecedented, with a new major release approximately every two to three months. Each release offers several new features and improvements that a lot of people could take advantage of to make their computing experience faster, more efficient, or better in other ways.
-
-
-
AMD has released new Linux drivers for the upcoming Linux 4.2 kernel.
The drivers include the new “AMDGPU” kernel driver which succeeds the “Radeon” DRM kernel driver.
For those who came in late this is part of AMD’s long talked about new Linux driver architecture for supporting the latest GPUs and all future GPUs.
-
Graphics Stack
-
The Mesa developers, through Emil Velikov, have announced earlier today, July 26, the immediate availability for download of the third maintenance release of the stable Mesa 10.6 3D graphics library.
-
-
The HarfBuzz 1.0 milestone marks the point that it supports the Universal Shaping Engine, a project out of Microsoft’s Operating Systems Group as a new effort for converting Unicode texts to glyphs. Information on the Universal Shaping Engine is available via this blog post and here.
-
-
One of the latest Direct Rendering Manager drivers in development for the mainline Linux kernel is the Freescale DCU driver.
-
Applications
-
In the current DIY environment, many musicians can expect to wear a number of different hats. Of course, musicians and singers play instruments or sing for live audiences and in recording studios. Practising and rehearsing are also daily activities. They have always worn these hats. But there are many other duties that musicians and singers do themselves that have nothing to do with music; travelling to venues, finding locations for performances, and promoting their careers on websites and social media. They may also want to process and generate sound, and this is where audio programming languages step in.
-
-
The FFmpeg project and its forked Libav have added support for new video decoders based on libmfx, technology from the Intel Media SDK.
-
Proprietary
-
Instructionals/Technical
-
Games
-
This week I posted the results of a 15-way graphics card comparison on Ubuntu Linux with AMD Radeon and NVIDIA GeForce graphics cards while running the very latest proprietary drivers. Those tests were focused on 4K resolution testing in order to stress the latest-generation AMD/NVIDIA GPUs. However, if you want to see 1080p numbers, here are some benchmark-friendly results.
-
Victor Vran, an isometric action RPG developed by Haemimont Games and published by EuroVideo Medien on Steam, has been released on Linux as well.
The genre of isometric action RPGs is a very well defined one and it incorporates titles like Diablo. Victor Vran has been very well received by the community and the Linux platform has been supported right from the start.
-
Desktop Environments/WMs
-
WHAT’S NEW IN VERSION 150726?
1. ExLight is now based on Ubuntu 15.04 (alias Vivid Vervet) and Debian 8.1 Jessie.
2. I have upgraded the Desktop environment Enlightenment (Beauty at your fingertips) to version 0.19.7.
3. I have replaced kernel 3.18.0-10-exton with kernel 4.0.0-4-exton.
-
Immediately after having announced the major Enlightenment 0.19.6 release, the developers of the modern and lightweight desktop environment used in numerous GNU/Linux distributions offered Enlightenment 0.19.7 for download.
-
K Desktop Environment/KDE SC/Qt
-
I’ve just pushed a patch to KWallet5 allowing you to have your wallet unlocked automagically during login. This patch was originally done by Alex Fiestas for KWallet4, so all credits and free beers go to him; I’ve merely just forward-ported it.
-
Now that cauldron is open, the kde team has updated KF5 to 5.12.0, Plasma to 5.3.2 and Kde Applications to 15.04.3.
-
When approaching this issue I had been thinking about the issue for a while. I had mainly 2 problems: I was rather frustrated with previous Linux-based systems so far and the one I liked didn’t really scale for us.
-
A common problem for many applications contained in the KDE Applications releases are non-incremented version numbers. Often the maintainer forgets to update the version number of the application, like I did it for Kate since the first KF5 based release.
-
Akademy, the yearly KDE conference is alive and kicking. During the last days we were discussing again about potential KDE licensing issues (for instance code that is licensed under GPLv2, but not GPLv3). That’s why KDE is maintaining a relicense checker script, that every KDE contributor should enter herself/himself.
-
-
The second day at Akademy started off with 10 or so hours of sleep!, which was much needed for basic functions (really happy I don’t have to drive here). The hotel (Rialta) had great breakfast with coffee, OJ, bread with meat and cheeses, yogurt, cereal all the basics that makeup a great day!
-
-
-
KDE developers have announced that they are working on a new project called Plasma Mobile. From what the developers are saying, it’s running on Wayland, and it’s capable on running Ubuntu apps. One of the problems is that at least one of the Ubuntu developers has noticed that even if the project is based on Ubuntu for phones, credit is not given.
-
-
Jonathan Riddell said the hacking was frustrating at first, but Martin Gräßlin was able to get the system going with Wayland and KWin. Gräßlin said Plasma Mobile is the first product to use Wayland by default and the only reason Wayland is mature enough to be included as a technical preview in upcoming Plasma 5.4. They’re confident Android apps will run on it at some point as well.
-
As you may know, the KDE developers have created Plasma Phone UI, a Linux based operating based on Ubuntu Touch and Kubuntu Linux.
The OS is open-source, has an user-friendly interface and provides a customizable platform for mobile devices. For now, KDE’s mobile OS is just a prototype and can be tested on the LG Nexus 5.
-
With loads of help from people on #kde-devel, we finally managed to complete the KDE Network Filesharing port to KF5. Wasn’t easy, given that this was my first time porting frameworks, but it was real fun. Apart from apol’s blogpost shared in my last post, here’s another post that was immensely helpful to me while porting: Porting a KControl Module to KF5.
-
GNOME Desktop/GTK
-
During the release cycle of the GNOME 3.18 desktop environment, the GNOME developers updated the GNOME Initial Setup components, which is displayed only once when you first install the GNOME desktop on your GNU/Linux distribution.
-
As you may know, Gnome Pie is a circular application launcher, enabling the users to easily access their favorite apps, which they have added to the pie. For usage information, see this link.
-
-
-
Reviews
-
BackBox is a Linux distribution that’s based on Ubuntu and designed for conducting “penetration tests and security assessments”.
If you’re not familiar with the distribution, this brief review will give you an idea what else it can be used for other than being an OS for pentesters.
-
New Releases
-
On July 27, Arne Exton, the creator of several Linux kernel-based operating systems, had the pleasure of informing us about the immediate availability for download of a new build of his Exton|OS Light distribution.
-
On July 27, ARNU Box (formerly Armada) had the great pleasure of informing Softpedia about the immediate availability for purchase of two new Pure Linux set-top box devices powered by the recently released Kodi 15.0 “Isengard” media center software (formerly XMBC Media Center).
-
On July 26, Arne Exton, the creator of numerous distributions of GNU/Linux as well as various Android-x86 Live DVDs, was more than proud to announce the immediate availability for download of a new build for his ExLight Linux distribution.
-
Arch Family
-
The Manjaro development team, through Philip Müller, has posted an interesting article on the project’s website informing the entire Linux community that they need your help to contribute to the Arch Linux-based distribution.
-
Manjaro Linux 0.8.13 has received a fresh update pack and the developers have upgraded some of the supported Linux kernels, a number of important packages have been updated, and some important fixes have been implemented.
-
Ballnux/SUSE
-
Red Hat Family
-
Kesha Shah, a student at Dhirubhai Ambani Institute of Information and Communication Technology, and Sarah Sharp, embedded software architect at Intel, were named winners of Red Hat’s first Women in Open Source Awards. The winners were announced at Red Hat Summit, the industry’s premier open source technology conference, in Boston.
-
Red Hat released the latest milestone of Red Hat Enterprise Linux (RHEL) 6.x last week with the RHEL 6.7 update. With the update comes some new features as well as some that were backported from the more recent RHEL 7.x branch.
-
As previously disclosed, Charles E. Peters, Jr. will retire as an employee and Executive Vice President of Red Hat, Inc. (the “Company”) effective July 31, 2015.
-
-
-
Fedora
-
The number of Fedora packages within their repository has seemed to plateau, but it’s not necessarily a bad sign.
Fedora contributor Jiri Eischmann published some interesting statistics today indicating that the number of Fedora packages have leveled off since Fedora 20. Fedora 22 currently is comprised of 17,021 packages, which is largely flat since the Fedora 20 days.
-
I’ve recently set up a Fedora 22 firewall/router at home (more on that later) and I noticed that remote ssh logins were extremely slow. In addition, sudo commands seemed to stall out for the same amount of time (about 25-30 seconds).
-
Debian Family
-
On July 27, the Debian Project, through Joerg Jaspert, announced the effective removal of support for the SPARC hardware architecture from the Debian GNU/Linux operating system.
-
The Debian project is best known for its stable GNU/Linux operating system, a platform which is used as a base by over one hundred distributions. However, the Debian project is home to other operating systems, including a port of GNU’s Hurd. The GNU/Hurd port combines Debian packages and package management with GNU userland software running on GNU’s microkernel. The project offers this description: “The Hurd is a set of servers running on top of the GNU Mach microkernel. Together they build the base for the GNU operating system. Currently, Debian is only available for Linux and kFreeBSD, but with Debian GNU/Hurd we have started to offer GNU/Hurd as a development, server and desktop platform, too. We hope to be able to release Debian GNU/Hurd for Wheezy.”
-
While Debian supports many CPU architectures, it’s working to remove support for the Sun/Oracle SPARC architecture. As of this weekend, Debian has dropped SPARC from their unstable, experimental, and jessie-updates archives.
-
Derivatives
-
Canonical/Ubuntu
-
Ubuntu has changed its mind on an end-of-life announcement, giving Version 14.10 one last kernel patch to cover off some big vulns.
Usually, end-of-life means what it says: a version isn’t going to get any more updates, and that was the status of Ubuntu 14.10 “Utopic Unicorn” (guys, it’s time to rethink your naming conventions) after July 23.
-
Lately, I’ve found myself being asked by readers about how I like the Ubuntu phone I own for some time now, if I’ve already got used to it, and if they should be buying one right now, or if they should wait a little more time. If yes, which one should they buy?
-
The Meizu MX4 Ubuntu Edition is the latest phone to ship with the operating system built by Canonical, and it’s also the most powerful available right now. We’ll take a closer look at it, and we’ll try to determine whether it’s good enough to stand on its own.
-
-
On July 27, Canonical’s Łukasz Zemczak sent in his daily report informing us all about the work done by the Ubuntu Touch developers in the last couple of days, as well as to apologize for a regression introduced by the Ubuntu Touch OTA-5 update.
-
-
-
Flavours and Variants
-
The Ubuntu MATE distro will no longer ship with the Ubuntu Software Center, starting with the next 15.10 Alpha 2 released, announced one of the project developers.
-
-
Aaeon’s Yocto Linux ready, 3.5-inch “GENE-BSW5″ SBC offers Intel Braswell CPUs, dual GbE ports, six serial ports, and mini-PCIe, SATA, and mSATA expansion.
-
Phones
-
Android
-
The Lava Pixel V1 offers a solid value for the price, combining mid-range hardware with the latest Android software updates from Google.
-
The Lava Pixel V1 offers a solid value for the price, combining mid-range hardware with the latest Android software updates from Google.
-
If you’ve invested in one of a few “NVIDIA Tegra Note 7″ tablets, sold by other companies of course, and have been green with envy over all the attention showered on NVIDIA’s SHIELD devices, then maybe its time for a change of color. Somewhat out of the blue, NVIDIA rather quietly started to roll out a massive OTA update to the stylus-enabled tablet, pulling the Tegra Note 7 from Android Jelly Bean and right into Android 5.1 Lollipop territory, extending the device’s lifetime by just a bit.
-
Apple will always be limited in some way by its walled-garden. Even with its hugely impressive sales figures, in terms of overall market share, Apple made up just 18.3 percent of smartphone sales in the first quarter of 2015, while Android dominated with 78 percent. Growing iPhone sales in China will help bridge the gap somewhat, but even then they face fierce competition from budget Android handsets.
-
Android continues to account for the lion’s share of smartphone users in France, based on a recent report from the Mobile Marketing Association (MMA), “Le Baromètre Trimestriel du Marketing Mobile en France – Juin 2015 – 10ème edition.”
-
Craig Muzilla, Red Hat’s Application Platform Business’ Senior Vice President, says that 80% of businesses want their closed-circuit enterprise apps developed and deployed for the mobile, first. Samsung, on the other hand, has been preaching about the need for secure enterprise applications for several years now. Robin Bienfait, Samsung Electronics America’ Chief Enterprise Innovation Officer and Executive Vice President, envisions enterprise apps that will be deployed internally, but also double in functionality and let the business reach their customers and partners. These are the goals that the Samsung and Red Hat “strategic alliance” aims to reach.
-
The new model looks to be an improvement over its predecessor in nearly every way. “We started this company because we didn’t think any Android phones on the market were good enough,” OnePlus director and co-founder Carl Pei said. “We still think that’s the case, and we learned a lot from the OnePlus 1. The OnePlus 2 not only flagship worthy, but something that will remain cutting edge next year as well.”
-
To do this with Android Kitkat, the most popular Android version, you open the Messenger app and tap on the menu at the top right corner of the screen (the three vertical dots) and then tap on Settings. Once there, select Block Unknown Senders, and you’re done.
-
(There are a couple of workarounds: one is to root your Android mobile and disable Stagefright. Another is to remove or disable Google Hangouts, the default messaging app on Android, which processes video messages automatically. Even without Hangouts, if you receive a booby-trapped MMS and accidentally view it, you’ll still be infected. Finally, you could tweak your carrier settings to not receive MMS texts.)
-
Interestingly, the Stagefright vulnerability also affects Firefox on all platforms except Linux, and that includes the Firefox OS. Firefox developers have patched the vulnerability in versions 38 and up.
-
-
There are no guaranteed solutions, of course, but there are smart things we can do. One of the biggest is “eating our own dog food.” If you’re putting on an open source conference, there’s no reason you can’t use open source software to create the flyers, video promos, banners, T-shirt graphics, and the myriad of other pieces of content to run and promote the show. If you’re working for a company that ostensibly has a commitment to open source, ask if your marketing material is being produced with open source software. If it isn’t, then ask why not. And if you happen to be a creative at one of these companies, why aren’t you?
-
Open source software has become a critical driver for innovation at leading companies and public-sector organizations around the world, according to a new research report produced by Oxford Economics in partnership with Wipro Limited.
The report, The Open Source Era, also shows that open source software is essential to the use of other cutting-edge technologies and that open source methodologies have spread far beyond software development.
-
Typefaces designed for programmers aren’t a new idea, but I’m particularly taken with Iosevka, a monospace coding typeface that’s completely generated using Node.js.
The project – which is inspired by existing coding typefaces Pragmata Pro, M+ and PF DIN Mono – aims to produce characters that “have a narrow shape to be space efficient and compatible to Chinese, Japanese and Korean characters.”
-
The bank launched its Hygieia DevOps dashboard at the O’Reilly Open Source Convention (OSCON) last week in Portland, Ore. The Capital One Agile development teams all use the technology.
-
IBM has just launched developerWorksOpen to enable developers to collaborate using its open sourced technologies. It is poised to provide new tools, in particular with regards to mobile.
-
IFTTT (If This Then That) has this month introduced a new collection of new open source projects as well as updating existing ones.
-
Allen Gunn is a facilitator, open source technologist and Executive Director of Aspiration, where he helps NGOs, activists, and software developers make smarter use of tech for social change. Later this month, Aspiration is partnering with Greenpeace’s Mobilisation Lab to host the first-ever Open Campaigns Camp in Berlin. We recently got together to chat about working open and the leadership required to make it work.
-
Kravets showed us a report she found. It reviewed 23,493 GitHub projects and found that 75.3% had no gender diversity at all. This brought Kravets to the following quote from Malcolm Gladwell: “The world that we could have is much richer than the world we’ve settled for.”
-
In the open source industry, we often hear that we should fail quickly and often, but that doesn’t make failure any less scary. Failure seems like a personal problem, but it’s really a corporate problem. We use the phrase “failure is not an option,” and people are so proud to live by it. The fact of the matter, said Scavarda and Hawthorn, is that this statement should say “failure is not an option; it is a requirement.” The truth is that it’s not a matter of whether we will fail, but when we will fail and what will be our timeline for our recovery.
-
Unmanned Aerial Vehicles’ (UAV) applications and capabilities are advancing at a phenomenal rate, and the cost of these systems is decreasing at an equally impressive rate largely because of the open source. In many cases, open source projects are outpacing the development of their equivalent closed source systems.
-
phpMyAdmin, the popular free and open source web based tool for administering MySQL databases, has left the SourceForge building.
In a blog post on Saturday, the project’s infrastructure coordinator, Michal Čihař, announced that a migration from Sourceforge is all but complete. The few remaining items left on the SourceForge server will be “hopefully handled in upcoming days as well.”
-
Boundless’ global customer base uses the OpenGeo Suite, a complete open source geospatial web services stack, to deploy solutions for web mapping, transportation, telecommunications, open government, and a diverse range of other solutions. The OpenGeo Suite provides a continually updated geo web services platform along with maintenance agreements that include support and training to support the growing functionality of continually enhanced open source geospatial software.
-
Web Browsers
-
Mozilla
-
Firefox Nightly for Linux has been compiled with GTK+3 and the stable version of Firefox 42 may be the first one to be released with GTK+3.
-
Can your ideas make one of the most popular Internet browsers better? Mozilla is considering the possibility. The company is launching a testing initiative next month that will let Firefox users try out possible changes to the browser. The project is called “Idea Town” and basically seeks to crowdsource ideas for browser- and web-centric new concepts.
-
firefox-os-phone-firefox-os-phone-While choosing a new mobile phone to buy, you must consider all different available options. Earlier I’ve written about the differences between Ubuntu Touch, Android OS, and Windows Phone. Today I’m going to add another contender in the list – the Firefox OS – and I’ll discuss how is Firefox OS different from others.
-
SaaS/Big Data
-
On July 19, 2010, Chris Kemp, at the time NASA’s CTO for IT, went on stage at the OSCON open-source conference to announce OpenStack, a new open-source effort along with Rackspace. Five years later, OpenStack has emerged as one of the leading cloud platforms governments and big-name companies around the world use. Best Buy and Walmart are among the major retailers that use OpenStack while major carriers, such as Comcast and AT&T, are also users and contributors. One of the biggest drivers of OpenStack’s growth in the last five years was the formation of the OpenStack Foundation, a vendor-neutral, multi-stakeholder effort to help build and promote the OpenStack platform. While OpenStack in 2010 was made up of two companies, the OpenStack Foundation in 2015 numbers well over 100 members. Another key driver of OpenStack’s growth is continued technical innovation. In 2010, the OpenStack Platform started with just two projects: the Nova Compute Project and the Swift Storage Project. Over the years, multiple additional projects were added, including Glance image, Horizon dashboard, Neutron network and Keystone identity. Here’s a look at key milestones in OpenStack’s five-year history.
-
-
In the data analytics and Hadoop arena, the folks at Pepperdata have an interesting story to tell. Pepperdata’s cofounders ran the web search engineering team at Yahoo during the development of the first production use of Hadoop and created Pepperdata with the mission of providing a simple way of prioritizing Hadoop jobs to give resources to the ones that need them most, while ensuring that a company adheres to its SLAs.
-
Databases
-
MariaDB Corporation is a provider of open source database solutions for SaaS, cloud and on-premise applications that require high availability, scalability, and performance. Built by the founder and core engineering team behind MySQL, MariaDB has more than 2 million users globally and over 500 customers in more than 45 countries — most of whom are running Linux.
-
Oracle/Java/LibreOffice
-
Caolán McNamara, a renowned Red Hat engineer, has recently published some interesting details, claiming that he managed to get the well-known LibreOffice open-source office suite to run on the next-generation Wayland display server.
-
BSD
-
-
It has occurred to me that not learning Unix is a grave mistake. My relatively early exposure to Unix was important. I may not have appreciated Linux as much or even at all if I hadn’t had that ability to experiment at home with Xenix. Learning about Unix develops new mental muscles like playing a musical instrument or learning a new language. But learning these new processes becomes more difficult with age. To me the exact technical details are less important. It does not really matter if you are a Linux user or if you use one of the BSDs or even something more exotic like Plan 9. The important thing is you can learn new concepts from what I will broadly refer to as the Unix/Internet Community.
-
FSF/FSFE/GNU/SFLC
-
In the olden days, Guile had no compiler, just an interpreter written in C. Around 8 years ago now, we ported Guile to compile to bytecode. That bytecode is what is currently deployed as Guile 2.0. For many reasons we wanted to upgrade our compiler and virtual machine for Guile 2.2, and the result of that was a new continuation-passing-style compiler for Guile. Check that link for all the backstory.
-
Project Releases
-
The developers of the lightweight and user-friendly Claws Mail GTK-based email client used in many GNU/Linux distributions have announced the release of the major 3.12.0 version.
-
The developers of the famous open-source Docker Linux container engine have recently announced that the first RC (Release Candidate) version of the anticipated Docker 1.8 app is now available for download and testing.
-
-
Public Services/Government
-
The UK’s National Health Service (NHS) is nurturing a growing number of communities of software developers working on open source solutions. NHS’ Code4Health team is now supporting 17 communities that bring together health care providers, developers and supporters.
-
Programming
-
Google is no longer forcing Google+ on the world: people will be able to log into YouTube, and other Googley services, without having to create mandatory Google+ profiles.
From now on, only those who deliberately sign up for Google+ will create profiles on the ghost town of a social network. Previously, Google harassed users of YouTube, Gmail and so on, to convert their accounts into Google+ accounts, a move obviously designed to boost G+’s sad numbers. It didn’t go down very well at all – a lot of folks hated it.
-
Google has decided the autocomplete API it informally offers will no longer be available for “unauthorised” users as of August 10th.
-
Sepp Blatter deserves a Nobel Prize for his leadership of Fifa, according to Vladimir Putin.
-
Security
-
If successfully planted, the malware tries to register itself in the system as a daemon (system service). Thereafter it uses LZO compression and the Blowfish encryption algorithm to chat to command and control servers. Every packet contains a checksum, so that the recipient could verify data integrity.
-
-
Cybersecurity experts aren’t like you or I, and now we have the evidence to prove it. Researchers at Google interviewed more than 200 experts to find out what security practices they actually carry out online, and then spoke to almost 300 non-experts to find out how they differ.
-
More than a million Chrysler vehicles, including Jeeps, Ram pickups, and Dodge vehicles, are vulnerable to a major vulnerability that could drive them — literally — off the road.
Last week, the company recalled 1.4 million vehicles at risk of a remote hijack vulnerability, which, as detailed by Wired, can result in a hacker remotely operating the brakes, interfering with the driver’s visibility by switching on the windshield wipers, and even shutting off the engine.
-
Jane answered the phone and a pleasant young man identified himself as an internet technician with Microsoft. He told her they’d received a report that something was extremely wrong with their computers and he was calling to help.
[...]
From here it gets crazy. There was a $200 payment made to this “tech expert” and then he calls back and says that payment wasn’t necessary. In fact, an error was made and a draft of $2,000 had been made and not $200. He needed to take his $1,800 back. Of course, the “bank statement” Jane looked at did indeed show $2,000 instead of $200, so Jane was being asked to refund the $1,800.
-
-
In a joint operation that included law enforcement agencies from 20 countries, the infamous Darkode hacking forum has been taken down.
-
Defence/Police/Secrecy/Aggression
-
At last sensible Labour politicians are injecting some maturity into the leadership debate. To start with, Tony Blair’s aide John McTernan called anyone who nominated Jeremy Corbyn a “moron”, which is such a refreshing change from the divisive and childish approach of the Left.
-
Ian Cobain, a reporter with The Guardian, is one of very few people who know why a student arrested by armed British police officers in 2013 was finally acquitted this year of terrorism charges.
Problem is, he cannot report what he knows. He was allowed to observe much of the trial, but only under strict conditions intended to keep classified material secret. His notebooks are being held by Britain’s domestic intelligence agency. And if he writes — or even talks — about the reason that the student, Erol Incedal, 27, was acquitted, Mr. Cobain faces prosecution and possibly jail.
-
According to a document recently published on WikiLeaks, authorities in Saudi Arabia are looking for a new access point on the Arabian Sea. This implies either a port in the Sultanate of Oman or in Yemen.
-
Lord Hall, the director general of the BBC, is to be questioned by MPs over his refusal to refer to Islamic State using the term ‘Daesh’ (an Arabic abbreviation that means ‘one who crushes something underfoot’ and ‘one who sows discord’) because it is pejorative and therefore biased. Controversial British prime minister David Cameron had sent a request to the BBC supported in a letter signed by 120 MPs from across the spectrum – Labour, Tory and SNP.
-
No explanation was given of what these goals are, nor was any evidence given that “barely any Israeli” agrees with these goals.
While New York Times editors didn’t make Shmuel Rosner specify what the alleged goals of the avowedly pro-Israel peace group J Street are that “barely any Israeli” agrees with, context suggests the most obvious explanation: J Street has backed the Obama administration’s diplomacy with Iran and is backing the Iran nuclear deal, and that’s why opponents of the Iran nuclear deal are attacking J Street and saying that J Street’s claim to be “pro-Israel” is dubious.
-
Environment/Energy/Wildlife
-
Can Civilization Survive the CO2 Crisis?
-
Finance
-
Along with credit default swaps and other exotic instruments, the total notional derivatives value is about $1.5 quadrillion – about 20% more than in 2008, beyond what anyone can conceive, let alone control if unexpected turmoil strikes.
The late Bob Chapman predicted it. So does Paul Craig Roberts. It could “destroy Western civilization,” he believes. Financial deregulation turned Wall Street into a casino with no rules except unrestrained making money. Catastrophic failure awaits. It’s just a matter of time.
Ellen Brown calls the “derivatives casino…a last-ditch attempt to prop up a private pyramid scheme” – slowly crumbling under its own weight.
For years, Warren Buffett called derivatives “financial time bombs” – for economies and ordinary people.
-
I pointed out that Nicola Sturgeon’s appearance in the TV leadership debates was the first major airing of an anti-Trident argument on broadcast media in England for a decade. Actually hearing anti-austerity arguments led to a huge surge in support for the SNP in England as well as Scotland.
-
-
Prostitution and drug dealing provide a £10billion boost to the economy, new research revealed today.
Bizarre new European rules mean that for the first time illegal activities must be included in the official estimates of the size of the economy.
It means a booming sex trade or an expansion in cannabis factories will provide a boost to George Osborne’s economic outlook.
-
PR/AstroTurf/Lobbying
-
Journalistic objectivity is a sham, a horribly misleading and self-flattering conceit.
-
But something else struck me about the twitter record. Aaronovitch’ twitter account claims to have 78,000 followers. Yet of the 78,000 people who allegedly received his tweet about my insanity, only 1 retweeted and 2 favourited. That is an astonishingly low proportion – 1 in 26,000 reacted. To give context, Mark Doran has only 582 followers and yet had more retweets and favourites for his riposte. 1 in 146 to be precise, a 200 times greater response rate.
Please keep reading, I promise you this gets a great deal less boring.
Eighteen months ago I wrote an article about Aaronovitch’s confession that he solicits fake reviews of his books to boost their score on Amazon. In response a reader emailed me with an analysis of Aaronovitch’s twitter followers. He argued with the aid of graphs that the way they accrued indicated that they were not arising naturally, but being purchased in blocks. He claimed this was common practice in the Murdoch organisation to promote their hacks through false apparent popularity.
-
Walker was accused of coordinating with outside groups, namely Wisconsin Club for Growth and Wisconsin Manufacturers & Commerce. And these are groups that, after the US Supreme Court’s ruling in Citizens United, can accept unlimited secret donations, and Walker’s campaign is still bound by campaign finance limits that the US Supreme Court has consistently upheld.
-
Privacy
-
From the start of 2014 through March of this year, the NSA has paid the state $1,033,850 to patrol the perimeter of the data center, according to records provided by UHP.
-
Britain’s equivalent of the FBI has been condemned by judges after a sophisticated bugging operation against alleged money-launderers descended into farce and a series of ‘grave failures’.
The National Crime Agency deployed 100 officers in 30 cars to seize the bosses of a company in West London under investigation.
While the suspects were being interviewed at a police station, NCA chiefs hid listening devices in their offices.
-
The Department of Homeland Security has been monitoring the Black Lives Matter movement since anti-police protests erupted in Ferguson, Missouri last summer, according to hundreds of documents obtained by The Intercept through a Freedom of Information Act request.
-
Tor, the world’s largest and most well-known “onion router” network, offers a degree of anonymity that has made it a popular tool of journalists, dissidents, and everyday Internet users who are trying to avoid government or corporate censorship (as well as Internet drug lords and child pornographers). But one thing that it doesn’t offer is speed—its complex encrypted “circuits” bring Web browsing and other tasks to a crawl. That means that users seeking to move larger amounts of data have had to rely on virtual private networks—which while they are anonymous, are much less protected than Tor (since VPN providers—and anyone who has access to their logs—can see who users are).
-
Civil Rights
-
Alex Ciccolo was arrested after weeks of talking to an FBI agent he thought would sell him weapons for a terror attack—and who likely knew he was mentally ill.
-
The ever-vigilant Federal Bureau of Investigation has once again reminded us of the constant threat of domestic terrorism plots — by inventing one. But the most recent story has a more tragic twist than many other FBI “national security” capers, since it involves as well a betrayal of family values.
-
…the threat of white terrorism, which the US government largely ignores; a recent elaborate FBI sting against a poor black felon that shows where the agency is putting its resources; and how the FBI monitored live streams of Ferguson protests.
-
Retired general and former Democratic presidential candidate Wesley Clark on Friday called for World War II-style internment camps to be revived for “disloyal Americans.” In an interview with MSNBC’s Thomas Roberts in the wake of the mass shooting in Chatanooga, Tennessee, Clark said that during World War II, “if someone supported Nazi Germany at the expense of the United States, we didn’t say that was freedom of speech, we put him in a camp, they were prisoners of war.”
-
Former MSNBC employee Pat Buchanan used an appearance on NBC’s Meet the Press to frame immigration as a “massive invasion” and “conquest of the West” by “third-world … border jumpers.” During the appearance, host Chuck Todd did not mention Buchanan’s past history of racist comments, or that NBC’s cable channel MSNBC parted ways with Buchanan in 2012.
-
But VICE News has exclusively obtained more than 100 pages of contracting documents [pdf below] that show it was CIA officials who insisted on outsourcing work related to the Senate’s review — and that it was the CIA that paid more than $40 million to one of its longtime contractors for administrative support and other tasks related to the report. Those tasks included compiling, reviewing, redacting, and posting to a server the more than 6 million pages of highly classified CIA cables and other documents Senate Intelligence Committee staffers pored through during the course of their probe.
-
The Hoffman report (so named because the principal investigator is a lawyer named David Hoffman) was commissioned by the American Psychological Association to examine a 2005 APA publication called the Psychology Ethics in National Security document (PENS). This document, voted into policy by APA leadership at the time, outlined the conditions in which a psychologist could ethically work alongside military and intelligence interrogators. Critics from within and without the APA had—since the document’s inception—suspected foul play. The Hoffman report lays those accusations bare, by showing that the APA’s head of ethics had been directly working with the military to create a back-scratching policy.
-
Intellectual Monopolies
-
Copyrights
-
This decision of the Swiss Federal Supreme Court is not the most recent, but may be interesting in connection with the discussion on private copying exception in the UK.
-
Can collecting societies authorise the reproduction and communication to the public of out-of-print works without an express prior mandate from relevant rightholders?
Permalink
Send this to a friend
07.26.15
Posted in News Roundup at 11:28 am by Dr. Roy Schestowitz

Contents
-
Desktop
-
While it’s been several months since the Purism Librem crowd-funding campaing got underway for producing “the first high-end laptop in the world that ships without mystery software in the kernel, operating system, or any software applications,” the Librem 15 still relies upon a proprietary BIOS and there’s still no easy fix.
-
Kernel Space
-
Libreboot, the downstream of Coreboot that strips out all binary blobs / microcode / firmware, has added experimental support for a new ThinkPad laptop.
-
The Linux Foundation has announced the availability of a country-specific pricing for its Essentials of System Administration course and Linux Foundation Certified System Administrator exam for people in India. India is the first region in which the Linux Foundation will offer country-specific pricing on select training and certification products. The course plus exam will cost Indian credit/debit card holders 5,000 rupees which is equivalent to $79.
-
Graphics Stack
-
With the Linux 4.2 kernel settling down nicely and AMD developers having already sent in a few round of fixes for their new AMDGPU kernel DRM driver, I’ve started testing out this new kernel driver — plus the new xf86-video-amdgpu DDX and the associated new Mesa/LibDRM code — that is providing the open-source accelerated graphics support for Tonga and all new/future GPUs like Carrizo and Fiji.
-
Applications
-
-
-
Rcpp has become the most popular way of enhancing GNU R with C++ code. As of today, 423 packages on CRAN depend on Rcpp for making analyses go faster and further. Note that this is 60 more packages since the last release in May! Also, BioConductor adds another 57 packages, and casual searches on GitHub suggests many more.
-
After months of focused work, etcd 2.1 has been released. Since the etcd 2.0 release in January, the team has gathered a ton of valuable feedback from real-world environments. And based on that feedback, this release introduces: authentication/authorization APIs, new metric endpoints, improved transportation stability, increased performance between etcd servers, and enhanced cluster stability.
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
I’ve recently taken a new(ish) look at streaming video for the web, in terms of what’s out there of formats. (When I say streaming, I mean live video; not static files where you can seek etc.) There’s a bewildering array; most people would probably use a ready-made service such as Twitch, Ustream or YouTube, but they do have certain aspects that are less than ideal; for instance, you might need to pay (or have your viewers endure ads), you might be shut down at any time if they don’t like your content (e.g. sending non-gaming content on Twitch, or using copyrighted music on YouTube), or the video quality might be less than ideal.
-
Games
-
Cradle is a brand new adventure game from ‘Flying Cafe for Semianimals ‘ that’s now on Steam, I managed to grab a copy to take a look, and here’s my findings. It’s really nice to see another UNiGiNE powered game.
-
Excellent news guys, Aspyr Media have pushed out a hotfix for Knights of the Old Republic II Linux that makes it work with the restored content mod.
This modification is an essential addon to fix up the game, and now that it’s out I can safely stream some soon.
-
Fans of crawling about in the dark rejoice! Rogue’s Tale an interesting looking dungeon crawler now has a Linux version available.
-
Volo Airsport is a rather difficult game about gliding through the air, and we have some keys for you lovely Linux gamers.
I’ve tested it out personally and it’s quite difficult, hilariously difficult. It will take a while to get the hang of it, as the control scheme is pretty unique.
-
When I recently complained that Portal 2 was too easy, I have to say, The Talos Principle is challenging. For a solution that, if known, takes only a few seconds, I often have to wring my brain about the logistics for long long time. Here a nice screenshot from one of the easier riddles, but with great effect.
-
Desktop Environments/WMs
-
I did not hope that just handful amount of people would like KDE in comments. Probably there was one or two who pointed the love for Unity.
-
K Desktop Environment/KDE SC/Qt
-
The KDE community has spent the day in western Spain giving and watching talks showing new developments in the community and where we are likely to be going in the next year.
-
The developed prototype was written in C++, using Qt4. The speech recognition system was realized with the open-source speech recognition solution Simon, using a custom, domain-specific speech model that was especially adapted to the pervasive Styrian dialect. Simon was modified to integrate OpenEAR, which was used to evaluate a statement’s “arousal” value, to realize the paralingual weighting discussed above (this modification can be found in Simon’s “emotion” branch).
-
Earlier today I gave a talk at Akademy 2015 about WikiFM. Videos of the talk should shortly become available. Based on the feedback that I have received during and after the talk, I have written a short resume of the points which raised more interest. They are aimed at the general KDE developer community, who doesn’t seem completely aware of the project and its scope.
-
The yearly KDE conference Akademy is currently being held with lots of interesting talks and workshops. One big thing that was announced yesterday is Plasma Mobile, a free mobile platform.
-
-
Plasma Phone uses Wayland as the windowing system with KWin being the Wayland compositor. This is our first product which uses Wayland by default and also the first product which uses KWin as the Wayland compositor. The phone project pushed the Wayland efforts in Plasma a lot and is the only reason why we are able to make Wayland a technological preview with the upcoming Plasma 5.4 release.
-
-
The latest player to the open source mobile market is here, this time those behind the KDE desktop are pitching in. Their new project is called Plasma Mobile and it is already available for people to test on the Nexus 5. The OS seems to have a few different names at the moment, it is being referred to as Plasma Mobile, Plasma Phone OS and Plasma Phone.
-
-
-
The KDE Community just announced its ambitious Plasma Mobile platform. To better understand the project I reached out to Sebastian Kügler, one of Plasma’s lead architects and developers, and Chief Operations at Blue Systems. Following is a detailed and exclusive interview about Plasma Mobile.
-
-
-
-
GNOME Desktop/GTK
-
The Second step has finished June 26. But I prepared several exams in early July and went to Beijing to apply the Visa for GUADEC and had a travel in Beijing. So I was a little busy in the past few days. Now I’d like to spend sometime to write this blog and share something I learned during the second step of my plan.
-
-
PCLinuxOS/Mageia/Mandriva Family
-
On July 24, Russian company ROSA proudly announced the immediate availability of a major release of their ROSA Desktop Fresh GNU/Linux operating system built around a highly customized KDE4 desktop environment.
-
Red Hat Family
-
The sentiment dropped, as 170 investment managers increased or opened new positions, while 201 reduced and sold stakes in Red Hat Inc.
-
Debian Family
-
-
Derivatives
-
Canonical/Ubuntu
-
Evernote is one of the most popular note-taking services on the globe. But Evernote client app is still not available for Linux. So are you feeling unfortunate? You don’t need to. We have Everpad! Evernote can be used on Linux with Everpad. You can easily install it and use it on the go on your Ubuntu or other Linux Distributions.
-
-
-
The Intel Compute Stick is a tiny PC that plugs directly into the HDMI port on your TV or monitor. A model with Windows software launched earlier this year for $150. Now you can buy a model with Ubuntu Linux for $100.
-
Flavours and Variants
-
When I booted into Linux Mint, I immediately saw how mature and smooth the distribution was. It was a breeze to open files, switch between windows and even type, with a GUI which didn’t look like it was designed in the 1990s. The high level of theme customisability and the gorgeous wallpaper selection enthralled me, and impressed me enough to make it the sole operating system on my old laptop.
-
-
-
-
-
Phones
-
Android
-
When you’re writing code, picking the font you use is more about utility than beauty. Whether you’re an expert coder, or just starting out, this open source font is easy to read and easy to work with.
-
The Television Academy, those behind the Emmy award, have announced that they will be giving all voters a Chromecast device instead of distributing DVDs. Chromecast devices will work with a members-only website and streaming app.
-
-
Users are complaining after installing an update to take the operating system of the Tegra Note 7, launched by NVIDIA before the Shield gaming tablet, to Android 5.1 Lollipop.
-
Popular YouTuber Dave Bennett recently published instructions on how to make Half-Life run on Android Wear. While a smartwatch screen is rather small for such an epic game, the idea of getting Valve’s sacred shooter running on a wearable device just sounds really cool.
-
-
-
-
-
-
-
-
-
-
-
-
-
What’s interesting, though, is how similar the platforms are becoming. Android firms are doing a pretty good job of matching Apple’s design smarts, while Apple has clearly noticed how much people like Google Now. The platforms may be bitter rivals, but their battle is driving big improvements in both iPhones and Android devices – and that means everybody’s a winner.
-
Not strictly a feature, no, but it’s one of the reasons so many people like Android: unlike certain other platforms, there’s a massive choice of handsets to choose from at all kinds of prices – and even the really cheap ones are really good.
-
Thanks to SourceForge.net, it has been great home for us, but now we have better places to live.
-
CMS
-
I just pushed a new release of PiwigoPress (main page, WordPress plugin dir) to the WordPress servers. This release incorporates some new features, mostly contributed by Anton Lavrov (big thanks!)
-
BSD
-
The latest ARM platform that NetBSD has been ported to is the NVIDIA Jetson TK1.
This Tegra K1 ARM SoC Cortex-A15 development board is now in a fairly good working state with HDMI audio/video working along with other stability fixes. The NetBSD -current code is working on this board with the customized “JETSONTK1″ kernel.
-
A group of parents whose children were killed in the Germanwings plane crash have released a scathing letter to Lufthansa’s chief executive, accusing him of ignoring their needs and feelings and insulting them with his company’s compensation offer.
-
Are you a developer who uses Google’s unofficial Autocomplete API? Be warned, you won’t be able to do so anymore after August 10, 2015.
Google currently supports more than 80 APIs that developers can use to integrate Google services and data into their applications. The company also has unsupported and unpublished APIs which people outside the company have discovered and leveraged. One of those is the Autocomplete API.
-
Science
-
1980S BEDROOM BRILLIANCE the Commodore Amiga computer has reached the ripe old age of 30 and is still blazing in the hearts and minds of anyone who took keyboard and joystick in hand and shut the door on their parents.
-
The search for alien life is moving to the icy moons orbiting Jupiter following the discovery of organic materials hailed as the “building blocks of life”.
Work is due to start over the coming days on the development of a spacecraft for the European Space Agency (ESA) mission.
Named Juice (the JUpiter ICy moons Explorer), it is scheduled for launch in 2022 and arrive in the Jovian system around Jupiter eight years later.
-
A Dangerous Master, a new book by academic and futurist Wendell Wallach, takes us on a tour of the nefarious possibilities technological innovations can lead to. It’s not a light read if you’re not already familiar with predator drones and hacking the human genome. But it’s a perfect guidebook to the potential threats mankind faces if we continue along our current trajectory of unchecked innovative progress.
-
Security
-
Chrysler is having a bad week. On Tuesday, Wired published a fantastic and gripping report detailing an open vulnerability in Chrysler’s UConnect system, allowing attackers to take control of transmission, brakes, or even steering. There was already a patch available when the article was published, but because cars required physical updates, most cars hadn’t received it. Today, Chrysler upped the ante, asking 1.4 million cars to report to dealerships or install a patch mailed out over USB. It’s the biggest vulnerability we’ve ever seen from a car company, and a firsthand demonstration of how hard it is to patch a problem once it pops up.
-
President Obama’s team has spent more than a half trillion dollars on information technology but some departments, notably the IRS, still run on DOS and old Windows, which isn’t serviced anymore, according to House chairman.
-
Despite the fact that numerous American officials have blamed China for the massive hack that involved the personal data theft of millions of government employees, the United States has reportedly chosen not to publicly point the finger at Beijing.
Two breaches at the Office of Personnel Management this year put the data of more than 22 million Americans at risk, raising concern about foreign cyberattacks and lax government security measures.
-
Several car infotainment systems are vulnerable to a hack attack that could potentially put lives at risk, a leading security company has said.
NCC Group said the exploit could be used to seize control of a vehicle’s brakes and other critical systems.
The Manchester-based company told the BBC it had found a way to carry out the attacks by sending data via digital audio broadcasting (DAB) radio signals.
-
Welcome to the age of hackable automobiles, when two security researchers can cause a 1.4 million product recall.
On Friday, Chrysler announced that it’s issuing a formal recall for 1.4 million vehicles that may be affected by a hackable software vulnerability in Chrysler’s Uconnect dashboard computers. The vulnerability was first demonstrated to WIRED by security researchers Charlie Miller and Chris Valasek earlier this month when they wirelessly hacked a Jeep I was driving, taking over dashboard functions, steering, transmission and brakes. The recall doesn’t actually require Chrysler owners to bring their cars, trucks and SUVs to a dealer. Instead, they’ll be sent a USB drive with a software update they can install through the port on their vehicle’s dashboard.
-
-
“When you have access to information about the friends, family members and health issues of someone who works for the U.S. government, you can use that to try to get close to that person and gather intelligence,” she said. “To my mind, the OPM breach is absolutely catastrophic for our national security.”
-
As readers of WhoWhatWhy know, our site has been one of the very few continuing to explore the fiery death two years ago of investigative journalist Michael Hastings, whose car left a straight segment of a Los Angeles street at a high speed, jumped the median, hit a tree, and blew up.
Our original report described anomalies of the crash and surrounding events that suggest cutting-edge foul play—that an external hacker could have taken control of Hastings’s car in order to kill him. If this sounds too futuristic, a series of recent technical revelations has proven that “car hacking” is entirely possible. The latest just appeared this week.
-
Lara Abdallat is not your average beauty queen. She was Miss Jordan 2010 and first runner-up to Miss Arab 2011, but she abandoned her career in pageantry to do something slightly more controversial and dangerous.
Abdallat is currently fighting the Islamic State group and Islamic extremists as a hacktivist with Ghost Security, an international counterterrorism organization tenuously affiliated with Anonymous, perusing the Deep Web and the Darknet for suspicious activity.
-
Defence/Police/Secrecy/Aggression
-
-
The attack on a Navy and Marine Reserve recruitment station in Chattanooga, Tennessee, was an act of war.
It was not terrorism.
Was it terrifying? Certainly. War is terrifying. Was it tragic? No doubt. War is tragic. Was it terrorism? No.
Muhammad Yousef Abdulaziz killed Marines, three of whom had served abroad.
He did not shoot up a church, school, or movie theater–he attacked a military target. There was premeditation in his action, intent. He attacked a recruitment station, no different in purpose than the recruiters and training camps we regularly destroy in Iraq, Syria, Yemen, Pakistan, Afghanistan, and elsewhere. Although the authorities are still investigating, it is clear his was a political act.
[...]
14 years into the war on terror, the longest war in American history, with close to 7,000 dead U.S. soldiers and–conservatively–over 200,000 dead foreign civilians, it should not take an attack on American soil to jar us into asking these questions.
-
-
According to local and federal officials, Thursday’s bloody assault in Chattanooga, Tenn., was ruthless and deranged. The U.S. attorney says investigators are treating the attacks, committed by a lone gunman at a military recruiting station and a Navy and Marine Corps Reserve centre, as a possible “act of terrorism.” Defence Secretary Ashton Carter calls it a “senseless act of violence.” Navy Secretary Ray Mabus says the attacks were out of bounds: “While we expect our sailors and marines to go into harm’s way, and they do so without hesitation, an attack at home, in our community, is insidious and unfathomable.”
-
I’m not a fan of war or of killing of any kind, but the labeling of the deadly attack by Mohammod Youssuf Abdulazeez on two US military sites in Chattanooga, Tennessee as an act of terror is absurd.
-
Lincoln Chafee campaigned for president in New Hampshire last month proudly showcasing his foreign policy credentials based in large part on his opposition to the Iraq war. He also had some things to say about U.S. policy in Yemen.
The targeting of al-Qaida terrorists with drones has killed militants and civilians in recent years. And many Yemenis have called on the Obama administration to end drone strikes, which Chafee refers to as “extrajudicial killings.”
“No more drone strikes,” Chafee said in New Hampshire. “One of the reasons I believe we’re in trouble in Yemen is we lost the population on drone strikes issues. That’s what stirred up the population. That’s what is happening in Yemen.”
-
“One of the reasons I believe we’re in trouble in Yemen is we lost the population on drone strikes issues. That’s what stirred up the population. That’s what is happening in Yemen.”
-
The U.S. is shifting to a more direct role in the near decade-old fight against Al Qaeda-affiliated Shabab militants, launching as many as six drone strikes in southern Somalia over the last week to support African forces battling the group, American officials said.
-
Stewart said to Obama: you’ve tried bombing and overthrowing leaders and arming rebels and … what’s that new thing … oh yeah, diplomacy.
-
The UK Prime Minister David Cameron has delivered his second speech in as many months on the terrorist threat, proposing a top-down reorganisation of British Islam. His new approach will see ‘moderate’ and ‘reforming’ voices sponsored by the central government.
This has provoked a mixed response from British Muslims. It is also a remarkably unconservative approach to personal belief, from a supposedly conservative prime minister.
Cameron’s understanding and presentation of the jihadist threat is that radical Islamist ideology, not Western foreign policy, explains all. In a single sentence, his speech dismissed the latter notion: “9/11 – the biggest loss of life of British citizens in a terrorist attack – happened before the Iraq War”.
In fact, the speech demonstrated Cameron’s exceptionally poor historical knowledge. Al-Qaeda was attacking Western targets long before September 11, 2001.
-
Obama made no mention of the fact that Anwar al-Awlaki was an American citizen, convicted of no crime, judged in no court, but sentenced to death on the sole authority of the president of the United States. Nor did he refer to the subsequent US government murder of Awlaki’s son, an innocent teenager, in another drone missile strike, or the thousands of other civilian victims of US drone warfare across Central Asia, the Middle East and North Africa.
-
It’s erroneous to portray the conflict in Xinjiang as a struggle between Islam and the Chinese government
-
At least 3,500 have been killed as a result of the Saudi-led war, launched on March 26 of this year. Some 1,700 of these have been confirmed as civilians, according to the UN, with some 3,800 more civilians confirmed wounded.
-
TUNISIA has once again had to deny allegations of agreeing to host a US military base in the country, reviving speculations over the depth of US-Tunisian relations.
-
The usual Western strategy for dealing with Islamic terrorists is to kill them. President Obama vows to crush Islamic State in Iraq and Syria. The United States helps African nations repel groups like Boko Haram. It uses drones to strike Al Qaeda operatives in any country. “Negotiations cannot convince Al Qaeda’s leaders to lay down their arms,” Mr. Obama stated in 2009.
-
Deaths of civilians and Afghan army personnel in “friendly fire” has become a contentious issue in the country. The toll makes it one of the deadliest such incidents involving coalition and Afghan troops in the 14 years that global forces have fought in Afghanistan.
Two US helicopters are believed to have carried out the attack against a military checkpoint.
A statement on behalf of the commander of U.S. forces in Afghanistan says the U.S. deeply regrets the loss and offers condolences to those affected.
-
At least eight Afghan soldiers have been killed in a US air strike on an army checkpoint in Logar province, south of Kabul, Afghan officials say.
-
A U.S. airstrike in eastern Afghanistan killed at least seven Afghan soldiers, local officials said, an incident that threatens to strain relations between allies who are battling the Taliban and burgeoning Islamic State insurgencies.
-
The airstrike was part of the U.S.-led NATO coalition targeting the anti-Afghan government group the Taliban.
-
The trouble is that airstrikes and other quick applications of military force are rarely as cheap as they first appear. They tend to cause unanticipated trouble and begin conflicts without winning them. Escalation to more costly warfare then beckons. Drone strikes may prove to be especially misleading this way. Their benefits come fast and are straightforward. Most strikes bring reports of dead terrorists or insurgents, and their disrupted plans are easily imagined. The costs—especially blowback measured in violent anti-American sentiment and pressure toward escalation — arrive gradually and less discernibly.
-
We already have semi-autonomous killing machines in the battlefields but (theoretically) they will do everything except making the final decision to pull the trigger. That final, ultimate decision is supposed to be left up to a human somewhere who can analyze the situation and decide whether or not the drone is targeting a friend or an enemy and then issue the go-/no-go death sentence.
-
On Sunday, a Libyan war plane from the forces of the internationally-recognized Tobruk government attack and sank a vessel near the port city of Beghazi according to spokesperson for the air force.
-
The hostage crisis in Algeria in 2013 led to the deaths of ten Japanese nationals along with many other individuals from different nations. Sadly, it was abundantly clear from the start that the Libya connection would enter the equation. After all, the terrorist infiltration was extremely close to the border of Libya. Also, since the demise of Gaddafi the region is awash with military arms and countless terrorist groups. Within Libya itself you have various different Islamist terrorist organizations and the same applies to many militias that control parts of this nation. Therefore, in modern day Libya in 2015 you have chaos and a non-functioning state that can’t control the whole of this nation.
-
The title comes from the testimony of a 13-year-old Pakistani boy whose grandmother was killed in a drone strike. ‘‘I no longer love blue skies,’’ the boy said, speaking before Congress. ‘‘In fact, I now prefer gray skies. The drones do not fly when the skies are gray.’’ Houtryve attached a camera to a small drone and traveled around the United States, making aerial photographs of the sorts of events that have been associated with intentional or erroneous drone strikes: funerals, weddings, groups of people at play, in prayer or during exercise. His images show Americans in the course of their daily lives, photographed from a great height, in bright sun that throws their distorted shadows far ahead of them, presenting them as unindividuated, vulnerable and human. Houtryve makes it clear that the people in Yemen, Pakistan, Somalia or Afghanistan who are killed by American drones are also just like this. With simple, vivid means, Houtryve brings the war home.
-
When a Western soldier suffers from post-traumatic stress disorder, there are doctors and organisations who can help them recover from the heartbreaking legacy of war.
When it is someone from Afghanistan, where bombings regularly wreak devastation and tear families apart, you are unlikely to find any assistance, since there is little understanding of mental illness in the country.
“The most common treatment is to take your loved one to a religious shrine where they are chained to walls or trees for up to 40 days, fed stale bread, water and ground pepper, and read dubious lines from the Qur’an by individuals with no medical or, for that matter, religious training,” documentary-makers Jamie Doran and Najibullah Quraishi told news.com.au.
[...]
“The allied nations that invaded – or liberated, as some still claim – Afghanistan at the beginning of the 21st century have managed to leave an even bigger mess than they inherited.
“An entire generation brought up in daily fear of death does not augur well for either their future or ours. It may not be entirely fair, but they blame the West and allied nations for the state of their country. Expect some of them, at least, to seek revenge in the years to come.”
-
Although it seems like cyber-crime gets all the news headlines these days, national and corporate intelligence agencies around the globe still often use old-fashioned cloak and dagger techniques to get the job done. That said, blackmail has long been one of the most effective ways to turn an intelligence target, and agencies have no compunctions about taking advantage of a target’s predilections for drugs, sex or even gambling to blackmail then into cooperation.
-
US intelligence may have used Macau casinos owned by an American tycoon to set a trap for Chinese functionaries who gamble with public money, in order to blackmail and recruit them.
-
China feared that casinos in Macau owned by the billionaire gambling magnate and Republican party funder Sheldon Adelson were used by US intelligence agents to entrap and blackmail Chinese officials, according to a “highly confidential” report for the gambling industry.
-
A report uncovered Wednesday said the Chinese government believes the U.S. was using Chinese officials’ gambling problems in order to blackmail them.
-
-
-
-
-
-
-
-
Was Bob Smith a super-spy or a super-fantasist? That was the question many in Los Angeles are trying to answer after the puzzling death of man who kept a hoard of more than 1,200 firearms and two tons of ammunition at home.
The man, who is yet to be formally identified, was found dead in his sports utility vehicle not far from the house in LA’s affluent Pacific Palisades neighbourhood, where his body was believed to have been for two weeks in warm weather before police were alerted.
-
During the age of cold war espionage, CIA agents resorted to unusual techniques to outsmart the Russian KGB. One method required the use of life-size rubber sex dolls purchased in a Washington D.C. store.
Walter McIntosh, who headed the CIA’s disguise unit from 1977 to 1979 told Newsweek magazine that the idea came about when CIA operatives in Moscow needed a trick to get Russian counterspies off their tails so they could safely meet with their secret agents.
-
Of all the missions Walter McIntosh undertook in his long CIA career, buying life-size rubber sex dolls in a Washington, D.C., porno shop was maybe the most memorable.
It was all for a good cause, of course. And deadly serious, not just for McIntosh, who headed the CIA’s disguise unit from 1977 to 1979. The agency’s Moscow operatives were in desperate need of something—anything—to trick Russian counterspies into leaving them alone, if only for a few minutes, so they could meet their secret agents without fear of being arrested. A key operation was in peril.
-
-
“People always think that picture was taken blocks away at the American embassy, but it happened here.”
-
Army Secretary John McHugh, who revoked the award, told The Washington Times through a spokesman that Maj. Golsteyn “assassinated an unarmed Afghan.”
-
Applying the transmittal letter’s reasoning to the aerial drone strike’s facts, it is unlikely that a US Attorney General would make similar findings with regard to CIA operatives’ participation. The opinion avoids a crucial issue by assuming the operatives carried out this mission from a remote location, presumably where an enemy could not strike, making distinction by insignia unnecessary (why the opinion assumed operatives were distant from the battlefield is unclear, though it certainly made it easier to reach the Prosecutor’s conclusion).
[...]
Left to a policy preference, which would be the better choice? Allowing CIA operatives to benefit from combatant immunity while also being considered lawful targets at all times, or maintaining their status as unlawful targets when not directly participating in hostilities who may face criminal liability for hostile actions. Against the lawless foes faced in Afghanistan and Pakistan, perhaps neither presents practical advantage. Nevertheless, the German opinion offers persuasive arguments that might gain support in the international community. Reaffirming US commitment to the principle of distinction might prevent its diminishment on other battlefields.
-
From 1945 until their divorce in 1984, she was the wife of William Colby — the spy and later spymaster who, as CIA director from 1973 to 1976, revealed the assassination attempts and other clandestine activities known as the agency’s “family jewels.”
-
A decades-old conflict between Turkey and the Kurdish PKK has been reignited.
Turkey vowed Saturday to continue attacks against the Kurdistan Workers’ Party (PKK), along with strikes against the Islamic State group.
“The operations will continue for as long as threats against Turkey continue,” Prime Minister Ahmet Davutoglu said, according to Turkey’s Anadolu Agency.
-
We Americans respond with anger when Donald Trump warns us of murderous Mexicans, and we worry that ISIS can hit us at any moment. Yet we continue to pretend we’re safe from our own gun-toting, bomb-making neighbors.
-
In all three of the countries where the Obama administration declared US wars “over” in the past few years – Afghanistan, Iraq and Libya – the US military is expanding its presence or dropping bombs at an ever-increasing rate. And the government seems to be keeping the American public in the dark on the matter more than ever.
Pentagon leaders suggested this week that the US military wants to keep remaining 9,800 troops in Afghanistan from withdrawing in 2016, despite the fact that the Obama administration declared combat operations in the country “over” six months ago. The gradual extension of the Afghanistan War hasn’t been a secret to anyone who’s been paying close attention, but sadly it has happened far away from the pomp and circumstance of Obama’s now embarrassingly false State of the Union announcement that the Afghanistan War had ended.
-
Despite the disastrous Iraq War, neocons still dominate Official Washington’s inside-outside game…
-
-
Since then, Israeli media have been pressing hard to restore the military option to its accustomed place “on the table.” Flying to Israel Sunday night for a handholding mission with top Israeli officials, U.S. Defense Secretary Ashton Carter tried to make his reception in Tel Aviv less frosty, telling accompanying journalists that the nuclear deal with Iran “does nothing to prevent the military option.” The context, however, seemed to be one in which Iran was caught cheating on the nuclear deal.
That this kind of rhetoric, even when it is not from the president, is still poison to Tehran was clear in the immediate reaction by Iran’s Foreign Minister, Mohammad Javad Zarif, who insisted Monday: “Applying force … is not an option but an unwise and dangerous temptation.”
cComments
Looking for changes in official public statements was my bread and butter during a long tenure as a Kremlinologist. So on Wednesday, as I watched Mr. Obama defend the deal with Iran, I leaned way forward at each juncture — and there were several — where the timeworn warning about all options being “on the table” would have been de rigueur. He avoided saying it.
-
The agreement has reduced the chance of a U.S. attack on Iran, which is a great development. But the interventionists will not give up so easily. Already they are organizing media and lobbying efforts to defeat the agreement in Congress. Will they have enough votes to over-ride a presidential veto of their rejection of the deal? It is unlikely, but at this point if the neocons can force the U.S. out of the deal it might not make much difference. Which of our allies, who are now facing the prospect of mutually-beneficial trade with Iran, will be enthusiastic about going back to the days of a trade embargo? Which will support an attack on an Iran that has proven to be an important trading partner and has also proven reasonable in allowing intrusive inspections of its nuclear energy program?
-
Operation Ajax (1953) was a covert operation executed by the CIA to oust the democratically-elected Prime Minister of Iran, Mohammed Mossadeq. While the reasons for this now declassified covert operation exceed the scope of this letter, it is important to note that once Mossadeq was overthrown by forces funded and manipulated by the U.S., he was replaced with the tyrannical Shah of Iran (which the 1979 revolution forced from power).
-
Iran has many more reasons to be suspicious of us than we of them. Our government had supported a puppet regime in their country which held them back for decades and was installed by our CIA. We have intervened in Afghanistan and Iraq, literally surrounding them.
-
-
A top Central Intelligence Agency official said Friday that the recently brokered nuclear agreement between leading nations and Iran will make it difficult for the Middle Eastern country to dupe nuclear inspectors.
CIA deputy director David Cohen, speaking at the Aspen Security Forum, said intelligence officers were “reasonably” confident that the terms of the nuclear deal would prevent Iran from cheating in a way that avoided international detection.
-
The accord struck in Vienna to rein in Iran’s nuclear activities has warmongers fulminating. Citizens worldwide should support U.S. President Barack Obama’s brave effort to outmaneuver them, taking heart from the fact that the signatories include not just the United States, but all five permanent members of the UN Security Council plus Germany.
-
Many of the warmongers are to be found in Obama’s own government agencies. Most Americans struggle to recognize or understand their country’s permanent security state, in which elected politicians seem to run the show, but the CIA and the Pentagon often take the lead — a state that inherently gravitates toward military, rather than diplomatic, solutions to foreign-policy challenges.
-
-
The late Chalmers Johnson (once a CIA consultant, a former “spear-carrier,” he said) called the agency the president’s “praetorian guard,” a private army producing phony intelligence to justify extrajudicial actions.
They include toppling democratically elected governments, assassinating foreign heads of state and other key officials, propping up friendly dictators, and abducting targeted individuals for extraordinary rendition to agency controlled black sites – torture prisons to extract forced confessions from innocent victims under extreme duress, at times bringing them close to death and back.
-
Former Central Intelligence Agency (CIA) officer Paul Pillar said that Iran’s regional policies depend on various political interests and equities and not on how much money it has in its bank account.
-
The relationship between video games and violence is healthier than we like to think
[...]
He started up the desktop computer he had built himself, and opened up the first-person shooter game Counter-Strike. The military-style video game had been updated many times since its initial release in 1999, but this was the same version that had infested my middle school computer lab back then—or some pirated incarnation. Halil connected to a server by manually entering a memorized IP address.
[...]
“No no no,” and he smiled, “that wouldn’t be a ‘The Great Secret.’” The team of “counterterrorists” threw a couple grenades and started firing, peering around corners and strafing.
“Then who is playing as Israel and Lebanon?”
“IDF,” Halil pitched his screen to the rushing counterterrorist team, “and Hezbollah,” he tilted in the direction of the virtual AK fire. “This is my ‘Middle East Peace Plan.’” He said the phrase derisively, putting on his best American accent.
I didn’t believe him, at first. The teams in the game were made up of the same avatars that always populated it. But Halil then showed me a series of taunting pictures the two teams had posted online. Among the match reports and running commentaries, the Israelis in uniform threw up imitations of American gang signs learned from rap videos, while young men of Hezbollah held real life rifles next to computer monitors, all with their faces blurred or blacked out in Photoshop. My favorite was a succession of shots of real guns, superimposed on computer monitors displaying virtual ones.
-
An ex-senator, a former CIA officer, and an Iraqi mogul lobby Congress for a private army, led by Saddam’s officers, to take on the terrorists that have trampled America’s proxies.
-
A US military drone flying a combat mission has crashed in Iraq after losing communication, the US Defense Department has confirmed.
-
A slew of news reports have highlighted the crisis of drone pilot burnout in the United States military. Indeed, pilot shortages have prompted the US Air Force to cut the number of drone flights to fewer than 60 per day. That’s an important problem, but buried in these stories is another one. The Air Force has announced that, in response to the shortage, it will increase its use of contractors for these flights. Given the service’s manpower shortages, this statement is not surprising. Yet the growing numbers of contractors in drone operations, while little discussed, raise significant concerns about oversight and accountability at a time when drone use is set to accelerate. We simply don’t know enough about how contractors will be used in the increasingly automated version of war that appears to be our future. And that means we need to ask hard questions now about how this system should operate rather than simply letting it evolve without oversight.
-
George Clooney is being paid by the world’s top two war profiteers, Lockheed-Martin and Boeing, to oppose war profiteering by Africans disloyal to the U.S. government’s agenda.
-
Human rights activists in the country told me earlier this month that he should raise these issues sensitively, and not pretend that the U.S. record on policing and fighting terrorism has been flawless. The scandal of CIA torture and the prison at Guantanamo Bay are widely known throughout Kenya. They said President Obama should be sure to make reference to the United States’ own mistakes when he talks to his Kenyan counterparts, and fully acknowledge how much the United States still has to improve.
-
-
Kenya inherited the massive investment in the militarization of the Horn of Africa from the era of anti-communism and this militaristic link to the West was deepened during the so called War on Terror. This Global War on Terror has now backfired against the peoples and the insecurity generated within Kenya and East Africa reinforce the influence of the US military when Barack Obama and his Administration want to focus on “Doing Business with Africa.” In 2014, the Obama Administration with much fanfare had called the first major US Africa summit but the present Washington sequestered bureaucracy has not worked to turn the page with the new engagement with African peoples. There have been no resources from Congress to support the much touted Power Africa.
-
Chadian dictator Hissene Habre goes on trial in Senegal, a quarter of a century after his blood-soaked reign came to an end, in trial seen as test case for African justice
-
-
When Chad’s former president Hissène Habré strode into a Senegalese court yesterday accused of 40,000 murders, war crimes and torture, he may have been wondering what became of his old superpower friends.
-
In breaking news from Senegal, the trial of Chadian former dictator Hissène Habré has been postponed until September 7 after Habré’s lawyers did not show up to court for the second day of trial. Habré has been charged with crimes against humanity, war crimes and torture related to his eight-year reign in Chad during the 1980s. We’ll have more on this story later in the show.
-
Gunners from the Royal Air Force (RAF) Regiment and Scotland Yard police are training foreign governments in how to prevent aviation being shot down by missiles looted from Libyan armories after the 2011 war.
As many as 10,000 handheld surface-to-air missiles are feared to have been taken from Colonel Muammar Gaddafi’s armories as the regime collapsed, leading to fears they could be used by militants to bring down civilian airliners.
Now members of the RAF Regiment – British soldiers who specialize in defending airfields – have been deployed to Middle Eastern and North African countries to advise on missile defense.
-
Following calls for government to come clean over role in US air force unit, MoD says such UK personnel are ‘effectively operating as foreign troops’
-
The Kurdish Peshmerga have repeatedly been praised by U.S. congressmen from both sides of the aisle, the Department of Defense, and numerous pundits, as the most effectual allies in the fight against ISIS and a group in need of American arms. But remember that October 2014 CIA study demonstrating that nearly all attempts to arm rebels have backfired or failed? It turns out that the Kurds aren’t our perfect match. They will be no exception to the trend, with their massive human rights violations, political conflict with Syrians and Iraqis, and destabilizing role in the Middle East.
-
The heavily-redacted order does contain some good news, however. The presiding judge ordered the Dept. of Defense and the CIA to turn over FOIAed documents to the ACLU that contain “previously acknowledged facts,” thus preventing the Dept. of Justice from turning real life into a bizarre fantasy world where previously disclosed information can be treated as though it was still locked up in the agency’s “TOP SECRET” digital filing cabinet.
But the obvious downside is this: because the government has been given permission to avoid confirming or denying the existence of the documents the ACLU is seeking, the search for more information on accidental deaths and collateral damage will still consist of issuing speculative FOIA requests, which will then result in more lengthy, expensive litigation.
I’m pretty sure the involved agencies believe they can outlast FOIA requesters, especially if they continue to receive mostly-favorable decisions from judges who place more faith in the government and its assertions about national security than in those who view government secrecy with considerably more skepticism. The problem is that the government has the resources to fight long legal battles. Most FOIA requesters do not.
-
But Rubio cannot accept that Cubans’ nearly unanimous rejection of his right-wing politics might mean he is badly mistaken in his Manichean view of the Cuban socioeconomic system. Rubio wears Cubans’ disapproval of him as a badge of honor. For Rubio, Cubans are incapable of independent judgement. If the Cuban people are against him, it means they must be brainwashed by the evil Castro regime.
-
The United States and Cuba have re-established embassies in each other’s capitals, formally restoring diplomatic ties severed more than five decades ago.
-
As the Cuban flag was raised over Washington, D.C., on Monday, some 20 anti-Castro demonstrators gathered outside Versailles Restaurant in Little Havana to protest warming relations between the U.S. and Cuba. In Washington, a man rushed the embassy gate with red paint splattered across his shirt, yelling “This is Cuban blood.” But for the most part, protests in both cities were small and low-key.
-
-
-
-
On July 20, history was made in Washington, D.C., and in Havana, Cuba. As the Cuban national anthem was played, the island nation’s flag was raised over its embassy in Washington. The embassy, as well as the U.S. Embassy in Havana, was open for business, for the first time in 54 years. The Washington ceremony was attended by more than 500 people. Earlier in the day, the U.S. State Department elevated the Cuban flag to a place of honor, joining 150 other national flags on display in the main lobby. While diplomatic relations have been restored, the crushing U.S. economic embargo against Cuba is still in place, and the U.S. prison at Guantanamo Bay remains open. More than 100 prisoners are still languishing there, many of them cleared for release for over a decade.
-
On Tuesday, July 21, a judge in Santiago, Chile ordered the arrest of seven army officers for their participation in the burning alive of photographer Rodrigo Rojas Denegri, and student Carmen Gloria Quintana on July 2, 1986. The case is known in Chile as Caso Quemados (Case of the burned).
The army had detained both during the repression of an anti-government demonstration. They were severely beaten, before being soaked in gasoline and set afire. The young people, still alive, were dumped in a remote area and left to die, but were found by construction workers. Quintana survived, but Rojas died from his injuries, four days later.
The horrible crime took place during the military-fascist dictatorship of General Pinochet (1973-1989) and was part of the reign of terror against workers and youth that took place with the assistance of the US Central Intelligence Agency.
-
It’s probably a good thing that United States Army General John F. Kelly’s May op-ed in the Miami Herald went largely unperceived, but recent developments have rendered the cynicism that informed it too blaring to ignore.
Ostensibly, General Kelly’s editorial seeks to extrapolate salient lessons from the Colombian government’s military campaign against the country’s leftist guerrilla insurgency. Specifically, Kelly contends that Plan Colombia, the $9 billion U.S. military aid package passed in 2000, has “shown us the way” to defeat ISIS, which he claims poses a similarly “daunting challenge for the United States and its allies.”
On first read, the article is a relatively straightforward parade of banality and adulation, remarkable only because the individual leading it is the commander of U.S. Southern Command (Southcom). Sure, the content consists almost entirely of lies, half-truths, and meaningless platitudes, but nothing that ventures too far from the official Washington line.
-
Transparency Reporting
-
But, of course, that was just one batch of the emails. A few weeks ago, reports started leaking from inside the State Department that, in fact, there was classified information on that server, and late last night the other shoe dropped, with a report in the NY Times that two separate Inspectors General have requested the Justice Department open a criminal investigation into Clinton’s mishandling of sensitive information — in particular the inclusion of “hundreds” of potentially classified emails on her private server.
-
A government watchdog has ordered the CIA and the Pentagon to re-investigate retaliation allegations brought by two intelligence employees who accused their agencies of major institutional failings.
The action by the intelligence community inspector general is the first public indication that a new intelligence appeals system is underway. The panel was set up by President Barack Obama as an independent forum that can evaluate whether whistleblowers were improperly fired or otherwise punished for disclosures after their agencies rejected their claims.
The cases, nonetheless, demonstrate that the whistleblower system continues to be beset with problems and bureaucratic delays despite being overhauled by Congress and the Obama administration.
-
Sterling has long maintained that the CIA retaliated against him for questioning racial bias at the agency, where, as he put it in a letter to Al Sharpton’s National Action Network, he was deemed “too big and too black” to move up the ranks. The CIA does not release data on its racial demographics, but a recent internal report on diversity affirms some of Sterling’s allegations of bias. Minorities accounted for less than 24.8 percent of its workforce and only 10.8 percent of its top leadership, according to the report. The CIA’s lack of diversity underscores the racial underpinnings of the global “war on terrorism,” in which white CIA officers torture nonwhite others in secret prisons and incinerate them with drone missiles.
-
When reporter Jason Leopold gets ready to take on the U.S. government, he psychs himself up by listening to the heavy metal bands Slayer and Pantera.
He describes himself as “a pretty rageful guy.” Mr. Leopold (45), who works for Vice News, reserves most of his aggression for dealing with the government. He has revealed about 20,000 pages of government documents, many of them the basis for explosive news stories.
-
At least 309 police officers and police community support officers (PSCOs) in the UK have been convicted of criminal offences in the last three years, according to figures released after a Freedom of Information request.
-
Finance
-
A year ago he slept in his own apartment, but today Charles Jackson sleeps under a bridge bordering Silver Lake, one of the more fashionable neighborhoods in Los Angeles. A few dozen strangers share the encampment; some become neighbors, while others come and go. Jackson wants to get off the streets, but as many of those who live on the margins have found, it is easier to lose a home than find another.
“People say, ‘This is going to be temporary, you know, until I get out from under this rock,’” he told me. A kind-looking brown-eyed man in his mid-50s, Jackson stands in front of the tent he lives in, looking away as we talk, his voice barely louder than a whisper. Beside us, Jackson’s white-and-tan terrier, Ozzie — well-groomed and clearly beloved — pokes his nose out from the front of the tent, panting in the midday sun. “Two years pass by, four, five years pass by; before you know it, you’re ten years homeless in the streets because out here, time is nothing. You get to not know what day it is, what month it is.”
-
…Japanese officials have systematically exaggerated the Japanese economy’s various weaknesses, real and imagined.
-
But he chose to “follow the rules” by accepting the EU plan. Greece is getting its financial bailout, Greeks are tightening their belts, and the Eurozone will survive more-or-less intact. Tsipras learned what happens when you challenge the rules of an elite club. Once in a while, the club changes the rules. Most of the time, the club issues an ultimatum: suck it up or move on.
-
July 18th 2015 was the first day of this year’s summer camp for the world’s business and political aristocracy and their invited guests. 2,000 to 3,000 men, mostly from the wealthiest global one percent, gather at Bohemian Grove, 70 miles north of San Francisco in California’s Sonoma County—to sit around the campfire and chew the fat—off-the-record—with ex-presidents, corporate leaders and global financiers.
[...]
On the surface, the Bohemian Grove is a private place where global and regional elites meet for fun and enjoyment. Behind the scene, however, the Bohemian Grove is an American version of building insider ties, consensual understandings, and lasting connections in the service of class solidarity. Ties reinforced at the Grove manifest themselves in global trade meetings, party politics, campaign financing, and top-down corporatism.
-
Washington never granted islanders control of their lives, welfare and destiny. They have no say over foreign relations, commerce and trade, their air space, land and offshore waters, immigration and emigration, nationality and citizenship, currency, maritime laws, military service, US bases on its territory, constitutionality of its laws, jurisdictions and legal procedures, treaties, radio and television, communications, agriculture, its natural resources and more.
Independence supporters aren’t tolerated – men like Oscar Lopez Rivera, a decorated Vietnam War veteran, wrongfully imprisoned for wanting Puerto Ricans to live free, behind bars for over three decades.
Washington wants to continue exploiting its Caribbean colony for profit – raping and pillaging it at the public’s expense, much like what’s happening to Greece.
-
For the many people who have engaged in the struggle for Puerto Rico’s independence, July 25 has a special significance. On that date in 1898, U.S. troops invaded Puerto Rico, beginning a period of U.S. colonial domination on the island that continues to this day.
The United States invaded Puerto Rico, along with the Philippines, Guam and Cuba, in the setting of the Spanish-American War. That war was the opening of what would be the menacing role and predatory nature of the U.S. capitalist class in the Caribbean, Latin America and the entire world.
The seizure of Puerto Rico, Cuba, Guam and the Philippines by the United States signaled the quest of the U.S. capitalist class to become a world power. European powers had pursued a policy of colonial acquisitions since the end of the 15th century.
But only in the late 19th century had the mature and developed capitalist powers virtually colonized the entire planet. The projection of U.S. power outside of the North American mainland signified a rush not to be left behind in this global division of markets.
-
PR/AstroTurf/Lobbying
-
Mr. Gates, you swing a lot of weight in political circles. If you told policymakers that the current thrust of reform was blocking alternative ways of improving learner performance, and educators should have enough autonomy to explore those alternatives, those of us who have been working on them for decades might have a chance to show what’s possible.
-
If you talk to the reporters who work for various big media companies, they insist that they have true editorial independence from the business side of their companies. They insist that the news coverage isn’t designed to reflect the business interests of their owners. Of course, most people have always suspected this was bullshit — and you could see evidence of this in things like the fact that the big TV networks refused to cover the SOPA protests. But — until now — there’s never necessarily been a smoking gun with evidence of how such business interests influences the editorial side.
-
Censorship
-
Everyone’s fired off a hasty email that they desperately wish they could take back. A new Gmail tool will let you do that whenever you please.
Dmail is a new browser extension for Google Chrome that gives people more control of how long others can view their Gmail messages. When sending an email through Gmail, users can set a specific time when the message will self-destruct, ranging anywhere from an hour to a week. And even emails without a specific self-destruct timer can still be recalled by the sender at an time, making them unviewable to the recipient.
-
Privacy
-
There’s a reason “librarians everywhere” were singled out for an EFF Pioneer award in 2000. Time and again, in fights against censorship and intrusive surveillance laws, librarians have been allies of the public, serving as the institutional representation of the ideals of intellectual freedom, unfettered speech, and reader privacy.
-
The United Nations Human Rights Committee has criticised the UK’s spying framework, saying that it “allows for mass interception of communications,” and “lacks sufficient safeguards against arbitrary interference with the right to privacy.”
Separately, but perhaps even more importantly, the UK government has stated that the Wilson doctrine—a 50-year-old political convention which historically prevented politicians from being spied on—has no legal standing, and will not prevent the UK’s intelligence agencies from surveilling MPs and members of the House of Lords.
-
A secretive British police investigation focusing on journalists working with Edward Snowden’s leaked documents remains ongoing two years after it was quietly launched, The Intercept can reveal.
London’s Metropolitan Police Service has admitted it is still carrying out the probe, which is being led by its counterterrorism department, after previously refusing to confirm or deny its existence on the grounds that doing so could be “detrimental to national security.”
-
Hitherto-secret MI5, MI6 and GCHQ documents revealed in court that the agencies amended internal policies on surveillance of parliamentarians eight times in the past 12 months. The updated internal rules fail to comply with a 50-year-old political convention, known as the Wilson doctrine, which states that no parliamentarian’s telephone can be tapped unless there is a major national emergency and that changes to the policy will be reported to Parliament by the Prime Minister.
-
The 50-year-old political convention that the UK’s intelligence agencies will not intercept the communications of MPs and members of the Lords cannot survive in an age of bulk interception, government lawyers have conceded.
-
Nicola Sturgeon demands assurances that MSPs are not being spied on, amid reports GCHQ has decided monitoring rules do not apply to devolved governments
-
Tribunal hears claims that GCHQ is unlawfully intercepting MPs’ and peers’ communications
-
-
-
-
-
Palantir Technologies is quickly rising up the ranks after disclosing that it raised $450-million in its latest fundraising round, which – according to the Wall Street Journal – gives the 11-year-old Palo Alto firm a private market valuation of $20-billion, putting it an elite club of so-called unicorns, including Uber, Snapchat, AirBnB and Chinese smartphone maker Xiaomi.
-
The amount of cyber attacks has grown in the last three years exponentially, helped on by the growth in government attacks. The fact we hear about a GCHQ cyber attack on allied corporations in Belgium and The Netherlands, alongside human rights organisations, sure does give the impression hacking isn’t taken seriously.
-
In the past, it was agencies like the CIA, FBI and foreign intelligence services that had access to high tech electronic tracking devices.
Now, police agencies in San Diego County own or can borrow sophisticated surveillance tools like that too. The use has evolved over the years, to where now, it’s commonplace for both law enforcement and the private sector.
-
Hear ‘Edward Snowden and the Ethics of Whistleblowing’ this Sunday afternoon at 5, on the KSUT Sunday Special.
-
-
-
The Obama administration is preparing to release Jonathan Pollard, a U.S. Navy intelligence officer convicted of spying for Israel, the Wall Street Journal reported on Friday, citing U.S. officials.
-
An American convicted of selling classified information to Israel may be released from federal prison within months, according to his lawyer and the US Justice Department.
-
Civil Rights
-
Hundreds of Westernised young men who grew up in Britain after fleeing war-torn Afghanistan as children have been forcibly returned to their home country due to what experts believe is an inhumane shortcoming in the UK asylum system.
-
President Obama’s recent statements about mass incarceration, together with his decision to commute the sentences of 46 people serving lengthy and life sentences in federal prison on drug charges, treat “nonviolent drug offenders” as the symbolic figureheads of America’s prison problem. This framing seems to imply that everyone else actually deserves to be in prison.
-
It’s becoming increasingly clear that the U.S. prison at Guantanamo Bay, Cuba, isn’t going to be closed during President Barack Obama’s administration — or beyond, despite the administration’s efforts. That raises a deep question about foreign policy and the rule of law: What if Guantanamo never closes, and some of its detainees remain there for the rest of their lives?
The sad truth is that the continued operation of the prison is unlikely to do any more long-term damage to the U.S. reputation abroad — because the world has already come to the conclusion that the U.S. is no better than anyone else when it comes to dealing with terrorists.
-
It sounds like an old vinyl record stuck in its groove, another regular reminder of what has long since been a national disgrace. After six years of trying in vain to close the infamous prison for suspected terrorists at Guantanamo Bay, the White House, it is said, is close to finalising another plan to do just that. To which one is tempted to reply: “Dream on”.
-
Congress is faced with the opportunity to forbid the CIA from engaging in torture forever, thanks to a bill sponsored by Sens. John McCain and Dianne Feinstein. The legislation passed the Senate in a recent impressively bipartisan 78-21 vote, and now heads to the House of Representatives.
When we talk about torture, too often we use distant, medical language to grapple with the most vile things that can be done to a human being. Very few of us can imagine this horrific treatment, and even fewer of us want to think about it.
But our government has too often sanctioned torture. It is critical that we understand it so that we can stop it.
Through Survivors of Torture, International, an organization that advocates for an end to torture everywhere and treats torture survivors, I have heard stories from survivors that have never been more relevant. I shall try to share my sense of what torture is and why Congress must pass the McCain-Feinstein legislation that would prohibit it.
-
The government would prefer you never knew about any of that. When Montgomery was being sued by a former employer, then–Director of National Intelligence John Negroponte quashed any public court discussion of Montgomery’s bizarre relationship with U.S. intelligence. He insisted that public revelations about how easily the country’s protectors can be conned would constitute “serious, and in some cases exceptionally grave, damage to the national security of the United States.”
Democracy is supposed to transmit the people’s will to our governors, but it’s hard to argue that’s the case when said governors can keep us ignorant about what they’re doing and what it costs. However, the U.S. government has become increasingly adept at waving the flags of democracy and national security simultaneously.
-
The chief reason why the USA is no longer a democracy (if it ever was) is that its mega-criminals have impunity, just like kings and other dictators in countries that make little pretense to being a ‘democracy.’
-
Outspoken political activist and avant garde hip-hop artist Sole, together with DJ Pain 1, gives Sputnik readers a first look at his visually stunning new video that tells the story of a CIA black site as seen through the eyes of a detainee.
-
Hacktivist group launches action against RCMP in B.C. following fatal shooting in Dawson Creek
-
I am concerned that yet again Cameron is conflating the issue of extremism and terrorism with those of cohesion and integration.
He says that Muslims are not doing enough to integrate and that risks fostering extremism – but just what is enough and how do you measure it?
-
Jailed journalist and activist Barrett Brown has received 30 more days of solitary confinement in the prison, where he is serving a five-year and three-month sentence issued against him in January.
Brown, who had been put in “the hole” at the Fort Worth Correctional Institution previously, was put in solitary confinement in late June after staff “singled” him out “for a search” of his locker and “found a cup of homemade alcohol.”
-
The case against Khan, an imam at a Miami mosque before his 2011 arrest, was built on hundreds of FBI recordings of both telephone calls and Khan’s face-to-face conversations with an undercover informant. In the calls, Khan discussed details of numerous wire transfers to Pakistan over a three-year period that totaled about $50,000.
-
Dylann Roof, the 21-year-old white man who stands accused of murdering nine black members of Mother Emanuel AME Church in Charleston, South Carolina, last month, was indicted Wednesday on federal hate crime charges, some of which carry the possibility of the death penalty.
-
-
-
Louisiana police on Friday identified John Russell Houser (59) of Alabama as the suspected lone gunman who opened fire in a crowded movie theater, killing two and wounding others before turning the gun on himself.
-
DRM
-
Here’s some remarkable news: a judge in a New Orleans-based 5th Circuit Appeals Court has ruled that the Digital Millennium Copyright Act’s ban on breaking DRM only applies if you break DRM in order to violate copyright law. This is a complete reversal of earlier rulings across the country (and completely opposite to the approach that the US Trade Representative has demanded from America’s trading partners). In the traditional view, DRM is absolutely protected, so that no one is allowed to break it except the DRM maker. In other words, a film-maker isn’t allowed to take the BluRay DRM off her own movie, a video game programmer can’t take the iPad DRM off her own game, and an audiobook author can’t take the DRM off his own Audible book.
-
In 1985, Japanese giant Namco got out its wallet, and bought control of Atari Games – the coin-op arcade games maker that was doing rather well compared to its ailing home console cousin, Atari Corp.
The deal was the first step toward a massive legal battle that changed the way console manufacturers produced, licensed, and distributed their games. And this is how it happened:
-
Intellectual Monopolies
-
Copyrights
-
A restaurateur has been threatened with a £1,000 fine or court action if any customer watches TV on their mobile phone in her premises in a ‘bullying’ letter from the BBC TV Licensing body.
Neleen Strauss, the owner of the High Timber restaurant in central London, was sent the ‘intimidating and aggressive’ letter this week.
-
This week several Hollywood studios and pay TV giant Sky found themselves on the wrong end of an EU antitrust investigation for blocking cross-border access to TV shows and movies. Yet twenty years ago Sky was doing the same thing, a stubbornness that sparked a huge wave of piracy right across Europe.
-
During his stay in prison, Pirate Bay co-founder Fredrik Neij was deprived of the Internet and forced to view broadcast TV. A grueling experience, but not as bad as it used to be, something the Pirate Bay can take credit for in part. Still, Fredrik believes that there’s plenty of room for improvement.
-
Prenda Law is gone, and today it’s a legit porno company, Malibu Media, that files more copyright lawsuits than anyone else. Malibu sues thousands of people for downloading the company’s content via BitTorrent, then asks for settlements reportedly in the several-thousand-dollar range.
-
A bill extending the term of copyright by an additional 45 years—almost doubling it, in the case of corporate and government works—sailed through the Jamaican Senate on June 26, after having passed the House of Representatives on June 9. The copyright term in Jamaica is now 95 years from the death of the author, or 95 years from publication for government and corporate works. This makes it the third-longest copyright term in the world, after Mexico and Côte d’Ivoire respectively with 100 and 99 years from the death of the author.
-
The State is particularly upset that Malamud ran some crowdfunding and donation campaigns seeking to raise money to keep his operations running, saying that he raised this money “to assist the Defendant in infringing the State of Georgia’s copyrights.” The State also complains that he uploaded the code to the Internet Archive under a CC 0 public domain dedication, saying (incorrectly) that this implies that he claimed that he was the owner of the annotations. That’s not true at all. He’s claiming that everyone owns them, because they’re the law.
Permalink
Send this to a friend
07.25.15
Posted in News Roundup at 11:08 am by Dr. Roy Schestowitz

Contents
-
I’ve been flirting with Linux on virtual machines for years, dissuaded more than once by the appearance of Ubuntu, I stumbled upon Kali Linux, the deluxe penetration testing and hacking distro compiled by the macho sounding Offensive Security.
-
Server
-
Containers are coming together on Internet time. That’s because, as Jim Zemlin, the Linux Foundation’s executive director, explained in his OSCon, keynote that “Containers will change the datacenter in the same way that shipping containers changed global trade. They will shift IT from a server view of the world to an application view of the world.”
-
Kernel Space
-
Daniel Vetter of Intel’s Open-Source Technology Center has sent in many Intel DRM driver changes to be queued up in DRM-Next for the Linux 4.3 kernel.
This drm-intel-next load is quite big given that there’s three batches of changes due to Vetter having held off on sending out this pull request for the code to land in DRM-Next.
-
Anyone who still thinks that Linux is some sort of second-class citizen when it comes to virtual desktop infrastructure hasn’t been keeping up. New products are allowing IT departments to mix virtualized Linux desktops with those using Windows, without sacrificing any graphics performance.
-
Graphics Stack
-
-
Earlier this week I finished up a 15-way AMD/NVIDIA graphics card comparison on Linux with the very latest proprietary Linux drivers. That earlier article focused on the OpenGL performance and simply put the Catalyst performance on the tested Radeon hardware was abysmal compared to NVIDIA’s Linux driver performance. However, there is one area where the Catalyst Linux driver really excels at performance and routinely beats out the green competition.
-
Applications
-
As you may know, Dolphin Emulator is an open-source, multi-platform Nintendo GameCube, Wii and Triforce emulator. Like all the emulated software, the games have minor bugs and issues. Being an open-source project, it may be improved by third party developers.
-
-
Instructionals/Technical
-
Games
-
A developer has posted on the Gauntlet Steam forums about Gauntlet: Slayer Edition, a free upgrade to Gauntlet. In the same post the developer noted that the SteamOS version has now been cancelled due to limited resources.
-
They say that taking a vacation is good for your health, so every summer, we take a break from our lists of more serious open source apps and focus on games. This year’s list is longer than ever before with 112 projects. While we’ve removed a few projects that are no longer actively maintained, you’ll find plenty of old favorites on the list, plus a few newcomers that have never been featured before.
-
-
Back in 2011 we were talking about Cradle as the latest Unigine Engine game and it was expected to launch in 2012 with Linux support. Three years later, this game has finally launched on Steam with Linux support.
-
Desktop Environments/WMs
-
The developers behind the modern and beautiful Enlightenment desktop environment used in countless distributions of GNU/Linux have announced recently the immediate availability of the sixth maintenance release of Enlightenment 0.19.
-
K Desktop Environment/KDE SC/Qt
-
KDE is de-camping to the far west of Europe today to A Coruña in Galicia. In this north west corner of the Iberian Peninsula the sun is warm and the air is fresh. KDE contributors of all varieties will be spending a week in talks, discussions, hacking, renewing old friendships and getting to know people new to our KDE Community.
-
Plasma Mobile offers a Free (as in freedom and beer), user-friendly, privacy-enabling, customizable platform for mobile devices. Plasma Mobile is Free software, and is now developed via an open process. Plasma Mobile is currently under development with a prototype available providing basic functions to run on a smartphone.
-
It was recently brought to our attention that the KDE developers are hard at work these days preparing a new user interface (UI) for mobile devices running on top of the Ubuntu Touch and Kubuntu operating system, as well as on the next-generation Wayland display server.
-
There’s a new player in the smartphone operating system space: the folks behind the KDE desktop environment for Linux-based desktop computers have just unveiled Plasma Mobile.
-
-
Today, July 25, KDE, the company behind the modern, mature, and robust desktop environment with the same name, which is used in numerous Linux kernel-based operating systems, had the great pleasure of announcing a new project targeted at mobile device, Plasma Mobile.
-
A lengthy write-up of the announcement has been posted to dot.kde.org. That announcement talks of Plasma Mobile’s advantages of freedom, user-friendliness, privacy, and customization and personalization. It also mentions that while native apps will be written using Qt5, it will also support GTK apps, Android apps, Ubuntu apps, and applications from other mobile ecosystems.
-
At KDE’s Akademy event today, the KDE camp has just lifted the embargo on Plasma Mobile.
KDE Plasma Mobile is focusing on a fully-free software stack that’s developed openly for mobile devices such as smartphones.
-
GNOME Desktop/GTK
-
On July 24, Igor Gnatenko was more than proud to publish some details about his upcoming news reader app for the highly acclaimed GNOME desktop environment, called GNOME News.
-
In the last part, I glued the paper templates for the shield and foot onto the wood. Now comes the part that is hardest for me: excavating the foot pieces in the dark wood so the light-colored ones can fit in them. I’m not a woodcarver, just a lousy joiner, and I have a lot to learn!
-
-
-
Ballnux/SUSE
-
DeMaio quoted Richard Brown, chairman of the openSUSE board, saying, “The opportunity for topping this SLE core with the things you want in a long-term release really makes this attractive and I see people wanting to get involved with this next chapter of openSUSE. Leap will fill the gap between the longevity of a SLE core and the innovation related to Tumbleweed.”
-
OpenSUSE 42.1 Leap is derived from SUSE Linux Enterprise’s source-code and is going to be the openSUSE project’s next non-rolling release and entered development last month. Currently Leap is due for release in November. OpenSUSE Tumbleweed, the rolling-release arm of the distribution, will meanwhile keep on rolling.
-
Slackware Family
-
That updated version 44.0.2403.107 may have to wait, because I will be unable to do a lot of Slackware related stuff until august; real life is catching up with me. If there are real useability issues with 44.0.2403.89, let me know and I will see if I can shift priorities or make the older 43.x packages available again. My initial (not exhaustive) testing showed no weirdness at least.
-
Red Hat Family
-
Fedora
-
Speaking of schedules, Fedora 23 development is well underway. Last week, Fedora 23 branched from Rawhide, so that we can focus on stabilization and bugfixes for the planned October release while ongoing work on future features — Fedora 24 and beyond! — can continue in the development branch. The Alpha Freeze (where F23 features and changes are supposed to be substantially complete and testable) is scheduled for a week from today, with the actual Alpha release August 11th — the day before Flock starts. The QA team is already working on early test candidates, and Docs has put out a call for help with release notes.
-
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
On July 23, we reported that the Ubuntu 14.10 (Utopic Unicorn) operating system reached end-of-life and that Canonical urges all users that still run the Utopic distribution to upgrade to the current stable release, Ubuntu 15.04 (Vivid Vervet), as soon as possible.
-
On July 24, Canonical’s Łukasz Zemczak sent in his daily report on the work done by the Ubuntu Touch developers in the last 24 hours, informing us all that the full-featured Mir 0.14 display server update landed in the devel branch of Ubuntu Touch.
-
The boot manager has been updated from something in the past called Upstart, to the more widely supported and loved systemd environment. Upstart still manages user sessions, but the systemd (pronounced System Dee) has been found to be more reliable according to many folks inside and outside of Canonical.
-
Over the last few years, Google and Android have increasingly dominated the mobile scene, with Microsoft relegated to bit-player status. Once-massive players like BlackBerry scarcely stir a ripple in the market. Nonetheless, Ubuntu has chosen to stick its neck out and create a mobile operating system based on its own software to hopefully compete against the massive entrenched players. A new review of the Ubuntu Phone OS puts the operating system through its paces — and finds a great deal wanting.
-
-
On July 24, Canonical’s Bill Filler sent in his report on the work done by the Ubuntu Touch developers, as well as to inform us all about the new features and bug fixes that will be implemented in the upcoming OTA-6 update for Ubuntu Touch.
-
Flavours and Variants
-
Clement Lefebvre, leader of the Linux Mint project, has announced on July 23 that the upgrade path from the Linux Mint 17 (Qiana) and Linux Mint 17.1 (Rebecca) distributions to the Linux Mint 17.2 (Rafaela) operating system is now open for all editions.
-
We’re now in the RC phase for the Xfce and KDE editions. So far most of the bugs were either minor or cosmetic. The upgrade paths for these two editions were also successfully tested and will be open to 17 and 17.1 users at around the same time as the stable releases, around the end of the month.
-
On July 23, Clement Lefebvre, leader of the popular Linux Mint computer operating system, sent in his monthly report on the work done by the Linux Mint developers in the month of July 2015.
-
The following OEM installation images are now available:
Linux Mint 17.2 Cinnamon OEM 64-bit
Linux Mint 17.2 MATE OEM 64-bit
Reminder: OEM images are for computer vendors and manufacturers. They allow Linux Mint to be “pre-installed” on a machine which is then used by another person than the one who performed the installation. After an OEM installation, the computer is set in such a way that the next reboot features a small setup screen where the new user/customer has the ability to choose his/her username, password, keyboard layout and locale.
-
-
We reported the other day that Clement Lefebvre, leader of the Linux Mint project has published news about some of the upcoming work that will be done for the acclaimed GNU/Linux operating system based on Ubuntu.
-
-
Sundance’s sandwich-style SBC runs Linux on an ARM/FPGA Xilinx Zynq SoC, offers VITA57.1 FMC-LPC I/O, and stacks via a PCIe/104 OneBank expansion bus.
-
The MIPS Creator CI20 is a fun little $65 board for those wanting to experiment with alternative architectures on Linux.
-
MontaVista Software has launched an Internet of Things version of its commercial MontaVista Linux Carrier Grade Edition (CGE) development platform. The new Yocto Linux-based MontaVista Linux Carrier Grade eXpress (CGX) distribution will be available in the fourth quarter in a scaled down CGX Foundation optimized for IoT products. Customers can then add profiles including Carrier Grade and Virtualization in modular fashion.
-
Phones
-
Tizen
-
Smart TVs are becoming the central point of our communications in the modern Smart home. They can entertain and increasingly provide us with important information, and living in the UK it doesn’t get more Important than the weather for me.
-
Android
-
Fallout Shelter, the mobile Fallout game developer Bethesda released in June on iOS devices, is finally coming to Android on August 13.
-
Taking a look back at seven days of news across the Android world, this week’s Android Circuit includes Samsung’s surrender to Apple, Samsung’s supporters in the Apple patent case appeal, details on the Moto G leak, updating the S6 Edge software, what we know about the Samsung Galaxy Note 5, the Android 5.1 update for Xperia handsets, who to add MicroSD support to the S6, details on the Pebble Time smartwatch sales, and AP releases a million minutes of archive footage on YouTube.
-
-
-
-
-
-
-
-
-
A pair of Android tablets are climbing the update mountain to the peak of Android 5.1. They’re the highlight in a slower-than-usual week for Android devices, especially with the first-generation AT&T Moto X pushed back to a holding pattern.
-
For an emerging platform business model, information technology may not top the owner’s agenda. Building a community and setting the ground rules for participation and conflict resolution are often the first priority. IT, however, tends to become a higher priority as a platform scales and matures. That’s been the case for Etsy, which was founded in 2005. Today, Etsy’s technology infrastructure plays a critical role in the current stage of the platform’s evolution.
[...]
Etsy is largely built on open source technology, according to Allspaw. At its core, the company’s platform stack includes PHP and MySQL, Hadoop and Scalding, and Solr/Lucerne/ElasticSearch, he explained.
-
Besides the open-source Mesa finally hitting OpenGL 4.0+, Vulkan being right on the horizon, there being Skylake just around the corner, AMD R9 Fury Linux benchmarks coming next week, and Intel Skylake being days away, there’s been many other exciting announcements so far this month and milestones for free software.
-
Harnessing the power of apps, devices, and the cloud, IFTTT has just unveiled five open source projects. Now available on GitHub, the projects can be used by anyone to integrate IFTTT automation in their apps and services.
-
CNCF’s role is to foster developer and operator collaboration on common technologies for deploying cloud native applications and services, said Jim Zemlin, executive director at The Linux Foundation — that is, applications or services that are container-packaged, dynamically scheduled and micro services-oriented. To ease the process, CNCF aims to drive alignment among technologies and platforms.
-
Events
-
The fifth developer weekend was an opportunity for us to gather in a pleasant setting and work together in person. We were graciously hosted, once again, by Codethink in their Manchester offices.
-
-
-
Web Browsers
-
Mozilla
-
As of this commit yesterday, by Mike Hommey, Firefox nightly builds are now being built with PLATFORM_DEFAULT_TOOLKIT set to cairo-gtk3! It would appear, according to the commit tag, that mainline Firefox will be built with GTK+3 for Firefox 42. Firefox 42 is expected to be released this November.
-
SaaS/Big Data
-
The OpenStack Foundation’s executive director has defended the community project’s growing corporatisation following criticism from a former colleague and lead pioneer.
Jonathan Bryce told The Reg big companies are critical to the success of OpenStack as they bring vital resources lacking at startups and among individuals. They also tackle the unsexy work that makes OpenStack acceptable to enterprise customers.
-
-
Hadoop Summit
-
Enterprise customers could consider open source as the solution to their problems. According to Anand Venugopal, Impetus’ head of real-time stream analytics platform StreamAnalytix, “People have become so friendly to open source, and they have been waiting to be liberated from the hold of proprietary vendors that they are positively biased toward open source-oriented technology.”
Discussing a recent use-case scenario, Kankariya said, “The guy was looking for his problem to be solved; he doesn’t care if it’s Hadoop or NoSQL or whatever.” This openness has allowed Impetus to become a trusted partner and advisor for customers that want to “cross-learn from across the ecosystem.”
-
Cloudera, Inc.’s Todd Laurence, director, global partner sales, and Michael Crutcher, director of product management, joined theCUBE, SiliconANGLE’s Media team, at Hadoop Summit 2015 to discuss how Cloudera’s close relationship with EMC is benefiting its Isilon scale-out NAS storage customers and “bringing analytics to data where it lives today in EMC Isilon.”
-
BSD
-
The FreeBSD Project announced a few minutes ago that the first Release Candidate (RC) version of the upcoming FreeBSD 10.2 operating system is now available for download and testing through the usual channels.
-
This latest development milestone for FreeBSD 10.2 has fixes for ZFS, Xen, SSH, pkg, and many other key components. Besides being offered for i386, amd64, PowerPC, PowerPC64, and SPARC64, there are also ARM spins for popular development boards from the RaspberryPi B to BeagleBone and PandaBoard.
-
One week after tagging LLVM 3.7-RC1, Hans Wennborg of Google announced its formal release on Thursday.
-
FSF/FSFE/GNU/SFLC
-
-
-
As you may already know, this is the Free Software Foundation’s thirtieth year fighting for computer user freedom. It has been a great year already, with our biggest LibrePlanet conference ever and an article about GNU in the New Yorker. But what’s a birthday without a party?
-
Openness/Sharing
-
Open Data
-
Earlier this month, the Open Data Institute held its Open Data Awards ceremony at Bloomberg’s London office, where ODI founders Sirs Tim Berners-Lee and Nigel Shadbolt presented this year’s winners.
-
Open Hardware
-
What if you could assemble your house like Legos using free modeling software and a 3D printer? That’s the idea behind Eric Schimelpfening‘s WikiHouse – a home designed entirely in SketchUp that can be downloaded by anyone, customized to fit the user’s needs and sent to the 3D printer. The components are then snapped together using less than 100 screws to make rooms that can be rearranged as easily as you would rearrange furniture.
-
Programming
-
Just two weeks after PHP 7 decided to go into beta, the second beta release is now available for testing.
If you’ve been living under a rock, PHP 7.0 is slated to deliver much greater performance over PHP 5.6 (as much as 2x or more), consistent 64-bit support, various new language features, better handling of fatal errors, and other changes.
-
Standards/Consortia
-
The International Organization for Standardization (ISO) has updated the ODF open document format standard for office application. ODF version 1.2 was published on 17 June.
-
Security
-
-
In 100 milliseconds or less, researchers are now able to determine whether a piece of code is malware or not — and without the need to isolate it in a sandbox for analysis.
-
Get your facts straight before reporting, is the main takeaway from Peter Hansteen’s latest piece, The OpenSSH Bug That Wasn’t. OpenSSH servers that are set up to use PAM for authentication and with a very specific (non-default on OpenBSD and most other places) setup are in fact vulnerable, and fixing the configuration is trivial.
-
In the weeks since the Hacking Team breach, the spotlight has shone squarely on the small and often shadowy companies that are in the business of buying and selling exploits and vulnerabilities. One such company, Netragard, this week decided to get out of that business after its dealings with Hacking Team were exposed. But now there’s a new entrant in the field, Zerodium, and there are some familiar names behind it.
-
Defence/Police/Secrecy/Aggression
-
The National Archives on Friday released more than 350 never-before seen photos of former President George W. Bush and Vice President Dick Cheney, along with top members of the Bush administration, on Sept. 11, 2001, as they reacted to the most deadly attack in terrorism in American history.
-
On Tuesday, the Ukrainian government refused to release an international report on the disaster, intensifying widespread concerns that it pointed to Ukrainian rather than Russian or rebel culpability in the crash.
-
Saudi-led coalition airstrikes killed more than 120 civilians and wounded more than 150 after shelling a residential area in the Yemeni province of Taiz on Friday evening, security officials, medical officials and witnesses said.
The officials, speaking on condition of anonymity because they were not authorized to speak to reporters, said that most of the houses in the area were leveled and a fire broke out in the port city of Mokha. Most of the corpses, including children, women and elderly people, were charred by the flames, they said.
-
I’m reviewing some of the videos from the Aspen Security Forum. This one features DOJ Assistant Attorney General for National Security John Carlin and CIA General Counsel Caroline Krass.
I’m including it here so you can review Carlin’s complaints in the first part of the video. He explains to Ken Dilanian that ISIL’s recruiting strategy is different from Al Qaeda’s in that they recruit the young and mentally ill. He calls them children, repeatedly, but points to just one that involved a minor. 80% are 40 and under, 40% are 21 and under. In other words, he’s mostly complaining that ISIL is targeting young men who are in their early 20s. He even uses the stereotype of a guy in his parents’ basement, interacting on social media without them knowing.
Carlin, of course, has just described FBI’s targeting strategy for terrorist stings, where they reach out to young men — many with mental disabilities — over social media, only then to throw an informant or undercover officer at the target, to convince him to press the button that (the target believes) will detonate a bomb — though of course the bomb is an FBI-supplied inert bomb.
-
Transparency Reporting
-
Hong Kong is definitely the Asian hub of the global news industry.
-
-
-
In an interview, Julian Assange, 44, talks about the comeback of the WikiLeaks whistleblowing platform and his desire to provide assistance to a German parliamentary committee that is investigating mass NSA spying.
-
The minute that private email server Hillary Clinton used for work emails as Secretary of State became a controversy, it was clear that evidence would surface showing that classified information passed through that address – despite her repeated denials.
Of course there was “secret” information in her emails – but not because she had attempted to cover up smoking gun Benghazi emails like conspiracy-addled Republicans hoped. It’s because the US classification system is so insanely bloated and out of control that virtually everything related to foreign policy and national security is, in some way or another, classified.
And now it’s finally happened: the New York Times reported late Thursday that two internal government watchdogs have recommended that the Justice Department open a criminal investigation into Clinton’s private email account, because the cache of 55,000 emails from her now-deleted server reportedly include “hundreds of potentially classified emails”.
-
The nature of secrets is changing. The “half-life of secrets” is declining sharply for many intelligence activities as secrets that in the past may have been kept successfully for 25 years or more, are now exposed well before.
For evidence, one need look no further than the 2015 breach at the Office of Personnel Management (OPM), of personnel records for 22 million U.S. government employees and family members. OPM is just one instance in a long string of high-profile breaches, where hackers have gained access to personal information, trade secrets, or classified government material. The focus of the discussion needs to be on complementary trends in information technology, including the continuing effects of Moore’s Law, the sociology of the information technology community, and changed sources and methods for signals intelligence, all of which increase the likelihood that government secrets will not remain secret for long.
An age where secrets become known sooner, means that “the front-page” test will become far more important to decision-makers. Even if a secret operation is initially successful, the expected costs of disclosure become higher as the average time to disclosure decreases.
-
Finance
-
On this week’s podcast, we look back on Elizabeth Warren ripping apart a rip-off artist from Primerica, break down the latest effort to pass a highway funding bill, and explain why a former NSA chief is talking to a bunch of fruit growers.
-
PR/AstroTurf/Lobbying
-
US relations with Cuba have had a significant time to relax, and clearly there is a still a long way to go with Iran, which George W. Bush famously included as a member of the “axis of evil” in his 2002 State of the Union address (White House Archives, 1/29/02). One might wonder, however, were the US media to grant the same kind of legitimacy to Iranian perspectives as it now does to Cuba’s, whether that latter number might tick up.
-
Fox News anchor Megyn Kelly responded to breaking news of a deadly shooting at a Louisiana movie theater by baselessly asking about possible connections to ISIS or radical Islam.
-
In his piece “Tennessee Is the Capital of American Jihad,” author and “War on Terror” think-tanker James Kitfield sets out to draw a connection between the the recent Chattanooga shooter Mohammad Youssef Abdulazeez and the case of Carlos Bledsoe, who shot up a recruiting station in Arkansas in 2009. The fact that both attacked recruiting stations, both lived in Tennessee and both were Muslim is apparently enough to make Tennessee the “Capital of American Jihad.”
-
On Saturday, at the 2015 Family Leadership Summit, an event which showcases Republican candidates, Donald Trump gave a notorious interview in which he discussed John McCain’s military record. Trump said, “He’s not a war hero. He’s a war hero because he was captured. I like people who weren’t captured.” His interviewer cut him off twice and and asked what he thought again. Suddenly, Trump said McCain was a war hero multiple times, creating a debate about whether Trump meant that McCain is a war hero because being captured is heroic or that McCain only got hero status because he was captured, not because he was doing anything special. Amazingly, Trump got a standing ovation — and his interviewer, Frank Luntz, knew exactly what he was doing.
Luntz is not a journalist. He is not a fellow politician or a Republican Party executive. He is a pollster who specializes in language, and though you might not have heard of him, the Republican candidates certainly have. He knows what words to use to make you like them more.
-
Censorship
-
The Colombo Telegraph, Sri Lanka’s most iconoclastic investigative news website, is gearing up for this year’s second national election. And once again they face the threat of censorship — despite a presidential promise to bring it to an end.
January’s polls saw the website blocked to domestic voters by order of authoritarian incumbent president Mahinda Rajapaksa. Unseated by shock winner Maithripala Sirisena, one of the victor’s first acts after the vote was to lift the official banning order.
-
127.0.0.1 is the “loopback” address for your Internet stack, the address you tell your computer to visit when you want it to talk to itself.
Links to 127.0.0.1 just go to your own computer — it’s like asking your computer to knock on its own door. Not understanding this is directly analogous to not being able to find your own ass with both hands.
-
Earlier this year, the faculty advisor to Northern Michigan University’s college newspaper was outed for encouraging her students to file public records requests and draw attention to acts of secrecy performed by university administration. Noting that public records requests are legal and even encouraged as per Michigan’s Freedom of Information Act, it is unnerving to know that the accomplishments and reputations of our nation’s finest journalism educators can be undermined in the name of image control. But the Marquette-based college is not alone; the Rochester Talon, the nationally recognized and award-winning student newspaper of Rochester High School in Oakland County, has been subjected to prior review by school administration since January, when–in an attempt to raise awareness about changing smoking trends among students of legal smoking age–it ran a photo (shown below) of a teenager (lawfully, and in an off-campus location) smoking a hookah pen. The school administration’s swift retaliation made certain that no journalist would again dare attempt to inform the school community about an issue of social concern.
-
Turkey’s Press Council has said censorship is still in place in Turkey, adding the country ranked 149th among 199 countries in press freedom reports, with 21 journalists in jail and a large number of ongoing cases filed against journalists, in a written statement issued to mark the 107th anniversary of Journalists Day.
-
According to local filmmakers, the recent suppression of documentary Beyond The Fear is just one episode in a quickening erosion of artistic freedom in Israel.
As Nanni Moretti’s Mia Madre began to roll on the opening night of the Jerusalem Film Festival in the picturesque Sultan’s Pool amphitheatre in early July, another screening was kicking off just metres above the spectators’ heads.
-
Putrajaya’s three-month ban on two local publications reveals a growing clampdown on press freedom in Malaysia and a bid to encourage self-censorship, human rights groups said today.
-
“If the Film and Publication Board’s new internet regulations are implemented, they’d have the right to review and classify almost every blog, video, and personal website – even Avaaz campaigns like this one. Think apartheid-era censorship, reloaded and super-charged for an all-out assault on our digital freedoms.”
-
WeChat is China’s hottest social media app. But like internet services in China, discussion on WeChat isn’t entirely free – it is censored by Tencent in accordance with Chinese law. Just how censored is WeChat, and what exactly is being hidden from view? Those questions are the subject of an exhaustive new report from the University of Toronto’s Citizen Lab on WeChat censorship.
-
The Citizen Lab report, published on Monday July 20, conducted an analysis over several thousand posts that were posted publically on the social messaging app WeChat’s public blog. WeChat is owned by Tencent.
-
-
-
Legislation that is being promoted as a way to update the country’s anti-discrimination rules has sparked controversy in the Lower House and society at large amid concerns that it could lead to censorship, particularly in online forums.
-
Privacy
-
Pakistan has been striving to set up a refined National Security Agency-style public watching system capable of tapping the phone calls and emails of hundreds of millions of people globally.
-
In 2013, Pakistan’s Inter-Services Intelligence commissioned a major surveillance system that taps into three international under-sea cables affecting communications of its citizens and also the neighbouring countries whose communications pass through its borders, according to the findings of a report published by the British NGO, Privacy International.
-
A report published by London-based advocacy group Privacy International claims that the practical surveillance capacity of the Pakistani government and Inter-Services Intelligence Agency (ISI) has exceeded local and international regulation laws for surveillance.
-
Pakistan’s intelligence agency has been trying to build a sophisticated spying network that would rival the U.S. National Security Agency (NSA) in its scope, recording the phone calls and Internet data of hundreds of millions of people worldwide, according to a new report.
-
Top officials of US and Pakistan have stressed on achieving peace and stability in South-Asia and its economic development through enhanced cooperation.
-
You have to ask yourself: have trojan viruses and worms already been planted in peacetime, so that if we ever get into a serious confrontation with a potentially hostile state, then we will suddenly discover disruption?
-
Top-secret intercepts prove that economic spying by the U.S. is pervasive and wielded to benefit powerful corporate interests.
-
For years public figures have condemned cyber espionage committed against the United States by intruders launching their attacks out of China. These same officials then turn around and justify the United States’ far-reaching surveillance apparatus in terms of preventing terrorist attacks. Yet classified documents published by WikiLeaks reveal just how empty these talking points are. Specifically, top-secret intercepts prove that economic spying by the United States is pervasive, that not even allies are safe and that it’s wielded to benefit powerful corporate interests.
-
An Obama campaign bundler and prominent Washington, D.C., attorney has been tapped as the new general counsel for the National Security Agency, according to multiple sources familiar with the matter.
Glenn Gerstell has decades of experience helping to run a major law firm, and he has served on public boards and a presidential commission. But while he is well known in Washington legal circles, he’s a relative outsider among national security lawyers and experts who have recently composed the recruiting pool for the top legal position at the nation’s largest intelligence agency.
-
-
-
The German domestic security service has urged the Federal Public Prosecutor to consider charges of treason as a result of two articles posted earlier this year by Netzpolitik.org, one of Germany’s most influential digital rights blogs. The articles reported on leaked documents regarding the German government’s mass surveillance plans. The German criminal code considers the leaking of state secrets to a foreign power, or to anyone else with the intention of damaging the Republic to be treason: the crime can be punished with up to five year’s imprisonment.
-
A leaked NSA intercept shows that German FM Steinmeier was relieved to have “not received any definitive response” from the US on its rendition program at the time of the scandal, which exempted him from the need to act on the matter, WikiLeaks claims.
-
Secret-spilling organization WikiLeaks has published new evidence of what the group says shows the extent of the National Security Agency’s longstanding surveillance of top German officials.
The latest release from the anti-secrecy group, published Monday on its website, includes a list of 20 targets, all pertaining to German politicians, who had been supposedly singled out by the NSA for the purpose of gathering intelligence on behalf of the U.S. government.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Following a meeting in the U.S. with then-Secretary of State Condoleezza Rice, the German Foreign Minister Frank-Walter Steinmeier allegedly, “seemed relieved that he had not received any definitive response from the U.S. secretary of state regarding press reports of CIA flights through Germany to secret prisons in Eastern Europe allegedly used for interrogating terrorism suspects.”
-
Steinmeier, per the reports, didn’t appear too interested in investigating CIA torture flights going through German airports, and the NSA reported he seemed “thrilled” that his tactic of avoiding asking direct questions had succeeded, and relieved that Condi Rice had given him nothing he “had to” look too far into.
-
The latest secret document revelations from WikiLeaks regarding US National Security Agency (NSA) espionage on Europeans, shows German government as a “complete vassal” of the United States, a member of the German Bundestag with the Die Linke party told Sputnik Tuesday.
-
New WikiLeaks revelations about US National Security Agency (NSA) spying on the German Foreign Ministry reveal hypocrisy by the United States toward its allies, co-director of privacy activist group Code Red Simon Davies told Sputnik on Tuesday.
-
Germany’s domestic intelligence chief said Tuesday that the revelations by Edward Snowden have had at least one positive effect, by raising awareness about the importance of counter-espionage.
Hans-Georg Maassen told a gathering of business leaders in the southwestern city of Stuttgart that after the Cold War ended, the issue of counter-espionage was seen as unimportant, German news agency dpa reported.
“So maybe one can be grateful to Snowden that he has put a spotlight on the issue of counter-espionage in Germany,” dpa quoted Maassen as saying.
-
-
Somewhere in the thousands of towering apartment blocks that ring the Russian capital, whistleblower Edward Snowden remains in hiding two years after outraging US intelligence agencies with revelations of their snooping into the private communications of millions of ordinary citizens.
Mr Snowden’s release of classified files he took from his National Security Agency contractor’s job blew the lid off programs long said to be aimed at catching terrorists and keeping Americans safe. The leaks triggered a global debate on government trampling of personal liberties and led to last month’s congressional action to end the mass collection of telephone records, the first major restrictions on spy agency powers in decades.
-
-
On July 1, The Intercept published an exposé on and NSA program it called, “The NSA’s Google for the World’s Private Communications.” It turns out advertisers and the data they rely on are facilitating the government’s bulk surveillance.
-
Saxby Chambliss, a former Republican senator from Georgia, has called for National Security Agency whistleblower Edward Snowden to be publicly hanged.
-
-
-
-
-
-
-
-
-
Gov. Chris Christie on Wednesday sharpened his verbal attacks on Edward Snowden for his disclosure of classified domestic surveillance programs, blasting the former NSA contractor as a “piece of garbage.”
-
-
-
-
The internet is not for businesses, governments, or spies. It’s for users—and it’s up to the independent web engineers to keep it safe for them.
-
-
Edward Snowden, a former CIA employee and NSA contractor who in 2013 blew the whistle on several government-run surveillance programs, envisions an Internet that largely focuses on privacy. He urges leading group of engineers to weave an interweb that prioritises on people’s privacy over anything else.
-
In a very powerful exclusive interview, I recently had the privilege of speaking to an American hero, William Binney, NSA whistleblower.
We discussed how NSA mass data collection makes us LESS safe; how the intentions behind it are not misguided but positively nefarious; how the lies that have been told about it are snowballing, and how Rand Paul may uniquely represent an opportunity for change.
-
We discussed how NSA mass data collection makes us LESS safe; how the intentions behind it are not misguided but positively nefarious; how the lies that have been told about it are snowballing, and how Rand Paul‘s presidential candidacy may uniquely represent an opportunity for change.
-
Years after Edwards Snowden exposed the scale of NSA and GCHQ mass surveillance in a series of high profile leaks, UK police are still investigating the journalists involved in the expose to decide whether to prosecute.
After refusing to confirm or deny whether the two-year investigation was still underway, the Metropolitan Police have revealed they are still examining the journalists who published the leaks by NSA contractor Edward Snowden.
The disclosure was reported by the Intercept, who had been engaged in a Freedom of Information battle which has lasted seven months.
In 2013 Cressida Dick, a high-ranking UK police officer, told a parliamentary inquiry the force was investigating whether the journalists should be charged for their reportage.
-
A controversial data localization law in Russia that would require businesses to perform data storage and processing with servers located on Russian soil is set to go into effect on September 1, 2015, after an amendment passed late last year accelerated the law’s start date. Recently, the Association of European Businesses (“AEB”), an industry lobby group, raised concerns to the Russian government about industry’s ability to comply with the accelerated date. There is some indication that Russia may be considering giving businesses more time to comply.
-
The chilling effect of broad surveillance programs limits the exercise of the constitutional rights to freedom of speech, assembly, and religion, as well as equal protection under the law. It also causes professional harms—lawyers and journalists cannot do their jobs as well, and customers may avoid search engines and email servers run by U.S.-based companies.
-
In an interview with HuffPost Live on Tuesday, Wikipedia co-founder Jimmy Wales discussed changing American attitudes toward hacking and mass surveillance and expressed optimism about the lawsuit he helped bring against the government.
Earlier this year, the Wikimedia Foundation, which Wales chairs, and the American Civil Liberties Union sued the National Security Agency. The suit, Wales explained, objects to the spy agency’s use of “upstream surveillance” methods, which Wales described as “collecting data on almost everybody’s Internet usage in a really wholesale manner.”
-
Joseph P. Nacchio, the former chairman/CEO of Qwest Communications International and of two national commissions on security and infrastructure, will speak at a National Press Club Newsmaker news conference on Wednesday, July 29 – to explain why he believes the USA Freedom Act signed into law last month provides inadequate protection against National Security Agency’s (NSA) bulk data collection of the public’s electronic communications.
-
On March 20, 2000, as part of a trip to South Asia, U.S. President Bill Clinton was scheduled to land his helicopter in the desperately poor village of Joypura, Bangladesh, and speak to locals under a 150-year-old banyan tree. At the last minute, though, the visit was canceled; U.S. intelligence agencies had discovered an assassination plot. In a lengthy email, London-based members of the International Islamic Front for Jihad Against Jews and Crusaders, a terrorist group established by Osama bin Laden, urged al Qaeda supporters to “Send Clinton Back in a Coffin” by firing a shoulder-launched missile at the president’s chopper.
-
The parallel between Jeremy Bentham’s panopticon and CCTV may be clear, but what happens when you step into the world of data capture?
-
People underestimate what cyberwarfare can do, but as the infrastructure of all our countries is run over the internet now, an attack on them could make society collapse within days, says Annie Machon, former MI5 agent.
Germany passed legislation which requires over 2,000 essential service providers to implement new minimum information security standards. If they fail to do so within two years they are going to face fines of up to €100,000.
-
A bill prohibiting law enforcement from obtaining location data from electronic devices without a warrant in most cases became law in New Hampshire this week. The new law not only protects privacy in New Hampshire, but also takes an important first step in addressing the growing federal surveillance state.
Rep. Neal Kurk introduced House Bill 468 (HB468) back in January. The legislation prohibits any government agency from obtaining “location information from an electronic device without a warrant issued by a judge based on probable cause and on a case-by-case basis” with only a few exceptions. The law also prohibits law enforcement from placing tracking devices on any person, or their property, without a warrant.
-
A new anonymous web browser capable of delivering encrypted data across the dark web at high speeds has been developed by security researchers.
HORNET (High-speed Onion Routing at the Network Layer), created by researchers from Zurich and London, is capable of processing anonymous traffic at speeds of more than 93 Gb/s, paving the way for what academics refer to as “internet-scale anonymity”.
The research paper detailing the anonymity network reveals that it was created in response to revelations concerning widespread government surveillance that came to light through the US National Security Agency (NSA) whistleblower Edward Snowden.
-
On February 6 next year, legal provisions that allow police and the secret services to conduct surveillance will disappear. All of it! This will be the result of a judgment by the Constitutional Court a year ago – and the government has yet to prepare regulations to replace them. It was put on its work schedule in March, but at this point there isn’t even an outline of how to approach the project.
A few weeks ago, the Sejm Speaker and a group of senators from the Civic Platform (PO) presented a plan to the lower chamber on how to implement Court decision as sparingly as possible. For example, the Court held that it’s necessary to establish the maximum time that surveillance of an individual is permitted. The senators propose that police should be limited to a year and a half. Other services, however, [like the intelligence agencies], have no such limitations; although the Court didn’t exempt them from its decision.
-
Palantir, the makers of a data analytics platform used by government agencies, law enforcement, as well as financial, insurance, retail and healthcare industries, has confirmed by way of an SEC filing that it has raised an additional $450 million in a new round of funding. The filing indicates the company had offered $500 million in stock, which means $50 million more could still be in the works. According to a report by the WSJ, the funding was raised at a valuation of $20 billion, up from its late 2014 valuation of $15 billion.
-
Palantir is a big-data company that can sift through vast amounts of data to find patterns, answer questions, and solve problems. It serves various government agencies including the military, law enforcement and spy agencies like the CIA and NSA. It also counts Wall Street financial firms, pharmaceutical firms and other big companies as clients.
-
Leaked e-mails from the Italy-based computer and network surveillance company Hacking Team show that the company developed a piece of rugged hardware intended to attack computers and mobile devices via Wi-Fi. The capability, marketed as part of the company’s Remote Control System Galileo, was shown off to defense companies at the International Defense Exposition and Conference (IDEX) in Abu Dhabi in February, and it drew attention from a major defense contractor. But like all such collaborations, it may have gotten caught up in the companies’ legal departments.
-
Former White House Chief Privacy Officer Peter Swire told Sputnik that the likelihood of secrets coming to light limits the degree of control a government can exert over its people.
-
The hack of the Office of Personnel Management databases is reverberating on Capitol Hill. The first phase of the response was a series of withering hearings that put (now former) OPM Director Katherine Archuleta in the spotlight, along with agency CIO Donna Seymour.
-
“If we are going to continue to preserve our right to free speech in the electronic age, then we need to use tools like encryption,” says Ladar Levison, founder of the Lavabit, the encyrpted email service used by Edward Snowden prior to the NSA leaks.
Levison shut down Lavabit after the FBI asked for access to all of his users data during what many suspect was a hunt for Snowden. He talked about that decision in an interview with Reason TV last year.
Reason TV’s Zach Weissmueller sat down with Levison at Freedom Fest in Las Vegas this July to discuss the latest developments in the Dark Mail Alliance, a collaborative efforts by some of the world’s top cryptographers to create a user-friendly email service that encrypts data on the user devices themselves, rather than over a server.
-
Cloud security and privacy has become critical in the wake of the Prism scandal, said Cronje.
-
Three British politicians, including a current MP, are taking the UK government to the country’s top secret security court over claims intelligence agencies are unlawfully intercepting the communications of MPs.
-
-
Not only has the NSA been collecting our personal information, but now it has finally leaked that the Obama administration has been undertaking a massive program to mine and collect personal data on your health, credit cards, jobs and movements.
-
Public keys, trusted hardware, block chains — developers should use these tech tools to help secure the Internet for all
-
Days ago South Korea’s National Intelligence Service (NIS) announced that it too had purchased hacking tools from cyber security pariahs, the Italian Hacking Team. Now the organization reveals one of its agents has been found dead in his car. The spy’s body was discovered beside a supposed suicide note that comments on the recent NIS revelation.
The NIS was originally established as the Korean Central Intelligence Agency in 1961. In 1999 the organization changed its moniker to reflect its present mission which reflects something of a mix between Foreign Intelligence and NSA-level Domestic Spying – despite what its officials claim.
-
In a recent post, Google said the newly proposed export controls for vulnerability research from the U.S. Commercial Department would make finding bugs and reporting them much more difficult. Instead of the new rules protecting Internet users, they might even have the opposite effect and make the Web less secure overall.
-
The period for comments on proposed amendments to the Wassenaar Arrangement – which governs the export of guns, lasers and proper weaponry, and computer hardware and software – ends today. So far, the tweaks concerning IT security products have received an overwhelming thumbs-down from the technology community.
In May the US Bureau of Industry and Security (BIS) suggested altering the Wassenaar Arrangement to include controls on the selling of state-sponsored or commercial surveillance software among the 41 countries that abide by the agreement.
But the amendments were so loosely written that they would also ban the trade in vulnerability exploits, including possibly making bug bounty programs illegal, and criminalizing many of the tools used by legitimate security researchers to test software for flaws.
-
Ever since the internet emerged into public view in the 1980s, a key question has been whether digital technology would pose an existential challenge to corporate and governmental power. In this context, I am what you might call a recovering utopian – “utopian” in that I once did believe that the technology would put it beyond the reach of state and corporate agencies; and “recovering” in the sense that my confidence in that early assessment has taken a hammering over the years. In that period, technology has sometimes trumped politics and/or commercial power, but at other times it’s been the other way round.
-
-
In the digital world we live in– from the videos shared on social networks to location-aware apps on mobile phones to log-in information for connecting to our email to our search history — our data is no longer private, though we have every right to it
-
Civil Rights
-
In the US, race has always mattered. Whiteness in particular has mattered most, standing as the seal of civilisation and the gateway towards citizenship.
Since 1944, Arabs have been deemed white by law. Many Arabs still embrace and defend that status today.
-
“England’s difficulty is Ireland’s opportunity”. Anyone who heard that in childhood as a wise saying, not to be questioned, was being told their elders believed the Nazis were not all bad.
-
While research hitherto has focused on the support German aristocrats secretly provided Hitler within Germany, Urbach’s book discusses an additional, international dimension to this secret diplomatic back channel, most notably from members of the British royal family.
-
Writing in the Telegraph, Conservative London mayor Boris Johnson thundered that it “makes my blood boil to think that anyone should use this image in any way to impugn the extraordinary record of service of Her Majesty to this country.”
She was “a tiny child, and she is making that parodic salute long before her family could possibly have grasped what Hitler and Hitlerism was really all about.”
In the Guardian, columnist Michael White wrote that the “Queen’s Nazi salute [was] a sign of ignorance shared by many in scary times.” The royal family’s “wobbly views” were, he claimed, shared by the “great British public.”
Elsewhere, military historian James Holland opined, “I don’t think there was a child in Britain in the 1930s or 40s who has not performed a mock Nazi salute as a bit of a lark. It just shows the Royal Family are as human as the next man.”
-
In the past decade, advances in neuroscience have given new insights into old problems, ranging from drug addiction and post-traumatic stress disorder to adolescent shenanigans.
For example, if the new neuroscience shows that a drug addict’s brain is physically dissimilar to a non-addict’s brain in ways that make the former more prone to addiction, then we must ask if his infractions of the law ought to be treated less punitively.
-
-
16-year-old traumatized, Amos Yee is open for cash donation, who had already served four weeks in jail.
-
Mr Lee was asked about the cases of Amos Yee and Roy Ngerng – the former found guilty of insulting a religion, the latter of defaming the Prime Minister – in an interview with Time.
-
AWARE has grave concerns about the negative implications of the recent prosecution of Amos Yee. This statement focuses on harassment and hate speech as these areas are closest to our work, although we also share concerns that others have raised about the importance of upholding freedom of expression, children’s rights, and the integrity of people with autism and mental health issues.
-
-
-
Teenage blogger Amos Yee, who received a four-week jail sentence for posting an obscene image online and posting content intended to hurt the religious feelings of Christians, is appealing against both his conviction and the sentence.
-
The lawyers for teenage blogger Amos Yee want his appeal to be heard by a non-Christian judge when it goes before the High Court.
The 16-year-old will be appealing against both his conviction and sentence. His lawyer Alfred Dodwell filed the notice of appeal on July 9, three days after Yee was released from remand.
-
Intellectual Monopolies
-
Washington lobbying by companies and groups involved in global trade boomed in the past nine months, records show, as Congress debated a landmark trade pact proposed by President Barack Obama, the 12-nation Trans-Pacific Partnership (TPP).
Lobbying expenditures by members of a pro-TPP coalition increased to $135 million in the second quarter of 2015, up from $126 million in the first quarter and $118 million in the fourth quarter of 2014, according to Senate Office of Public Records reports reviewed by Reuters.
-
Trademarks
-
Today, Forbes unearthed a lawsuit from late last year that Jewish dating site JDate’s parent company filed against an app called JSwipe (also aimed at Jewish folk). It’s over the use of the letter J. The case is set to pick up again next month.
-
Jdate, the popular dating service responsible for more Jewish hookups than a bottle of Manischewitz, is playing hardball in the dog-eat-dog world of nice Jewish match-making.
Jdate’s parent company, Spark Networks, discreetly filed a lawsuit late last year against Jswipe, the ‘Tinder for Jews’ dating app, claiming intellectual property over the letter “J” within the Jewish dating scene (the company refers to the branding as the “J-family”).
-
Over the sounds of the packed crowd at the lower level of Noho hotspot “Acme,” on Tuesday evening, one phrase could consistently be heard: “I work in real estate.”
-
Additionally, Jdate claims it owns the patent on software that “confidentially determines matches and notifies users of mutual matches in feelings and interests.” Jswipe, like Tinder, notifies users when their romantic interest ‘swipes right’ on their picture, violating Jdate’s patent.
-
Copyrights
-
“Using the Digital Millennium Copyright Act (DMCA), our team has now successfully removed all posts related to this incident as well as all Personally Identifiable Information (PII) about our users published online,” said Ashley Madison parent company Avid Life Media in a statement. “We have always had the confidentiality of our customers’ information foremost in our minds and are pleased that the provisions included in the DMCA have been effective in addressing this matter.”
-
The Intellectual Property Office is consulting on proposals to increase prison penalties for criminal online copyright infringement to 10 years to bring them to the same levels as those for similar physical copyright infringement.
Permalink
Send this to a friend
07.24.15
Posted in News Roundup at 3:40 pm by Dr. Roy Schestowitz

Contents
-
Desktop
-
In 2015, we see the huge sluggishness of Wintel markets. This will motivate retailers to seek other solutions. Better GNU/Linux on those retail shelves than a product that’s not selling… Last Christmas was a wake-up call for retailers. GNU/Linux sold well, and “8.1” did not. Q1 of 2015 showed huge increases in usage of GNU/Linux according to web-stats. When school resumes in the north, I expect more increases. Then, what worked last Christmas will work again. 2015 will be the last year we see reluctance on the part of retailers to sell GNU/Linux. They’ve seen what Android/Linux has done. They will be ready to give GNU/Linux a try on the desktops. The OEMs are OK with whatever ships because the lock-in to M$ is gone. US DOJ v M$ and EU v M$ fixed that.
-
Applications
-
The Calibre eBook reader, editor, and library management software, has been updated to version 2.33. It’s one of the smallest updates, and it’s just here to bring support for an important new device and deliver a few small changes.
-
Instructionals/Technical
-
Games
-
Since this is an open beta, the game doesn’t yet have SteamOS icons or Linux+SteamOS system requirements on the store page. If you own the game (or decide to buy it now), you need to right-click the game on Steam and go to Properties->Betas and select the beta from there. I personally haven’t tried the beta but I’ve heard from a couple of people that it’s working fine.
-
The Terraria developers have confirmed the Linux version will launch tomorrow in open beta, I can’t wait.
-
I briefly mentioned Luckslinger back in March, and now this odd mix is actually out on Linux, so what’s it really like?
-
I’ve spoken with the Gnomoria developer a few times over the past couple years, and I’m pleased to say the Gnomoria Linux version is now live!
-
A new collection of games called Humble Weekly Bundle: Simulators 4 has been made available and some of the titles game Linux support.
-
A fresh update has been released for the famous online multiplayer shooter from Valve Team Fortress 2, and a bunch of balancing changes have been made to the game.
-
Gauntlet is a co-op action title developed by Arrowhead Game Studios and published on Steam by Warner Bros. The studio has just announced that it’s dropping the SteamOS version in order to focus on Windows version.
-
Desktop Environments/WMs
-
GNOME Desktop/GTK
-
If you talk with software developers, sooner or later the topic drifts to tools. The most obvious one is the editor. People really love their editors and are happy to talk about the wonderful features they have and how they increase productivity. The second tool is the compiler, which also receive a lot of praise. The compilers we have today are massively better, faster and more powerful than ones from just 10 years ago. And then there’s the build systems, which are, well…
-
-
Ballnux/SUSE
-
Leap1The newest openSUSE release Leap 42.1, which is based on core SUSE Linux Enterprise source code, has just released its first development milestone.
-
We reported the other day that the openSUSE Project had plans on publishing the first development milestone of their anticipated openSUSE Leap 42.1 operating system, which promises to change the openSUSE Linux distribution as we know it.
-
Red Hat Family
-
-
RHEL users might be disappointed that there are no major new features in the latest edition. Instead, the focus has been on security and stability, with the arrival of a new read-only mounting option for removable media, epitomizing that focus.
-
1. Red Hat Launches Linux Enterprise 6 – Open source solutions provider Red Hat (RHT) announced the general availability of Red Hat Enterprise Linux 6.7 this week. The latest version of the company’s Linux 6 platform is designed to help enterprise users increase their system security and speed up the identification and resolution of IT issues, according to the company.
-
-
Fedora
-
-
-
Few days ago there was an article on Fedora magazine by Jiri Eischmann explaining the current situation of Telegram clients on Fedora.
-
It’s a simple bash script and is free to modify and do what you want with.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Canonical has been talking about convergence for a long time, and we’ve had some examples along the way, like apps that work both on mobile and PC desktops. It’s now possible to observe convergence at a much deeper level, for the entire operating system.
-
The smartphone arena is dominated by two operating systems. Gartner’s latest figures show that during the first three months of 2015, iOS and Android devices accounted for almost 97 percent of global smartphone sales. With established alternatives from Microsoft and BlackBerry already fighting for the leftovers, there doesn’t seem to be a whole lot of opportunity for new players. Canonical, maker of the popular Linux distro Ubuntu, is taking on the challenge regardless. With a version of Ubuntu built specifically for mobile, it’s hoping to shake up the current duopoly with a fresh approach to content consumption. That’s the plan, anyway, but after spending some time getting to know the OS, it’s clear Canonical has a lot of work to do if Ubuntu Phone is ever going to be a viable option for even casual smartphone users.
-
Details about NBD vulnerabilities that have been found and fixed in Ubuntu 15.04, Ubuntu 14.10, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS have now been published by Canonical in a security notification.
-
-
Phones
-
Android
-
Limited apps and software, combined with a mediocre messaging experience shows that Google still has some work to do with Android Auto.
-
We’ve written about the Nova Launcher Android app before but this in-depth review from Android Central made us want to plug it all over again. For those of you who don’t know, launchers in general are like Facebook Home but 1,000 times less terrible — they take over your phone’s main home screen and make some great improvements to the design while also giving you added customization options. Android diehards have long had high praise for Nova Launcher, which just seems to get better and better with each new release.
-
Android is a fantastic platform to develop for. Its development tools are free, easy to come by, and available for Windows, MAC and Linux computers. Android has excellent developer documentation, it is the dominant mobile operating system, and it is available on phones, tablets, watches, TVs and cars. Developing and publishing an Android app is also incredibly easy and straight forward, considering that there are multiple Android app stores available, unlike the single app store for iOS and Windows.
-
Sony is considering launching a pared-down version of Android 5.1 Lollipop, and is testing the concept in Sweden first.
-
-
The WhatsApp Android app recently went through a succession of no less than five updates as the developers brought forward several new features. The fifth and most recent update to WhatsApp for Android bears version number v2.12.194.
-
-
-
-
-
-
-
-
With Oracle and Google headed back to court soon to resume their dispute over Android, Oracle is seeking to update its lawsuit to reflect the huge gains Android has made in the five years since the case began.
-
Android and guitar amp juggernaut Marshall have teamed up to create what might be the greatest sounding smartphone ever. Jack Wallen gives you the scoop.
-
IFTTT, a service that triggers actions between your favorite apps, launched its own suite of productivity tools this year. It’s now open sourced five frameworks for mobile developers, which were used to build the company’s Do range of apps.
-
When a company decides to embrace open-source software development, releasing the code under a suitable license is only the tip of the iceberg. The real challenge that companies face is learning how to attract and collaborate with contributors.
-
-
Another advantage is increased innovation. By allowing anyone to contribute code, open source products can incorporate a greater diversity of use cases. That’s not the only facet though. As the saying goes, no matter who you are, most of the smartest people work for other companies. Open source permits — and encourages — leveraging of the collective knowledge of the larger developer base. In turn, this enables access to greater innovation.
-
Announcing that the company has taken another step toward establishing its “geek cred,” Capital One unveiled Hygieia, an open source DevOps dashboard at the Oscon open source conference this week. With Hygieia’s release, Capital One said it is the first large bank to release an open source software product to the world, and the company promises additional open source products are in the pipeline.
-
At OSCON this year, Jared Smith of Bluehost spoke about how our companies can become good open source citizens. At ByWater Solutions, my job involves engaging in community outreach and getting everyone more involved, so this was a great session for me to attend.
-
IBM has announced a new web portal called developerWorks Open, bringing together various projects they are open sourcing. The projects cover many domains including Analytics, Cloud, IoT, Mobile, Security, Social, Watson and others. So far, IBM has open sourced about 30 projects, and they plan to increase the number up to 50 by the end of the year, and others may come in the future.
-
-
-
It’s the summer of open source at Fusion. Maybe you saw Publishing Checklist, which we released in June, or Shortcake Bakery (our Shortcake add-on), which we released just last week. Today we’re putting another major plugin into the fray: Speed Bumps, a tool to intelligently insert speed bumps into site content.
-
Events
-
What, exactly, is architecture as opposed to plain old software development? And why does architecture matter? In his keynote address at the OSCON conference this week, as seen below, author Martin Fowler took on these two questions and was able to deliver surprisingly detailed answers, given his scant 15-minute time limit.
-
-
Two months ago, “Cloud Native” was something of a new term, adopted most visibly by the Cloud Foundry project; a term both aspirational and unburdened by legacy at the same time. As of this week at OSCON, it’s a statement, borderline manifesto. As if it wasn’t enough that Google and a host of others adopted the term as well, it now has its own open source foundation – the imaginatively titled Cloud Native Computing Foundation. In the wake of its relatively sudden emergence, the obvious questions are first what is cloud native, and second what does it mean for the industry?
-
SaaS/Big Data
-
-
-
-
The company known for its ‘fanatical’ approach to managed cloud services support, Rackspace, has added managed Elasticsearch technology to its cadre.
More specifically, Rackspace’s managed database platform ObjectRocket is expanding its database service portfolio to include fully-managed instances of Elasticsearch.
-
-
Most major vendors have an open source cloud solution. But they take very different approaches, so you need to be a picky eater and find the right restaurant.
-
Business
-
An open industry initiative was formed to promote the Decision Model & Notation (DMN) standard, by providing an open source reference implementation for automatic execution of DMN models. The OneDecision.io project is supported by Signavio, Alfresco, Omny Link and Bruce Silver Associates.
-
FSF/FSFE/GNU/SFLC
-
With broad support from the P2P community, we have been trying for a while to follow RFC 6761 to register special use domain names for “.bit”, “.exit”, “.gnu”, “.i2p”, “.onion” and “.zkey” to reduce the likelihood of ICANN accidentally creating a conflicting gTLD assignment.
-
Project Releases
-
First remarkable thing is that I attended the WebKit Contributors Meeting that happened in March at Apple campus in Cupertino as part of the Igalia gang. There we discussed of course about Streams API, its state and different implementation possibilities. Another very interesting point which would make me very happy would be the movement of Mac to CMake.
-
-
Public Services/Government
-
The imminent release of the Intranet starter kit was announced by Dale Shepherd. The Digital Services Manager at Shropshire Council was one of the speakers at the Open Source Conference that took place in London on 7 July.
-
France has published its first Open Government National Action Plan which details 26 commitments to promote “a transparent and collaborative public action”.
-
Openness/Sharing
-
-
The idea to create a service that anyone can use to his or her own end made him attractive to the Philadelphia Open Source project.
-
-
Security
-
It was discovered that the libuser library contains two vulnerabilities which, in combination, allow unprivileged local users to gain root privileges. libuser is a library that provides read and write access to files like /etc/passwd, which constitute the system user and group database. On Red Hat Enterprise Linux it is a central system component.
-
-
Environment/Energy/Wildlife
-
If the Magna Carta marked the birth of human rights, today we may have reached its apotheosis. In Spain, or at least in one Spanish town, politicians have just voted overwhelmingly in favour of creating what are effectively human rights for dogs and cats.
-
PR/AstroTurf/Lobbying
-
National Public Radio ombud Elizabeth Jensen (NPR.org, 7/22/15) responds to FAIR’s study of NPR commentary, saying, “I find the specific numbers in the study somewhat arbitrary, even though the broad sweep of its conclusions pretty much echo what NPR already knows.”
-
This week on CounterSpin, a sort of theme show on how media cover government corruption disguised as business as usual. First up: A Wisconsin court has just handed Gov. Scott Walker a “big victory,” headlines in the Washington Post and elsewhere declared. One might’ve hoped they’d lead with what the ruling–about Walker’s abuse of campaign finance rules–did for democracy and the public’s right to know who’s paying what to whom in public office. We’ll talk with Brendan Fischer, general counsel at the Center for Media and Democracy, about what just happened in Wisconsin.
-
Censorship
-
Privacy
-
By validating almost all surveillance measures provided in the Surveillance Law adopted on 25 June, the French Constitutional Council legalises mass surveillance and endorses a historical decline in fundamental rights. Algorithmic black boxes have been approved. Only international surveillance has been deemed to be non compliant to the Constitution.
-
-
Civil Rights
-
“Eight years ago I used offensive language during a conversation,” Hogan’s statement said. “It was unacceptable for me to have used that offensive language; there is no excuse for it; and I apologise for having done it.”
-
Intellectual Monopolies
-
Copyrights
-
The IPKat is delighted to host an extremely thoughtful contribution by competition law scholar and fellow blogger (Chillin’ Competition) Pablo Ibanez-Colomo (London School of Economics) on some key developments occurred yesterday.
Permalink
Send this to a friend
Posted in News Roundup at 6:30 am by Dr. Roy Schestowitz

Contents
-
Desktop
-
As I learned more about Linux, it became easier to use with time. I was impressed by the contributions of open source developers to it as well. Use cases that were really hard for me at first became easier as more advancements were made in the Linux community. At one point, finding and installing codecs to play multimedia files was annoying, but later it became a cinch. Proprietary drivers (when absolutely necessary) required me to recompile my kernel, but it is now often just a checkbox. Free drivers have also made leaps and bounds.
-
Kernel Space
-
The Linux Foundation posted a schedule for LinuxCon + CloudOpen + Embedded Linux Conference Europe 2015 (Oct. 5-7), and expanded its training into India.
-
-
-
Open source has always been about democracy, openness, and opportunity. In keeping with that spirit, at Linux Foundation Training we’re working to make high-quality professional Linux training available worldwide. As part of that, today we’re announcing region-specific pricing for India. Starting now, if you live in India, you’ll be able to purchase the LFS201 Essentials of System Administration bundle with included LFCS exam for 5,000 Rupees (~$79). This pricing is available only to residents of India.
-
Linux Foundation announced its Essentials of System Administration course and Linux Foundation Certified System Administrator exam for individuals in India for $79 or Rs 5,000.
-
This makes India the first region in which the Linux Foundation will offer country-specific pricing on select training and certification products.
-
-
Graphics Stack
-
Marek Olšák of AMD finished landing the code needed today in Mesa for exposing the OpenGL 4.0 ARB_tessellation_shader by the RadeonSI Gallium3D driver.
-
-
Five years after the OpenGL 4.0 specification was introduced, the open-source Mesa 3D project has finally moved on to supporting the necessary extensions, the open-source NVIDIA (Nouveau) driver even exposes OpenGL 4.1 support this morning, and OpenGL 4.2 patches are pending.
-
Wldbg supports a few different modes of operation from taking a list of modules and running functions on those modules for each message going through the Wayland function, there’s also a GDB-like interface for debugging Wayland clients, and there’s also a server mode for overtaking the bound socket and accepting all new connections.
-
The news today of OpenGL 4 finally being accomplished in Mesa/Gallium3D is quite ironic and memorable as this day five years ago was when the R600 Gallium3D driver reached the milestone of being able to run glxgears on AMD hardware.
-
Benchmarks
-
Applications
-
SmartGit, a graphical client for the version control systems Git and Mercurial with optimized workflows for multiple platforms, has been upgraded to version 7 preview 12 and is now ready for download and testing
-
On July 22, Konstantin Dmitriev announced the first maintenance release for Synfig Studio, an open-source, industrial-strength vector-based 2D animation software solution that can be used for producing feature-film quality animations.
-
The CMake 3.3 update brings new capabilities to the if(), add_dependencies(), and find commands along with various property improvements. CMake 3.3 has also deprecated Visual Studio 6/7 support and made other changes for developers relying upon this popular build system.
-
Instructionals/Technical
-
Games
-
Don’t Be Patchman is a new game that will land on Steam for Linux in about a month. Beside the fact that it seems to be a very interesting title, it’s also probably the first one to launch on Linux, without a Windows or Mac version.
-
Terraria, a 2D adventure game developed and published by Re-Logic on Steam, will finally get a Linux version. The makers of the game said on Twitter that a Linux version is incoming.
-
Feral Interactive is one of the major studios out there that are porting important games for Linux users, and it looks like they are planning something big, but they don’t want to announce anything for certain.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
I’m glad to announce that a couple of new, long-awaited (5 and 7 years respectively!) features are going to land in Ark. Starting from the 15.08 release (which will be KF5-based)…
-
-
GNOME Desktop/GTK
-
GNOME 3.17.4 is out. This is a development snapshot, so use it with caution.
Among the new things in this release, you can find improved Wayland hi-dpi support in mutter, IP addresses for vms in gnome-boxes, MathML support in orca, performance improvements in tracker, events from different boots in gnome-logs, a new places view in the GTK+ file chooser, a new application preview: gnome-todo, and many small improvements and bug fixes all over the place.
-
The GNOME 3 Human Interface Guidelines were released just under a year ago. They incorporated material from the GNOME 2 HIG, but they were also a thorough rework: the GNOME 3 HIG has a radically different structure from the GNOME 2 one, and is largely based on a collection of design patterns. The hope was that this collection could grow and evolve over time, ensuring that the HIG is always up to date with the latest design practice.
-
On July 23, the GNOME Project announced that the third snapshot towards the Nautilus (Files) 3.18 file manager for the upcoming GNOME 3.18 desktop environment was available for download and testing.
-
The hard working developers behind the highly acclaimed GNOME desktop environment used in numerous distributions of GNU/Linux have just finished a new milestone towards the anticipated GNOME 3.18 release.
-
Mutter 3.17.4 is a bit more feature-rich this time around than the GNOME Shell updates. The new development version of Mutter has improved HiDPI handling on Wayland and support for compositor-side animated cursors. Another change to benefit Wayland is allowing basic configuration of dummy outputs when Mutter is running as a nested Wayland compositor.
-
GNOME Shell 3.17.4 is now available, but it’s not the most exciting development release of recent times…
-
-
-
On July 23, the GNOME Project, through Matthias Clasen, announced the release of the fourth development milestone towards the GNOME 3.18 desktop environment, due out on September 23, 2015.
-
-
New Releases
-
Jeff Hoogland today posted some updated information for fans of his Bodhi Linux distributions as well as requesting help testing new desktop Moksha. Elsewhere, Clement Lefebvre today said the upgrade path from 17.0 and 17.1 to 17.2 is now open to all. Also, The Linux Foundation today announced its keynote speakers for upcoming conferences in Dublin and QEMU is the Software Freedom Conservancy’s newest member.
-
Screenshots/Screencasts
-
Ballnux/SUSE
-
We reported a while ago that the openSUSE Project is producing a brand-new version of their RPM-based Linux distribution, called Leap, version 42, which will completely change the openSUSE operating system as we know it.
-
-
While a milestone release of Leap has been imminent, it’s not coming out today as hoped for. Partially causing the delay is that Leap is moving over to the Linux 4.1 kernel than their previous Linux 3.x base.
-
Slackware Family
-
Red Hat Family
-
Red Hat, the king of Linux and open source world; the only fully open source company to bag over a billion dollars in revenue, has announced the general availability of RHEL (Red Hat Enterprise Linux) 6.7, the latest update to RHEL 6 platform.
-
-
-
Fedora
-
Jan Šilhan has announced that the DNF package manager tool used in the latest production version of the acclaimed Fedora Linux operating system reached version 1.0.2 on July 22, introducing some new attractive features, and patching those nasty issues reported by users since the previous version of the software.
-
There are a lot of tools and applications connected to 3D printing available to Fedora users. In this article, I’ll guide you through one possible scenario of creating a 3D physical object: from an idea to a real thing.
-
The team I manage at Red Hat, the Fedora Engineering team, includes people who work on Fedora system administration, release tooling, application development, and design. We have a job opening for an engineer to work with our infrastructure applications team on some challenging, fun, and forward-looking problems:
-
Debian Family
-
Derivatives
-
Debian and Ubuntu are moving to update all C++ packages with GCC5, which was released in April. GCC stands for Gnu Compiler Collection, and it is used to convert source code to executable code and libraries. These compilers are used to build everything from the Linux kernel to user applications, so it’s a far-reaching change.
GCC5 has introduced more fundamental updates than previous versions, as it is the first version to fully support the latest version of C++. This new standard, released in 2011, contains numerous improvements to the previous standard, which dates back to 1998. It gives developers the tools they need to build more stable software rapidly, at all levels of the Linux ecosystem.
-
Canonical/Ubuntu
-
Canonical released details about a couple of LXC vulnerabilities that have been found and corrected in Ubuntu 15.04, Ubuntu 14.10, and Ubuntu 14.04 LTS, operating system.
-
Canonical works on a few Ubuntu Touch branches at all times, besides the current stable one that everyone can get. From the looks of it, the development one is based on the new Wily Werewolf, and it’s receiving some interesting changes.
-
After having published details about a new Linux kernel update for its Ubuntu 12.04 LTS (Precise Pangolin) operating system, Canonical has posted two more Ubuntu Security Notices informing users of the Ubuntu 15.04 and Ubuntu 14.04 LTS OSes about the availability of kernel updates for their systems.
-
On July 23, Canonical posted a new Ubuntu Security Notice informing all users of the Ubuntu 12.04 LTS (Precise Pangolin) operating system about the immediate availability of a kernel update.
-
We reported a few days ago that the next major update for Canonical’s mobile operating system, Ubuntu Touch OTA-6, will arrive in approximately 6 weeks, around September 1, 2015 or at the end of August if we’re lucky.
-
-
-
Arbor is launching an Ubuntu-ready Type 6 Compact module with a dual-core 5th Gen Core CPU, -40 to 85°C operation, 12 USB ports, and eight PCIe slots.
-
Phones
-
Tizen
-
Samsung Electronics have announced the addition of four services that provide real-time on-screen Information on their Tizen based Smart TVs. You can display Information that relates to sports, news, entertainment, and social. The Information is displayed on the right hand side of the screen on a transparent window, and can be accessed via the TV remote when the viewer is watching cable TV or IPTV.
-
Android
-
It’s easy to forget that Android is little more than a decade old. I fondly remember one of my first editors at CIO.com asking me to write a story about “WHAT ANDROID MEANS TO ENTERPRISE.” I write that title in capital letters, bold, italics, underline and quotation marks because the story was supposed to have gravity. This was in 2007 or 2008, when Android was more of a concept than something the average Joe could grasp in his hands. I was supposed to explain the mysterious OS, and quell the fears of CIOs, who worried the consumer software would make their jobs harder.
-
In the world of Android-connected professionals, we tend to see two different types of people: those who design or develop for the platform, and those who observe and write about it.
Liam Spradlin is a rare case of someone who falls equally into both categories.
-
The latest Android-based smart TV platform – cunningly called Android TV – is by my reckoning Google’s third stab at becoming a force to be reckoned with in the smart TV world. Actually its fourth if you also include the early and little-seen Android 4.2 Jelly Bean effort introduced on a few high-end Philips TVs in a handful of European territories last year.
-
The Android of 2015 is a world away from that 2008 version, where the Android Market was in its infancy, there were no native video playback capabilities and the G1 had no multi-touch support. But Google is going to have to keep innovating and improving its mobile OS to keep the lion’s share of the smartphone market.
-
Infotainment systems are actually the worst part of a modern car. In fact, a study by Nielsen and SBD Consultancy found the systems in new cars to be the biggest cause of customer complaints. Much like during the beginnings of the modern smartphone, the car infotainment trend takes a bunch of manufacturers that traditionally have only made hardware and asks them to create software. It should be no surprise that they are terrible at it. (And that says nothing of their typical sloth-ish product cycles.)
-
One of the more recent discoveries resulting from the breach two weeks ago of malware-as-a-service provider Hacking Team is sure to interest Android enthusiasts. To wit, it’s the source code to a fully featured malware suite that had the ability to infect devices even when they were running newer versions of the Google-developed mobile operating system.
The leak of the code base for RCSAndroid—short for Remote Control System Android—is a mixed blessing. On the one hand, it provides the blueprints to a sophisticated, real-world surveillance program that can help Google and others better defend the Android platform against malware attacks. On the other, it provides even unskilled hackers with all the raw materials they need to deploy what’s arguably one of the world’s more advanced Android surveillance suites.
-
A respected security researcher has denied any involvement with Hacking Team after open-source code he wrote was found in smartphone spyware sold by the surveillance-ware maker.
-
In this sense, software commons make sense, and because these commons do not effectively exist in some village somewhere in Europe during the Middle Ages, but much rather all over the Internet, they are of primary importance for software and for the world we live in.
-
On the third day of OSCON, I heard Facebook’s James Pearce deliver one of the convention’s many keynote presentations.
Pearce explained how Facebook does open source at scale. And according to him, Facebook launches several open source projects every month and has hundreds of engineers supporting those projects on an ongoing basis—all while they’re engaging with communities around the world to make software experiences better.
But more interesting than how Facebook does this is the question of why they use, support, and release open source projects at a
-
IBM has set up a new code repository that aims to foster collaborative development of enterprise open source software — and it may also drum up interest in its own Bluemix platform services.
-
The right storage solution is critical for business, but the price tag can put many options out of reach. Luckily, there’s a host of powerful, scalable open source candidates to choose from.
-
However, open-source software and hardware has become the platform of choice for developers for next-generation drone technology. Mature alternatives exist in the open-source realm. From OpenPilot to Dronecode, these projects emphasize customizability and offer ways to collaborate on development and support that are not possible with proprietary systems. For every layer of the drone, from flight code to firmware, to vision processing and collision avoidance, there are viable open-source options.
-
When a company decides to embrace open-source software development, releasing the code under a suitable license is only the tip of the iceberg. The real challenge that companies face is learning how to attract and collaborate with contributors.
-
Monoid, designed by Andreas Larsen, is designed to be sleek and precise. Every single character in Monoid’s library has been designed by Larsen to be beyond easy to tell apart, so you don’t ever have to worry about confusing thetas, o’s, O’s, and 0’s (zeros). The font is also monospaced (each character takes up the same width), so it makes it easy to skim your code and spot any errors that might be fudging things up. The spacing between the characters is small, however, so you can fit as much as you need into a line of code. What makes Monoid even better is the fact that it’s alive. Since it’s an open source font, it can be adjusted and perfected over time by the very people that use it. You can check out Monoid at the link below.
-
Non programmers can write docs. They can design logos. They can help with user interface design. They can test fixes or new features. They can triage bugs by verifying that the submitted report can be recreated and adding additional details, logs, or config files. Larger projects need some infrastructure support that is more administration and security compliance than Java programmer. Many people who consider themselves non-programmers do have some pretty good scripting skills and can assist with packaging for distributions.
-
Leading vendor-independent Linux certification organization extends commitment to furthering the adoption of Linux and Open Source.
-
Events
-
At OSCON, Purism has on hand the Librem 13 and Librem 15 laptops – the numbers designating the screen size (13-inch and 15-inch, respectively) — which are both designed, chip-by-chip and line-by-line to respect your rights to privacy, security and freedom, which is Purism’s philosophy.
-
Like many of the Linux/FOSS events that dot the calendar year, OSCON resembles that — Bonnaroo without the mosh pit (though now that I’ve written that, let’s see if something like that appears in Austin next year) — but along with the camaraderie there’s also an element of “high school reunion” in the mix.
-
“Big Blue” unveiled a new platform for developers to collaborate with IBM on a newly released set of open source technologies. IBM plans to release 50 projects to the open source community to speed adoption in the enterprise sector and spur a new class of cloud innovations around mobile and analytics, among other areas.
-
-
Web Browsers
-
Mozilla
-
Today, Mozilla proudly celebrates the 10th anniversary of the Mozilla Developer Network, one of the richest and also one of the few multilingual resources on the Web for documentation. It started in February 2005, when a small team dedicated to the open Web took DevEdge (Netscape’s developer materials) and set out to create an open, free, community-built online resource for all Web developers. Just a couple of months later, on 23 July, 2005 the original MDN wiki site launched and has evolved steadily ever since for the convenience and the benefit of its users.
-
SaaS/Big Data
-
President of Huawei Central Software Wang Chenglu insists that open source is in the firm’s blood from core business networking (where the firm helped drive the network openness as founding member of OPNFV), to cloud computing and the IoT (where the firm open sourced LiteOS — a lightweight IoT Operating System).
-
-
FSF/FSFE/GNU/SFLC
-
Richard Stallman, the founder of the Free Software Foundation and the GNU Project known by many in the open source worlds as rms, is not the sort of person you’d expect to endorse a product. But Stallman and the FSF have formed a partnership of sorts with Crowd Supply, a crowdfunding company that has been largely focused on open source hardware and software projects.
-
Project Releases
-
I’ve released man-pages-4.01. The release tarball is available on kernel.org. The browsable online pages can be found on man7.org. The Git repository for man-pages is available on kernel.org.
This release resulted from patches, bug reports,and comments from nearly 50 contributors. As well as a large number of minor fixes to over 100 man pages, the more significant changes in man-pages-4.01 include the following.
-
Public Services/Government
-
The French government has published templates to be used by procurement officers when requesting free software-based ICT solutions. The templates include intellectual property clauses, and clarify the specifics of the free software environment.
-
Licensing
-
Today, Software Freedom Conservancy proudly welcomes QEMU, the generic machine emulator and virtualizer, as a member project. QEMU is now one of many free and open source software projects who call Conservancy their non-profit corporate home.
-
Openness/Sharing
-
It is an idea that has not set the country on fire, but has been noticed all over the world. For a few years now, it has been knocking at the doors of international technology awards, but losing out in the end to far more extraordinary innovations. It has also been among the few, if not the only, ideas from India to get an entire session at an American Chemical Society meeting. It is called the Open Source Drug Discovery (OSDD) model. With a bit of luck and commitment, it could break new ground in drug discovery and development.
-
Standards/Consortia
-
Microsoft could get the boot from the French government if a new recommendation from an official advisor is adopted.
DISIC (Direction interministérielle des systèmes d’information et de communication de l’État) has recommended that French authorities ditch Microsoft Office tools in favour of the Open Document Format (ODF).
DISIC is responsible for harmonising and reducing the costs of all state computers, including government ministries, state and regional departments and local authorities, and sees ODF as the best way to make them all interoperable.
According to sources, an initial draft of the report envisaged outlawing Microsoft’s Open XML altogether, although with some agencies using tools specifically developed for use with Open XML, DISIC relented.
-
Barack Obama has urged the United Kingdom to stay with the European Union.
The US President also said that the UK is his nation’s “best partner” during an interview with the BBC on Thursday.
“Having the United Kingdom in the European Union gives us much greater confidence about the strength of the transatlantic union,” he said during an interview with the broadcaster before his visit to Kenya.
-
Security
-
Some measure of protection is afforded by the fact that attackers will need a way to log in to a vulnerable site with at least Contributor privileges.
-
Hackers are running rings round our technophobe police and the companies we rely upon every day. Who can blame them, asks Emma Barnett
-
This is a big deal. Hackers can remotely hack the Uconnect system in cars just by knowing the car’s IP address.
-
Customers who hired the infamous ID theft-protection firm Lifelock to monitor their identities after their data was stolen in a breach were in for a surprise. It turns out Lifelock failed to properly secure their data.
-
Defence/Police/Secrecy/Aggression
-
While beefing up NATO’s military presence in Europe Washington should refrain from deploying more US nuclear weapons in EU countries, senior fellow of the Brookings Institution Steven Pifer said.
-
PR/AstroTurf/Lobbying
-
Co-host Steve Doocy later worried that the loans amounted to “discrimination” in favor of Muslims, while network analyst Peter Johnson, Jr, said that it “opens up a lot of questions” such as concerns about “legitimatizing a law that is really inimical to American values.”
-
A Fox News report on the so-called “unintended consequences” of Seattle, Washington’s municipal minimum wage increase included the unsubstantiated claim that better pay is encouraging workers to work less so that they stay in poverty and continue receiving government benefits. This report fits the network’s anti-minimum wage, poor-shaming narrative, but ignores the many benefits of increasing the minimum wage.
-
Comcast executive David Cohen is, by dictionary definition, a lobbyist. And not just any lobbyist; a gushing profile piece by the Washington Post in 2012 called him a “wonk rock star” and the company’s “secret weapon,” who uses “his vast network of high-powered contacts” to help craft Comcast-friendly regulations and apply pressure on DC policy makers. You know, a lobbyist. Unless you’re Comcast, which has now e-mailed me repeatedly to demand I stop calling him that.
-
Privacy
-
As an Eisenhower Fellow, Dr. David A. Bray had the opportunity to travel to Taiwan and Australia in a personal capacity to discuss the burgeoning privacy and security challenges that the Internet of Everything era presents. Throughout his meetings, everyone asked: who is responsible for ensuring security? Answering as an Eisenhower Fellow in a personal capacity, Bray was always quick to answer: Everyone is.
-
Civil Rights
-
During the traffic stop that led to her arrest and, ultimately, her death in a Texas jail, Sandra Bland repeatedly questioned the decisions of state Trooper Brian Encinia and asserted rights she said Encinia was violating.
A close look at the police car dashcam video that recorded the exchange shows her questions had merit: Encinia at every occasion escalates the tension. He tells Bland, a Black Lives Matter activist, she’s under arrest before she has even left her car, shouts at her for moving after ordering her to move, refuses to answer questions about why she’s being arrested and, out of the camera’s view, apparently slams her to the ground. He gets testy with her — “Are you done?” — when she explains after he points out she seems irritated. And, contrary to a recent Supreme Court decision, he unconstitutionally extends the traffic stop, it appears, out of spite.
-
A Guantanamo prisoner balked at working with his defense lawyers due to a possible conflict of interest Wednesday, prompting an indefinite recess in his pretrial hearing in Cuba.
Abd al-Hadi al-Iraqi told the military judge Wednesday he wished to stop conferring with the two lawyers assigned to his case, at least temporarily. During the recess, prosecutors will try to arrange a meeting between al-Hadi and one of his former attorneys in hopes of resolving the issue.
-
Sandra Bland’s arrest and death are a national scandal. The police are responsible.
-
Attorney John W. Whitehead opens a recent posting (see below) on his Rutherford Institute website with these words from a song by Bob Dylan. Why don’t all of us feel ashamed? Why only Bob Dylan?
I wonder how many of Bob Dylan’s fans understand what he is telling them. American justice has nothing to do with innocence or guilt. It only has to do with the prosecutor’s conviction rate, which builds his political career. Considering the gullibility of the American people, American jurors are the last people to whom an innocent defendant should trust his fate. The jury will betray the innocent almost every time.
-
Intellectual Monopolies
-
Animal-shaped pillows are cute and fluffy, except when they spur litigation. Recently, the Milo & Gabby brand sued Amazon for IP infringement because merchants allegedly sold knockoffs of its “Cozy Companion Pillowcases.” Amazon has successfully avoided IP liability for its marketplace, and a recent ruling rejected most of Milo & Gabby’s claims. However, a key piece of Milo & Gabby’s claim survived Amazon’s dismissal attempt, leaving the possibility that Amazon could be liable for merchants’ IP violations.
-
Copyrights
-
The European Union has today launched an antitrust investigation against several large U.S. movie studios and Sky UK. The European Commission wants to abolish geographical restrictions and has sent a statement of objections over the geo-blocking practices of six major US film studios including Disney, Paramount Pictures and Warner Bros.
-
Google search results sometimes include a tiny message at the bottom that some sites have been removed for sharing pirated content.
Those requests come from movie studios and other content rights holders who manually submit links to be taken down.
What’s pretty hilarious is movie studios have been submitting takedown requests that include links to pirated content stored on their own desktop computers.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »