11.03.16
Posted in News Roundup at 4:50 pm by Dr. Roy Schestowitz

Contents
-
Open source software was once relegated to hobbyists and tech-enthusiasts who enjoyed tinkering with code, but we’re entering an era of open source professionalization.
Businesses of all sizes are investing in open source projects and, to support these investments, 65% of hiring managers say they are expanding open source hiring into multiple parts of their companies—beyond just the IT and engineering aspects.
While hiring open source professionals is increasingly important, the rise of open source software is critical to the new Internet of Things and connected devices reality. You may not realize it, but the growth of Linux since the early 1990s has dictated the development of open source in the business and consumer worlds.
-
Desktop
-
Windows 10′s market share has stalled, according to all three of the traffic-measurement tools The Register tracks at the start of each month.
Our three sources are Netmarketshare, StatCounter and analytics.usa.gov. All three investigate web traffic to determine operating system prevalence, with the third source only considering traffic to United States Government web sites.
-
Back in September, complaints that reached the web (and even got confirmed by a supposed Lenovo official) claimed that installing Linux on a Yoga 900 was impossible because the operating system was blocked as part of a deal between Microsoft and Lenovo.
-
A KDE user for the second week in a row! And one who uses Activities. KDE isn’t an easy desktop environment, but it continues to attract power users. My suspicion is that as other desktop environments (across operating systems) simplify their interfaces, KDE will continue to attract new users who want a more sophisticated interface—even at the cost of a learning curve.
-
Server
-
Amazon Web Services is letting customers download its own artisanal Linux.
The company has loosed its Linux Container Image to assist those planning a move into its cloud can test their software and workloads on-premises.
Previously the image was only accessible on-cloud, for customers running virtual machine instances on AWS.
The cloud giant’s chief evangelist Jeff Barr made the announcement in this blog post.
-
Conversely, looking at new developments in technology can often give a hint at the future of business at large. I see three developments that have the potential to influence our company of the future in a major way.
Microservices
Blockchain
Industry 4.0
While this might read like a list of keynote topics at any major tech conference in 2016, let’s look further than the average trend report.
-
Apcera today is launching what it claims is the first enterprise-grade container management platform.
The idea is to provide a turnkey package that includes all the functions necessary for running containers — functions such as orchestration and networking, along with aspects such as security.
-
There are many examples of collaboration all around us that stretch far beyond the type of collaboration in open source projects. As preparation for her keynote at LinuxCon Europe, Jilayne Lovejoy, Principal Open Source Counsel at ARM, watched a TED talk by Rodney Mullen and was inspired by how he talked about collaboration within the skateboarding community where he compared it to hackers within the open source community.
Lovejoy says, “You’d think the people in this room had an invented the whole concept of collaboration, but you can actually find examples of collaboration all around us, like in the way skateboarding evolved from freestyle to street skating by adapting to a new environment.” She talks about how the values underpinning collaboration are inherently compelling and goes on to talk about how “it’s about being motivated by the respect from your peers, the satisfaction of creating something others can use, and being part of a community that you helped build and you can see other people contributing that and taking it to the next level.”
-
Cloud Foundry, the open-source Platform-as-a-Service (PaaS) cloud, surveyed nearly 900 executives and all of them are having fits finding enough staffers with cloud skills. How bad is it? Bad.
-
Kernel Space
-
Jeff Garzik, CEO and co-founder of enterprise-grade blockchain solutions provider Bloq, has been elected as a representative to the Board of Directors for The Linux Foundation – a nonprofit organization promoting open source software. This key appointment recognizes Garzik’s commitment to innovating with open source technologies.
-
-
The Linux Foundation, the top non-profit, open-source group, has announced the appointment of Erica Brescia, co-founder and COO of Bitnami; Nithya A Ruff, director of Western Digital’s Open Source Strategy Office; and Jeff Garzik, co-founder of Bloq, to its board of directors.
Linux Foundation Logo
Ms Ruff and Ms Brescia join as at-large directors, and Mr Garzik comes on board as the representative of Linux Foundation Silver members. Brescia and Ruff will take the place of Larry Augustin and Bdale Garbee. Garzik replaces Matt Jones of Jaguar Land Rover.
-
Nithya Ruff, director of Western Digital’s Open Source Strategy Office, has joined the Board of Directors of the Linux Foundation. In addition to Ruff, the Linux Foundation has also appointed Erica Brescia, co-founder and COO of Bitnami and Jeff Garzik, co-founder of Bloq, to its Board of Directors.
Ruff runs the open source program office for WD and also leads the gender diversity efforts through the WD Women’s Innovation Network Board, which is an Employee-led group that advocates for women to achieve their highest potential in the company.
-
-
-
Fujitsu subsidiary PFU has announced Linux support for their SP Series scanners (SP-1120, SP-1125, SP-1130). Sadly, even in 2016, binary-only drivers are still a thing for printers/scanners.
The Fujitsu SP scanner Linux drivers released today are 32-bit and 64-bit binaries spun for Ubuntu 14.04/16.04 LTS and no sign of any source code nor does the README mention anything aside from the binary blobs that are behind an EULA barrier.
-
Graphics Stack
-
-
-
-
-
-
-
-
Interested in hacking on some low-level stuff and implementing a feature that’s useful to a lot of laptop owners out there? We have a feature on libinput’s todo list but I’m just constantly losing my fight against the ever-growing todo list. So if you already know C and you’re interested in playing around with some low-level bits of software this may be the project for you.
Specifically: within libinput, we want to disable certain devices based on a lid state. In the first instance this means that when the lid switch is toggled to closed, the touchpad and trackpoint get silently disabled to not send events anymore. [1] Since it’s based on a switch state, this also means that we’ll now have to listen to switch events and expose those devices to libinput users.
-
Benchmarks
-
Following last week’s benchmarks of the GeForce GTX 1050 and GTX 1050 Ti has been a request to see some fresh Blender benchmarks with CUDA acceleration of the Pascal line-up. Now having more time with these latest GTX 1000 series cards, here are such benchmarks.
-
-
Applications
-
It appears that the first day of November 2016 was fruitful for the open source ecosystem, as many major software releases and GNU/Linux distributions have landed, including the GStreamer 1.10 multimedia framework.
-
cURL 7.51.0 was released today and while it does add some new features it does contain a number of active CVEs.
-
Today a new major version of the libblockdev library was released – libblockdev 2.0. This new release breaks the C API [1], but for the sake of important new features that required such changes. So what’s new?
-
Instructionals/Technical
-
-
-
-
-
-
-
Secure File Transfer Protocol (SFTP) is used to encrypt connections between clients and the FTP server. SFTP provides file access, file transfer, and file management functionalities over over SSH tunnels.
-
-
-
-
-
-
-
Games
-
Feral Interactive has just released Deus Ex: Mankind Divided for Linux!
Great to see Feral get this game out now for Linux with the Windows release having just been this past August. While on Windows there is Direct3D 12 support and on macOS there is Metal, under Linux there is just OpenGL support. As mentioned yesterday with the Linux system requirements for this game, only NVIDIA graphics are currently supported. I’ll be running some Mesa Git tests with this game shortly…
-
Retracing the life of the protagonist, his choices and their consequences are central to this open world game. Life and death and philosophical quandaries are ever-present in Mortido.
-
-
-
-
Just a word of warning, the latest Steam Client Beta has partially broken the downloading and updating of games on Linux.
I noticed it yesterday, as all my games repeatedly said “disk write error”, even though the drive has been working perfectly with everything else. I checked on github, and it seems others are having this issue too.
-
The moment you’ve all been waiting for is here, the UK-based video game publisher Feral Interactive has just made the big announcement today, November 3, 2016, for the launch of the Deus Ex: Mankind Divided video game on Steam for Linux, and SteamOS.
Exactly two weeks ago, the guys behind Feral Interactive teased the Linux gaming community with yet another AAA title, Deus Ex: Mankind Divided, after giving us a unique chance of playing the excellent Mad Max open world action-adventure video game just a day before announcing the Deus Ex: Mankind Divided Linux port.
-
Feral Interactive has published the system requirements for Deus Ex: Mankind Divided. As usual, it’s the GPU/driver requirements that are always most interesting.
-
I thought the recent port of Mad Max to Linux was our highlight of the year, but Deus Ex: Mankind Divided is a whole ‘nother level of fun.
I have to say, I’m damn impressed at not only how many games Feral Interactive have ported this year, but also at the fact that Deus Ex: Mankind Divided came to Linux so soon after the original Windows release! Not quite the day-1 releases we need, but damn close.
-
With the Deus Ex: Mankind Divided release happening tomorrow, Feral Interactive have released the system requirements. It will need a pretty decent rig.
It is a heavy game, I’ve seen plenty of reports about the Windows version requiring a beefy PC to play it reasonably well, so this isn’t surprising.
-
For so long Linux users filled very excluded from the gaming world, with a lot of games for other OSes and almost no games for Linux. For playing good Linux games with good graphics the solution was to use wine but, wine never worked very well out the box. Most of the games were small in size and not too good in graphics, the developers didn’t think of porting or creating games for linux because of it small size of users.
-
Desktop Environments/WMs
-
GNOME Desktop/GTK
-
The GTK+ 4 work is continuing at full speed, and today I want to show one of the first concrete benefits from the GSK merge: We can now record and replay frames. If you ever wondered why your animation does not look quite right, this might be just the tool for you.
-
The development team of the GNOME Builder IDE (Integrated Development Environment) application designed for the GNOME desktop environment, released the second maintenance update to the 3.22 stable series.
-
-
We are looking at accommodation options for GUADEC 2017 in Manchester and we would like some feedback from everyone who is hoping to attend!
Manchester’s hotels fill up quickly in summer so we are going to do one or more group bookings now to ensure we have enough rooms for everyone.
-
-
-
There are a lot of reasons I recommend Ubuntu to Linux newbies. It’s well supported, reasonably stable, and easy to use. But I prefer to roll with Arch Linux myself. It has several compelling attributes, but one of its biggest pluses is that Arch is a rolling-release distribution.
What?
If you’re using Linux for the first time, there’s a pretty good chance your OS is what’s called a “versioned release” distribution. Ubuntu, Fedora, Debian, and Mint all release numbered versions of their respective operating systems. By contrast, a rolling-release distribution eschews versions altogether. Here are a few of the things you can expect from a rolling release.
-
Those of us living in the Solus world know that its development team grows each day faster than that of other Linux-based operating systems, and magic happens all the time for the rolling distro.
-
The m23 project, an open-source network deployment and management system for Linux-based operating systems, recently announced the release and general availability of m23 Rock 16.3.
-
-
New Releases
-
The name of the developers is not publicized on the website, but Q4OS clearly is intended as more than a community-supported general purpose Linux distro. The website also invites businesses to makes use of Q4OS.org’s commercial support and software customization services.
The Trinity desktop provides a lightweight KDE environment. The Q4OS platform shows strong potential for business use. It could provide an interesting alternative for consumer home and small business use.
-
Arch Family
-
Dig through the annals of Linux journalism and you’ll find a surprising amount of coverage of some pretty obscure distros. Flashy new distros like Elementary OS and Solus garner attention for their slick interfaces, and anything shipping with a MATE desktop gets coverage by simple virtue of using MATE.
Thanks to television shows like Mr Robot, I fully expect coverage of even Kali Linux to be on the uptick soon.
-
Arch Linux has long been known as a very powerful desktop distribution, but one that is not well suited for newcomers to Linux. In order to get the most out of Arch Linux, a user needs to learn the ins and outs of the command line.
-
OpenSUSE/SUSE
-
Today, November 2, 2016, Douglas DeMaio from the openSUSE project announced the release and immediate availability for download of the second Release Candidate of the upcoming openSUSE Leap 42.2 operating system.
-
-
Douglas DeMaio today announced the release of openSUSE Leap 42.2 Release Candidate 2, giving testers one last chance to report bugs before the final. Elsewhere, Linux developers were suffering under a DoS attack today while at the Linux Plumbers conference and Scott Gilbertson shared his thoughts on Arch Linux. Dedoimedo reviewed Yakkety Yak and Bertel King, Jr. found five reasons to try it.
-
The development cycle for openSUSE Leap 42.2 Release Candidates (RC) is coming to an end.
RC2, which will be followed by the stable release of openSUSE Leap 42.2 on Nov. 16, is now available for testers after its release today.
-
-
Although its “Ruby” meetup, it usually isn’t just about Ruby. The programming language itself is not that important. Important is the reason: To connect great minds, ideas and solutions together.
-
Red Hat Family
-
Today, Cisco announced its new UCS S-Series storage-optimized server with the introduction of the UCS S3260, marking its entry into the emerging server market for data intensive workloads.
Red Hat and Cisco have worked together for a long time, including our collaboration on Red Hat OpenStack Platform.
-
Softpedia was informed today, November 3, 2016, by John Terrill from Red Hat about the general availability of the Red Hat Enterprise Linux 7.3 operating system for existing and new customers.
-
-
In our amazing Linux world, we have not one, not two, but three, count ‘em, three major-league enterprise Linux distributions: Red Hat Enterprise Linux, Canonical’s Ubuntu Linux, and SUSE Enterprise Linux. In this series, we will contrast and compare all three. Each one is so large it would take a book to thoroughly cover them, so we’ll hit the high points of major products, services, important partnerships, and support.
-
-
-
-
Finance
-
Fedora
-
Thursday, November 3rd, 2016, is the Better Switchable Graphics Support Test Day! As part of this planned Change for Fedora 25, we need your help to test Better Switchable Graphics Support!
-
-
On 18 October 2016, we organized a workshop at the CMR Institute of Technology in Bengaluru, India. In the workshop, we covered topics of free and open source software (FOSS), Fedora, and git. Before talking about the event, I would like to thank a few people whose presence made this event a huge success.
-
Debian Family
-
My monthly report covers a large part of what I have been doing in the free software world. I write it for my donors (thanks to them!) but also for the wider Debian community because it can give ideas to newcomers and it’s one of the best ways to find volunteers to work with me on projects that matter to me.
-
Derivatives
-
After a long break, the development of the Debian-based antiX MX operating system continues, and it looks like we need to get ready for a new major release, simply versioned as 16.
-
Canonical/Ubuntu
-
So you wanna transform Ubuntu 16.04 desktop to Apple’s MacOS X operating system. Well, I got you covered. Macbuntu Transformation Pack is available for Ubuntu 16.04 and I will guide you to set it up easily. The Macbuntu Transformation Pack contains themes for GTK, meaning there is support for Unity, Gnome, Cinnamon, Xfce and MATE desktop environments.
-
GNU/Linux developer Arne Exton is always ahead of time, and it looks like he has just released a new build of his MeX GNU/Linux distribution that ships with the Refracta tools pre-installed.
-
Are you ready for the most important Ubuntu event in Europe in 2016? Well, you should, because the long anticipated UbuCon Europe conference is taking place in only two weeks from today, between the 18th and 20th of November.
Dubbed as the first international European Ubuntu conference, UbuCon Europe 2016 was put together by a group of Ubuntu members, and it now looks like everything is good to go. Registrations have been opened for the past two months, along with the release schedule, and the event will take place at the Unperfekthaus in Essen, Germany.
-
The latest version of the most popular Linux distribution is here, and it’s called Ubuntu 16.10. This release comes six months after its predecessor. The user-friendly desktop doesn’t offer any substantial new features this time around. Canonical, the company behind Ubuntu, views the existing experience as largely complete.
-
Benny Hill’s music makes everything better. Fact. Now, I most strongly recommend that you hit Yakety Sax on Youtube, and let it play for the duration of this review. Your reading experience may be improved. Anyhow, it is time to test Ubuntu again. It’s only been six month since the rather underwhelming Xerus LTS, and only a few days since I tested it the second time around, with only marginal improvements.
I am really angry, because I feel that the Linux desktop is dying, and Canonical is slowly spearheading this effort, the same way it once led Linux out of the basement and into the mainstream awareness. But let’s see what gives. Maybe Yakkety Yak is a good release. Maybe it will behave nicely on my G50 box. Let us.
-
Today, November 3, 2016, Canonical informed us about the general availability of the final release of the company’s Ubuntu Snappy Core 16 Linux-based operating system designed for Internet of Things (IoT).
-
Ubuntu Core 16 is released today. Otherwise known as Snappy, it is a pared-back version of the Ubuntu Linux operating system (OS) that’s designed for IoT use cases.
On a press call, Canonical CEO Mark Shuttleworth explained that one key difference between Core 16 and its predecessor is the way the software is distributed. On installing software in Core 15 the individual files were spread out all over the disk, as happens with a desktop OS. In Core 16 it remains as a blob.
“In Ubuntu Core 16 we keep all of the software as compressed and signed files,” Shuttleworth said. This both takes up less disk space and is also more secure, he added.
-
-
-
Flavours and Variants
-
The times changed, and my best friend is now Xubuntu 16.04, whereas my latest attempts to try Kubuntu back in 2011 and 2012 were not so nice.
I tried more recent versions of this operating system when I got orders for DVDs through the BuyLinuxCDs.co.uk site, but they impressed me so little that I didn’t bother to write anything about them.
Kubuntu 16.10 was released few weeks ago, and I decided to give it a go. The results were more impressive this time.
-
-
Linaro adds that work already has begun on network protocol stacks, such as OpenFastPath (OFP), products like the nginx web server accelerated with ODP and OFP and libraries like OpenSSL that provide crypto acceleration via ODP. In addition, ODP and ODP-based products, such as OFP, nginx and OpenSSL, now can be made available as packages in popular Linux distributions like Debian, CentOS and OpenEmbedded. To accompany the release, Linaro launched a validation test suite that permits users and vendors to verify API compatibility between different ODP implementations.
-
VoCore2 is an open source Linux computer and a fully-functional wireless router but its size is smaller than a coin. It can also act as a VPN gateway for a network, an AirPlay station to play lossless music, a private cloud to store your photos, video and code, and much more.
The Lite version of the VoCore2 features a 580MHz MT7688AN MediaTek SoC, 64MB of DDR2 RAM, 8MB of NOR storage, and a single antenna slot for Wi-Fi that supports 150Mbps.
All this for $4.
-
-
-
“IGEL Linux 10 is changing the game for thin client technology,” said Matthias Haas, Director of Product Management, IGEL. “It enables customers to access today’s most modern devices and endpoint computing capabilities, with the performance and power they demand for accelerated workforce productivity and the security and control IT needs for simplified management. You really have to try it to believe it.”
-
The 48 x 46mm Orange Pi Zero runs Linux or Android on a quad-core Allwinner H2, and offers WiFi, 10/100, microSD, USB host and OTG, and a 26-pin RPi header.
Shenzhen Xunlong has added a Raspberry Pi Zero competitor to its Orange Pi lineup of open source hacker boards. The new Orange Pi Zero is selling for just $7 plus shipping, for a total price of $10.30 when shipped to the U.S.
-
Phones
-
Tizen
-
All the Tizen hysteria at the moment has been centered around the Gear S3 and rightly so as it is a very handsome piece of tech. First the smartwatch went on sale in Canada, soon thereafter the UK, and then Germany. Many websites had previously been reporting that the S3 was to be delayed until early 2017, but we told you all that you needed to just relax and the S3 will be with us shortly.
-
-
Android
-
Google’s Android operating system was the big winner in a big time for worldwide phone shipments, market researcher Strategy Analytics reported Wednesday.
Android captured 88 percent of all smartphone shipped in the third quarter of 2016, a period that also marks the fastest growth rate in a year. “Android’s gain came at the expense of every major rival platform,” Strategy Analytics’ Linda Sui said in a press release.
-
While most of Android’s gains can be attributed to the continued demise of BlackBerry and Windows smartphones, which are now practically non-existent on the market, iOS adoption remains at its lowest levels since mid 2014.
-
In the older days of Android, developers had to use the open-source Eclipse IDE (integrated development environment) to create apps for the platform. Google released its own IDE called Android Studio in 2014, but continued to support those that decided to stick with Eclipse.
Today, that support ends. The news follows the release of Android Studio 2.2 in September, although Google announced that it was planning on ending support for the Eclipse Android Development Tools in mid-2015.
-
-
-
-
-
-
-
-
-
-
-
-
Brian Behlendorf is well known in the open-source community as one of the founders of the Apache Software Foundation. Today, Behlendorf serves as the Executive Director of the Hyperledger project at the Linux Foundation, though he still takes an interest in Apache.
In a video interview, Behlendorf discusses how the Apache Way continues to influence the open source movement. Among the key ways that Apache has helped to influence open source development is by having a focus on enabling a community that outlasts the original developers.
-
New research shows that 98 percent of developers use open source tools at work, with 56 percent revealing that more than half of their development tools are open source, and 18 percent using only open source tools.
The study from code collaboration platform GitLab also shows that more than half of developers (55 percent) are able to choose the tools they work with.
When asked about the tools and techniques that are most important to them, 92 percent say distributed version control systems (Git repositories) are very or extremely important for their everyday work followed by continuous integration (77 percent), chat/collaboration tools (63 percent), agile development (59 percent) and continuous delivery (55 percent).
-
Where do your witty Tweets end up? What about the rest of the content you create inside walled platforms like Facebook, Swarm, and Instagram*?
Those posts and images are part of your identity yet they are “lost” in a sense when posted to platforms that aren’t open. That’s where the IndieWeb comes in; it’s based around the idea that you have a personal domain and web space where you post everything first, then you can copy it to third party services, like Twitter.
The phrase that has been coined to describe it is: Publish (on your) Own Site, Syndicate Elsewhere, or POSSE.
-
Artificial intelligence and machine learning are creating a lot of buzz right now, and open source tools are part of the buzz. A few months back, Google made a hugely influential contribution to the field of machine learning. It open sourced a program called TensorFlow that is now freely available. It’s based on the same internal toolset that Google spent years developing to support its AI software and other predictive and analytics programs.
Now, data science company DataRobot has announced the latest version of its enterprise machine learning platform. The new release integrates the TensorFlow library for deep learning along with new tools to help users extract insights from all models on the platform. This is a great example of how powerful open source tools are driving commercial offerings forward.
-
For future Chromebooks/Chromeboxes, Google appears to be building an open-source TPM 2.0 implementation that’s possibly backed by open hardware.
Their own TPM (Trusted Platform Module) 2.0 implementation can be found in their Git code and here plus more code here. The TPM 2.0 implementation uses a Cortex-M3 core and there’s also an FPGA version.
-
Over one year after the DirectFB project site disappeared and the code just appearing on GitHub, they have a project site restored but the development still appears rather dormant.
-
TM Forum is stepping up to be the organization that unites the multiple open source network management and orchestration efforts going on within telecom today, intending to create a hybrid network management platform that incorporates diverse open source efforts.
In an interview here today in advance of a TM Forum Workshop tied to Light Reading’s OSS in the Era of SDN & NFV event this week, Barry Graham, senior director of agile business & IT for TM Forum, tells Light Reading the organization has already held one meeting of eight open source groups and is intending to create a Catalyst project for early 2017 as well. Catalyst projects are a TM Forum method of bringing network operators and others together to create real-world solutions that can be demonstrated to the broader community.
-
A team made of former Cisco and Nuage Networks veterans has developed an open source project it released this week named Trireme that takes an application-centric approach to securing code written in containers.
-
Now that organizations of all sizes have discovered that IT is indeed a competitive weapon, an interesting phenomenon is starting to occur. IT organizations that build their own software are moving to make that software available under an open source license. Case in point is Walmart, which is now making a React/Node.js application platform dubbed Electrode available as an open source project.
Alex Grigoryan, director of software engineering for the Application Platform at Walmart Labs, says even though Walmart has spent millions of dollars developing Electrode, the retailer has a vested interest in recruiting other IT organizations to contribute code to extend the core platform.
“We’re looking for contributions that can help us stay on the cutting edge,” says Grigoryan.
-
Second, since the software in an open source business is free, selling software licenses can’t be the revenue model. There are a number of ways, however, to make money with open source. One is monetize stability. This is kind of what Red Hat does. They support both the leading edge technology through Fedora and monetize stability through Red Hat Enterprise Linux. Both our open source, but people are willing to pay for stability.
-
Events
-
Red Hat’s Vincent Batts gives a presentation at systemd.conf 2016 conference entitled, “What’s next for containers?”. It is a good overview of where the various container projects are (with no mention of OpenVZ however) and what work needs to be done. I enjoyed his assessment that the first thing that is next is, “Get Past the Hype,” and to, “Make Containers Boring.” Vincent goes over several of the userland tools as well as covers the areas where Linux native containers still need work.
-
There have been a ton of conferences in the last couple of months… and luckily a lot of the presentations were recorded and have been posted. Here is Lennart Poettering’s presentation from the systemd.conf 2016 conference on, “State of the Union / Portable Services”.
-
The 7th edition of Software Freedom Kosova took place in Prishtina from October 21-23. The main conference venue was held at RIT Kosovo (AUK) and workshops were held at Prishtina Hackerspace as well as at Innovation Centre Kosovo (ICK). This years conference involved around 300 participants, 41 speakers, 48 sessions, 10 booth tables aand lots of food
-
-
Watching the ELCE 2016 / OpenIoT Summiy 2016 videos is free, but a basic registration is required. If you want to watch it, visit LinuxFoundation.org.
-
For the past several years, Gabor Szabo has been the owner and primary editor of the Perl Weekly, and the Perl Maven. Never willing to rest on his laurels, he recently started the Code Maven Podcast, and recently, during the last week of October, he spun up his newest site, a listing of open source technology events.
-
If implementing DevOps practices is difficult, then maintaining them may be even tougher. Michael Nygard knows this—which is why he’s turned to the language of warfare to describe the ongoing campaign that is the agile workflow.
In his upcoming talk at this year’s DevOps Enterprise Summit (“Tempo, Maneuverability, and Initiative”), Nygard, VP of Customer Solutions at Cogitect, Inc., will draw several useful parallels between the theater of modern war and the scene inside the contemporary IT shop. He graciously agreed to tell us about them in advance of the conference, which begins next week.
-
Web Browsers
-
Mozilla
-
This is an overview of Thunderbird and hopefully it has highlighted a few new features to those of you who didn’t know they existed and for others it might have convinced you that actually this is a tool I might want to use after all.
The RSS feed reader is very useful as it allows you to browse your favourite sites without actually visiting them.
-
Jamey Sharp, the developer known for some of his past contributions to X.Org, has been hacking a lot lately on his latest project: Corrode. This project is about automatically converting C source files into Rust.
Corrode is able to convert C code into Rust, but so far is able to perform just basic operations automatically and doesn’t yet take full advantage of Rust’s potential. Corrode is designed to help with partial automation of legacy code into Rust and as a new/complementary approach for static analysis of C programs. Corrode is going along so well that Mozilla has begun sponsoring Jamey’s work with Mozilla continuing to spearhead Rust’s development.
-
Oracle/Java/LibreOffice
-
Today we release CODE 2.0 which includes Collaborative Editing. We’ve done a huge amount of work since CODE 1.0 – and many of these improvements have been back-ported for our customers & community, but it is perhaps well to credit the authors in one place and survey progress over the last six months.
-
CMS
-
I switched back to WordPress, on a premium subscription, because WordPress started supporting markdown, which I like, and because WordPress is open source software (with open source comments support), which I also like. What’s more, paying for hosting through Automattic means not having to mess with WordPress updates myself, and means helping to support a legit open source software company, and I’m into both of those, big time.
-
Anyway, I let my annual premium subscription auto-renew about a month and a half ago, so I’m out of the refund window, so I’ll probably stick around, although this markdown to HTML autoconvert misfeature is pretty distressing. Worst case scenario, I’m supporting open source software, so there’s that.
-
Healthcare
-
The European Commission Directorate General for Health and Food Safety (DG SANTE) is using the open source tools for its interoperability testing. On Wednesday, the DG published a request for tender, specifying the eHealth test framework Gazelle and the healthcare documentation and ePrescription specification, implementation and testing tool Art-Decor as reference tools for its digital service infrastructure (DSI).
-
Pseudo-Open Source (Openwashing)
-
Mellanox Technologies, Ltd. (NASDAQ:MLNX), a leading supplier of high-performance, end-to-end interconnect solutions for data center servers and storage systems, today announced a new open source software initiative to enable advanced open networking platforms such as routers, load balancers, and firewalls. A key part of the initiative is the release of the first ever software development kit: OpenNPU SDK, for the company’s most advanced network processor unit (NPU), the NPS-400. OpenNPU is made available under either GPL or BSD license to enable developers to explore, research, and innovate with true programmable packet processing at 600 million packets per seconds. The OpenNPU SDK addresses the need for open source software aimed at the increasing number of open networking platforms proliferating the market today.
-
-
-
-
Public Services/Government
-
Denmark’s tax authorities (SKAT) are looking for a service provider that can help them with their tax account system, which uses Apache and Linux servers. SKAT on Wednesday published new information on its procurement request from last month.
-
You didn’t know we had one? We do! Sort of. David Graham is the Member of Parliament for Laurentides—Labelle, which is in Quebec. He’s also a cofounder of the OFTC (Open and Free Technology) IRC network and for many years used the online handle “CDLU,” for “Confused Debian Linux User.” Confused or not, he got his start in politics running for (and becoming) Secretary of Software in the Public Interest, a non-profit group that helps develop and spread free and open source software, most notably Debian Linux. David was also the newsfeed editor for Linux.com for eight years (Disclosure: I was his boss). He’s also a licensed pilot, a rail fan and the father of a delightful little girl. Hey! I’d vote for him. Wouldn’t you? Assuming we lived in his district, that is.
-
Programming/Development
-
The web’s early history is generally remembered as a few seminal events: the day Tim Berners-Lee announced the WWW-project on Usenet, the document with which CERN released the project’s code into the public domain, and of course the first version of the NCSA Mosaic browser in January 1993.
-
Standards/Consortia
-
The lead up to the official debut of HTML 5 in October 2014 was a very big deal. Now two years later HTML 5.1 was declared an official standard on November 1.
With HTML 5 work was ongoing for more than seven years and the standard replaced HTML 4.x which had been in place for a decade. HTML 5.1 in contrast is a very incremental step up, dealing with minor items that fell out from the original HTML 5 approach.
-
Science
-
The human brain is predisposed to learn negative stereotypes, according to research that offers clues as to how prejudice emerges and spreads through society.
The study found that the brain responds more strongly to information about groups who are portrayed unfavourably, adding weight to the view that the negative depiction of ethnic or religious minorities in the media can fuel racial bias.
Hugo Spiers, a neuroscientist at University College London, who led the research, said: “The newspapers are filled with ghastly things people do … You’re getting all these news stories and the negative ones stand out. When you look at Islam, for example, there’s so many more negative stories than positive ones and that will build up over time.”
Everyone’s a little bit racist, sometimes | Dean Burnett
Read more
The scientists also uncovered a characteristic brain signature seen when participants were told a member of a “bad” group had done something positive – an observation that is likely to tally with the subjective experience of minorities. “Whenever someone from a really bad group did something nice they were like, ‘Oh, weird,’” said Spiers.
-
Health/Nutrition
-
The state of Michigan has reportedly issued preliminary approval for bottled water behemoth Nestlé to nearly triple the amount of groundwater it will pump, to be bottled and sold at its Ice Mountain plant, which lies roughly 120 miles northwest of the beleaguered community of Flint.
“Nestlé Waters North America is asking the Michigan Department of Environmental Quality (DEQ) for permission to increase allowed pumping from 150 to 400 gallons-per-minute at one of its production wells north of Evart,” MLive reported on Monday.
“The DEQ Water Resources Division conducted a site review and signed-off on the pumping increase in January, but the Office of Drinking Water and Municipal Assistance is approving the permit,” the report continued. The agency is accepting public comment on the proposal (pdf) until Thursday, Nov. 3.
While Nestlé and other bottled water companies have rankled many communities for privatizing their public water supply, the news particularly stung in Michigan, where citizens have faced a years-long nightmare over lead contamination in their drinking water. Many residents of Flint are still forced to rely on bottled water for cleaning, cooking, and bathing as government delays have hampered efforts to replace the corroded pipes.
-
Security
-
-
According to James Bottomley, an IBM Research distinguished engineer and a member of the Linux Plumbers Conference committee, “Since yesterday we are being attacked from the outside. The attack follows us as we switch external IP and the team has identified at least one inside node which looks suspicious.”
The conference is not being attacked by some sophisticated Internet of Things distributed denial of service (DDoS) attack like the Dyn attack. No, it’s being mugged by one of the oldest attacks in the DoS book: a SYN flood.
-
Citing a computer virus outbreak, a hospital system in the United Kingdom has canceled all planned operations and diverted major trauma cases to neighboring facilities. The incident came as U.K. leaders detailed a national cyber security strategy that promises billions in cybersecurity spending, new special police units to pursue organized online gangs, and the possibility of retaliation for major attacks.
In a “major incident” alert posted to its Web site, the National Health Service’s Lincolnshire and Goole trust said it made the decision to cancel surgeries and divert trauma patients after a virus infected its electronic systems on Sunday, October 30.
-
Patients who had a scheduled operation on Tuesday November 1 have been told to presume it has been cancelled, unless they are contacted. A select number of services will continue; inpatients will continue to be looked after and patients who would be at “significant clinical risk should their treatment be delayed”, will also be treated. The trust is apparently reviewing the situation on an hourly basis.
Few details have been released about the nature of the attack but the shutdown has affected Goole and District Hospital, Scunthorpe General Hospital and Diana, Princess of Wales Hospital.
Ed Macnair, CEO of CensorNet told SCMagazineUK.com that the “NHS is one of the most advanced in the world in terms of digitisation, which clearly has its benefits, but also increases the impact of a cyber attack. The NHS holds hugely personal information about patients and the consequences of that getting into the wrong hands could be devastating.”
Independent Security Evaluators (ISE) carried out a study into the cyber-resilience of the US healthcare industry last year, finding that security teams in the healthcare sector overemphasised protection of data and didn’t focus on more advanced threats.
-
If you have an internet-connected home appliance, such as a crock-pot, a lightbulb, or a coffee maker, you can control it from the comfort of your smartphone. But a bug in the Android app that controls some of those devices made by a popular manufacturer also allowed hackers to steal all your cellphone photos and even track your movements.
Security researchers found that the Android app for internet-connected gizmos made by Belkin had a critical bug that let anyone who was on the same network hack the app and get access to the user’s cellphone. This gave them a chance to download all photos and track the user’s position, according to new research by Scott Tenaglia and Joe Tanen, from Invincea Labs.
-
Reproducible Debian Hackathon – A small hackathon organized in Boston, USA on December 3rd and 4th. If you are interested in attending, contact Valerie Young – spectranaut in the #debian-reproducible IRC channel on irc.oftc.net.
-
Linux/Moose is a malware family that primarily targets Linux-based consumer routers but that can also infect other Linux-based embedded systems in its path. The compromised devices are used to steal unencrypted network traffic and offer proxying services to the botnet operator. In practice, these capabilities are used to steal HTTP Cookies on popular social network sites and perform fraudulent actions such as non-legitimate “follows”, “views” and “likes”.
-
Cybercrime is the second most-reported economic crime in Australia and costs the economy an estimated $17 billion annually, but despite this there are widespread “frailities” in the governance of cyber security among executives in both the public sector and private enterprise, according to a newly published report.
The survey of Australia’s security preparedness by the Macquarie Telecom Group and the National Security College found that there is considerable variation in cyber-risk governance arrangements and an absence of cyber-risk knowledge at the executive/board level.
-
Environment/Energy/Wildlife/Nature
-
Forest and land fires making the news in Indonesia is nothing new. But a hostage drama in the middle of “fire season”? That’s a new twist, and indeed dominated headlines in early September. After collecting evidence of burned land within a palm oil concession in Rokan Hulu, Riau, seven inspectors from the Ministry of Environment and Forestry (MOEF) were taken captive and violently threatened to handover or delete the gathered evidence.
Only a few days later, the head of the Peatland Restoration Agency (Badan Restorasi Gambut or BRG) was forcefully prevented from entering lands managed by a prominent pulp-and-paper concessionaire in Pulau Pisang, Riau. BRG was investigating reports of alleged illegal conversion of peatland.
Both incidents illustrate how divisive the fire issue is, particularly at the local level. The incidents also illustrate that despite political will and improved efforts to contain the fires, without an overarching and enforced fire policy, fires will continue to smolder.
Forest and land fires are now an annual man-made event. Some 2,356 hotspots were detected in Sumatra and Kalimantan between January and August of 2016, and fire-prone provinces of South Sumatra, Riau, Jambi, and parts of Kalimantan have declared emergency fire status. This is a significant improvement from last year, thanks largely to a wetter La Niña-induced dry season; the number of hotspots have dropped by over 74% compared to 2015.
Government has taken action that includes the moratorium on peat swamp conversion and the ban on new oil palm licenses. The establishment of the BRG in January 2016 is a particularly bold move, as President Joko Widodo set an ambitious target for the agency: restore two million hectares of degraded peatlands. Environment and Forestry Minister Siti Nurbaya has also pursued legal action against those suspected of starting fires.
-
With other pressing developmental problems, it’s difficult for many African governments to justify the costs of ramping up the fight against elephant poaching. But a new study published in the journal Nature Communications might give them a good financial reason.
Elephants are a big draw to parks across Africa, so as their numbers dwindle, so too do the numbers of tourists coming to see them. The first continent-wide assessment of poaching’s effects on tourism reveal that the annual killing of elephants results in a $25 million loss in tourism revenue across Africa. What’s more, this lost revenue is significantly higher than the cost of combating poaching, making it economically favorable to invest in the protection of elephants.
Every year some 20,000 to 30,000 elephants are slaughtered for their ivory tusks to feed a demand for Chinese and Southeast Asian markets, despite a commercial ban on the trade of ivory. Elephant populations across the continent have fallen up to 60 percent.
-
Native American tribes, including the Sioux, have clear historical causes for grievances against the federal government, including treaties that were approved and then violated. Complaints that pipeline workers have already plowed up previously unrecognized sacred sites should be taken seriously. More broadly, though, the environmental costs of continued reliance on fossil fuels are not only real, but the damage is already underway. The pipeline begins at the Bakken Formation in western North Dakota then angles southeastward through South Dakota, Iowa and into southern Illinois before tying into an existing pipeline network. Proponents of the pipeline argue that the oil it will carry will get to market even if the project is scuttled, transported by truck or rail, which they say carry more risk of environmental damage. But data show that while train and truck accidents might occur more often, pipeline breaks spill more oil and generally cause more damage to the environment by fouling groundwater and wilderness areas.
-
Finance
-
Imtiyaz Sheikh Sardar, a resident of Honnavar in Uttara Kannada district, is penniless and starving in Saudi Arabia, where he has been working as a driver since 2014. Imtiyaz, whose Saudi employer hasn’t paid him for months now, said that he is not being allowed to come back home. “I have been hungry for the last several days and my employer is not ready to listen to my grievances,” said Imtiyaz in a WhatsApp message seeking immediate help from the Uttara Kannada district administration. In his communication, however, Imtiyaz has refrained from revealing his local address and only mentioned his passport number.
With no money to feed himself or support his family , Imtiyaz has decided to contact the Uttarra Kannada deputy commissioner’s office, which is now working towards helping him return to India. “My family too is in trouble,” he said in the WhatsApp message. Imtiyaz has thanked the authorities for their efforts to help him return.
-
A battered Dodge Challenger roars past as I head out on the nine-lane highway, riding past shuttered shops and decaying restaurants and row upon row of vacant, overgrown housing lots.
Normally I wouldn’t even consider cycling on such an expanse of road, but it’s not so bad in Detroit. After all, the birthplace of America’s car industry doesn’t have that many cars any more.
My ride along Jefferson Avenue passes the low bulk of Chrysler’s car assembly factory. Along with General Motors’ Hamtramck plant, it is all that remains of the once-great industry which supported this city. Where there were 285,000 jobs, now there are just 10,000.
In 1940, Detroit was the fourth largest city in the US; now it doesn’t even make the top 20. From a peak of 1.8 million inhabitants, the population now stands at 677,000.
But the city is resurgent – and its near-total collapse may unwittingly have created one of its most powerful and unique assets. The well-documented flight to Detroit’s sprawling suburbs killed the city inside, but it also left space. The wide rivers of asphalt carved deep into the city were designed to transport a population three times its current size.
-
Parliament must vote on whether the UK can start the process of leaving the EU, the High Court has ruled.
This means the government cannot trigger Article 50 of the Lisbon Treaty – beginning formal exit-negotiations with the EU – on its own.
Theresa May says the referendum – and existing ministerial powers – mean MPs do not need to vote, but campaigners called this unconstitutional.
The government is appealing, with a further hearing expected next month.
A statement is to be made to MPs on Monday but the prime minister’s official spokesman said the government had “no intention of letting” the judgement “derail Article 50 or the timetable we have set out. We are determined to continue with our plan”.
-
Today’s ruling by the High Court requires the government to obtain approval from Parliament if it wishes to trigger ‘Article 50’, ie the process of withdrawing from the European Union. This short post won’t focus on the national constitutional law issues, but on the process of possible involvement of the EU courts in Brexit disputes.
The government has announced its intention to appeal today’s ruling to the Supreme Court. Some have suggested that the case might then be ‘appealed’ to the ECJ, but this misunderstands the judicial system of the European Union. There is no ‘appeal’ from national courts to the ECJ. Rather a national court may suspend proceedings and ask the ECJ some questions relating to EU law that the national court believes it needs the answers to. After the ECJ gives the answers to those questions, the national court resumes its proceedings and gives its judgment in light of them. The ECJ normally takes about 16 months to give a ruling, although it could (and probably would) fast-track a case raising fundamental questions about Brexit.
-
AstroTurf/Lobbying/Politics
-
Peter Kadzik, the assistant attorney general of the U.S. Justice Department involved with the probe into Huma Abedin’s emails, gave John Podesta a heads-up on when the State Department would start releasing Hillary Clinton’s emails.
“There is a HJC oversight hearing today where the head of our Civil Division will testify,” Mr. Kadzik emailed from his personal gmail account, with the header “Heads up.”
“Likely to get questions on State Department emails,” Mr. Kadzik continued. “Another filing in the FOIA case went in last night or will go in this am that indicates it will be awhile (2016) before the State Department posts the emails.”
Mr. Podesta, Mrs. Clinton’s campaign chairman, then forwarded the email to Mrs. Clinton’s inner-circle and added: “Additional chances for mischief.”
The email was dated May 19, 2015.
Mr. Kadzik has a close relationship with Mr. Podesta. They both attended Georgetown University law school together in the 1970s and have remained good friends, with Mr. Kadzik frequently dining with Mr. Podesta.
The Washington Free Beacon reported Mr. Kadzik previously donated to Mrs. Clinton and the daughter of Mr. Podesta.
-
Even if Hillary Clinton does not win the presidency on Tuesday, Republicans on Capitol Hill say they are revving up for more investigations involving the former secretary of state.
House Oversight Committee members remain unconvinced that charges of impropriety against Clinton have been fully reviewed.
Chairman Jason Chaffetz also wants to know if the FBI’s deputy director, Andrew McCabe, whose wife received $675,000 in political donations from a close friend of the Clintons, is still working on the Clinton email case in light of that disclosure.
-
A Department of Justice official who notified Congress Monday that the agency would “dedicate all necessary resources” to the reopened Hillary Clinton email investigation has a close relationship with campaign chair John Podesta, hacked emails show.
Peter Kadzik, assistant attorney general, sent his son to seek a job on the Clinton campaign given his personal relationship with Podesta. He was invited to a small birthday gathering for Podesta’s lobbyist brother last year. Kadzik also dined with Podesta at his home in January, when the first FBI probe was well underway.
Emails made public by WikiLeaks over the past several weeks raise fresh questions about the Justice Department’s handling of an investigation into a case with such close ties to the agency’s leadership. Just one week before FBI Director James Comey closed the original Clinton email probe in July, Attorney General Loretta Lynch’s private meeting with Clinton’s husband sparked a wave of outrage that ultimately clouded the Justice Department’s decision to end the investigation.
-
Memos prepared by legal counsel for Hillary Clinton’s presidential campaign reveal how the campaign developed workarounds so it could coordinate with a network of pro-Clinton super political action committees or Super PACs. The memos were explicitly developed to ensure regulators at the Federal Election Commission (FEC) would not detect any signs of unethical practices.
While the workarounds may not necessarily be illegal as a result of the Supreme Court’s Citizens United decision, they clearly undermine campaign finance law, and for those concerned about the influence of money in politics, the policies developed show how candidates can easily game the system.
The documents, produced by Marc Elias of Perkins Coie LLP, were attached to emails from the Clinton campaign, which were published by WikiLeaks. They were drafted on April 1, 2015, before Clinton officially launched her presidential campaign.
Perkins Coie recommended, “Secretary Clinton and her agents to make a hard solicitation for $5,000,” when discussing any Super PAC with prospective donors. Super PACs and their personnel would be free to “follow up with the donor—that day or at any other time of their choosing – to ask for additional funds, without any participation by Secretary Clinton or her agents.”
-
Those voting for Hillary Clinton, defending Clinton and supporting Clinton without reading the information reported by WikiLeaks are intellectually no different than those who criticize climate science without ever having read the science. In short, if you defend Clinton and ignore WikiLeaks, you have something in common with Sarah Palin. Let that sink in for a moment. Finished processing that? Now process this — if the journalists responsible for reporting on Watergate were labeled “Russian sympathizers,” charged by the media as “attempting to influence an election,” and banned from travel or communication access, how would history judge the event? This is exactly what has happened to Julian Assange, who has done more for journalism than any of these corporate-owned, brand-named media products have done this election cycle. Either you support access to information or you have a problem with an informed public. Which side are you on?
-
Eric Schmidt, the chairman of Alphabet and former Google chief executive, has been closely involved in the “strategic planning” of the 2016 Democratic Party presidential campaign for at least two years, emails released by whistleblowing outfit WikiLeaks suggest.
A number of emails, which were directly highlighted by the WikiLeaks Twitter account, show how Google has previously loaned a company jet to the Democratic Party for an official trip to Africa and how Schmidt himself wanted to be “head outside advisor” to any future presidential candidate.
In an email sent to Hillary Clinton aide Cheryl Mills on 15 April 2014, Schmidt included a detailed draft plan on how the Democratic candidate should structure their campaign, where it should be based and how technology should be utilised for maximum effect.
It was sent directly to Robby Mook, who now serves as Hillary Clinton’s campaign chief, and was later sent to John Podesta, whose emails were leaked online by the Julian Assange-led anti-secrecy group. At the time of writing, over 30,000 messages have been published.
“Here are some comments and observations based on what we saw in the 2012 campaign,” Schmidt wrote, adding: “If we get started soon, we will be in a very strong position to execute well for 2016.”
-
A new WikiLeaks release shows a possible conflict of interest between a Justice Department official and Clinton campaign chairman John Podesta.
Assistant Attorney General Peter Kadzik, the DOJ official in charge of the email investigation, emailed Podesta a heads-up on the case in May 2015.
Under the subject “heads up,” Kadzik wrote: There is a HJC [House Judiciary Committee] oversight hearing today. Likely to get questions on State Department emails. Another filing in the FOIA case went in last night or will go in this am that indicates it will be awhile (2016) before the State Department posts the emails.”
Podesta wrote back, adding other Clinton aides, “additional chances for mischief.”
Kadzik used a private Gmail address to send the note, not his .gov email account.
Trump argued today in Florida this is yet another example of the “rigged system” being exposed by WikiLeaks.
“These are the people who want to run our country, folks!” he said about Kadzik and Podesta.
-
-
A senior Department of Justice official gave Hillary Clinton’s campaign chairman a “heads up” about new developments related to Clinton’s email use as secretary of state, according to hacked emails published Wednesday by WikiLeaks.
In May of 2015, Assistant Attorney General Peter Kadzik emailed Clinton campaign chairman John Podesta to tell him about potential developments at an impending congressional hearing, as well as about a new development in a Freedom of Information Act lawsuit for the emails Clinton turned over to the State Department from her private account.
In an email from Kadzik’s personal account titled “Heads up,” he wrote: “There is a [House Judiciary Committee] oversight hearing today where the head of our Civil Division will testify. Likely to get questions on State Department emails. Another filing in the FOIA case went in last night or will go in this am that indicates it will be awhile (2016) before the State Department posts the emails.”
-
A State Department official appeared to coordinate with Hillary Clinton’s nascent presidential campaign hours before the former secretary of state’s exclusive use of private emails was first detailed in a news account last year, newly released hacked emails show.
Emails from the files of Clinton’s campaign chairman John Podesta show that the department official provided Clinton aides with the agency’s official response to a New York Times reporter in advance of the newspaper’s March 2015 report that Clinton had used a private email account to conduct all of her work-related business as secretary.
-
Young people are planning to break from the two-party system in unprecedented numbers this year. Their discontent is real: one May 2016 poll showed 91 percent of voters under age 29 wanted an independent challenger to Hillary Clinton and Donald Trump.
Media pundits have reacted harshly toward these young rebels, especially those supporting me and Ajamu Baraka, who as progressive Green candidates are constantly framed as taking votes from Clinton.
But instead of attacking our young voters, why not ask what’s motivating them to vote outside the two-party box? They’re well aware of the conventional wisdom that they should vote for the “lesser evil,” which the media has beaten into them for months. What few pundits have been willing to admit is that for many young people, voting Green is not a whim but a well-considered decision.
Millennials are disillusioned with politics and desperate to change it. For many, WikiLeaks exposing how the Democratic Party sabotaged Bernie Sanders confirmed their suspicions that the political system is rigged. They see Clinton as the embodiment of a political establishment that serves the economic elite, and they reject Trump’s sexist, racist behavior and regressive platform.
-
Sheryl Sandberg, the billionaire Facebook executive whose book “Lean In” has made her an icon to women in the workplace, is getting lots of attention as a potential Treasury secretary under Hillary Clinton.
But she’s also drawing red flags from progressives, who are suspicious about her ties to former Clinton administration Treasury Secretary Larry Summers, unhappy with Facebook’s international tax practices and wary about seeing the next Democratic White House stack its Cabinet with allies of big business.
That makes Sandberg an illustration of the lingering skepticism by Massachusetts Sen. Elizabeth Warren and other progressive Democrats about the staffing and economic policies of a Clinton presidency — even though Sandberg saidthis month that she has no intention of leaving Facebook.
-
Corporate media are focused on Donald Trump’s accusations of “oversampling” on the part of Democrats against Republicans. He’s half right, because polls do oversample declared Democrats by up to 14 percent in polls that compose the RealClearPolitics average.
The deeper story is that mainstream polls skew against youth and independents, who are undersampled in most polls up to a whopping 30 percent. A recent CNN poll sampled few people under the age of 50. Not one major poll lists alternative-party identification in the breakdown of its sample.
The first problem with sampling involves definitions. Most polls sample “likely voters,” with a bit of expansion to count for a smattering of “registered voters.” So who are “likely voters”? Voters who (1) consistently vote—which automatically excludes people ages 18 to 22, who have no voting history, (2) identify with either of the two major parties and (3) say that they intend to vote in the next election. “Registered voter” polls don’t count first-time voters not yet registered to vote, so forget about the opinions of those college students who are signed up in enthusiastic campus get-out-the-vote drives.
The questions asked in the polls reinforce established, dualistic views of the political spectrum. The presidential-preference questions in polls that deign to include Green Party nominee Jill Stein and Libertarian nominee Gary Johnson don’t ask “Who is the candidate you want to vote for?” or “Which candidate is most aligned with your positions and values?” Nearly all the polls frame the presidential question as “If the election were held tomorrow, who would you vote for?” In a media landscape where we are told—through unbalanced news coverage, controlled debates and ceaseless cultural propaganda, down to the red and blue cups at 7-Eleven stores during election season—that only the Democratic and Republican candidates are considered viable, most people will, of course, hold their noses and vote for the lesser of two evils. It’s telling that the very next follow-up question reads, “If the election were ONLY held between Donald Trump and Hillary Clinton, who would you vote for?” You might as well reword the questions to (1) “Which candidate do you think will win?” and (2) “Which of these two candidates do you hate the least?” Neither of these questions address the issue of who people want to be their next president.
-
The Electoral College has been on life support since a chad—specifically a “hanging” chad—tipped the White House to George W. Bush in 2000. The painful reality of how our Constitution works was never more apparent. The Gore/Lieberman ticket won the popular vote 50,994,086 to 50,461,092 but lost the electoral vote 266 to 271.
There was a lot more to it, but the punchline is that the U.S. Supreme Court ruled Bush the winner because he won the electoral vote. It’s a tribute to the American national character that we weathered that cataclysm without civil war, but it left a bad taste in the electorate’s mouth.
-
The FBI’s investigation into the Clinton Foundation that has been going on for more than a year has now taken a “very high priority,” separate sources with intimate knowledge of the probe tell Fox News.
FBI agents have interviewed and re-interviewed multiple people on the foundation case, which is looking into possible pay for play interaction between then-Secretary of State Hillary Clinton and the Clinton Foundation. The FBI’s White Collar Crime Division is handling the investigation.
Even before the WikiLeaks dumps of alleged emails linked to the Clinton campaign, FBI agents had collected a great deal of evidence, law enforcement sources tell Fox News.
“There is an avalanche of new information coming in every day,” one source told Fox News, who added some of the new information is coming from the WikiLeaks documents and new emails.
FBI agents are “actively and aggressively pursuing this case,” and will be going back and interviewing the same people again, some for the third time, sources said.
Agents are also going through what Clinton and top aides have said in previous interviews and the FBI 302, documents agents use to report interviews they conduct, to make sure notes line up, according to sources.
-
New revelations from the emails of Hillary Clinton campaign head John Podesta on Wednesday appeared to show coordination between the State Department and the Democrat’s campaign. The stolen emails released by Wikileaks suggested that a government official may have tipped Clinton off that news was about to break about the private email server she used as Secretary of State.
The message, dated March 1, 2015, came from Department of State press aid Lauren Hickey. In it, she describes having “just cleared” a reply to a New York Times reporter about to publish the story.
The mail also seemed to imply that the reply to the newspaper had been altered at the Clinton camp’s behest, saying: “Yes on your point re records – done below,” but without context, it was difficult to say what kind of change was made.
State Department spokesman John Kirby rejected the implication that anything untoward was taking place. Speaking to the press on Wednesday, Kirby said that his department was always determined to “provide accurate information to the media” and that this sometimes required checking in with relevant parties to ensure veracity.
Wednesday’s trove of emails about Clinton’s private server also included a note from Clinton aide Phillippe Reines saying “there’s a lot to respond to here, but first and foremost the premise is wrong. There is nothing wrong with anyone having personal email addresses or her emailing someone’s private account or vice versa. Maybe she was wishing [aide] Jake [Sullivan] a happy birthday. Or I was sending her a note about her mom. … We’re allowed to have personal lives.”
-
A woman who accused Donald Trump of raping her when she was 13 called off a press conference at which she planned to speak out after receiving threats, her attorney said.
The unidentified accuser, known as Jane Doe, was set to make a public statement for the first time about the accusations Wednesday afternoon alongside lawyer Lisa Bloom.
-
The woman who accused Donald Trump of raping her when she was 13 years old at a party failed to show up at a press conference to give her first public statement as she “received terrible threats” and was “in great fear”.
Her lawyer, Lisa Bloom, told reporters at a Los Angeles press conference that the accuser was “unable ultimately to do this”.
Ms Bloom said the accuser planned to reschedule the press conference.
-
Secret recordings of a suspect talking about the Clinton Foundation fueled an internal battle between FBI agents who wanted to pursue the case and corruption prosecutors who viewed the statements as worthless hearsay, people familiar with the matter said.
-
The latest batch consists of over one thousand emails, bringing the number released so far to over 44,000. WikiLeaks said it will publish a total of 50,000 emails in the run up to next week’s presidential election.
-
Senior Justice Department officials gave a “stand down” order to FBI investigators digging into the Clinton Foundation, according to a report.
The order was delivered in February — just as voting got under way in the Democratic presidential primary, a source told the Wall Street Journal.
“The message was, ‘We’re done here,’” a source told the paper, saying that prosecutors were not moved by the FBI’s presentation of evidence it had gathered to that point.
Soon after the presentation, Justice Department officials handed down the “stand down” message.
-
Two sources within the FBI told Fox News on Wednesday that the investigation of the Clinton Foundation is likely to lead to an indictment.
Fox News’ Bret Baier said Wednesday that the FBI probe into a possible pay-to-play scheme between Hillary Clinton and the Clinton Foundation has been going on for over a year.
Sources told the news network that the investigation, which is conducted by the White Collar Crime division of the FBI, is a “very high priority.”
One source further stated that the bureau collected “a lot of” evidence, adding that “there is an avalanche of new information coming every day.”
Baier also said that the Clinton Foundation probe is more expansive than previously thought, and that many individuals have been interviewed several times throughout the course of the investigation.
-
The FBI has long been an iconic institution in American life. After the last week’s announcement by FBI Director James Comey that the investigation into Hillary Clinton’s private email server continues, it’s hard to see it staying that way.
Wrote Roz Helderman, Tom Hamburger and Sari Horwitz in a story headlined “After another release of documents, FBI finds itself caught in a partisan fray”: “For the second time in five days, the FBI had moved exactly to the place the nation’s chief law enforcement agency usually strives to avoid: smack in the middle of partisan fighting over a national election, just days before the vote.”
Clinton and her allies — including President Obama(!) — are criticizing Comey for stepping into the fray so close to an election. Republicans, who spent the last several months castigating Comey for failing to indict Clinton over the email server when he initially wrapped the investigation in July, are now singing his praises.
The result of the FBI-as-political-football narrative is nothing but bad for the Bureau.
-
In the introduction, Assange writes: “Hillary Clinton made significant money from delivering these three speeches to Goldman Sachs immediately after stepping down from her role as Secretary of State. Now we can all profit from learning what the likely future president says behind closed doors.”
-
Green Party presidential candidate Jill Stein discusses Hillary Clinton and Donald Trump and the “politics of integrity.” She speaks with Bloomberg’s Tom Keene on “Bloomberg Surveillance.”
-
On November 1, WikiLeaks released an email that revealed one of the most dubious pay-to-play examples between the Clinton Foundation and the Clintons.
In a March 2015 email, Clinton Foundation director of foreign policy Amitabh Desai asked the Clinton campaign whether Bill Clinton could meet with Ukrainian Clinton Foundation billionaire donor Victor Pinchuk. The purpose of the meeting was to use Bill Clinton as a selling point to other Western leaders, so that Pinchuk could make a statement in opposition to Russian Leader Vladimir Putin.
-
The chain of emails that WikiLeaks released in its 26th batch of what has been dubbed the “Podesta emails” show communication between Clinton’s team and the State Department, right before the Times published its report.
It appears the State Department and its former spokeswoman Jen Psaki personally “cleared” and made changes to the report.
-
Censorship/Free Speech
-
One-third of Australians, according to the latest poll, oppose Muslim immigration — down on an earlier survey which put the figure at around fifty per cent. Whatever the actual number, it is heartening to note that good sense continues to defy the elites’ favoured narrative
-
The government’s proposal for age verification to access pornograpy is running out of control. MPs have worked out that attempts to verify adult’s ages won’t stop children from accessing other pornographic websites: so their proposed answer is to start censoring these websites.
-
In fighting a lawsuit filed by the former professional wrestler Hulk Hogan, Gawker Media lost nearly everything — the verdict, its founder, its independence — but it maintained its resolute conviction that it would win on appeal.
On Wednesday, however, Gawker capitulated, settling with Hulk Hogan, whose real name is Terry G. Bollea, for $31 million, according to court documents, and bringing to a close a multiyear dispute that stripped the company of much that once defined it.
Faced with a $140 million judgment in the invasion of privacy lawsuit brought by Hogan over the publication of a video that showed him having sex with a friend’s wife — and the later revelation that Peter Thiel, the billionaire Silicon Valley entrepreneur, was financing the lawsuit and others against the company — Gawker filed for bankruptcy in June and ultimately sold itself in August to Univision for $135 million.
-
When peer-to-peer file-sharing was in its infancy, Internet forums were the places where the enthusiasts came to meet. Regular users hung out with file-sharing site owners, while developers offered the latest builds of their new clients.
For a number of years, these forums housed thriving communities but slowly but surely most fell out of use, hit by a double whammy of failing to stay current alongside the advent of social media. For many, sites like Facebook and Reddit became the go-to place for discussion and news.
Of course, these platforms can be used for outright piracy too, with users posting links to the latest content on groups dedicated to file-sharing. This hasn’t gone unnoticed by the entertainment industries who often put sites like Facebook under pressure to take action.
-
Privacy/Surveillance
-
It comes after the Norwegian Consumer Council filed a complaint against fitness app Runkeeper in May for illegally sending users’ personal data to a third party in the US, even when not in use.
The new complaint against Fitbit, Jawbone, Garmin, and Mio will be sent on Thursday to both the data protection authority and Norway’s consumer ombudsman.
None of the four companies gives users proper notice about changes in their apps’ terms and conditions, the complaint claims, and all of them collect more data than is strictly necessary to provide their service. Nor do the companies fully explain who they may share user data with, or for how long they retain that data.
As part of its AppFail campaign earlier this year, the Norwegian Consumer Council analysed the terms and conditions and privacy policies of dozens of everyday mobile phone applications. It found that fitness trackers were particularly bad at looking after personal data. Following the 24-hour readout of those T&Cs—designed to shame companies into behaving better—some did update their policies.
-
Investigators looking into corruption within Montreal’s police force for almost six months focused their attention on one of Quebec’s most prominent journalists even though he had neither reported on the corruption case nor had any strong connection to it.
Advocates of press freedom expressed alarm about revelations this week that the police had captured calls and text messages to and from an iPhone belonging to the journalist, Patrick Lagacé, a columnist with the Montreal newspaper La Presse, and were given permission to track his movements by using the phone’s GPS function.
In response, legal scholars have questioned the legality of the police action, and journalism organizations and politicians have condemned the police monitoring. On Tuesday, the government promised greater protections for journalists.
On Monday, La Presse reported that Mr. Lagacé had been spied on as part of an effort by Montreal’s police force to find the source of leaks to news outlets about an internal inquiry into allegations that members of a drugs and street-gang unit had fabricated evidence.
From January to July this year, the police obtained 24 warrants, allowing them to track Mr. Lagacé’s movements by activating the GPS chip on his phone and to record all the numbers associated with texts and calls to and from the device, according to La Presse.
Most of the warrants, the newspaper reported, were approved by Josée De Carufel, a justice of the peace who was previously a criminal prosecutor.
Mr. Lagacé said he believed that the surveillance was prompted by general concern within the police force over leaks to the media by its members rather than by worries that the leaked information about the drugs and street-gang unit might jeopardize the investigation. He added that most of the articles based on the leaks that concerned the police did not appear in La Presse but in a competing newspaper and on a television network owned by the same corporation.
-
-
-
-
-
The Congressional Black Caucus has called on Facebook to stop allowing advertisers to exclude racial and ethnic groups when placing housing ads in what lawmakers say is a violation of federal anti-discrimination housing laws.
“We are writing to express our deep concerns with reports that Facebook’s ‘Ethnic Affinities’ advertising customization feature allows for advertisers to exclude specific racial and ethnic groups when placing housing advertisements,” members of the caucus wrote in a letter addressed to Facebook’s chief executive Mark Zuckerberg on Tuesday.
“This is in direct violation of the Fair Housing Act of 1968, and it is our strong desire to see Facebook address this issue immediately,” reads the letter.
-
Civil Rights/Policing
-
The birthday cards and letters for the Reverend Edward Pinkney’s 68th birthday this month will be opened and searched before reaching him. That is part of the price the political activist is paying for taking on a powerful corporation in Michigan.
Pinkney is currently serving a two-and-a-half to ten-year sentence — of which he has served 22 months already — after being found guilty of changing dates on a recall petition. Pinkney denies that he changed these dates.
He believes that his actual crime was to challenge the Whirlpool Corporation and its political allies in the city of Benton Harbor, Michigan.
-
Social activist Shelley Thio said in her Facebook that teen blogger Amos Yee will be released for Home Detention by the end of this week.
-
Staff at Amnesty International in Moscow say their office has been broken into and sealed off by municipal officials.
When employees arrived on Wednesday they found new locks on the door and a stamped paper across the entrance that demanded the office contact the city authorities, said Alexander Artemyev of human rights group’s Moscow office. No warning had been given.
“Our neighbours told us that five men came around 9.30am, broke in and then changed the locks. When asked what they were doing, the men said it was a rent issue,” Artemyev told the Guardian.
-
A Kurdish church leader smuggled to Britain says he received death threats – for having left Islam for Christianity – while living in makeshift camps in northern France.
The church leader, who did not wish to be identified, spent nine months living in camps outside the French cities of Calais and Dunkirk. He told World Watch Monitor that Kurdish Muslims in both camps antagonised him.
“In Calais, the smugglers [saw] my cross [round my neck], and said: ‘You are Kurdish and you are a Christian? Shame on you,’” he recalled. “I said, ‘Why? I’m in Europe, I’m free, I’m in a free country.’ They said, ‘No, you are not free, you are in the Jungle. The Jungle has Kurdish rule here – leave this camp.’ The smugglers were from inside the camp, and were Kurdish. They said to me, ‘We will tell the Algerians and Moroccans to kill you.’”
The church leader, who taught art in his home in Iraqi Kurdistan, as well as helping to lead a church there, said he received further threats in the camp outside Dunkirk. “They [set] fire [to] my tent,” he said.
-
As in almost all articles at mainstream Western media – staunch supporters of Ms Clinton’s candidacy and the geopolitical stances she represents – the Newsweek piece do not treat the main issues in the context: a) whether the published Clinton’s emails kept on private servers are a matter of state-secrets or of national security, b) whether the content of the revelations constitutes aggravating wrongdoings of for instance Hillary Clinton or the Clinton Foundation, the DNC tops, etc., or c) whether the revelations done by WikiLeaks refers to true facts –which should be the paramount concern of the analyses, instead of solely focusing in the messenger, or in how the true was obtained and by whom.
-
After the DNC email leaks that led to the resignation of top DNC officials, WikiLeaks has intensified its activity. Since October 7, they began publishing emails from the private account of Hillary Clinton’s campaign chair John Podesta. The archive contained transcripts of Clinton’s paid Goldman Sachs speeches that show her two faces and total disconnect from the middle class. It also revealed her private remarks dismissing climate activists. As usual, the leaks have been condemned by the status quo and Clinton loyalists. This time, a narrative that ‘Vladimir Putin was meddling in the election’ was used to discredit their publication, with the mainstream media creating an echo chamber of McCarthy-era style hysteria.
Over the years, as WikiLeaks grew, incorporating their evolving strategies, criticism against the organization has also changed. Back in the day, WikiLeaks was slandered with Pentagon official’s rhetoric of “blood on their hands”, and was depicted as reckless hackers putting innocents in danger. Proclaimed liberal media institutions such as The New York Times abandoned WikiLeaks, with then executive editor Bill Keller differentiating it from his kind of journalism.
Now, while the beam of transparency is focused on U.S. rigged contest for power, WikiLeaks is once again in the eye of media storms. Some criticize what they perceive as a politically driven information dump and question whether WikiLeaks has gone too far. This new sensation around WikiLeaks is now opening up a debate for all to examine the role of journalism and at the same time gives us an opportunity to understand how the organization’s efforts to open governments is changing the media landscape.
-
An extra 2,100 prison officers are to be recruited to ease staffing shortages in jails in England and Wales, Justice Secretary Liz Truss will say later.
Unveiling a White Paper, Ms Truss will say the new recruits should help to reduce attacks on staff and prisoners.
She will detail plans for more autonomy for governors and ensure drug tests for inmates when they enter and leave jail.
But Labour said the speech would be a “blatant PR stunt” unless comprehensive plans to address staff cuts were made.
-
Although some people of color were allowed to vote, many still faced disenfranchisement prior to the Voting Rights Act of 1965. With the recent gutting of that act by the supreme court, the systematic disenfranchisement of people of color is alive and well today.
Progress on suffrage has always tended to be incremental. And, far from being a closed chapter in our history, the fight to keep things moving forward continues to this day.
For every thousand people living in the US, seven are incarcerated. That population consists disproportionately of black and brown people, whether accused and convicted of crimes or held by immigration authorities.
-
Turkey could pull out of its refugee deal with the European Union this year if visa-free travel for its citizens is not introduced soon, the country’s foreign minister, Mevlüt Çavuşoğlu, warned in an interview published Thursday.
“Our patience is running out,” Çavuşoğlu told German newspaper Neuen Zürcher Zeitung. “We are waiting on an answer [on visa liberalization] in the coming days. If we don’t get one, we’ll terminate the agreement.”
-
Internet Policy/Net Neutrality
-
On May 12, 1996, like a benevolent mad scientist, Brewster Kahle brought the Internet Archive to life. The World Wide Web was in its infancy and the Archive was there to capture its growing pains. Inspired by and emulating the Library at Alexandria, the Internet Archive began its mission to preserve and provide universal access to all knowledge.
-
Intellectual Monopolies
-
Copyrights
-
A Polish appeals court has ruled that Artem Vaulin, the alleged owner of KickassTorrents, will remain in prison. The court refused the request for a supervised release and deems the accusations of the U.S. Government serious enough to keep him in custody.
-
There’s consistent disinformation from the copyright industry that even if a national parliament wanted to legalize file-sharing, it is not permitted to do so because of international treaties. This disinformational notion is hogwash, and I’m going to show exactly how it’s possible to legalize the private sharing of music, movies, and other culture while complying with all international treaties.
When determining whether it is possible to legalize file-sharing – defined as the noncommercial sharing of cultural works for personal use, without the consent of the distribution monopoly holder – and still stay in accordance with all international treaties, an obvious shortcut is to check if there is such legislation already somewhere, legislation that has been around for a long time and is accepted as a legislative precedent by the international community and the host legislature.
It turns out there is. Specifically, there is a very little-known such exception in Sweden (a country and a law I’m very familiar with since it’s my native country), and Sweden is affected by pretty much all existing EU treaties: what applies to Sweden will apply to any EU/EFTA country, like Germany, Czech Republic, or Iceland. When computer programs were moved in under the copyright monopoly umbrella in the early 1990s, politicians actually considered the cost of enforcement of the distribution monopoly when designing the law, unlike today.
-
You may have thought that if you owned your digital devices, you were allowed to do whatever you like with them. In truth, even for possessions as personal as your car, PC, or insulin pump, you risked a lawsuit every time you reverse-engineered their software guts to dig up their security vulnerabilities—until now.
Last Friday, a new exemption to the decades-old law known as the Digital Millennium Copyright Act quietly kicked in, carving out protections for Americans to hack their own devices without fear that the DMCA’s ban on circumventing protections on copyrighted systems would allow manufacturers to sue them. One exemption, crucially, will allow new forms of security research on those consumer devices. Another allows for the digital repair of vehicles. Together, the security community and DIYers are hoping those protections, which were enacted by the Library of Congress’s Copyright Office in October of 2015 but delayed a full year, will spark a new era of benevolent hacking for both research and repair.
Permalink
Send this to a friend
Posted in Europe, Patents at 12:09 pm by Dr. Roy Schestowitz
Breaking what’s clearly not broken to build something new which doesn't work for anything or anyone but billionaires

When all else fails Battistelli characteristically uses a hammer
Summary: The latest overt pushes for the Unitary Patent, courtesy of biased (self-serving) media and the EPO’s Michael Fröhlich, who joins Margot Fröhlinger with her Unified Patent Court (UPC) advocacy that conveniently waves off Brexit
THIS new article from Managing IP (MIP), a proponent of the UPC, is very optimistic about the UPC. It’s hardly surprising given the site’s track record. Even though recruitment of UPC judges has been called off the site speaks of the UPC as though it’s some unstoppable gravy train which is also desirable. It’s neither; the public does not want it (at least the few who understand what it does) and it seems to have been derailed — quite fatally in fact — following Britain’s vote for Brexit.
“How can a continent with so many languages get along with the UPC? And now that the only large English-speaking member state may be out, why even have hearings and patents in English?”“UK Prime Minister Theresa May rules out influence of the CJEU and authority of EU law in a post-Brexit Britain,” MIP wrote, but “Labour party MPs demand answers from government regarding UK participation in the UPC and EPO” (we rebutted this spin before). MIP says “five more EU member states including Italy and Slovenia [are] expected to ratify the UPC Agreement early next year,” but without Britain and especially with lingering uncertainty about its status in the EU the UPC won’t get anywhere any time soon. Its death might not be “official” for several years to come, but it’s not too hard to see where this is going.
How can a continent with so many languages get along with the UPC? And now that the only large English-speaking member state may be out, why even have hearings and patents in English? How would Spain feel about it? Battistelli may think (as he’s a clueless nontechnical thug) that patent examination and accurate translations can be attained using algorithms, but he's wrong beyond words. Fools who think that automated translations are an excuse that can make patents go global (applicable everywhere) would have us believe that even patents in Mandarin (new MIP article about notoriously crappy patents from SIPO) would be legible in Latin/Greek-derived languages. At this stage we’re actually entering the twilight zone, wherein totally idiotic people like Battistelli make big decisions that can undermine the whole of Europe. According to another new article from MIP and from IP watch [1, 2], there is a new AIPLA President and he is one who used to be involved in software patents and ITC cases (embargo at the behest of large corporations). WIPR, in the mean time, writes about AIPLA 2016 and quotes the EPO’s Michael Fröhlich (another Battistelli and UPC “yes man”, not to be confused with Margot Fröhlinger [1, 2, 3, 4]) who will say just about anything — even lie — in an effort to make the UPC seem inevitable. From the report:
The Unified Patent Court (UPC) and unitary patent will become a reality, with or without the UK, according to a senior official at the European Patent Office (EPO).
Michael Fröhlich, director of international legal affairs at the EPO, was speaking in a personal capacity at the American Intellectual Property Law Association’s (AIPLA) 2016 Annual Meeting in Washington, DC.
He said: “The issue of the Brexit vote is the last hurdle in what has been a hurdle chase since the beginning. There have been hurdles that have been higher than what Brexit has posed … and this last one will be taken successfully.”
Slovenia is about to become the 12th country to ratify the UPC Agreement in the coming days, with Italy expected to become the 13th, according to Fröhlich, speaking on Friday, October 28.
He added that Germany plans to finish the parliamentary ratification process by the end of year.
They have been saying this for a long time, yet it never actually happened. Last year Battistelli said that UPC would happen this year and it’s already near December/Christmas. Progress made? Nothing. Even worse — the UPC has gone backwards/in reverse, owing primarily to the UK. Always remember that the EPO’s management is now living in (and accepting) Battistelli’s fantasy land. The man is deluded, maybe clinically damaged. He will say anything to get his way, even breaking his very own rules, then look for scapegoats (especially when he does not get his way). Recall what he's rumoured to have attempted to do even to Roland Grossenbacher (behind his back). Nobody is safe from the paranoia and vengeance of Battistelli, not even old allies/friends like Grossenbacher. Battistelli turned the EPO’s management into a dangerous cult.
“Always remember that the EPO’s management is now living in (and accepting) Battistelli’s fantasy land.”Be wary and sceptical of all the UPC propaganda that’s still abound. Here we have WIPR asking its choir (mostly patent law firms) about things that the choir would profit from. Nothing is said about the number of respondents and their nature, but this was used to generate misleading headlines about UPC, as usual (“Readers confident in UPC despite Brexit vote”).
WIPR did the same thing regarding software patents in the US about a week ago. As we said at the time, that’s like conducting a poll in Fox News about Donald Trump’s chance of becoming President. They’re asking an already self-selecting and biased population to reinforce an echo chamber’s mentality/mindset (self-deluding/self-misleading, disconnected from reality). █
Permalink
Send this to a friend
Posted in Europe, Patents at 11:15 am by Dr. Roy Schestowitz
…And the Administrative Council allows this to happen, knowing darn well the consequences
“Shallow understanding from people of goodwill is more frustrating than absolute misunderstanding from people of ill will. Lukewarm acceptance is much more bewildering than outright rejection.” ~Martin Luther King, Jr., 16 April 1963
Summary: The EPO is racing to the bottom of patent quality and the last resort, the Boards of Appeal, are being destroyed by Battistelli, who attempts to make this destruction appear like “improved independence” while the Administrative Council, led by Battistelli’s Pet Chinchilla, condones these outrageous moves or simply abstains rather than object (ruinous passivity)
THE EPO keeps following the footsteps of the old USPTO — the patent office in which there was only one goal: maximalise profit (for the Office). The inherent problem with this misguided strategy is that it’s short-term (and thus quite likely short-lived), as applicants sooner or later realise that their patents are being devalued and that the newer patents are not even worth pursuing. Too much of everything or too much of anything has a stigma or proverbs associated with it in many languages/cultures.
Watch this latest nonsensical piece of patent maximalism seeded by the EPO and EUIPO for cheap PR. The EPO is so proud that someone reprinted these lies — lies that even Managing IP refused to accept several years ago. Deloitte has also just released similar propaganda in the form of a press release. These people view the whole world in terms of patents (or so-called “Intellectual Property”, which also includes trademarks and other laws). “Industries that use IPR intensively have a huge impact on the economy, study shows. Here are the key findings,” the EPO wrote this week, repeating some of this whole nonsense. They try to take credit for every single segment of the science and technology world!
“Too much of everything or too much of anything has a stigma or proverbs associated with it in many languages/cultures.”In reality, the EPO needs the appeal boards and it needs outside (independent) auditors of patent quality. Sadly, Battistelli is allowed by his Pet Chinchillas at the Council to just demolish these boards, little by little, step by step. The EPO under Battistelli already rejects the law and doesn’t give a damn about what the European Parliament says, so much so that, as Benjamin Henrion put it today: “EPO software patent guidelines have been updated, they keep using the term “computer-implemented inventions” https://is.gd/U8GQmj” (this is a new publication from a British site).
Yet again, as a matter of fact, the EPO is pushing software patents that are against the EPC and the Parliament’s determination. This is happening every week these days, i.e. a lot more frequently than before. We have campaigned on this subject for a very long time (I have personally done so longer than this site’s existence) and this week comes yet another lie from the EPO (namely that people need no special software to apply for a patent, clearly a fallacy). Also this week we see the EPO using EPOPIC as yet another opportunity to distract from abuses, retweeting stuff like [1, 2].
“Why is the media no longer covering internal EPO affairs?”How many people are even aware of what goes on inside the EPO? As one insider put it (illustrating it visually too): “This is how it feels like walking through the EPO corridors in 2016″ (see the image and the responses there). Why is the media no longer covering internal EPO affairs? Have intimidation tactics worked? Why do insiders need to submit anonymous comments in some thread from almost 5 months ago? One such comment says: “The EPO is for sure a magic place with its 365 day/year Halloween, leave-no-trace social conferences and its alien AC support forces. Happy Halloween!”
“As a side effect, more of the EPO money is leeched towards Germany,” another person wrote about the relocation of the boards to Haar:
Re. Art. 36 EPC (weighing of votes):
Germany did not vote no in the Budget and Finance Committee…
I assume, Munich is happy that another building is now in use, thus earning taxes.
As a side effect, more of the EPO money is leeched towards Germany.
Without the German vote, the weighing will be very close against the mass of smaller countries coming to the Administrative Council meeting in December (meeting 150! time for a fancy dinner!).
Here is a very detailed comment about what happened in the meeting behind closed doors:
Yes the German delegation seems to be playing a double game here.
During the June assembly they did not make any criticism of the planned move.
The only delegations that criticised or questioned the proposal were as follows.
Switzerland
“The boards’ location falls within the EPO President’s powers. In the redesigned framework, the BOA President would also play a role, by drawing up their budget. Only via the budget can the Council exercise direct influence. So this is not a formal request either; we are merely pointing out that in our opinion the boards’ location has no bearing on their independence. The Swiss delegation is therefore not prepared to agree to any spending on relocating the boards, and suggests leaving them where they are.”
Ireland
“Relocation: Ireland believes that a separate location for the boards of appeal is neither justified nor required. Users have already expressed the view that
the boards are considered to be independent from the rest of the Office and the fact that the boards are physically located in the Isar building does not
impinge on their independence. It seems that even a relocation within Munich would give rise to unnecessary expense and my delegation cannot see that the expenditure associated with such a move could be justified.”
Austria
“As far as relocating the boards was concerned, those most immediately affected, i.e.BOA members and users, would have to agree. And the cost – even in the
Munich area – would also have to be taken into account.”
Netherlands
There was no point relocating the boards, as proposed in Section C of CA/43/16; this would merely waste money.
Slovakia
“The Office’s relocation proposal was certainly better than the original one, but even such a move should still be presented to the Budget and Finance Committee for opinion, because it would cost a lot of money.”
Czech Republic
“Lastly, on the relocation issue it agreed with earlier speakers. This was more an internal management issue, and should be uncoupled from the
independence question. But if the majority was in favour of a move, it would oppose it.”
Bulgaria
“Relocation did not seem essential, and the costs involved should be looked into.”
Denmark
“Lastly, it was certainly not convinced that relocating the boards – whether in Munich or the vicinity – would make them look more independent.”
As we predicted years ago, the EPO is rapidly losing top talent and is becoming a paperwork pipeline (look at the recruitment standards), without much/any science in the mix. See these two new articles [1, 2] that show us in what ways the EPO is ‘evolving’. Brain drain continues, but the priority now seems to be more paperwork. Nicely done? Painful, covert way to kill any joy and pride associated with a job at the EPO?
Unless something is done to undo the coup, the EPO will end up like the chinchilla shown at the top, dissected and skinned for whatever profit may be in it. █
Permalink
Send this to a friend
Posted in News Roundup at 10:02 am by Dr. Roy Schestowitz

Contents
-
Linux has been around for a long time now, and many of us take it for granted as part of our everyday lives. But have you ever paused to consider what life would be like if Linux never existed? A writer at Network World recently explored this question based on some funny social media posts.
-
I like the idea of life hacking. I’m not sure it’s a term that you’ll find in the dictionary (although perhaps—dictionaries have some odd things in them now), but the idea of improving life by programmatically changing things is awesome. I think that might be why I’m such an open-source fan. When it’s possible to change the things you don’t like or improve on something just because you can, it makes computing far less mystical and far more enjoyable.
-
Desktop
-
At its October event, Apple tried hard to convince the users that its latest MacBook Pro is machine built for professional users. The company showed off the brand new Touch Bar that changed its appearance depending on the applications running on the screen. The new MacBooks are thinner and more powerful than ever. But, there’s something missing that’s driving away some diehard Apple fans.
Firstly, Apple decided to ditch a large array of connectivity ports–HDMI ports, SD card slot, Thunderbolt 2 ports, and standard USB port. These ports have been replaced by 4 Thunderbolt 3/USB-C ports. So, the same power user segment that’s being aimed by Apple, is expressing lots of concerns.
Apart from the disappeared ports, these MacBooks have maximum 16GB of RAM. On the contrary, minimum 32GB RAM is becoming a standard for power users. While Microsoft is presenting itself as the new innovative tech company, some Apple loyalists are turning to another alternative, i.e., Linux.
-
I’m not one prone to knee-jerk reactions, but I’m also not one to sit about idly without considering alternatives. So the first thing I did after the Apple keynote was to download a copy of Elementary and burn it to an SD card.
An hour or so later, after checking that my Chromebook would work OK with it1, I installed from the live image to the SSD and began the process of figuring out whether, three years after I first tried it, Elementary is finally good enough for me as a development environment.
Like last time, this isn’t a review per se, but rather a smattering of my impressions while trying to assess whether it suits me.
I’m being realistic here – I know it’s not macOS, I don’t expect it to be macOS, it will not be a magical replacement for macOS for most people who share my current disenchantment with Apple, but I am very familiar with Linux, and most definitely need to consider moving to it in the long term given the way Apple has been neglecting Mac hardware and software over the past few years.
So given this week’s keynote completely ignored desktops and that I sorely need to upgrade my six-year-old Mac mini, this is as good a time as any to evaluate what’s out there.
-
Server
-
Amazon Web Services (AWS), a division of Amazon that offers cloud computing and storage services, today announced that it has released a container image of its Amazon Linux operating system — which has, until now, only been accessible on AWS virtual machine instances — that customers can now deploy on their own servers.
Of course, other Linux distributions are available for use in companies’ on-premises data centers — CentOS, CoreOS, Red Hat Enterprise Linux, Canonical’s Ubuntu, and so on. Now companies that are used to Amazon Linux in the cloud can work with it on-premises, too. It’s available from AWS’ EC2 Container Registry. Amazon Linux is not currently available for instant deployment on other public clouds, whether Oracle’s, Google’s, Microsoft’s, or IBM’s.
-
Kernel Space
-
No one aside from Linus Torvalds has more influence or name recognition in the Linux Kernel project than Greg Kroah-Hartman. More commonly known as GKH, the ex SUSE kernel developer and USB driver maintainer is now a Linux Foundation Fellow and the full-time maintainer of the -stable Linux branch and staging subsystem, among other roles. In a recent Fireside Chat with Kroah-Hartman at Embedded Linux Conference Europe, Tim Bird, Chair of the Architecture Group of the Linux Foundation’s CE Working Group, described him as the hardest working person he knows.
-
I’m announcing the release of the 4.4.30 kernel. This fixes a bug in
4.4.29 and older kernels by reverting two patches that should not have
been applied.
All users of the 4.4 kernel series must upgrade.
The updated 4.4.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.4.y
and can be browsed at the normal kernel.org git web browser:
http://git.kernel.org/?p=linux/kernel/git/stable/linux-st…
-
After informing the Linux community about the release and immediate availability of the Linux 4.8.6 kernel, renowned Linux kernel developer Greg Kroah-Hartman announced the Linux 4.4.29 LTS kernel.
Linux kernel 4.4.29 LTS was a fairly normal maintenance update that brought changes to a total of 82 files, with 657 insertions and 358 deletions, according to the appended shortlog and the diff from Linux kernel 4.4.28 LTS announced a week ago. However, later that day Greg Kroah-Hartman bumped the version to 4.4.30, removing two patches that shouldn’t have been applied in the first place.
-
A blockchain project developed by several Japanese firms including by startup Soramitsu and IT giant Hitachi has been accepted into the Hyperledger blockchain initiative.
Developed by Hyperledger member and blockchain startup Soramitsu, Iroha was first unveiled during a meeting of the project’s Technical Steering Committee last month. Iroha is being pitched as both a supplement to other Hyperledger-tied infrastructure projects like IBM’s Fabric (on which it is based) and Intel’s Sawtooth Lake.
-
At the time, many people who first read the paper became interested in the background technology, and several wanted to see it in a working state.
It seems very few knew that was going to happen.
Once Bitcoin launched in 2009, the biggest success story in digital money was launched. Satoshi launched Bitcoin as open source software so anyone could use it, fork it and update it. At first, the early adopters were mainly from the cryptography community like Hal Finney, the recipient of the very first bitcoin transaction.
-
Brian Behlendorf knows it’s a cliché for veteran technologists like himself to argue that society could be run much better if we just had the right software. He believes it anyway.
“I’ve been as frustrated as anybody in technology about how broken the world seems,” he says. “Corruption or bureaucracy or inefficiency are in some ways technology problems. Couldn’t this just be fixed?” he asks.
This summer Behlendorf made a bet that a technology has appeared that can solve some of those apparently human problems. Leaving a comfortable job as a venture capitalist working for early Facebook investor and billionaire Peter Thiel, he now leads the Hyperledger Project, a nonprofit in San Francisco created to support open-source development of blockchains, a type of database that underpins the digital currency Bitcoin by verifying and recording transactions.
-
Linux Plumbers, the invite-only conference for core Linux developers, is usually a happy occasion, but not this time.
Several top programmers came looking for work because they had just been laid off by Hewlett Packard Enterprise (HPE). And they weren’t the only ones. Last week, HPE laid off numerous OpenStack cloud developers.
-
Graphics Stack
-
Mesa 13.0 was released today as what is likely the most significant release to this 3D graphics driver/library implementation ever! Mesa 13 is huge for open-source driver uses particularly with Intel, Radeon, and GeForce hardware driver improvements. During development this release was known as Mesa 12.1
-
This release is a bit massive when it comes to actually looking at the features, everything we have been hyped about recently is now in the stable release.
-
-
With our past Intel Vulkan benchmarks the Vulkan driver was slower than the mature OpenGL driver but this is about to change with an important patch-set published today: a big performance boost is in store.
-
Applications
-
Kodi is a free and open source media player application developed by the XBMC Foundation, a non-profit technology consortium. Kodi media center was originally created for the Microsoft Xbox and called Xbox Media Center (XBMC), the software has continued to evolve, spawning a community of its own. Kodi is available for multiple operating systems and hardware platforms including Linux.
-
Microsoft Office is the de-facto standard office suite there in the world, but unfortunately it is not available to we, the “free” folk on linux. Sure there are quite a few number of ways to use it on Linux, either by using a virtual PC or employing ….. Which also allows you to run it on Linux. Either way the experience might not be the best. Fortunately also, this has also allowed for the creation of some very capable alternatives on Linux, and today, we’d take a look at 5 of the very top office suites that are available on Linux.
-
-
-
The Git development team pushed a new maintenance update to the Git 2.10 stable series, versioned 2.10.2, adding over 20 improvements and bug fixes to various areas of the free and open-source distributed version control system.
Among the changes included in Git 2.10.2, we can mention that the documentation was updated to include detailed information about what the “log -3 –reverse” command does, an issue that caused the “git blame” command to bypass the macro and peek into the DEFAULT_ABBREV variable was fixed, and the code that parses the format parameter of the “for-each-ref” command has been optimized a little.
-
Proprietary
-
Dynamsoft’s latest Dynamic Web TWAIN document scanning software development kit (SDK) version 12.1 has added a Linux Edition to support web-based SANE scanning on Linux machines. As a result, the document scanning SDK now supports cross-browser scanning across the three biggest platforms of Windows, macOS and Linux while also supporting all common scanners.
-
-
-
Instructionals/Technical
-
Games
-
More students are learning about the world of open source through video games. Open source games like FreeCiv and Minetest invite young gamers to dig into the source code, while projects like SpigotMC empower them to write plugins to extend their favorite games.
Unfortunately, the open source tools used to build games do not share the same prominence. Rochester Institute of Technology student Matt Guerrette hopes to help change that with Hatchit, his open source gaming engine.
-
With the start of a new month comes updated figures from Valve about their Steam hardware/software survey statistics.
-
As promised by Valve at SteamDevDays, Steam now has native support the for the PS4 Dual Shock Controller, giving it the config ability like Steam Controllers have.
-
-
-
-
We have gained a few fishing titles in the last year or so, but now we have another. Ice Lakes [Steam, Official Site] was released with Linux support and it doesn’t look too bad at all.
I used to love these types of sims when I was younger, and they have come a long way since I last played any in both looks and features.
-
While this isn’t exactly big news, as nothing is really different yet, it does confirm their commitment to bringing the game to our platform.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Today, November 1, 2016, the KDE project was proud to announce the release of KDE Plasma 5.8.3, the third maintenance update to the long-term supported KDE Plasma 5.8 desktop environment.
-
GNOME Desktop/GTK
-
-
In the first post in this series I introduced SVG markers, which let you put symbols along the nodes of a path. You can use them to draw arrows (arrowhead as an end marker on a line), points in a chart, and other visual effects.
In that post and in the second one, I started porting some of the code in librsvg that renders SVG markers from C to Rust. So far I’ve focused on the code and how it looks in Rust vs. C, and on some initial refactorings to make it feel more Rusty. I have casually mentioned Bézier segments and their tangents, and you may have an idea that SVG paths are composed of Bézier curves and straight lines, but I haven’t explained what this code is really about. Why not simply walk over all the nodes in the path, and slap a marker at each one?
-
From documentation Rust provides a low level and high level API to access common operations. Provides a set of assumptions to help its great features like automatic memory management, secure and concurrent data access. On high level side, Rust provides a rich set of common collection, iterators, tuples and others.
For GObject interoperability, there is a project , and this too, I found to allow you to use GObject based libraries in Rust, while they depends on other project, or directly on GObject Introspection generated XML files to introspect these C libraries.
-
If you love using GNOME Shell but wish that it was easier to create and customise folders in the App View, here’s an app that might help.
-
We reported last week that the first milestone of the upcoming GNOME 3.24 desktop environment, due for release on March 22, 2017, arrived for early adopters, but the changes weren’t all that significant.
A few days after the announcement for GNOME 3.23.1, the GNOME Shell 3.23.1 graphical interface and Mutter 3.23.1 window and composite manager made their appearance on the official FTP server, and looking at their changelogs, attached at the end of the article for reference, it appears there are plenty of new features to get excited for.
-
I’ve been keeping an eye on Rust for a while now, so when I read Alberto’s statement of support for more Rust use in GNOME, I couldn’t resist piling on…
From the perspective of someone who’s quite used to C, it does indeed seem to tick all the boxes. High performance, suitability for low-level tasks and C ABI compatibility tend to be sticking points with new languages — and Rust kills it in those departments. Anyone who needs further convincing should read up on Raph Levien’s font renderer. The usual caveat about details vis-a-vis the Devil applies, but the general idea looks exactly right. Rust’s expressiveness and lack of baggage means it could even outperform C for non-trivial code, on top of all the other advantages.
-
-
New Releases
-
On the first day of November 2016, Michael Tremer from the IPFire project, an open source, professional, secure and hardened Linux-based firewall distribution, proudly announced the release of IPFire 2.19 Core Update 106.
IPFire 2.19 Core Update 106 is the latest stable release of the Linux firewall OS, and it looks like it implements a new DNS proxy, namely Unbound, which replaces the Dnsmasq DNS forwarder and DHCP server used in previous releases. The decision was made because of the recent DNSSEC implementation by default in the distribution, which proves to offer better DNSSEC reliability, enhanced features, such as import of static leases, and improved performance.
-
Today, November 1, 2016, 4MLinux developer Zbigniew Konojacki informs us about the general availability of the final release of his independent 4MLinux 20.0 GNU/Linux operating system.
4MLinux 20.0 has entered development at the beginning of September, when the Core edition was pushed to the Beta channels for early adopters, as well as for the 4MLinux developer to rebase all of his GNU/Linux distribution on the new system, which is now powered by the long-term supported Linux 4.4.27 kernel fully patched against the “Dirty COW” vulnerability.
-
Arch Family
-
Today is the first day of November (still is in some countries), which means that a new ISO respin of the popular and lightweight Arch Linux operating system is now available for download.
That’s right, Arch Linux 2016.11.01 is out, and it’s powered by the recently released Linux 4.8.6 kernel, which makes Arch Linux the first GNU/Linux distribution to offer a live and installable ISO image powered by the latest stable and most advanced Linux kernel version available, at least at the moment of writing this blog story.
-
A new version of the Arch-based Manjaro Linux distribution is available and continues with its Xfce desktop choice while a KDE Plasma 5.8 version is also available.
-
Red Hat Family
-
Using a more declarative approach to IT automation that doesn’t require IT operations staff to learn how to program has the obvious benefit of being simpler for more IT organizations to embrace. Now Red Hat is extending the reach of that approach with the release today of an update to the agentless Ansible open source framework that reaches deeper into the realms of networking, containers and the cloud.
-
Finance
-
Fedora
-
ovember 1, 2016, was an important day on the release schedule of the forthcoming Fedora 25 Linux operating system, as it hit the Final Freeze development stage, leading to significant cut-offs.
The Final Freeze stage is a very important step in the development process of any GNU/Linux distribution, which means that no new packages will be added to the operating system and its current state will be preserved until the final release, but not before it passes all tests for all supported hardware architectures. As usual, during the Final Freeze stage, only critical bug fixes are accepted, and new package versions will be pushed to the stable repos after the OS officially hits the streets.
-
When Fedora 25 ships in (hopefully) two weeks it will contain much better support for hybrid graphics / Optimus systems thanks to improvements led by Red Hat.
-
For those with a NVIDIA Optimus laptop or other dual-GPU system, Fedora QA has organized a test day this week for testing the switchable graphics support for Fedora 25 that will be shipping later this month.
-
When we started the Fedora Workstation effort one thing we wanted to do was to drain the proverbial swamp of make sure that running Linux on a laptop is a first rate experience. As you see from my last blog entry we have been working on building a team dedicated to that task. There are many facets to this effort, but one that we kept getting asked about was sorting out hybrid graphics. So be aware that some of this has been covered in previous blog entries, but I want to be thorough here. So this blog will cover the big investments of time and effort we are putting into Wayland and X Windows, GNOME Shell and Nouveau (the open source driver for NVidia GPU hardware).
-
Debian Family
-
The Debian GNU/Linux project is 23 years old and one of its developers has just completed two decades with the community Linux organisation.
Steve McIntyre, who led the project in 2008 and 2009, joined Debian in 1996. He wrote that he had first installed Debian in late October that year, migrating over from his existing Slackware installation with the help of a friend. It took an entire weekend and he says he found it so painful that he thought of bailing out at many times.
-
Derivatives
-
On the last day of October 2016, the developers of the Debian-based Parsix GNU/Linux distribution informed their users about the general availability of a bunch of new security updates, as well as an updated kernel.
-
Canonical/Ubuntu
-
A brand new Ubuntu t-shirt is available to buy from the Canonical store bearing the official mascot emblem of Ubuntu 16.10 Yakkety Yak.
-
-
Adlink announced four modules, in SMARC 2.0, Qseven, and COM Express Compact format, plus a Mini-ITX board — all based on Intel’s 14nm “Apollo Lake” SoCs.
Adlink has rolled out the most comprehensive range of products yet supporting Intel’s 14nm-fabricated Atom E3900 “Apollo Lake” SoCs. Like rival Congatec’s Apollo Lake roll-out, the Adlink announcement includes one of the first modules supporting the new SMARC 2.0 COM form factor, as well as a COM Express Compact Type 6 module. There’s also a COM Express Mini Type 10 module, a Qseven COM, and a thin Mini-ITX SBC.
-
Phones
-
Tizen
-
The Gear S3 classic and Gear S3 frontier were available to pre-order from Samsung’s official website in the United Kingdom, since only a matter of days ago. The good or bad news is that it seems demand is outstripping supply as the device is now reported as out of stock. This is good as it shows the S3 is a much sought after product, but bad for anyone wanting to be the first to get their hands on it.
-
Today, the Gear Manager app, which is used to connect a Smartphone to a Samsung Gear smartwatch, received an update taking it to version 2.2.16101261. Immediately you can see a brand new brighter and sleeker looking User Interface (UI) which looks more in-line with the Samsung S-Health fitness app. We also get support for Samsung’s upcoming Gear S3 smartwatch, Improved stability, and bug fixes.
-
The Gear S3 recently went on pre-order in the UK for £349 with a shipping date of 11 November. Soon after the smartwatches went out of stock due to demand. Now, the next country to open pre-orders is Germany and a little gift will be included for you early birds.
-
The Tizen Studio, formerly known as the Tizen SDK, has received a software update today taking it to version 1.0.1. The transition from SDK to Studio means that you now have a “one click SDK for all Tizen devices”, that has a comprehensive set of tools for developing Tizen native and Web applications. You get an IDE, Emulator, toolchain, sample code, and documentation.
-
Android
-
It’s a common assumption among tech geeks, and even cybersecurity experts, that if you are really paranoid, you should probably use an iPhone, and not Android. But the man responsible for securing the more than one billion Android users on the planet vehemently disagrees—but of course he would.
“For almost all threat models,” Adrian Ludwig, the director of security at Android, referring to the level of security needed by most people, “they are nearly identical in terms of their platform-level capabilities.”
-
After years of fiddling around with Project Tango development hardware, Google has partnered with Lenovo to launch the first real consumer Tango device. This is the big day—the Lenovo Phab2 Pro is available for purchase. It’s priced at $500, but it won’t ship until December.
If you need a quick refresher, the Phab2 Pro is a massive 6.4-inch smartphone with a 1440p display, 4GB of RAM, and a Snapdragon 652 SoC. On the back are all the distance and orientation sensors that make the Tango augmented reality stuff work. Interestingly, the Phab2 Pro will launch with Android 6.0 Marshmallow instead of Nougat.
-
-
-
-
-
-
-
-
Network isolation isn’t the only way to secure application containers anymore, so Aporeto unveils a new security model for containers running in Docker or as part of Kubernetes cluster.
Dimitri Stiliadis co-founded software-defined networking (SDN) vendor Nuage Networks in 2011 in a bid to help organizations improve agility and security via network isolation. In the container world, however, network isolation alone isn’t always enough to provide security, which is why Stiliadis founded Aporeto in August 2015. On Nov. 1, Aporeto announced its open-source Trireme project, providing a new security model for containers running in Docker or as part of a Kubernetes cluster.
-
Minoca OS is a general purpose operating system written completely from the ground up. It’s intended for devices looking to conserve power, memory, and storage. It aims to be lean, maintainable, modular, and compatible with existing software.
In other words, it’s built for little devices that want a full-featured OS.
On the app side, we’ve got a package manager (opkg), and a growing suite of packages like Python, Ruby, Git, Lua, and Node. Under the hood, Minoca contains a powerful driver model between device drivers and the kernel. The idea is that drivers can be written in a forward compatible manner, so kernel level components can be upgraded without requiring a recompilation of all device drivers.
-
-
There are a lot of operating system updates to end out October and begin November… Even the “open-source Windows” ReactOS is out with a new test release.
-
The latest version of OpenIndiana, the Illumos-powered Solaris distribution letting OpenSolaris live on in community form, is now available.
-
OpenIndiana is a free and open-source Unix operating system, based on Illumos and derived from OpenSolaris. The latest version, 2016.10, was announced by Alexander Pyhalov on October 31, 2016.
The OpenIndiana 2016.10 “Hipster” release comes with a large number of updated components, new features and under-the-hood improvements, but the most exciting ones are the migration to FreeBSD Loader, porting of Intel KMS (Kernel Mode Setting), implementation of Python 2.7 by default, removal of Sun SSH, and MATE 1.14 desktop, which is now integrated and installed by default.
-
I haven’t seen Google announce any Intel Kabylake powered Chromebooks yet, but activity indicates that they may not be too far out with now having mainlined Coreboot support for a new device codenamed “Eve”.
-
Open source business process management (BPM) software appears to account for a large percentage of recent innovation in the broader BPM market.
“Open source solutions are leading the evolution of the BPM technologies: from pure BPM solutions that automate processes, increase productivity and ensure regulatory compliance to business application platforms that include tools and capabilities to empower DevOps teams to effectively create and maintain business applications,” said Miguel Valdes Faura, CEO and founder of Bonitasoft, provider of an open source BPM platform.
The trends in open source BPM software mirror the broader BPM market, said Phil Simpson, manager, BPM Product Marketing for Red Hat, mentioning a move away from on-premise deployments in favor of BPM-as-a-service, and adoption of more dynamic ad-hoc case management style flows in lieu of rigid process models.
-
Kubernetes has rapidly evolved from running production workloads at Google to deployment in an increasing number of global enterprises. Interestingly, US and Chinese enterprises have different expectations when it comes to requirements, platforms, and tools. In his upcoming talk at KubeCon, Xin Zhang, CEO of Caicloud, will describe his company’s experiences using Kubernetes to manage production systems in large-scale Chinese enterprises.
-
Node.js, the JavaScript runtime of choice for high-performance, low latency apps, continues to gain popularity among developers on the strength of JavaScript.
-
So you’ve some written excellent documentation. Now what? Now it’s time to go back and edit it. When you first sit down to write your documentation, you want to focus on what you’re trying to say instead of how you’re saying it, but once that first draft is done it’s time to go back and polish it up a little.
-
Here at OStatic, we’ve often noted that whenever the Apache Software Foundation graduates an open source project to become a Top Level Project, it tends to bode well for the project. Just look at what’s happened with Apache Spark, for example.
Last year, Apache, which is the steward for and incubates more than 350 Open Source projects, announced that Apache Ignite had become a top-level project. Ignite is an open source effort to build an in-memory data fabric that was driven by GridGain Systems. Now, GridGain Systems has announced that it is offering the Ignite-based GridGain Enterprise Edition in the Amazon Web Services (AWS) Marketplace.
-
Nitrous.io, a Singapore and San Francisco-based cloud integrated development environment (IDE) provider, has announced it is to shut down its development platform and cloud IDE on November 14, with customers given until that date before their data is deleted.
The company has stopped new signups, and said that payments made after October 16 will be refunded in full, as well as promising that subscriptions to any Nitrous email list will expire at the end of this month.
-
SaaS/Back End
-
At the recent OpenStack Summit in Barcelona, nteroperability among OpenStack-powered clouds was trumpeted far and wide. And, in tandem with that, OpenStack proponents are also touting the fact that the open cloud computing platform has emerged as a de facto standard, alongside Amazon Web Services.
Forrester Research’s latest report, “The State of Cloud Platform Standards, Q4 2016,” specifies that OpenStack and AWS are now the cloud standards. That’s quite something when you consider that OpenStack is only a few years old.
There are, of course, numerous open cloud platforms out there. OpenNebula, Eucalyptus, and CloudStack are just a few of the choices. But Forrester Research reports that ”almost every public, private, and hosted private cloud provider has either already developed or is in the process of developing varying levels of support for the OpenStack APIs.”
-
Oracle/Java/LibreOffice
-
LibreOffice in Git master (what will become LO 5.3 next year) has enabled its new layout engine by default for providing better rendering on all platforms.
-
Pseudo-Open Source (Openwashing)
-
Funding
-
-
-
Over the past five years, Linux Academy has become the largest community dedicated to Linux and cloud training on the web. The Company was founded on the belief that high-quality, certification-based training should be available to everyone at an affordable price. Linux Academy is a student-centric company with a mission to help people find or progress within careers in high demand segments of the technology industry including: Azure, AWS, OpenStack and other cloud and big data technologies. This commitment to students has resulted in the highest certification exam pass rate of any cloud training platform in the market.
-
FSF/FSFE/GNU/SFLC
-
GIMP is taking another step towards the long overdue GIMP 2.10 image program update with a new milestone release being on the horizon.
The GIMP 2.9.6 release has yet to happen but its NEWS entry was updated for the pending release.
What users can look forward to in GIMP 2.9.6 is a new clipboard implementation to copy/paste layers and layer groups, color tags, the mouse pointer dialogs and colors applied to images are now color-managed, various GUI additions, improvements to some of the built-in tools, a native WebP loader/exporter, and around 60 bug fixes over the earlier GIMP 2.9 development release.
-
-
Public Services/Government
-
For the second time this year, an Italian public administration is ending its use of open source office productivity software. A source in the IT department of the Emilia-Romagna region confirmed to the Open Source Observatory last week that the region will end its use of OpenOffice. The region will move to a cloud-based proprietary office solution, others say.
The IT department did not respond to emails seeking comments sent last week and yesterday. This news item will be updated with more information as it becomes available.
On 31 October, a press statement by the region’s councillor for the Digital Agenda, Raffaele Donini, mentions the use of unspecified cloud solutions, which should reduce the number of pages printed by the administration each year by some 5 million. The switch would save EUR 700,000 per year.
Update: the region took its decision to switch to a cloud solution on 24 October.
-
Licensing/Legal
-
Abrahami was alluding to the use in the WordPress text editor of code originally published as open source under the more permissive MIT public license, as Wix developer Tal Kol said explicitly in a followup post on Medium. Kol said that the code was developed in an attempt to collaborate with WordPress engineers—porting the Automattic, GPL-licensed editor to the React Native JavaScript platform for mobile apps. After a prototype was ready in June, Kol explained, he tweeted a link to the code to Automattic’s engineering team but didn’t get a response until October 28, when Mullenweg called Wix out for a GPL violation.
The problem for Wix is that while it may very well have open-sourced the component it built using WordPress’ editor—which Kol says was in turn built using another editor licensed under the more permissive MIT open source license—the company then published the component as part of commercially licensed software. That action violates both the spirit and the letter of the GNU Public License, which requires anything built with GPL-licensed code to be distributed with the same GPL license. By adding the GPL-licensed editor module code to its own application, Wix essentially placed its whole mobile application under the scope of the GPL license.
-
Openness/Sharing/Collaboration
-
There’s a new poll aggregator in town. And it’s a monster, harnessing three of the most powerful ideas in science today: Bayesian inference, open-source software, and reproducible research.
-
Open Data
-
Researchers collaborating in Pittsburgh have developed an open-source software resource that can better enable investigators studying cancer to process large amounts of genomic cancer data.
The new resource, developed by researchers from the University of Pittsburgh and the Pittsburgh Supercomputing Center can assist investigators in sorting through genomic cancer data to determine better methods of cancer prevention, diagnosis and treatment.
The open-source software, which processes data generated by The Cancer Genome Atlas (TCGA) project and is called TCGA Expedition, is described in an article in the journal PLOS ONE.
-
Programming/Development
-
The definition of an “older” language is a little fuzzy. For many developers, the languages they are working with were created before they were born. For the purposes of this poll, we selected a few popular languages from Wikipedia’s History of programming languages article and selected the somewhat arbitrary cutoff of needing to have been created prior to 1980.
-
Science
-
Professor Hiroshi Ishiguro is a weird dude. For the last couple of decades, he’s been on a quest to make the most lifelike android possible. His first creation was based on his daughter’s image and proved so frightening to his child that the machine had to be locked away in a crate. Later, Ishiguro–who dresses in all-black, like a Japanese Johnny Cash–made a machine that looks exactly like him. As you do.
-
Security
-
-
HTTPS is a small island of security in this insecure world, and in this day and age, there is absolutely no reason not to have it on every Web site you host. Up until last year, there was just a single last excuse: purchasing certificates was kind of pricey. That probably was not a big deal for enterprises; however, if you routinely host a dozen Web sites, each with multiple subdomains, and have to pay for each certificate out of your own dear pocket—well, that quickly could become a burden.
Now you have no more excuses. Enter Let’s Encrypt a free Certificate Authority that officially left Beta status in April 2016.
Aside from being totally free, there is another special thing about Let’s Encrypt certificates: they don’t last long. Currently all certificates issued by Let’s Encrypt are valid for only 90 days, and you should expect that someday this term will become even shorter. Although this short lifespan definitely creates a much higher level of security, many people consider it as an inconvenience, and I’ve seen people going back from using Let’s Encrypt to buying certificates from commercial certificate authorities for this very reason.
-
Microsoft Corp (MSFT.O) said on Tuesday that a hacking group previously linked to the Russian government and U.S. political hacks was behind recent cyber attacks that exploited a newly discovered Windows security flaw.
The software maker said in an advisory on its website there had been a small number of attacks using “spear phishing” emails from a hacking group known Strontium, which is more widely known as “Fancy Bear,” or APT 28. Microsoft did not identify any victims.
Microsoft’s disclosure of the new attacks and the link to Russia came after Washington accused Moscow of launching an unprecedented hacking campaign aimed at disrupting and discrediting the upcoming U.S. election.
-
Hackers continue to exploit vulnerabilities in the U.S. political technology, highlighting the need for cybersecurity standards and guidelines to help protect voter information.
-
On Oct. 31, Google’s Threat Analysis Group revealed a vulnerability in most versions of Windows that is actively being exploited by malware attacks.
Today, Terry Myerson, executive vice president of Microsoft’s Windows and Devices group, acknowledged the exploit was being used actively by a sophisticated threat group—the same threat group involved in the hacks that led to the breach of data from the Democratic National Committee and the Clinton campaign. And while a patch is on the way for the vulnerability, he encouraged customers to upgrade to Windows 10 for protection from further advanced threats.
-
DNS has been in the news a great deal as of late. First, there was the controversy over the United States government essentially handing over control of the Internet’s root domain naming system. Then DNS made headlines when cybercriminals performed three separate distributed denial of service (DDoS) attacks on a major DNS service provider by leveraging a botnet army of millions of compromised IoT devices. Yet with all the hoopla surrounding DNS, it surprises me how many IT pros don’t fully understand DNS and how it actually works.
DNS stands for Domain Name System. Its purpose is to resolve and translate human-readable website names to IPv4 or IPv6 addresses. Technically speaking, it’s not a necessary part of the networking processes. Rather, DNS simply makes it easier for human beings to know and remember what server they are trying to reach. For example, it’s much easier to remember that if you want to perform an internet web search, you type in www.google.com as opposed to the IPv4 address of 216.58.217.4.
-
Recommendations for mitigation include turning off global telnet open services and not using known vulnerable usernames or passwords. If a device is infected (or you’re not sure if it is), this can be removed by rebooting the infected devices, the post said. Of course it will then have to be secured against the intrusion, or it will be re-infected.
-
The National Cyber Security Center’s technical director Ian Levy has slammed commonly-accepted cyber security advice, equating the security industry to “witchcraft” and accusing it of deliberately creating unnecessary fear around cyber threats.
Speaking at Future Decoded 2016, Microsoft’s annual digital transformation conference, Levy argued that cyber security is not transparent and that the industry is “blaming the user for designing the system wrong”.
-
Defence/Aggression
-
Swiss police on Wednesday raided a mosque in the north of the country, detaining eight people, AP reported.
Those in custody are suspected of calling for killing of Muslims refusing to attend prayers.
Police searched the mosque in Winterthur, near Zürich, and the apartments of three people, according to a statement from the regional prosecutor’s office. Among those arrested was an Ethiopian imam who could have been behind the call for the killings.
-
Transparency/Investigative Reporting
-
The latest release consists of over 1,100 emails. More than 43,000 emails have now been published by the whistleblowing site, which has pledged to make public a total of 50,000 in the run up to next week’s US presidential election.
Tuesday’s email release divulged more details on the Clinton team’s reaction to her email server scandal and gave further insight into its relationship with the MSM.
-
Okay, look, let’s face the fact that any time we write about anything having to do with either Hillary Clinton or Donald Trump, people in the comments go nuts accusing us of being “in the tank,” or “shills.” or even (really) “up the ass” of one candidate or the other (and, yes, this has happened with both of the major party candidates). I’m assuming it will happen again with this post, even though it’s not true. As should be abundantly clear, we’re not big fans of either choice (and don’t get us started on the third parties…). So when we talk about one, the other (or even both together), it’s not because we’re “biased” or trying to help or hurt one or the other. We’re just doing the same thing we always do, and which we never had a problem with before, which is reporting on policy related issues having to do with technology, free speech, the 4th amendment, law enforcement, etc. So, before you rush in to yell at us in the comments, please consider that maybe just because we’re not toeing the party line on your preferred candidate, maybe it’s not because we’re in the tank for the other one.
-
or everyone wondering why the Clinton email case never went to a grand jury, former U.S. Attorney General Michael Mukasey offers an explanation: After disclosure of emails between Hillary Clinton and Barack Obama , “the president said during an interview that he thought Mrs. Clinton should not be criminally charged because there was no evidence that she had intended to harm the nation’s security—a showing required under none of the relevant statutes.
-
Environment/Energy/Wildlife/Nature
-
The Native Americans who have spent the last months in peaceful protest against an oil pipeline along the banks of the Missouri are standing up for tribal rights. They’re also standing up for clean water, environmental justice and a working climate. And it’s time that everyone else joined in.
The shocking images of the National Guard destroying tepees and sweat lodges and arresting elders this week remind us that the battle over the Dakota Access Pipeline is part of the longest-running drama in American history — the United States Army versus Native Americans. In the past, it’s almost always ended horribly, and nothing we can do now will erase a history of massacres, stolen land and broken treaties. But this time, it can end differently.
-
Alabama Governor Robert Bentley on Tuesday declared a state of emergency for the state due to an explosion and fire involving Colonial Pipeline Co [COLPI.UL] in Shelby County on Monday.
“The State of Emergency is effective November 1, 2016 through December 1, 2016 unless sooner terminated,” according to a statement from the governor’s office.
-
The crowdsourcing goal was modest: $5,000, enough to help a few dozen people camping in North Dakota to protest the nearby construction of the four-state Dakota Access oil pipeline. The fund has since topped a staggering $1 million.
The fund is among several cash streams that have provided at least $3 million to help with legal costs, food and other supplies to those opposing the nearly 1,200-mile pipeline. It may also give protesters the ability to prolong their months-long encampments that have attracted thousands of supporters, as the Standing Rock Sioux Tribe pursues the fight in court.
-
Finance
-
Liam Fox’s hopes of securing a trade deal with the European Union before Brexit have been dealt a blow by a leading member of the European parliament, who insists no deal can be struck until the UK has left the bloc.
Danuta Hübner, a former Polish government minister who became the country’s first European commissioner, said it would not be possible for the UK to conclude a trade deal while still an EU member.
Now an MEP, she chairs the European parliament’s constitutional affairs committee, which will be responsible for vetting any post-Brexit free-trade agreement with the UK.
In an interview with the Guardian, she stressed negotiations on Britain’s EU exit under article 50, due to begin next year, would be on a different track to talks on the future relationship.
“Formally you cannot conclude or even negotiate the agreement that belongs to a third-country situation while you are still a member. Article 50 is only about withdrawal and only when you are out can [you] negotiate another agreement.”
-
In Spain, as in almost all other markets it has entered, Uber has faced pushback from authorities, protests by taxi drivers, and a rash of rival startups looking to get their own piece of the lucrative ride-hailing market. But the latest attempt to challenge the US company’s hegemony in the taxi app market is a different beast. Perhaps realizing the difficulties in relying on regulation to keep Uber out, taxi drivers in Spain announced this week plans to create their own app.
This is not the first time taxi drivers have tried to beat Uber and its ilk at their own game. The last few years have seen a rash of rival apps brought out by taxi drivers, but this approach faces considerable challenges, not least winning over customers from big, established brands with multi-billion dollar budgets.
-
Earlier this month, Planet Money aired an interview with a Wells Fargo whistleblower who was fired for trying to alert the bank to the millions of criminal frauds being committed against its customers, and we learned that the whistleblower had been added to a confidential blacklist used by the finance industry, preventing her from ever getting work in the industry again.
This week’s Planet Money (MP3) airs an interview with another Wells Fargo whistleblower who resigned when the bank made him recant his complaints to upper management, and then put pressure on him to engage in the same frauds as his colleagues. This whistleblower, too, was unable to get work at any other bank, and it wasn’t until a sympathetic hiring manager at a rival bank told him confidentially that he had been blacklisted that he found out why.
The blacklist is called “U5,” and it’s maintained by the finance institutions as a way of alerting each other to fraudsters who are fired for breaking finance rules. The list was designed to protect banks from fraud, but it has no defenses against fraudulent banks.
-
AstroTurf/Lobbying/Politics
-
Before Democrats burn James Comey in effigy, they should think about how the FBI director came to have an outsized influence in the election in the first place.
It’s not something Comey sought or welcomed. A law enforcement official who prizes his reputation, he didn’t relish becoming a hate figure for half the country or more. No, the only reason that Comey figures in the election at all is that Democrats knowingly nominated someone under FBI investigation.
Once upon a time — namely any presidential election prior to this one — this enormous political and legal vulnerability would have disqualified a candidate. Not this year, and not in the case of Hillary Clinton.
-
On November 1, WikiLeaks released an email from Clinton campaign chair John Podesta that provided perspective into the corrupt inner conflicts of the controversial non-profit the Clinton Foundation.
“I cannot stress enough that if this is not handled appropriately it will blow up,” wrote Tina Flournoy, Bill Clinton’s chief of staff, in an April 8 2015 email to Podesta. The subject of the email was “CHAI” referring to the Clinton Health Access Initiative.
The day before, on April 7, Flournoy noted in an email to Podesta and other Clinton staff, “do you guys know where we are – as of today – on CHAI? That needs to be discussed – but he’s about to lose it if we don’t wrap the call.”
A 2015 New York Times article explained the tensions between CHAI CEO Ira Magaziner, and the rest of the Clinton Foundation, based on a performance review of Magaziner and by CHAI’s board, an influential member of which is Chelsea Clinton. “Ira’s ‘paranoia’ was mentioned by several board members to encompass Ira’s general mistrust of the board and its intentions,” the performance review noted.
-
That’s not the way CNN and Brazile reacted when exposed by the WikiLeaks emails. In the first incriminating email, Brazile told the Clinton team, “From time to time I get the questions in advance” and shared a question on the death penalty that Clinton would be asked on CNN’s March 13 town hall.
-
If you want to have an easy condescending laugh at someone else’s expense (and who doesn’t?), type the words “non story” into the Twitter search bar and look how many Hillary Clinton supporters are using that phrase to try and spin away the FBI’s discovery of new evidence pertinent to the criminal investigation of their candidate. Use quotation marks. You can do it with Facebook’s search function too, just make sure you click “Latest” to get the last few days’ worth of spin.
-
Reopening Hillary Clinton’s FBI investigation isn’t a political ploy, nor is it an “October Surprise.” But it could be God’s early Christmas gift to America.
Hillary Clinton’s top aide, Huma Abedin, says she doesn’t know how her emails showed up on husband Anthony Weiner’s computer. The FBI stumbled upon another treasure trove of Clinton-related emails while investigating Abedin’s now estranged husband, who is under investigation himself for allegedly exchanging lewd messages with a 15-year old girl.
Additional emails released in August found that Abedin carelessly toted around classified government information in her car, once asking Clinton’s personal assistant to intercept “a bunch of burn stuff in the pocket of my front seat” she’d left unattended.
If this wasn’t so incredibly dangerous it would be Saturday Night Live-worthy.
Despite how we feel about WikiLeaks, Americans should be thanking the good Lord the belly of the beast that is Hillary Clinton has been exposed for what it is. Emails have revealed, as the old song goes, corruption so high, you can’t get over it, so wide, you can’t get around it, and so deep, you can’t get under it.
-
This is nonsense. The evidence available on the Internet is that Trump neither (directly) controls the domain “trump-email.com”, nor has access to the server. Instead, the domain was setup and controlled by Cendyn, a company that does marketing/promotions for hotels, including many of Trump’s hotels. Cendyn outsources the email portions of its campaigns to a company called Listrak, which actually owns/operates the physical server in a data center in Philidelphia.
In other words, Trump’s response is (minus the political bits) likely true, supported by the evidence. It’s the conclusion I came to even before seeing the response.
When you view this “secret” server in context, surrounded by the other email servers operated by Listrak on behalf of Cendyn, it becomes more obvious what’s going on. In the same Internet address range of Trump’s servers you see a bunch of similar servers, many named [client]-email.com. In other words, trump-email.com is not intended as a normal email server you and I are familiar with, but as a server used for marketing/promotional campaigns.
-
Neera Tanden, president of the liberal Center for American Progress and policy director for Hillary Clinton’s 2008 presidential campaign, is arguably Clinton’s most fervent supporter. In one of the hacked emails to and from Clinton campaign chairman John Podesta published by WikiLeaks, Tanden emphasized that “I would do whatever Hillary needs always.”
But as a recently released email chain shows, even Tanden was concerned in May last year that plans of a pro-Clinton Super PAC to directly coordinate with the campaign were “shady” and “skirting if not violating [the] law.”
That Super PAC’s coordination with the Clinton campaign has since become the subject of a complaint to the Federal Election Commission from the Campaign Legal Center, a Washington, D.C., watchdog organization.
-
Actress and activist Susan Sarandon is backing Green Party presidential candidate Jill Stein instead of Democratic nominee Hillary Clinton.
In a letter published on Stein’s campaign website, Sarandon cites Clinton’s lack of support for a $15 minimum wage and her silence on the Dakota Access Pipeline as some of her reasons for not supporting the candidate.
“Fear of Donald Trump is not enough for me to support Clinton, with her record of corruption,” Sarandon’s letter reads. “Now that Trump is self-destructing, I feel even those in swing states have the opportunity to vote their conscience.”
Sarandon was a vocal champion of Sen. Bernie Sanders (I-Vt.) throughout the Democratic presidential primary, and was among his “Bernie or bust” supporters who said they likely wouldn’t back Clinton’s candidacy if the senator lost the primary.
-
Green Party candidate Jill Stein has not endorsed Donald Trump, and she has expressed wariness of either Trump’s or Clinton’s winning the presidency.
-
The Justice Department official in charge of informing Congress about the newly reactivated Hillary Clinton email probe is a political appointee and former private-practice lawyer who kept Clinton Campaign Chairman John Podesta “out of jail,” lobbied for a tax cheat later pardoned by President Bill Clinton and led the effort to confirm Attorney General Loretta Lynch.
-
Hillary Clinton’s campaign chairman advised a longtime aide that they were “going to have to dump all those emails” on the day that a report revealed Clinton’s exclusive use of a private email server while secretary of State, according to stolen emails released Tuesday by WikiLeaks.
“Not to sound like Lanny, but we are going to have to dump all those emails so better to do so sooner than later,” says the March 2015 message, labeled as from John Podesta to Cheryl Mills and apparently referencing longtime Clinton confidant Lanny Davis.
“Think you just got your new nick name,” Mills replied.
Clinton campaign officials have refused to confirm the authenticity of the emails, which are believed to have been stolen from Podesta’s personal account by Russian government hackers.
Previously released emails have revealed some advisers were frustrated that Clinton hadn’t made information about the server public sooner.
“Why didn’t they get this stuff out like 18 months ago? So crazy,” policy adviser Neera Tanden wrote to Podesta that same evening, March 2, 2015.
“Unbelievable,” Podesta replied.
-
Donald Trump has never met a person he didn’t want to publicly shame. Google the words “Donald Trump feuds” and you’ll get hundreds of articles detailing spats with random people like world-renowned architect Frank Gehry and comedian Jerry Seinfeld, who, in the fallout of his feud with Trump, said, “If God gave comedians the power to invent people, the first person we would invent is Donald Trump.”
-
The Real News profiles scholar, human rights activist and Green Party Vice Presidential Candidate Ajamu Baraka on a recent visit to Baltimore
-
On Tuesday’s Happening Now, Fox’s Jenna Lee spoke with the woman who asked the question that former CNN contributor Donna Brazile gave to Hillary Clinton‘s campaign before a CNN presidential debate.
Lee-Anne Walters identified herself as the “woman with a rash” who wanted to ask Clinton about her plan to address the poison water crisis that continues to afflict Flint, Michigan. Hacked emails from WikiLeaks revealed that when Brazile was still with her old network, she somehow got hold of Walters’ question, and then sent campaign chairman John Podesta advanced notice of what was coming.
When asked how she felt about the news, Walters said that Clinton “should be disqualified because she had had an advantage she shouldn’t have had.” Walters also said that she was “disgusted” by Clinton’s answer, describing it as a “cop-out” that would not adequately address the lead in the city’s water.
-
You just cannot make up the sort of things we have seen this wild, sordid election cycle. Is it any wonder that sixty percent of Americans think that we need another political party in the United States?
A vote for Jill Stein would help build such a party. The Greens have been around since 1984 and have had some limited election successes. This year, they have managed to get an all time high number of states, 45, including the District of Columbia, that feature their candidate, Jill Stein, on the Presidential ballots. This came about during an all out effort by the Greens for ballot access across the country. Many Bernie Sanders supporters flocked to the Stein campaign after his withdrawal from the Democratic Presidential race.
-
The Podesta emails show that Democratic power brokers won’t reward labor’s unwavering loyalty or record contributions.
-
Dr. Jill Stein is a mother, physician and longtime teacher of internal medicine. Also the co-author of two major environmental reports — In Harm’s Way: Toxic Threats to Child Development and Environmental Threats to Healthy Aging — she has dedicated years of public service as an environmental-health advocate. She has testified before numerous legislative panels as well as local and state governmental bodies, playing a key role in the effort to get the Massachusetts fish advisories to better protect women and children from mercury contamination. Her first foray into politics was in 2002, when she ran for Governor of Massachusetts. Dr. Stein is again running to be the Green Party nominee for President in 2016.
-
Most of the money behind an upstart “Republicans for Clinton” super PAC has come from billionaire Democratic megadonor Dustin Moskovitz, a co-founder of Facebook.
According to a Center for Public Integrity review of new campaign finance filings, Moskovitz has contributed $250,000 to the R4C16 super PAC. That represents about 70 percent of the group’s income through Oct. 19.
R4C16 nevertheless touts itself as “a grassroots movement” of “concerned Republicans who are committed to vote for Hillary Clinton for president to defeat Donald Trump.”
During the final presidential debate last week in Nevada, the super PAC sponsored an anti-Trump mobile billboard with the message “DON’T GROPE. VOTE,” which traversed the Las Vegas strip for hours.
-
Censorship/Free Speech
-
An angry mob vandalised at least five Hindu temples and attacked property in Bangladesh after an alleged Facebook post mocking one of Islam’s holiest sites, police and residents said Monday.
Scores of people attacked the places of worship late Sunday in the eastern town of Nasirnagar after a local Hindu fisherman allegedly posted an edited photo on social media of a Hindu deity inside the black cube-shaped Kaaba in Mecca, Saudi Arabia.
District police chief Mizanur Rahman said two Islamist groups had been demonstrating to demand the arrest and execution of the fisherman when a group of between 100 and 150 men broke away and attacked the temples.
A local Hindu community leader said at least 15 temples were vandalised and numerous Hindu idols were smashed during the hour-long rampage.
-
Turkish courts have ordered a media blackout on reporting the detention of the editor-in-chief of secularist opposition newspaper Cumhuriyet.
Murat Sabuncu was detained while authorities searched for executive board chairman Akin Atalay and writer Guray Oz, the official news agency Anadolu said.
Police were searching the homes of Mr Atalay and Mr Oz, the agency added.
CNN Turk said police have issued detention warrants for 13 of the paper’s journalists and executives.
-
Louis Smith has been given a two-month ban by British Gymnastics after he appeared to mock Islam in a video that emerged last month.
The four-time Olympic medallist has already apologised after a video, filmed by Smith that included his friend and retired fellow gymnast Luke Carson, mimicked Islamic prayer practices.
The incident happened a month after Smith competed at the Rio Olympic Games, where he won a silver medal in the men’s pommel horse.
He issued a statement soon after the video was leaked to the media to say he was “deeply sorry” for his “thoughtless actions”. The 27-year-old also said that his heavy training regime during his gymnastic career has not allowed him to “behave like an idiot” when he was younger, but accepted that his actions were inappropriate nonetheless.
-
After years of legal battles, YouTube and German music rights group GEMA have reached a landmark licensing agreement. As a result, Germans now have access to tens of thousands of music videos that were previously “not available” in their country.
-
What do you suppose happens on YouTube to a video that is a “discourse on the First Amendment and the tactics that progressives are using to limit speech and political engagement by conservatives”? Well, according to the Wall Street Journal, it falls victim to an algorithm with absolutely no sense of irony.
A video titled “The Dark Art of Political Intimidation” was posted last week by WSJ columnist Kimberly Strassel as a PragerU lecture. “Within several hours of PragerU posting the video,” said a WSJ editorial, YouTube placed it in ‘restricted mode,’ making it inaccessible to schools, libraries and young Americans whose parents have enabled YouTube technology filters.”
-
Almost four years after we noted that the fight between German collection society GEMA and YouTube had gone on way too long, it looks like it’s finally been settled. If you don’t know, way back when, GEMA, which is effectively a mandatory copyright royalty collector in Germany, demanded insane rates for any music streaming on YouTube. Apparently, it initially argued that a stream on YouTube was no different than a purchase on iTunes, and thus it should be paid the same rate. In 2009, it asked for 17 cents per video view (which was a decrease from the 37.5 cents per stream it had asked for earlier). 17 cents. Anyone who knows anything about how the internet works and how advertising works knows that’s insane. YouTube was paying out a decent chunk of its advertising revenue to other collection societies at a fraction of a penny per view, which is inline with the potential ad revenue.
-
Chinese video services have long censored taboo topics to promote the government’s vision of a “harmonious society.” Now some popular providers are turning the same tools on each other, using blacklists to shut out rival platforms, according to a research group.
Live-streaming video services in China have grown into a $2.5 billion industry by featuring everything from celebrities cooking lunch at home to women seductively eating bananas. But the competition for fickle viewers is such that several of the largest players have quietly scrubbed mentions of rivals along with political red-flags such as party leaders’ names, according to Citizen Lab at the University of Toronto.
-
As live streaming apps surge in popularity in China, the companies profiting from the craze are pulling out all the stops to censor millions of users and avoid the wrath of a government intent on maintaining a tight control over the flow of information.
A new report from the University of Toronto’s Munk School of Global Affairs describes how China’s biggest live streaming apps work to shut down discussion on everything from sex and gambling to political gaffes and government corruption.
-
-
-
-
Privacy/Surveillance
-
In the four years Hillary Clinton sent and received State Department correspondence using a private and insecure email system, Harold T. Martin III allegedly stockpiled classified information inside his Maryland home and an unlocked shed.
Martin faces charges for alleged theft of government documents and mishandling classified information that carry up to 11 years in prison, and he’s been behind bars since his August arrest, with prosecutors saying they intend to file more serious Espionage Act charges, often used by the Obama administration to go after leakers and whistleblowers.
-
Consultant firm Booz Allen Hamilton has engaged the services of former FBI director Robert Mueller for an external review of its security practice after one of its employees contracted with the National Security Agency (NSA) was arrested on charges of stealing classified information, reports Reuters. In three years this is the second Booz Allen staff with NSA to have been involved in a controversy, the first being Edward Snowden who leaked classified files in 2013.
Prosecutors allege that Harold Thomas Martin had been downloading secret documents for over two decades and stolen at least 50 terabytes of classified information. The files seized from Martin’s home include “specific operational plans against a known enemy of the United States and its allies.”
-
Data purports to show configuration details of servers that NSA allegedly hacked and used to host exploits
For the second time in the last three months, a group that calls itself ShadowBrokers has publicly released data allegedly purloined from the Equation Group, an outfit that many consider to be the cyber hacking arm of the National Security Agency (NSA).
In August, ShadowBrokers rattled many in the security industry when they leaked details on highly classified hacking tools and exploits that they claimed the NSA had developed and used over the years for breaking into systems belonging to US adversaries.
-
-
-
-
-
Dark web data intelligence provider Terbium Labs has conducted the industry’s first data-driven, fact-based research report that looked to identify what’s really taking place on the far corners of the Internet. For most, the term dark web immediately conjures thoughts of illegal drug sales, pornography, weapons of mass destruction, fraud and other criminal acts. The reality however is that the bulk of activity appearing on the dark web is much like the content and commerce found on the clear web. In fact, research found that nearly 55% of dark web content is legal.
“What we’ve found is that the dark web isn’t quite as dark as you may have thought,” said Emily Wilson, Director of Analysis at Terbium Labs. “The vast majority of dark web research to date has focused on illegal activity while overlooking the existence of legal content. We wanted to take a complete view of the dark web to determine its true nature and to offer readers of this report a holistic view of dark web activity — both good and bad.”
-
Social media feeds contain a wealth of personal information: daily gripes, tastes in music and movies, and plans for nights out. It’s no wonder that police are interested in mining that data for insights into where crime might spring up.
But can these digital artifacts, taken together, say anything deeper about who you really are? A number of experts believe so: In the near future, algorithms trained on this sort of information may make important decisions about individuals.
Here’s a recent example. Researchers from the Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis) at Wright State University, in a paper posted to the arXiv preprint server, say they’ve devised a deep learning AI algorithm that can identify street gang members based solely on their Twitter posts, and with 77 percent accuracy.
-
Patrick Lagacé, a columnist for Montreal’s La Presse newspaper, says that police told him he was a “tool” in an internal investigation when they tapped his iPhone’s GPS to track his whereabouts and obtained the identities of everyone who communicated with him on that phone.
Lagacé alleges that this surveillance was designed to intimidate and discourage potential sources within the Montreal police department from approaching him with information for his story.
Police obtained a warrant for this under the hugely controversial Bill C-13, which gave investigators new powers, privacy lawyer David Fraser noted in an interview. The bill was initially sold as combatting cyberbullying and the unwanted publication of intimate images online, also known as “revenge porn.”
“These laws are presented with certain scenarios in mind, but these are laws of general application that can be used for any offence,” Fraser said. “We need to be very careful in parsing, and frankly, not believing, the objectives that politicians use [when selling the public on the need for these laws]. We need to cut through that and look at the substance of the law to see how they can be used, and more importantly, abused.”
-
Civil Rights/Policing
-
After a day of clashes between police and demonstrators, at least 140 protesters were arrested near the Dakota Access Pipeline route last Thursday. Now some of the Native American activists arrested say they were kept in dog kennel-like enclosures and that police wrote identification numbers written on their arms.
One protest coordinator who was arrested, Mekasi Camp-Horinek, told the Los Angeles Times police wrote a number on his arm and kept him and his mother in a mesh enclosure that appeared to be a dog kennel, which did not have any bedding or furniture.
-
The Ethiopian vicar was visiting the town of Raunheim on the outskirts of Frankfurt when the pre-teens started throwing stones at him.
Dressed in traditional priest’s gear and wearing a cross around his neck, the 47-year-old was walking to the Russian Orthodox chapel in Frankfurter Straße with a local priest, who wished to remain anonymous, when he was attacked.
The three children, aged between 10 and 12-years-old, shouted “Allahu Akhbar” as they threw the stones, the other priest who was visiting from a nearby church said.
-
Tens of thousands of people have checked in on Facebook at the Standing Rock Indian Reservation over the past few days. They are expressing solidarity with the protests against the Dakota Access pipeline in North Dakota, which have faced an increasingly brutal backlash from police.
Native American activists on the ground recently told reporters they had been detained in dog kennels after being arrested at protests against the proposed pipeline. Other protesters have been pepper-sprayed by police and targeted with beanbag bullets as the militarized police crackdown has escalated.
For months, indigenous groups at Standing Rock have led protests against the $3.8 billion pipeline, which will transfer oil nearly 1,200 miles, from North Dakota south to Illinois.
Native Americans, who call themselves water protectors rather than protesters, warn that the pipeline will contaminate their lone source of drinking water and pollute their land. Thousands of environmental and social justice activists from around the country have joined their demonstrations in solidarity.
-
A MIGRANT turf war erupted into violence on the streets of one of Paris’ trendiest neighbourhoods early this morning as asylum seekers beat each other to a pulp with wooden clubs.
-
The police are utilizing “dumps” from cell towers in the area to obtain these phone numbers. And that’s all they’ve obtained, apparently. Using the list of connected phones in the area at the time of the murder, the police are sending text messages asking recipients to fill out a website questionnaire to help police find the killer.
As much as this might seem like an intrusion, it’s probably preferable to the alternative: sending out dozens of officers to question potentially thousands of witnesses. Obviously, it works out well for the police. But it also works out for citizens. Nothing obliges anyone to respond to the unsolicited texts and answering a few questions on a website is far less annoying than being questioned at home by officers peeking through open doors to see if they can spot anything resembling indicia of criminal activity. Why make the entire day a waste? Why not make a few ancillary arrests while investigating an unrelated crime?
Unfortunately, it appears ignoring the message (or sending back “UNSUBSCRIBE”) isn’t going to keep the cops from using your phone for their communications.
-
I’d imagine the DOJ is more concerned about crafty cybercriminals beating them in the tech arms race than it is about legislators’ inability to reform the CFAA (something the DOJ routinely opposes). The “Intake and Charging Policy” memo [PDF] for the DOJ’s prosecution of cybercrimes lists a number of factors to be considered before pursuing federal charges.
The first key is the sensitivity of the information or system accessed “without authorization,” followed by national security considerations and economic impact. Public safety is also a factor. The document points out that information obtained without authorization can be deployed to stalk and harass officials and lower level members of the general public.
But the definition of “unauthorized access” isn’t explored adequately in the legal memo, leaving this to be answered on a case-by-bad case basis. The prosecutions of Aaron Swartz and Andrew “Weev” Auernheimer suggest the DOJ allows this definition to be set by the complainant rather than by policy. When MIT or AT&T complain, the government listens.
-
Nothing sells like fear. And the Department of Public Safety is in need of some sales. There’s $800 million in border security dollars at stake. At least. The DPS would like $300 million more this year because it’s just damn unsafe to share a border with a foreign country.
-
Internet Policy/Net Neutrality
-
Back in August, we noted how the FCC lost an incredibly important case regarding municipal broadband. In short, the FCC tried to dismantle state-level protectionist laws, written by incumbent ISPs, that hamstring towns and cities from building their own broadband networks or striking public/private partnerships for broadband — even in areas those same incumbent ISPs refused to upgrade. The FCC had tried to claim that its congressional mandate to ensure “even and timely” broadband deployment allowed it to strip away any part of these laws that hindered broadband expansion.
But the courts argued that the FCC lacks this authority, forcing the agency to acknowledge it was giving up on this fight. But there are still countless municipal broadband providers in the 19 states that have passed these laws that can’t launch or expand existing service lest they run face-first into a law written by Comcast, AT&T, Verizon, or CenturyLink lawyers. And there are millions of customers that are incredibly frustrated by the lack of broadband market competition, resulting in the expensive, inconsistent broadband connections most of us “enjoy” today.
-
While the United States finally passed net neutrality rules this year, the FCC’s decision to not ban zero rating (exempting some content from usage caps) has proven to be highly problematic. ISPs like Comcast, AT&T and Verizon have all begun exempting their own content from usage caps, putting competing services like Netflix, Amazon and Hulu (or smaller startups) at a disadvantage. The loophole has also spawned new confusing options from Sprint that throttle games, music and video by default, unless a consumer is willing to pony up $20 or more extra to have those services actually work as intended.
So yes, the United States passed net neutrality rules, but its unwillingness to tackle zero rating means that net neutrality is now being hamstrung anyway — now just with regulatory approval.
-
Intellectual Monopolies
-
A number of prospective Chinese takeovers of German high-tech businesses have been suspended by Berlin pending further investigation of their potential economic impact and national security implications. The German government’s intervention does not bode well for Chinese buyers, which have been pinning their hopes of procuring strategically valuable IP on Europe after missing out on US acquisitions due to similar concerns.
Writing in Die Welt at the weekend prior to departing for Beijing to meet with counterparts, German vice chancellor and economy minister Sigmar Gabriel was markedly critical of China’s approach to acquiring foreign technology. While claiming that China protects its own businesses from foreign buyouts through the imposition of “discriminatory requirements”, Gabriel accused the country’s high-tech industries of “going on a shopping tour here with a long list of interesting companies” with the clear intention of gaining control of strategically important technologies. “Nobody can expect Europe to accept such foul play of trade partners,” he added.
-
Ottiglio Leaves IFPMA For Consultancy In Geneva [Ed: Mario Ottiglio to use connections acquired in public corridors in Europe to push private US Big Pharma interests]
-
The World Intellectual Property Organization Committee on Development and Intellectual Property (CDIP) is meeting this week with an agenda including the presentation of a first review on how well WIPO implemented its Development Agenda Recommendations from 2008 to 2015. Also on the agenda is a discussion on what United Nations Sustainable Development Goals can be applied to WIPO’s work, and what the role of WIPO is in technology transfer.
-
As the head of the World Health Organization warned of funding shortfalls at this week’s financing dialogue, she also proposed to raise assessed country contributions by 10 percent to help mitigate the situation. However, countries had a different take on the suggestion, which is expected to be further considered in the discussions on the budget for 2018/2019, at the Executive Board meeting in January, and at the annual World Health Assembly next May.
-
Sitting in the background is the Supreme Court’s parallel copyright decision in Petrella v. MGM (2014) holding that the doctrine of laches cannot bar a claim for legal damages brought within the three-year statutory limitations of copyright law. In its opinion, the Federal Circuit distinguished Petrella – finding that in this situation patents should be treated differently than copyrights.
Martin Black (Dechert) argued for petitioner-patentee SCA Hygiene and suggested that Petrella paves the way: “There is nothing in the Patent Act which compels the creation of a unique patent law rule, and if the Court were to create an exception here, that would invite litigation in the lower courts over a wide range of Federal statutes.”
-
Trademarks
-
Does the word “so” have a laudatory function when used on its own? The CJEU has struggled to resolve that question in its latest EU trade mark ruling
-
For those who don’t follow the video game industry closely, you may not be aware that there is currently a worker’s strike by voiceover actors belonging to SAG-AFTRA against some of the larger game publishers out there. The union and ten or so publishers have been attempting to negotiate a new labor agreement for something like two years, with the sticking point being additional compensation based on game sales. While this concept may sound foreign to those of us that grew up with the gaming industry in its infancy, the explosion in the market and its evolution as an artform certainly warrants the same consideration talents get from other entertainment industries, such as television and film. After all, why shouldn’t game voiceover actors be just as frustrated with Hollywood-style accounting as their on-screen counterparts?
And, yet, because this is a labor dispute, of course there had to be a petty wrong-turn along the way, which brings us to how SAG-AFTRA is now firing off demands that a PR firm hired by the game studios stop trying to influence the public because of a lame trademark claim. The key issue appears to be that this PR firm is using domain names and social media handles that include the SAG-AFTRA union name.
-
Copyrights
-
If you run any kind of website it’s super important that you file with the Copyright Office to officially register a DMCA agent. This is a key part of the DMCA. If you want to make use of the DMCA’s safe harbors — which create a clear safe harbor for websites to avoid liability of infringing material posted by users — then you have to first register with the Copyright Office. Larger corporate sites already know this, but many, many smaller sites do not. This is why for years we’ve posted messages reminding anyone who has a blog to just go and register with the Copyright Office to get basic DMCA protections (especially after a copyright troll went after some smaller blogs who had not done so).
A few months back, we noted, with alarm, that the Copyright Office was considering a plan to revamp how it handled DMCA registrations, which had some good — mainly making the registration process cheaper — but a really horrific idea of requiring sites to re-register every three years or lose their safe harbor protections.
-
Supreme Court oral arguments in Star Athletica v Varsity Brands touched on copyright, cheerleader uniforms and camouflage, with observers uncertain the court will come up with an appropriate test for useful articles
The Supreme Court heard arguments in Star Athletica v Varsity Brands on Monday in a copyright dispute over designs for cheerleading uniforms. The question presented was: “What is the appropriate test to determine when a feature of a useful article is protectable under section 101 of the Copyright Act?”
-
The Icelandic Pirate Party has made a record election. Early vote counts place Pirates at 14 percent, for nine ten seats of the 63-seat world’s oldest Parliament. As the victory party draws to a close and the results slowly finalize, it’s worth looking a little at what comes next.
Pirate Parties keep succeeding, although on a political timescale. It started out a little carefully with getting elected to the European Parliament from Sweden, then to multiple state parliaments in Germany, city councils all over Europe, the Czech Senate, and the Icelandic Parliament, all in a decade’s insanely hard volunteer work.
Permalink
Send this to a friend
11.01.16
Posted in News Roundup at 11:51 am by Dr. Roy Schestowitz

Contents
-
What would the world look like right now—all these years later—if Linux were never created? What would our daily lives look like? What actual, real-world impact would the simple act of a penguin not biting a Finnish man have on the lives of people on the other side of the world?
Well, as luck would have it [ahem], we happened to gain access to a (totally real) set of posts from the FriendFace account of a man living in an alternate universe that bears a striking resemblance to the one we just described. I present those to you now—unedited. You’re welcome.
-
VMware takes advantage of Sun Microsystems’ loss by bringing the once-niche Linux VDI out of the shadows and into the sun with Horizon 7 for Linux.
-
As the wall between worlds comes twain, and the spooks and spectres seep on in, our thoughts turn to the graveyard of Linux distributions.
For every spirited Ubuntu there’s a spiriting celebrity-based spin; for every Gentoo based success is a gOS shaped abscess, decaying in the mausoleum of popularity.
In this fiendishly frightful blog post we’re going to look at three of the most diabolical Linux distributions ever summoned.
-
How can a Linux geek have a fun Halloween? It’s not as hard as you might imagine. Before you put away your costume and all those decorations that you put up to scare your neighbors’ kids, make a stab at turning your office into a scary place for a day. Here are some tips that might help you enjoy your spooky day and bring a little cheer into your office.
Carve a pumpkin using a template. You can make a pretty good looking pumpkin for the office if you download a template and use it to carve a special Linux pumpkin. You’ll find a free template for Tux the Linux Pumpkin by pumpkinlady and a pile of other Halloween templates at this URL. Or check out the collection on Pinterest.
-
Desktop
-
If you’re not interested in Windows 10, System76 has a new Ubuntu laptop with Intel’s Kaby Lake chip that won’t burn your wallet.
The 14-in. Lemur laptop starts at $699, a more affordable price for cost-sensitive users than Dell’s Ubuntu-based XPS 13 Developer Edition, which starts at $949.
“We don’t have any Mac tax or Windows tax that goes into [Lemur],” said Ryan Sipes, community manager at System76.
Despite having a free OS, Dell’s XPS 13 laptop has been criticized for being more expensive than the XPS 13 with Windows 10, which starts at $799.99. The Lemur has many features in common with the XPS 13 DE, though it isn’t as slick-looking.
-
Lenovo recently caved in to criticism over many of its Yoga 900 laptops that incorporated Windows 10 Signature Edition by releasing a BIOS update that allows owners to install Linux-based operating systems. The company was the target of scrutiny last month when customers accused it of conspiring with Microsoft by blocking the installation of non-Windows platforms at the firmware level.
The accusations started on a Reddit thread, with customers claiming that Lenovo teamed up with Microsoft to lock down Yoga 900 laptops by keeping the installed solid state drives in RAID mode via the BIOS. The problem is that the RAID mode relies on a proprietary SSD driver from Intel, which is compatible with Windows 10. That means if Linux is somehow installed on the device, the operating system can’t see the SSD because there is no available driver. AHCI, which is supported by Linux, is disabled in the firmware and can’t be changed.
-
As we discovered back in September, the new Lenovo Yoga Signature Editions on the market would not allow you to boot your machine from a Linux installation. This was caused by the Intel software RAID used in these machines which has had a long history of trouble with Linux. Today Lenovo made a BIOS update available which will allow your Yoga to see a disk with Linux installed and to boot from it, likely by allowing you to switch your SATA drive from RAID to AHCI mode. Lenovo has made it clear that any support for RAID mode will have to come from Linux developers which makes perfect sense as they are the driving force behind such support. What confuses many, including The Register, is why Lenovo removed the ability to switch SATA modes in the BIOS in the first place.
-
Server
-
As Gregg explains on his blog, Linux has had plenty of tracing tools for a long time, but they were enhancements to BPF rather than dedicated tools and didn’t match DTrace’s full list of functions. But over time developers have worked on further tracing tools and Facebook developer Alexei Starovoitov recently offered up some enhancements to the Linux kernel that Gregg feels mean it now matches DTrace.
Gregg reckons Starovoitov’s contribution, plus efforts like the bcc project he’s worked on will offer Linux users their best ever chance to conduct really detailed tracing of Linux.
-
-
As coordinator for the Minnesota State Digital Curricula Initiative, Charles Bentz faces a unique challenge: How to teach DevOps (agile, relentless, fast) in an academic context (inflexible, deliberate, slow)?
-
-
Imagine smart cars talking directly to each other so they don’t crash. Imagine hooking your smart phone into a giant mesh of phone video streams at a stadium event, so you can watch your event from multiple perspectives. Imagine smart factory devices that manage themselves for better safety and efficiency. Imagine intelligent phones, and other intelligent devices, communicating directly at close range so they don’t bog down the Internet or cell phone networks. It doesn’t take much imagination to see how this benefits disaster management, to give one example, which traditionally is hampered by overloaded phone networks.
-
-
-
In 451 Research’s recent report on OpenStack adoption among enterprise private cloud users, they found that 72 percent of OpenStack-based clouds are between 1,000 and 10,000 cores and three-fourths choose OpenStack to increase operational efficiency and app deployment speed.
-
Kernel Space
-
The nascent business-to-business permissioned ledger industry is moving rapidly from pilots to real product development and deployment.
But as this novel application space opens up, it is important for technologists to start answering hard questions about what software development processes will provide the blockchain layer of these applications stacks.
The permissioned ledger industry proposes to build a trustworthy and scalable infrastructure for the finance industry and general purpose Internet security. However, the dominant development model in our industry thus far (capital-strapped startups leveraging public ledger technology for permissioned ledger applications) is insufficient for the task.
-
-
-
-
-
-
-
The OpenSwitch project today announced that SnapRoute, Inc. and Dell EMC will deepen their contributions to the project to advance OpenSwitch as it continues to evolve and meet market requests for a complete open source network operating system (NOS).
-
This article is intended to be a very high-level discussion of Linux filesystem concepts. It is not intended to be a low-level description of how a particular filesystem type, such as EXT4, works, nor is it intended to be a tutorial of filesystem commands.
-
So Linux is 25 years old now. The Linux kernel was created by a Finnish student named Linus Torvalds in 1991 who at the time was a 21-year-old computer science student at the University of Helsinki, Finland . On 25 August 1991, Torvalds posted the following to comp.os.minix, a newsgroup on Usenet…
-
I’m announcing the release of the 4.8.6 kernel.
All users of the 4.8 kernel series must upgrade.
The updated 4.8.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.8.y
and can be browsed at the normal kernel.org git web browser:
http://git.kernel.org/?p=linux/kernel/git/stable/linux-st…
-
-
On October 31, 2016, Linux kernel maintainer Greg Kroah-Hartman was proud to announce the release and general availability of the sixth maintenance update to the Linux 4.8 kernel series.
That’s right, Linux kernel 4.8.6 is here, only three days after the quite big release of Linux kernel 4.8.5, but don’t be fooled into thinking it’s a small update because that’s not the case. According to the appended shortlog and the diff from last week’s Linux 4.8.5 build, it appears that today’s Linux 4.8.6 kernel changes a total of 136 files, with 1387 insertions and 854 deletions.
-
The online course focused on devops follows the Linux Foundation’s work earlier this year on online classes targeting OpenStack
The development and operations model is quickly becoming a central focus for companies looking to take advantage of software and information technology in order to increase agility and streamline operations using devops. However, there appears to be a shortfall in terms of qualified employees.
-
Graphics Stack
-
Expert Mesa developer Marek Olšák at AMD is spending this weekend hacking on some new OpenGL threading code to benefit the open-source Radeon Linux driver stack.
-
Marek, the well known contributor to Mesa has been working on some form of Mesa OpenGL threading, and his test showed a 70% improvement for Borderlands 2. See the commit here.
It’s worth noting that Marek didn’t start this work. It was originally by Paul Berry and Eric Anholt, but Marek has picked it up to flip the switch.
-
-
Collabora employee and Mesa release manager Emil Velikov has announced the availability of Mesa 13.0-RC3 and he expects to do the final Mesa 13 release in a matter of hours.
-
Benchmarks
-
If you’ve been wondering how the AMDGPU+RadeonSI open-source driver stack has evolved since the hardware publicly launched, I ran some fresh benchmarks this weekend comparing my current driver numbers to that of my original Radeon RX 470 Linux review.
What we have to look at this Sunday is the open-source driver stack from early August on the Sapphire Nitro+ RX 470 OC with Linux 4.8 and Mesa 12.1-dev compared to the state today with Mesa 13.1-dev + LLVM 4.0 SVN Git and Linux 4.8.4 stable (since only recently the Linux 4.9 AMDGPU fallout has been getting cleaned up).
Various OpenGL benchmarks were compared to the original numbers on the same Xeon E3-1280 v5 Skylake system with MSI C236A WORKSTATION motherboard, and 16GB of RAM. Besides the performance, back in August this open-source driver stack only supported OpenGL 4.3 while now it has all GL 4.4/4.5 extensions although it doesn’t formally advertise the new versions yet pending conformance. There’s also been the mainlining of the RADV Radeon Vulkan driver too that works on the RX 470.
-
Now having had the NVIDIA GeForce GTX 1050 and GTX 1050 Ti graphics cards in my possession for a few days I have some more interesting data to share today compared to just last week’s raw OpenGL/OpenCL/Vulkan raw Linux performance data. In this article is a look at the power use and performance-per-Watt of the GeForce GTX 650, GTX 750, GTX 750 Ti, GTX 950, GTX 1050, and GTX 1050 Ti compared to the AMD Radeon RX 460 and RX 470. Additionally, for the newer cards still relevant, there is also performance-per-dollar metrics too.
-
Applications
-
This past weekend, the Kodi development was quite busy, and it looks like they’ve pushed yet another Beta towards the upcoming and highly anticipated Kodi 17 “Krypton” open source and cross-platform media center.
-
The developers behind the Calamares universal installer framework designed for GNU/Linux distributions have updated the open source software, recently, to version 2.4.3.
-
On October 31, 2016, people celebrated Halloween all over the world, and it looks like fans of the popular, open-source, free, and cross-platform Calibre ebook management software had a reason to party all night long as well.
Ten years ago, on October 31, 2006, the first ever version of Calibre was announced by developer Kovid Goyal, but under the name of libprs500, which was inspired by Sony’s first e-ink device, the PRS-500 Portable Reader System. Two years later, around 2008, it was time for a change, and libprs500 becomes Calibre.
-
Proprietary
-
Last month Adobe returned to updating their NPAPI Linux Flash plug-in after they went four years without updating it. In September was Flash Player 23 for Linux while available now is the Flash Player 24 beta.
-
Instructionals/Technical
-
Wine or Emulation
-
Games
-
Our user statistics page has been updated again, and it should now happen at the end of every month automatically.
Here we can see that Ubuntu, is clearly the most popular Linux distribution amongst our Linux gaming visitors, with Arch coming in second place again (out of 1645 users)…
-
It’s really nice to see such appreciation from Linux gamers, hopefully it won’t be for nothing.
Will let you know as soon as we have any news to share on Civilization VI for Linux.
-
Valve released a Steam client beta for Halloween 2016, but without any apparent spooks.
The announcement details appear to be revised from when I first looked at the 31 October update for Linux users as originally mentioned some other changes while now for Linux users does note just a fix for ZFS users.
-
Prison Run and Gun was a game I discovered because of an IndieDB giveaway, and I kept an eye on it since then, waiting for the right moment to play it. Considering it currently is on sale (60% off), I decided to finally try it.
-
-
-
The MMO genre is something Linux doesn’t really have a lot of games in, so I am pleased every time I hear about one coming. Space Wars: Interstellar Empires [Official Site] is a turn-based tactical strategy MMO that will launch in January 2017 with Linux support.
-
‘The Last Leviathan’ [Steam, Official Site], a physics-based, ship building and destruction adventure game recently released for Linux. It looked seriously fun, so I gave it a go and here are some thoughts.
-
Desktop Environments/WMs
-
The Enlightenment project has introduced a new launcher/taskbar/iconify manager called Luncher.
The 2K lines of new code introduced to Enlightenment on Friday debut the Luncher launcher.
-
GNOME Desktop/GTK
-
Trailing this weekend’s release of GNOME 3.23.1 is the first development update for the GNOME Shell in the road to GNOME 3.24.
GNOME Shell 3.23.1 introduces the new discrete GPU launch option for dual GPU / Optimus systems, assuming you are launching your games / OpenGL workloads through GNOME rather than say Steam.
-
With GTK Scene Kit landing and various OpenGL improvements coming to the GTK+ tool-kit, GNOME developers have found the need to improve the OpenGL Windows support.
On Friday some OpenGL improvements for Windows landed in the GTK+ Git code-base. This work affected the GDKGL implementation and now supports creating legacy contexts as well as finer-grainted attributes and as part of that support for anti-aliasing. These changes are needed for GTK4′s GTKGL to work on Windows.
-
There’s talk of potentially using more Rust code within the GNOME desktop environment as opposed to C/Vala code.
-
A few months ago I spent some time to learn some basic Rust, I was interested in getting an informed view of the language, specifically about the safety and concurrency idioms as well as its compatibility with the C ABI and automatic memory management while being non GCed. I must say I was pleasantly surprised with the tooling, cargo is a breeze and crates.io is a wonderful resource. More recently though I’ve been investing time to actually understand the memory ownership model and how it plays with channels/concurrency. I must say that what these guys have achieved is really clever with a language that once you get the grasp of things feels actually really nice to use.
-
In this last week, the master branch of GTK+ has seen 132 commits, with 10020 lines added and 16435 lines removed.
-
-
SystemRescueCd, a popular Gentoo-based Live GNU/Linux distribution designed for system rescue and recovery operations, was updated the other day to version 4.9.0, a maintenance release adding new technologies and components.
-
Ubuntu-based CAINE (Computer Aided INvestigative Environment) GNU/Linux distribution is designed by Italian developer Nanni Bassetti to be a complete digital forensic environment, and it’s been updated on October 31, 2016, to version 8.0.
-
Reviews
-
Right now my overall opinion of elementary OS 0.4 is that there are some great design ideas at work, but a lot of rough edges in the implementation. Looking at the desktop, its layout and especially when looking at the well organized (and mute-able) notification area, it’s clear a lot of thought has gone into the design. However, I ran into several lock-ups or glitches which would probably turn away the newcomers this efficient design is going to attract. Hopefully the problems I ran into will be worked out in time for the next release, because I like the style and approach elementary OS is taking.
-
New Releases
-
Version v0.7.0 of RancherOS, which mainly contains bug fixes and enhancements, was recently released and is now available on our releases page. Since there hasn’t been a blog post since the v0.5.0 release, this post also includes some of the key features implemented as part of v0.6.0 and v0.6.1. In addition to switching the default Docker version to 1.12.1 and kernel version to 4.4.21, the following features have been implemented.
-
Salix OS developer Dimitris Tzemos announced this past weekend the availability for download and public testing of the first Release Candidate (RC) development version of the upcoming Salix Xfce 14.2 Live Edition.
-
Linux Lite 3.2 Final is now available for download. The overall theme of this release is a focus on Security. Linux Lite will now download and install the latest Linux kernel security updates when they become available via Install Updates. In this release we introduce for the first time the Lite Desktop Widget. This features basic system information as well as Updates status to emphasize the importance of keeping your computer up to date. Also in this release we’ve included several theme enhancements, lots of updates to our Lite packages, as well as the usual fixes from the 3.2 Beta.
-
A day early than expected, the final release of the Linux Lite 3.2 Ubuntu-based GNU/Linux distribution has been officially announced today, October 31, 2016, by developer Jerry Bezencon.
Based on Ubuntu 16.04.1 LTS (Xenial Xerus) operating system and shipping with the long-term supported Linux 4.4 kernel, Linux Lite 3.2 arrives today with a focus on security, as the developer implemented support for fetching the latest Linux kernel security updated as soon as they become available in the repositories. These will be distributed to users via the Install Updates tool.
-
Arch Family
-
The Xfce edition remains our flagship offering and has received the attention it deserves. Few can claim to offer such a polished, integrated and leading-edge Xfce experience. We ship Xfce 4.12 with this release of Manjaro. We mainly focused on polishing the user experience on the desktop and window manager, and on updating some components to take advantage of newly available technologies such as switching to a new Vertex-Maia theme, we already using known as Maia for our KDE edition.
Our KDE edition continues to deliver this powerful, mature and feature-rich desktop environment with a unique look-and-feel, and with the perks of Manjaro’s latest tools. We ship now Plasma 5.8 desktop in combination with the latest KDE-Apps 16.08. It was a huge step to get it all playing together smoothly and to give the user experience the same feeling as our KDE4 editions of the past.
-
Red Hat Family
-
Red Hat, Inc. a provider of open source solutions, reports that communications leaders from around the world, including FreeBit, KazTransCom and Turkcell have deployed Red Hat OpenStack Platform, a highly scalable Infrastructure-as-a-Service (IaaS) solution, as the foundation for their modern cloud initiatives.
In a world driven by the growth of digital services, new devices, and massive user numbers, communications leaders around the world are modernising their infrastructures to support advanced cloud services and improve the speed at which new services can be created.
-
Swisscom selected Red Hat as its technology partner to help the company deliver a cloud platform. Swisscom said it was able to develop and deliver new digital products by deploying Red Hat OpenStack Platform and Red Hat Virtualization as the basis of its new cloud infrastructure.
-
“They recognize the company that builds the community around that piece of technology, that technology is going to win,” he said, according to the report. “I think it shows that there’s a growing recognition that the best way to innovate in these very fundamental areas is to do it in the open.”
[...]
Enterprises are frequently turning to open source and third party software components to decrease the amount of code they have to write, which helps accelerate deployment cycles, according to Sonatype’s 2016 State of the Software Supply Chain.
-
Finance
-
Fedora
-
We recently interviewed Kanika Murarka on how she uses Fedora. This is part of a series on the Fedora Magazine. The series profiles Fedora users and how they use Fedora to get things done. Contact us on the feedback form to express your interest in becoming a interviewee.
[...]
Murarka first got involved with Fedora after meeting Sumantro Mukherjee. Sumantro, who was a Red Hat intern, told her about the pathway to to contribute to Fedora. She then started to contribute to Fedora Quality Assurance (QA). Kanika would like to see the participation of women in Fedora grow. She would like to help bring SIGs to universities that help women become contributors to Fedora. Kanika was impressed with how easy it was for “new contributor to get involved in the Fedora Project.” Murarka describes the Fedora community as “one of the most diverse community projects”.
-
Yep, it’s Test Day time again – most likely the final Test Day of the Fedora 25 cycle. This Thursday, 2016-11-03, will be switchable graphics Test Day!
‘Switchable graphics’ refers to the fairly common current practice of laptops having two graphics adapters, one low-power one for general purpose use, one more powerful one for use with applications that require more oomph (e.g. games or 3D rendering applications). NVIDIA brands this as ‘Optimus’, and AMD just as ‘Switchable Graphics’ or ‘Dynamic Switchable Graphics’.
There are some enhancements to Fedora’s support for such systems in Fedora 25, and part of the Test Day’s purpose is to test those enhancements. The other part of the Test Day’s purpose is to ensure that support for switchable graphics on Fedora 25 Workstation with Wayland by default is as good as it can be, and that in some cases where we know Wayland support is not sufficient, fallback to X.org works as expected.
-
The reason is that my time is always strict; in the previous months, I’ve been busy testing the pre-releases of Fedora and helping out Italian users on FedoraOnline.it.
Overall, volunteering for the Fedora Project is exciting, entertaining and always useful. Not only I’ve got the chance to contribute to the overall stability of the OS, but I also keep on improving my individual skills. That’s really important, since my daily job is really far from IT, which is the kind of “science” (subject) I love the most. Yes… Being a part of the modern processes around Fedora, is always interesting.
-
-
-
-
Debian Family
-
The release of the Debian GNU/Linux 9 “Stretch” operating system is upon us, and Debian developer Jonathan Wiltshire informs us today, October 31, 2016, about the supported hardware architectures for the upcoming release.
-
The Debian Release Team has decided upon the official release architectures for next year’s Debian 9.0 “Stretch” release.
The release architectures for Debian 9 include amd64, arm64, armel, armhf, i386, mips, mips64el, mipsel, ppc64el, and s390x. What’s different from Debian 8 is that PowerPC is no longer considered a release architecture but is being discontinued.
-
Release architectures for Stretch will be as follows:
* amd64
* arm64
* armel
* armhf
* i386
* mips
* mips64el
* mipsel
* ppc64el
* s390x
-
This month I have been paid to work 13 hours on Debian Long Term Support (LTS).
-
My work has given me a days’ worth of leave under the Corporate Social Responsibility program, and I’m taking three days’ annual leave, to do this. 27 hours each way in transit, for 3 days on the ground.
-
-
So, it’s now been twenty years since I became a Debian Developer. I couldn’t remember the exact date I signed up, but I decided to do some forensics to find out. First, I can check on the dates on my first Debian system, as I’ve kept it running as a Debian system ever since!
-
Derivatives
-
Canonical/Ubuntu
-
The new Apple MacBook Pro looks to be a wonderful laptop, but understandably, not everyone is impressed. The “Pro” moniker literally means “professional”, and there are some concerns from that segment. Some photographers, for instance, will be very hurt and disgusted by the lack of an SD card slot. More importantly, the computer maxes out at 16GB of RAM — many pro users want 32GB or more, which is not possible on the new machine, sadly.
While you might expect some of these disappointed Apple loyalists to turn to a Windows machine — and I’m sure some will — some are turning to an unexpected alternative — Linux. You see, immediately after the Apple Keynote, famed Ubuntu laptop and desktop seller, System76, saw a huge jump in traffic from people looking to buy its machines. The traffic was so intense, that it needed to upgrade servers to keep up!
-
If you own an Ubuntu Phone or Tablet and miss having access to a basic offline word processor, you’ll want to check out uWriter.
-
In recent months, I’ve had the opportunity to dive into work flows between your typical Chromebook and an Ubuntu-based PC. This article will offer a comparison of the different work flows between the two Ubuntu and ChromeOS. We’ll examine common work flows like printing, scanning, word processing, email, among other tasks.
-
In the early days of OpenStack back in 2010 when the project was first getting started, Ubuntu Linux was typically the default reference implementation for all deployments. Canonical and Ubuntu Linux founder Mark Shuttleworth has been a vocal advocate for OpenStack throughout the project’s history, though he still has his fair share of criticism as well.
At the OpenStack Summit in Barcelona, Spain, last week, a key highlight of the event was a 16-vendor interoperability challenge in which Ubuntu was a participant. For Shuttleworth, interoperability is an admirable and needed attribute in OpenStack.
-
Flavours and Variants
-
Bodhi Linux 4.0 is here. It was released Saturday with Moksha 0.2.1, Linux 4.4, and LibreOffice 5.1.4. In other news, Dedoimedo’s latest foray into SolusOS proved fruitless and Jim Hall is looking for testers for FreeDOS 1.2 RC1. Bryan Lunduke explored an alternative universe where “Linux simply…never was” and most Linux gamers use Ubuntu.
-
-
-
-
Ubuntu and Linux Mint are two of the best known desktop distributions around. Both are extremely popular with Linux users, but which one is better? Since each of these distributions has much to offer it can be difficult to choose between them. Fortunately, a writer at Linux and Ubuntu has a helpful comparison between Linux Mint and Ubuntu.
-
-
Aaeon’s “Up Squared” hacker SBC offers dual- or quad-core Intel Apollo Lake SoCs, plus up to 8GB RAM, SATA, dual HDMI, 4K video, dual GbE, mini-PCIe, and more.
Aaeon Europe has launched a Kickstarter project for a follow-up to its x86-based “Up” hacker board. If it shipped today instead of its April 2017 due date, the “Up2” (or “Up Squared”) would be the most powerful hacker-friendly single board computer around. The SBC features the new 14nm-fabricated Intel Apollo Lake system-on-chips, and offers a feature set that is rare even on high end hacker boards.
-
Phones
-
Tizen
-
The Samsung Z1 was the first Tizen based smartphone to go on sale, anywhere in the world, at a press event held in New Delhi, India on January 2015. The device went on-sale shortly after exclusively on Samsung India’s official estore for Rs. 5,700.
-
-
-
Android
-
-
-
-
-
-
-
-
The update continues the company’s effort to make Android easier to manage in the workplace.
Google has introduced a couple of new features to help administrators better manage company-owned Android smartphones and tablets in the enterprise.
One of them is a bulk enrollment feature that lets organizations enroll Android devices en masse and deploy them to remote offices and other locations with all required settings enforced.
Administrators can assign a new asset tag attribute when using bulk enrollment. The goal is to make it easier to integrate company-owned Android devices with internal billing and tracking tools, Google announced in its G-Suite Update blog this week.
-
Brave, the new web browser company co-founded by former Mozilla CEO Brendan Eich, has launched a do-over on Android. The earlier version of the ad-blocking browser utilized an odd user interface involving floating link bubbles, which didn’t sit well with all users. The design made the experience more cumbersome and confusing, when what people really wanted was an alternative browser with built-in ad-blocking along with privacy and security protections.
Now Brave is out with a different version of its Android browser that offers a more traditional, tabbed browser experience.
-
OnePlus One and OnePlus 2 have recently been spotted on benchmarking websites running Google’s newest Android Nougat OS
-
-
-
-
-
-
-
-
-
-
-
-
-
The Fall is often an interesting time for smartphone releases, as some of the biggest names in the industry out their latest and greatest to end the year on a high, but this hasn’t gone to plan for a lot of names out there, particularly Samsung. Over the past few editions of this list, the Galaxy Note 7 has popped in and popped out, but now has been well and truly discontinued. For those that are still hanging on to one, return it. As for the rest of the Android world, the LG V20 and Pixel have hit shelves, and they’re proving to be quite popular with customers the world over.
-
Android has been with us in one form or another for more than eight years. During that time, we’ve seen an absolutely breathtaking rate of change unlike any other development cycle that has ever existed. When it came time for Google to dive in to the smartphone wars, the company took its rapid-iteration, Web-style update cycle and applied it to an operating system, and the result has been an onslaught of continual improvement. Lately, Android has even been running on a previously unheard of six-month development cycle, and that’s slower than it used to be. For the first year of Android’s commercial existence, Google was putting out a new version every two-and-a-half months.
-
India is a large and a populated country that makes up a large base of Google consumers. So in recent years, Google’s widened support of world languages for its various products has been a blessing. It has specifically helped Indian people grow their use of and participation on the Internet.
For one, Google Summer of Code helps students experiment with and build prototypes that enhance language-based software. Another way is through Google Translate, a web and app-based platform that provides machine translation from one language to another. It is predominantly maintained and serviced by volunteer contributions. Yet, there are more ways Google can support great inclusivity through the support of world languages; particularly people speaking South Asian-languages.
-
-
You may know that I am involved in many open source software projects. Aside from my usability work with GNOME, I am probably best known as the founder and project coordinator of the FreeDOS Project.
-
Today we’re thrilled to announce that Minoca OS has gone open source. We are releasing the entirety of the Minoca OS source code under the GNU GPLv3. We’re excited to build a community of users and developers around this new operating system, and we need help. You can check out the source at https://github.com/minoca/os. You can also check out our repository of third party source packages here. If you’re just looking to download the latest stable binaries of Minoca OS, head to the download page.
-
-
That was it. Those were the (altered for the sake of this example) instructions. Three steps and one big shout that hey, don’t look now but you’re playing the game already, and you’re up and running.
To be fair, there were a lot of nuances that those three steps did not in any way cover. Luckily, there were three more paragraphs that the author snuck in after the “You’re playing!” pronouncement, providing more details on the types of cards, what they mean, and so on.
And there were lots of times during those first few games where we had to stop game play and scratch our heads, asking “Wait, we can’t play this card after that card can we? What happens now?” For an answer, we went back to the rules and looked in the little reference section on the back of the rule sheet, learning about the technicalities of the game as we went along.
But you see, it tricked us; we didn’t feel like we were reading the instructions because we were actively playing the game. We weren’t reading instructions, as such; we were using the rules as reference. It was practically part of the game.
-
As I mentioned when the Recompiler interviewed me, my inspirations and role models in technology are technologists who serve the public interest. The person who introduced me to free and open source software, Seth Schoen, is a kind teacher and a rigorous thinker who deploys his software engineering expertise at the intersection of technology and activism. I was lucky enough to meet the right people early in my career so I see public interest technology as a desirable and viable career path AND something you can integrate into a career that doesn’t focus on nonprofit/government work — but not enough people know about it, and not enough institutions encourage it.
How do we help encourage and employ more Seths, more Bruce Schneiers, more Eleanor Saittas, more Kelsey Gilmore-Innises? If you were to say “Sumana, that’s a pretty infosecurity-centric list there, what about people who are more about analytics to enable policy work, or the web developers at 18F, or –” then I would agree with you! This is a broad and deep field, and thus a broad and deep question.
-
What do you do when your e-commerce site adds at least a million new products every month, and sometimes more than a million in a single week? According to Jeremy King, who is senior vice president and CTO for Walmart Global eCommerce, one of the things you do is invest in open source, both as a user and as a developer. But how do you convince the suits in the front office to release code developed in house as open source?
“The good part about WalmartLabs is that we sort of didn’t ask for permission,” he admitted last week before a crowd of over 2,000 at the All Things Open conference in Raleigh, North Carolina. He was being interviewed on stage by ATO’s master of ceremonies, community manager Jono Bacon, in a “fireside chat” during the opening day keynote sessions. “We sort of started off with that approach. As we got bigger, obviously you don’t open source a product that you’ve spent resources on for a couple of years without really talking to the enterprise, so it really was a baby step as you go in.”
-
In the wake of recent company shakeups and growing pains in the marketplace lending industry, the need for better transparency and industry tools for all participants has become a critical concern. PUFIN, an online and open source project to create free and global loan identifiers using blockchain technology, aims to deliver order and uniformity in a secure environment to the marketplace.
Recent entrants into the market are proposing systems that reserve the right to charge fees at any time. The idea of a free enticement that allows for charging fees later may be the basis for a slow or incomplete industry adoption of online loans.
LendingCalc.com‘s Ben McMillan and Mike Mazier may have the open source answer: They have filed to patent a fee-free system to use blockchain technology to generate unique identifiers for loans in line with the US Treasury’s whitepaper “Opportunities and Challenges in Online Marketplace Lending.” The company is in the works to set up their system as an open source resource for the industry.
-
Web Browsers
-
Mozilla
-
Mozilla has shuttered more than 130 serious vulnerabilities reported by community hackers this year.
The browser-backing outfit announced the statistics in a post covering its bug bounty program and broader information security efforts.
More than 500 million users ran Firefox at the close of 2015. It’s since become the world’s second-most-used browser.
-
Oracle/Java/LibreOffice
-
With the availability of the LibreOffice 5.3 Alpha, we have entered the road to LibreOffice 5.3, the next significant major release of the best free office suite ever developed. The software is in the early stage of the final development cycle, and as such should be installed only by expert community members skilled in quality assurance tasks, or involved in launch activities. Although in Alpha stage, LibreOffice 5.3 has an outstanding Coverity Scan score, as confirmed on October 20, with 0.01 defects per 1,000 lines of code (the image on the left is a screenshot of the Coverity Scan dashboard). LibreOffice 5.3 will be officially announced at the end of January 2017.
-
CMS
-
Anyone who knows me knows that I like to try new things — phones, gadgets, apps. Last week I downloaded the new Wix (closed, proprietary, non-open-sourced, non-GPL) mobile app. I’m always interested to see how others tackle the challenge of building and editing websites from a mobile device.
I started playing around with the editor, and felt… déjà vu. It was familiar. Like I had used it before.
Turns out I had. Because it’s WordPress.
-
So WordPress and Wix are fighting one another – and I’m not talking about them competing for customers. Instead, the two website building heavyweights are having a brawl via the blogosphere.
-
-
Attackers are aggressively attacking Joomla-based websites by exploiting two critical vulnerabilities patched last week.
The flaws allow the creation of accounts with elevated privileges on websites built with the popular Joomla content management system, even if account registration is disabled. They were patched in Joomla 3.6.4, released Tuesday.
-
Georgia’s enterprise web platform runs on Drupal 7, which includes many accessibility features in its baseline code and structure. That makes it easier for any new site to build in accessibility from day one. This comes with the caveat that not all modules are accessible, and plenty can be coded and designed without accessibility in mind, meaning that just using Drupal does not make a site accessible to users with disabilities. That said, even in its original implementation with Drupal 7 in 2012, Georgia’s web publishing platform was built to meet federal accessibility standards (Section 508, for those of you interested in the details).
From there, when the product team wanted to improve the platform’s underlying code to meet the more modern WCAG 2.0 AA accessibility guidelines, they were working from a flexible and scalable base.
-
Healthcare
-
The significant advances being made in technology over the past decade have introduced world changing solutions that are revolutionising how businesses operate.
However, it is not only business which is reaping the benefits of technologies in the fields of cloud, big data, the IoT, artificial intelligence and others, areas such as
healthcare are also being boosted.
Numerous companies such as IBM, Google, Microsoft and more have all invested significantly in the area and have made great strides in placing their technologies in this field.
-
Pseudo-Open Source (Openwashing)
-
Funding
-
BSD
-
AMD’s Tom Stellard has laid out a proposal to ship the LLVM 3.9.1 point release in early December.
-
Nothing is set in stone yet but since Friday there’s been an active discussion on the LLVM mailing list about having Clang default to LLVM’s LLD sub-project linker.
-
FSF/FSFE/GNU/SFLC
-
There is finally an update on the proposed HSAIL front-end for GCC for supporting the BRIG binary form of the Heterogeneous System Architecture Intermediate Language.
See that earlier article for more background information on the ongoing GCC HSA efforts that have been happening for a few years now. That HSAIL GCC front-end has been quiet since it was proposed back in May but now it looks like it may be close to going mainline.
-
Public Services/Government
-
France is continuing to improve its fiscal transparency by opening the source code of three new algorithms, and has promoted use of this code through a hackaton called #CodeGouv.
The three algorithms are used by the French administration to calculate:
The cost of a car registration document which can change according to the geographical location or the type of vehicle;
The legal bonus of an apprentice, which can vary according to the number of working hours;
The penalty rate. The simulator assesses the interest the French administration should pay if payments are delayed.
Read more
-
By 2020, 40% of public administration ICT systems in Slovakia should use open source software. The target for open source is part of the country’s ICT architecture, which was updated in September.
-
When implementing free and open source desktop software, public administrations should gather feedback through user surveys, says Eric Ficheux, change management specialist at Nantes Métropole, France’s 6th largest city. “Good news comes only if you organise feedback”, he says, adding: “Survey data cannot be challenged by project opponents, and helps to defend against foul play.”
-
I knew that 15 years ago when OpenOffice.org came out with version 1.0. It’s still true today. Further, LibreOffice also works on GNU/Linux so another barrier to FLOSS (Free/Libre Open Source Software) has been broken.
-
Licensing/Legal
-
React’s patent license (1) isn’t a bad idea, because the BSD license is not explicit about granting patent rights; and (2) probably meets the requirements of the Open Source Definition.
-
Openness/Sharing/Collaboration
-
-
Open Data
-
Slovakia will automate the publication of public sector information as open data as much as possible, and integrate this process in all government information processing systems. This is one of the main priorities in the National Concept of Public Information Services (Národná Koncepcia Informatizácie Verejnej Správy; NKIVS) that was adopted last month.
-
Start small, clearly demonstrate the impact, and adopt a standardised approach with civil society – these are among the lessons learnt arising from a session on Open Contracting, held as part of the Open Data International Conference (ODIC 2016). This event took place in Madrid at the beginning of October.
Open Contracting is a way to make public procurement more transparent to citizens and a way to avoid corruption. But only 10% of countries are aligned on an Open Contracting basic standard, it was noted during the session. Data are published in open format. The Open Contracting Partnership has developed a data standard for Open Contracting, the goal of which is to “reflect the complete contracting cycle”, according to the website.
-
Open Hardware/Modding
-
Patagonia finally released the Yulex wetsuits this fall. Even more important, it also released the technology behind the rubber and the names of the factories that produced the suits. The company’s hope: to motivate other manufacturers to use fewer resource-intensive materials. “We knew from the beginning that we’re a very small player in the surf industry—there’s no way we’re going to disrupt that industry—but it was always our intention to invite other companies to use [the technology],” Hubbard says.
-
Programming/Development
-
Earlier this year, ActiveState conducted a survey of users who had downloaded our distribution of Perl over the prior year and a half. We received 356 responses–99 commercial users and 257 individual users. I’ve been using Perl for a long time, and I expected that lengthy experience would be typical of the Perl community. Our survey results, however, tell a different story.
Almost one-third of the respondents have three or fewer years of experience. Nearly half of all respondents reported using Perl for fewer than five years, a statistic that could be attributed to Perl’s outstanding, inclusive community. The powerful and pragmatic nature of Perl and its supportive community make it a great choice for a wide array of uses across a variety of industries.
For a deeper dive, check out this video of my talk at YAPC North America this year.
-
Yale lecturer Erika Christakis and her husband, professor Nicholas Christakis, were uglied out of the university after she dared to offend the crypussies that pass for college students these days by sending out the mildest call to let people express themselves as they wish on Halloween.
The thing about all these tiny little authoritarian screechers on campus — they should spend more time going to class and learning the stuff of Western culture that promotes logical thought. Because they don’t bother to do the slightest bit of, “Hmm, where does this argument I’m supporting lead?”
-
The White House just published an overview explaining its plans for a “digital transition” between the departing Obama administration and the incoming 45th president of the United States. It details how each White House social media account (and position-specific handles like @POTUS, @FLOTUS, and @VP) will be transferred to the victor of November 8th’s presidential election. Since Obama is the first commander in chief to have a presence on most of these apps, there’s not much in the way of precedent for figuring out how it’s all supposed to work. So the White House developed some of its own.
For the big ones, the switchover will happen on inauguration day: January 20th. That’s when either Hillary Clinton or Donald Trump will assume the @POTUS Twitter account, for instance. The White House says that the account’s followers (currently over 11 million) will carry over to the next Oval Office occupant, but tweets will be zeroed out so that the 45th president can start fresh. President Obama’s @POTUS tweet history will be moved over to a new account, @POTUS44. That page is already live, though it’s currently protected.
-
Science
-
“The Government intends to carefully look into the possibility of introducing electronic voting in general elections. The matter is associated with both advantages and disadvantages. It is good to examine online voting as a means to promote democracy ahead of the one-hundredth anniversary of Finland,” says Jari Lindström (PS), the Minister of Justice and Employment.
The task force is expected to conclude its preparatory work by the end of next year.
General elections include the municipal, parliamentary and presidential elections, the elections to the European Parliament, and the planned provincial elections. Voters in indicative referendums will also be allowed to cast their votes online, according to the Ministry of Justice.
-
Hardware
-
This past week, Apple spent 82 minutes unveiling a new app, a computer screen made by another company, and three laptops with the same name. They weren’t exactly the major overhauls that many were hoping for, and the event comes not too long after the company released a new iPhone that looked much like the last two it put out, and its other notable innovations of late have been making its products in different sizes and unleashing a sea of dongles on the world.
In an old interview that’s making the rounds online today, former CEO Steve Jobs explained, in his mind why companies like Xerox, a company that once had one of the most innovative research labs in the world, failed. He compared the product cycles and the corporate structures of strong, stable consumer brands, such as PepsiCo, which John Sculley, the CEO that once replaced him at Apple, previously ran.
-
Health/Nutrition
-
During this year’s election, both major party candidates have discussed the need for massive infrastructure investments to upgrade everything from our highways and bridges to our airports. Unfortunately, there has been little conversation highlighting our nation’s urgent need to upgrade our aging drinking water and wastewater systems.
While our interstate highway system officially turned 60 this year, some of the infrastructure delivering water to our communities is over a century old, and that includes the pipes—many made of lead. So it’s no surprise that there’s an urgent national health crisis unfolding before our eyes. Far beyond Flint, Mich., every week more information is revealed showing that millions of homes, schools, restaurants and small and large businesses in almost every state throughout the country are serviced by lead pipes or old crumbling water lines. According to a recent study by the Government Accountability Office, economically distressed cities with declining populations continue to have urgent water infrastructure needs: there are more Flints waiting in the wings if we don’t act.
-
Punctuated by sharp intakes of breath, Max Simon repeated himself softly, trying to mask a deep frustration. “We … are … a … media … company. We produce media.”
Like many startup founders, the 34-year-old has a spiel right down to the enunciation and cadence. He gave his speech nine times, to nine different bankers. Eight rejected him. But it wasn’t venture capital he was seeking. It was a checking account.
Simon is the founder of Green Flower Media LLC, a production company in Ojai, Calif., that sells educational videos about marijuana, with topics ranging from medicinal use to cannabis industry investing. He likens the platform to a cannabis-centric Lynda.com, the online-course company owned by LinkedIn. Shortly after Green Flower sold its first batch of videos, Simon received an e-mail from Chase Bank. The company’s corporate account was being shut down.
-
As Flint continues to suffer from a water crisis, one question percolates here in Michigan’s capital: Who will be charged next?
So far, nine low-level or midlevel government officials have been criminally charged as part of the state investigation into the water’s contamination, which has been tied to lead poisoning in children and the deaths of 12 people from Legionnaires’ disease.
In recent weeks, however, there have been growing indications that investigators are focusing on bigger targets, and they seem to be looking more intently at the state’s failure to respond to the Legionnaires’ cases.
“Twelve people died,” said Bill Schuette, Michigan’s attorney general, who is leading the investigation. “That is certainly a high priority for us.”
-
The State of Michigan can be sued over allegations that the contamination of Flint’s drinking water damaged the health of residents and hurt the value of their properties, a Michigan Court of Claims judge has ruled.
Judge Mark Boonstra, in an opinion issued Wednesday, said that if proven true, allegations brought against Gov. Rick Snyder and other defendants by Melissa Mays and other Flint residents, “shock the conscience.”
Boonstra dismissed two counts against the state, but said two other counts may proceed to trial.
The lawsuit can proceed on allegations the state violated the due process clause of the state constitution by failing to protect Flint residents’ “bodily integrity,” Boonstra ruled. The suit can also proceed on allegations that state actions were a substantial cause of decline in Flint property values and the state “abused its powers” by “continuing to supply each water user with corrosive and contaminated water,” he said in a 50-page opinion released Thursday.
-
A controversial plan to set up so-called “fix rooms” to allow drug addicts to inject safely under supervision in Glasgow is likely to get the go-ahead.
Members of the health board, the city council and police are expected to agree the idea in principle.
The move aims to address the problems caused by an estimated 500 or so users who inject on Glasgow’s streets.
-
The controversy over genetically modified crops has long focused on largely unsubstantiated fears that they are unsafe to eat.
But an extensive examination by The New York Times indicates that the debate has missed a more basic problem — genetic modification in the United States and Canada has not accelerated increases in crop yields or led to an overall reduction in the use of chemical pesticides.
The promise of genetic modification was twofold: By making crops immune to the effects of weedkillers and inherently resistant to many pests, they would grow so robustly that they would become indispensable to feeding the world’s growing population, while also requiring fewer applications of sprayed pesticides.
Twenty years ago, Europe largely rejected genetic modification at the same time the United States and Canada were embracing it. Comparing results on the two continents, using independent data as well as academic and industry research, shows how the technology has fallen short of the promise.
-
The results of our survey are in. This year’s list of the most loved and hated Halloween treats has a surprise in store!
-
World Health Organization Director General Margaret Chan today warned of serious funding shortfalls for the current biennium endangering the implementation of certain programmes. Areas most in need of financing include non-communicable diseases (such as cancer, diabetes and cardiovascular diseases), food security, and antimicrobial resistance. The high-profile Health Emergencies Programme is also underfunded and Chan proposed to ask countries to raise their assessed contributions at the next World Health Assembly.
-
For next week’s World Trade Organization intellectual property committee meeting, the major developing economies have submitted a request to discuss the recently released report of the United Nations Secretary General’s High-Level Panel on Access to Medicines, according to Knowledge Ecology International (KEI). A key element of the UN report was to make it harder for countries deter or discourage other countries from trying to use patent flexibilities built into the WTO Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) – something the major developing economies have been discouraged from doing in the past.
-
A Michigan mother is furious that now-DNC Chairwoman Donna Brazile sent Hillary Clinton advance notice of her question at a Democratic presidential debate in Flint, Michigan this March.
According to the latest Wikileaks release of John Podesta’s emails, Brazile tipped off Clinton to an incoming question from an audience member at the debate hosted by CNN — where Brazile was then a paid contributor.
“One of the questions directed to HRC tomorrow is from a woman with a rash,” Brazile wrote in the email’s subject line. “Her family has lead poison and she will ask what, if anything, will Hillary do as president to help the ppl of Flint.”
LeeAnne Walters, the woman who asked that question, said on her Facebook page Monday that she found the revelation “appalling.”
-
Security
-
Right, so there’s currently a DDoS of our site specifically happening. Part of me is mildly annoyed, part of me is proud that we’re worth DDoS-ing now. Since it’s only slowing us down a bit and not actually shutting us down, I’m half tempted to just let them run their botnet time out. I suppose we should tweak the firewall a bit though. Sigh, I hate working on weekends.
-
There’s a new zero-day Microsoft Windows exploit in the wild by the name of AtomBomb, and Microsoft may not be able to fix it.
-
Researchers at cyber-security firm enSilo have discovered a method of code injection in all versions of Windows that cannot be eliminated as it is part of the operating system design.
The design flaw allows for code injection and is dubbed AtomBomb as it makes use of the system’s atom tables.
As Microsoft defines it, “An atom table is a system-defined table that stores strings and corresponding identifiers. An application places a string in an atom table and receives a 16-bit integer, called an atom, that can be used to access the string. A string that has been placed in an atom table is called an atom name.”
In a blog post describing the method of attack, enSilo’s Tal Liberman wrote: “Our research team has uncovered a new way to leverage mechanisms of the underlying Windows operating system in order to inject malicious code. Threat actors can use this technique, which exists by design of the operating system, to bypass current security solutions that attempt to prevent infection.”
-
This week, culture minister Matt Hancock and more than 100 fellow MPs (Members of Parliament) have signed a letter calling on president Barack Obama to block Lauri Love’s extradition to the US to face trial over the alleged hacking of the US missile defence agency, the FBI, and America’s central bank.
Love—an Asperger’s syndrome sufferer from Stradishall, Suffolk—was told in September at a Westminster Magistrates’ Court hearing that he was fit to be extradited to the US to face trial in that country. The 31-year-old faces up to 99 years in prison in the US if convicted. According to his lawyers, Love has said he fears for his life.
-
-
Over the years, people have wanted to use SELinux to confine the web browser. The most common vulnerabilty for a desktop user is attacks caused by bugs in the browser. A user goes to a questionable web site, and the web site has code that triggers a bug in the browser that takes over your machine. Even if the browser has no blogs, you have to worry about helper plugins like flash-plugin, having vulnerabilities.
-
Recently, Google’s Threat Analysis Group discovered a set of zero-day vulnerabilities in Adobe Flash and the Microsoft Windows kernel that were already being actively used by malware attacks against the Chrome browser. Google alerted both Adobe and Microsoft of the discovery on October 21, and Adobe issued a critical fix to patch its vulnerability last Friday. But Microsoft has yet to patch a critical bug in the Windows kernel that allows these attacks to work—which prompted Google to publicly announce the vulnerabilities today.
“After 7 days, per our published policy for actively exploited critical vulnerabilities, we are today disclosing the existence of a remaining critical vulnerability in Windows for which no advisory or fix has yet been released,” wrote Neel Mehta and Billy Leonard of Google’s Threat Analysis Group.”This vulnerability is particularly serious because we know it is being actively exploited.”
The bug being exploited could allow an attacker to escape from Windows’ security sandbox. The sandbox, which normally allows only user-level applications to execute, lets programs execute without needing administrator access while isolating what it can access on the local system through a set of policies.
But by using a specific type of call to a legacy support Windows system library generally used for the graphics subsystem—win32k.sys—malicious code can escalate its privileges and execute outside of the sandbox, allowing it to execute code with full access to the Windows environment. Win32k.sys has been a problem before: Microsoft issued a warning back in June about a similar privilege escalation problem that had not yet been exploited, and another arrived in August.
-
Government, academic, and private-sector officials are collaborating on new ways to prevent and mitigate distributed denial-of-service (DDoS) attacks, based on research years in the making but kicked into high gear by the massive takedown this month of domain name system provider Dyn.
-
The US government has updated and published a new list of exemptions to the Digital Millennium Copyright Act, a move perhaps long-overdue which will protect cybersecurity professionals from prosecution when reverse-engineering products for research purposes.
On October 28, the US Copyright Office and the Librarian of Congress published the updated rules on the federal register.
The DMCA regulations now include exceptions relating to security research and vehicle repair relevant to today’s cybersecurity field. For the next two years, researchers can circumvent digital access controls, reverse engineer, access, copy, and manipulate digital content which is protected by copyright without fear of prosecution — within reason.
-
This story got me thinking about security, how we ask questions and how we answer questions. What if we think about this in the context of application security specifically for this example. If someone was to ask the security the question “does this code have a buffer overflow in it?” The person I asked for help is going to look for buffer overflows and they may or may not notice that it has a SQL injection problem. Or maybe it has an integer overflow or some other problem. The point is that’s not what they were looking for so we didn’t ask the right question. You can even bring this little farther and occasionally someone might ask the question “is my system secure” the answer is definitively no. You don’t even have to look at it to answer that question and so they don’t even know what to ask in reality. They are asking the monkey paw to bring them their money, it’s going to do it, but they’re not going to like the consequences.
-
It came as no surprise to Tyfone CEO Siva Narendra when tens of millions of Internet connected devices were able to bring down the Web during a coordinated distributed denial of service attack on Oct. 21.
Narendra’s Portland-based company Tyfone has been working on digital security platforms to safeguard identity and transactions of people and things for years.
Narendra says mobile devices in conjunction with the cloud have brought new levels of productivity to our lives. Internet of Things devices (the common name given to these connected items) are poised to bring even greater levels of productivity and cost-savings to businesses, and safety and convenience to our everyday lives.
-
Today, Google’s Threat Analysis group disclosed a critical vulnerability in Windows in a public post on the company’s security blog. The bug itself is very specific — allowing attackers to escape from security sandboxes through a flaw in the win32k system — but it’s serious enough to be categorized as critical, and according to Google, it’s being actively exploited. As a result, Google went public just 10 days after reporting the bug to Microsoft, before a patch could be coded and deployed. The result is that, while Google has already deployed a fix to protect Chrome users, Windows itself is still vulnerable — and now, everybody knows it.
Google’s disclosure provides only a general description of the bug, giving users enough information to recognize a possible attack without making it too easy for criminals to replicate. Exploiting the bug also depends on a separate exploit in Adobe Flash, for which the company has also released a patch. Still, simply knowing that the bug exists will likely spur a lot of criminals to look for viable ways to exploit it against computers that have yet to update Flash.
-
Our research team has uncovered new way to leverage mechanisms of the underlying Windows operating system in order to inject malicious code. Threat actors can use this technique, which exists by design of the operating system, to bypass current security solutions that attempt to prevent infection. We named this technique AtomBombing based on the name of the underlying mechanism that this technique exploits.
AtomBombing affects all Windows version. In particular, we tested this against Windows 10.
-
On Friday, October 21st, we reported 0-day vulnerabilities — previously publicly-unknown vulnerabilities — to Adobe and Microsoft. Adobe updated Flash on October 26th to address CVE-2016-7855; this update is available via Adobe’s updater and Chrome auto-update.
After 7 days, per our published policy for actively exploited critical vulnerabilities, we are today disclosing the existence of a remaining critical vulnerability in Windows for which no advisory or fix has yet been released. This vulnerability is particularly serious because we know it is being actively exploited.
The Windows vulnerability is a local privilege escalation in the Windows kernel that can be used as a security sandbox escape. It can be triggered via the win32k.sys system call
-
The next president will face a cybercrisis in the first 100 days of their presidency, research firm Forrester predicts in a new report.
The crisis could come as a result of hostile actions from another country or internal conflict over privacy and security legislation, said Forrester analyst Amy DeMartine, lead author of the firm’s top cybersecurity risks for 2017 report, due to be made public Tuesday.
History grades a president’s first 100 days as the mark of how their four-year term will unfold, so those early days are particularly precarious, said DeMartine. The new commander in chief will face pressure from foreign entities looking to embarrass them early on, just as U.S. government agencies jockey for position within the new administration, she said.
-
Perhaps the most bustling marketplace on the Internet where people can compare and purchase so-called “booter” and “stresser” subscriptions — attack-for-hire services designed to knock Web sites offline — announced last week that it has permanently banned the sale and advertising of these services.
On Friday, Oct. 28, Jesse LaBrocca — the administrator of the popular English-language hacking forum Hackforums[dot]net — said he was shutting down the “server stress testing” (SST) section of the forum. The move comes amid heightened public scrutiny of the SST industry, which has been linked to several unusually powerful recent attacks and is responsible for the vast majority of denial-of-service (DOS) attacks on the Internet today.
-
Defence/Aggression
-
In the lead-up to Hillary Clinton’s marathon testimony before Congress on Benghazi in October 2015, her presidential campaign prepared to make some eye-popping claims—including that Libya would have turned into Syria without U.S. intervention.
That’s according to an internal talking-point memo released in Tuesday’s dump of WikiLeaks emails. WikiLeaks says those emails were hacked from the inbox of Clinton campaign Chairman John Podesta. The Clinton campaign is not commenting on whether or not the emails are doctored, and blames the Russian government for the hack.
-
As she marches toward the US presidency, Hillary Clinton has stepped up her promotion of the idea that a no-fly zone in Syria could “save lives” and “hasten the end of the conflict” that has devastated that country since 2011.
It has now been revealed, of course, that Clinton hasn’t always expressed the same optimism about the no-fly zone in private. The Intercept (10/10/16) reported on Clinton’s recently leaked remarks in a closed-door speech to Goldman Sachs in 2013…
-
In the first half of the program, Shahid Buttar discusses the chapter he wrote for Censored 2017, “Ike’s Distopian Dream,” where he examines the many ways that President Eisenhower’s warning about the military-industrial complex has proven correct.For the second half of the program, Mickey and Peter survey some of the other chapters of Censored 2017, particularly Peter’s chapter, “Selling Empire, War and Capitalism,” a look at the advertising / public relations industry, and how its influence extends far beyond peddling consumer products.
-
A former senior counter-terrorism official in Turkey has blown the whistle on President Recep Tayyip Erdogan’s deliberate sponsorship of the Islamic State (ISIS) as a geopolitical tool to expand Turkey’s regional influence and sideline his political opponents at home.
Ahmet Sait Yayla was Chief of the Counter-Terrorism and Operations Division of Turkish National Police between 2010 and 2012, before becoming Chief of the Public Order and Crime Prevention Division until 2014. Previously, he had worked in the Counter-Terrorism and Operations Division as a mid-level manager for his entire 20-year police tenure, before becoming Chief of Police in Ankara and Sanliurfa.
In interviews with INSURGE intelligence, Yayla exclusively revealed that he had personally witnessed evidence of high-level Turkish state sponsorship of ISIS during his police career, which eventually led him to resign. He decided to become a whistleblower after Erdogan’s authoritarian crackdown following the failed military coup in July. This is the first time that the former counter-terrorism chief has spoken on the record to reveal what he knows about Turkish government aid to Islamist terror groups.
-
Palantir is the Palo Alto, California, data analytics company co-founded and backed by billionaire Peter Thiel. It had won seed funding and praise from the Central Intelligence Agency a few years earlier and had become a darling among the Federal Bureau of Investigation and a few other government customers. Its employees were at the Pentagon to show off the company’s ability to compile disparate data streams and display the information graphically for non-technical consumers; Palantir hoped to win a big contract.
But the conversation went poorly. The slacks and dress shirts with a few buttons undone that Palantir executives wore may have been a step up for sunny California where hoodies are the norm but were a sign of disrespect at the Pentagon, according to a person familiar with the meeting. Senior officials, including U.S. Assistant Secretary of the Army for Acquisition, Logistics and Technology Dean Popps, were not impressed, this person said.
They told Palantir: “Don’t come to the E-ring without a tie unless your name is Gates or Buffet,” said the person, referring to the portion of the Pentagon occupied by senior officials. “They couldn’t get over the tie thing. They didn’t care about the technology.”
-
In an almost four-minute video, political editor of Spiegel Online Christoph Sydow tried to defend the editorial policy of his magazine regarding the developments in Aleppo and Mosul. However, the shots demonstrated in his video turned out to be the propaganda materials of Daesh terrorists.
The video was supposed to be a response to critical letters of Spiegel Online readers and their comments on social networks. Many of them accused the magazine of spreading propaganda and presenting the situation in the Middle East in a biased manner.
-
The CIA today released the long-contested Volume V of its official history of the Bay of Pigs invasion, which it had successfully concealed until now by claiming that it was a “draft” and could be withheld from the public under the FOIA’s “deliberative process” privilege. The National Security Archive fought the agency for years in court to release the historically significant volume, only to have the U.S. Court of Appeals in 2014 uphold the CIA’s overly-broad interpretation of the “deliberative process” privilege. Special credit for today’s release goes to the champions of the 2016 FOIA amendments, which set a 25-year sunset for the exemption: Senators John Cornyn, Patrick Leahy, and Chuck Grassley, and Representatives Jason Chaffetz, Elijah Cummings, and Darrell Issa.
Chief CIA Historian David Robarge states in the cover letter announcing the document’s release that the agency is “releasing this draft volume today because recent 2016 changes in the Freedom of Information Act (FOIA) requires us to release some drafts that are responsive to FOIA requests if they are more than 25 years old.” This improvement – codified by the FOIA Improvement Act of 2016 – came directly from the National Security Archive’s years of litigation.
-
The anti-war movement is struggling to find its place in a multipolar world in which stopping the war requires new thinking
When I was five years old, a very small Vietnamese man came to my bedside to say goodnight. He was the Vietnamese ambassador, and he had a very kindly, wrinkled smile, and, as I later discovered, both he and his wife were veterans of the very long war in Vietnam against foreign occupiers. He himself had crawled under barbed wire fences to set explosives under French war planes during the early 1950s. His wife, also diminutive, had been the 16-year-old leader of an anti-aircraft unit that helped bring down enemy planes during the conflict, which back in 1973 was still ongoing.
-
Sweden declares WWII hero Raoul Wallenberg dead, 71 years after he disappeared in Hungary.
-
Transparency/Investigative Reporting
-
So, months after clearing Hillary Clinton’s slate by deciding she was stupid rather than malicious, James Comey has again gone rogue, declaring there’s something worth investigating in emails recovered from a sleazy ex-politician’s computer. (Thus subverting the norm of recovering emails from a sleazy, CURRENT politician’s computer…)
The timing is, of course, suspect. The FBI really isn’t supposed to be announcing investigations of presidential candidates this close to Election Day. As Marcy Wheeler points out, there are guidelines Comey appears to be violating.
-
FBI agents pushed for the Clinton Foundation to be investigated over claims that it gave favors and special access to donors, The Washington Post reported.
According to the Post, the public integrity unit of the Justice Department said it did not have enough evidence to move forward with the case.
The Clinton Foundation reportedly was never contacted by the FBI.
“We are not aware of any investigation into the Foundation by the Department of Justice, Federal Bureau of Investigation, or any United States Attorney’s Office and we have not received a subpoena from any of those agencies,” a Clinton official told the Post.
-
Hillary Clinton did two huge favors for Morocco during her tenure as secretary of state while the Clinton Foundation accepted up to $28 million in donations from the country’s ruler, King Mohammed VI, according to new information obtained by The Daily Caller News Foundation Investigative Group.
Clinton and Environmental Protection Agency (EPA) chief Lisa Jackson tried to shut down the Florida-based Mosaic Company in 2011, operator of America’s largest phosphate mining facility.
-
The emails currently roiling the US presidential campaign are part of some unknown digital collection amassed by the troublesome Anthony Weiner, but if your purpose is to understand the clique of people who dominate Washington today, the emails that really matter are the ones being slowly released by WikiLeaks from the hacked account of Hillary Clinton’s campaign chair John Podesta. They are last week’s scandal in a year running over with scandals, but in truth their significance goes far beyond mere scandal: they are a window into the soul of the Democratic party and into the dreams and thoughts of the class to whom the party answers.
The class to which I refer is not rising in angry protest; they are by and large pretty satisfied, pretty contented. Nobody takes road trips to exotic West Virginia to see what the members of this class looks like or how they live; on the contrary, they are the ones for whom such stories are written. This bunch doesn’t have to make do with a comb-over TV mountebank for a leader; for this class, the choices are always pretty good, and this year they happen to be excellent.
-
WikiLeaks has shone light on the secret negotiation of major trade agreements, entrusted by insiders to bring multiple draft chapters into the public domain. These documents have fuelled social justice and fair trade movements throughout the world. While the Trans Pacific Partnership Agreement (TPP) and Transatlantic Trade and Investment Partnership (TTIP) are stalled, the Trade in Services Agreement (TiSA) between the US, EU and 22 other countries that account for 2/3rds of global GDP has been classified to keep it secret not just during the negotiations, but for five years after the TiSA enters into force.
-
The latest tranche consists of almost 2,500 emails, bringing the number released so far to almost 42,000. WikiLeaks has claimed it will publish 50,000 emails in total in the run up to the US presidential election on November 8.
READ MORE: WikiLeaks releases latest batch of #PodestaEmails from Clinton campaign chair
Yesterday’s emails revealed that Anthony Weiner was a cause for concern within the Clinton campaign as far back as 2011. Emails from the former congressman’s laptop are key to the FBI’s decision to reopen an investigation into Clinton’s use of a private email server.
-
-
-
-
-
-
-
-
-
Environment/Energy/Wildlife/Nature
-
Earlier this year, we noted how traditional utilities were playing extremely dirty in Florida to try and derail efforts to ramp up solar competition and adoption in the state most likely to benefit from it. After all, the vision of a future where competition is rampant, customers pay less money, and solar users actually get paid for driving power back to the grid gives most of these executives heartburn. As a result, utilities have gotten creative in the state, launching fake solar advocacy groups that actually function to pollute public discourse and derail any amendments intended to help solar grab a larger foothold in the state.
-
An expansive new analysis by Yale School of Public Health researchers confirms that numerous carcinogens involved in the controversial practice of hydraulic fracturing have the potential to contaminate air and water in nearby communities.
Fracking is now common in the United States, currently occurring in 30 states, and with millions of people living within one mile of a fracking site. The study suggests that the presence of carcinogens involved in or released by hydraulic fracturing operations has the potential to increase the risk of childhood leukemia. The presence of chemicals alone does not confirm exposure or risk of exposure to carcinogens and future studies are needed to evaluate cancer risk.
-
The conflict surrounding the construction of the Dakota Access Pipeline escalated dramatically Thursday, October 27. Water protectors at Treaty Camp, a new frontline in the path of the pipeline along Highway 1806, were forced off the land in a dramatic and often violent manner by police. The large police action included armored, military vehicles, pepper spray, high-velocity bean bags and tear gas. Shortly after the disturbing confrontation Jill Stein, Green Party nominee for the Presidential Election, and running mate Ajamu Baraka released a statement condemning the actions being used in North Dakota:
“The Stein/Baraka campaign is horrified and outraged at the militarized repression of water protectors at the Standing Rock reservation in North Dakota. Police and private security forces have engaged in violent actions against peaceful earth defenders who have come to protect the land and water from the construction of the Dakota Access Pipeline.
-
-
About 71 percent of the Earth is covered by water, so measuring sea level changes around the world is no small feat. Up until now, scientists believed they knew how much global sea level had risen during the 20th century. This number has hovered around 0.6 inches per decade since 1900, according to the National Oceanic and Atmospheric Administration, and has been partly driven by warming ocean temperatures.
But a new study, published this month to Geophysical Research Letters, found evidence to suggest that historical sea level records have been off—way off in some areas—by an underestimation of 5 to 28 percent. Global sea level, the paper concluded, rose no less than 5.5 inches over the last century, and likely saw an increase of 6.7 inches.
The reason for this discrepancy was uncovered by earth scientists at NASA’s Jet Propulsion Laboratory and the University of Hawai’i at Mānoa. By comparing newer climate models with older sea level measurements, the team discovered that readings from coastal tide gauges may not have been as indicative as we thought. These gauges, located at more than a dozen sites across the Northern Hemisphere, have been a primary data source for estimating sea level changes during the last several decades.
-
Finance
-
1) A containerful of shoddy training shoes are produced in China, shipped to UK, sorted by lowly paid British zero hours workers and put on shelves of High Street sports shop.
2) While this is happening, sterling plunges 25%.
3) Coachload of Chinese tourists visit sports shop attracted by collapsed pound sterling. They exclaim “Wow Western trainers! And so cheap”. They buy them to take back to China as gifts for family members they don’t like that much.
4) Declare a Brexit sales boom!
-
Low-earning families that Theresa May has promised to help will be thousands of pounds a year worse off by 2020 because of rising inflation, lower wage growth and Tory social security cuts, according to new analysis of their post-Brexit economic prospects.
Those who the prime minister describes as “just managing” – and who are her key priority, she says – are in line for substantial falls in real incomes unless the chancellor, Philip Hammond, steps in to help them in his autumn statement on 23 November.
Pressure is growing on Hammond from senior Tories to reverse the decisions to slash benefits, which were announced last year by his predecessor George Osborne, in order to assist those who May said on entering Downing Street were “working around the clock” but still struggling to get by.
-
By every measure, Minnesota governor Mark Dayton’s five year run as governor has been a stellar success: while Tim Pawlenty, his tax-slashing, “fiscally-conservative” Republican predecessor presided over a $6.2B deficit and a 7% unemployment rate (the mere 6,200 jobs added under Pawlenty’s 7-year run barely registered), Dayton added 172,000 new jobs to the Minnesota economy, brought Minnesota down to the fifth-lowest unemployment rate in the country, and brought the average Minnesotan income up to $8,000 more than the median US worker, while posting a $1B budget surplus.
How did Dayton do it? He raised the state income tax on individuals earning more than $150K, from 7.85% to 9.85%; he raised Minnesota’s minimum wage and guaranteed equal pay for women.
-
Democracy and civil rights took a crushing blow today. Shortly after news surfaced that Wallonia folded under the pressure, the Comprehensive Economic and Trade Agreement (CETA) has been signed.
One of the many secret trade deals floating around is known as CETA. While proponents say these trade agreements are simply about trade, the details suggest that such agreements are much more about pushing laws than actual trade.
Last year, we dug into some of these details and found a number of provisions that adversely affects digital rights. This includes censorship through site blocking, account termination through a three strikes law, unlimited damages for copyright infringement, and provisions that allow border patrols to seize your cell phone at the border.
Other concerns raised revolve around ISDS (Inter-State Dispute Settlement) that sets up an international tribunal for major multi-national corporations. The purpose is to allow corporations to sue governments if laws are passed that get in the way of profits and future potential profits. Examples raised in the past revolve around warning labels on cigarette packages, regulations on price for pharmaceuticals, and rulings against oil extraction and pipelines.
-
Switzerland is stepping up its bitcoin fascination in a big way. Railway operator SBB (with the help of SweePay) is launching a 2-year trial for a service that lets you exchange Swiss francs for bitcoin at any of the company’s ticket machines in the country. Scan a QR code with your phone and you can get between 20 to 500 francs ($20 to $505) of digital currency at any time. If you want to go shopping without using cards or physical cash, you can do it right after you leave the train station.
There are some big catches involved. You need to have a Swiss phone number to get bitcoin, so you’re not completely anonymous… and of course, you’re out of luck if you’re not a resident. You also can’t buy tickets with bitcoin at the machines, so don’t think your bitcoin mining operation will pay for your next trip to Zurich.
-
-
The European Union and Canada signed a far-reaching trade agreement on Sunday that commits them to opening their markets to greater competition, after overcoming a last-minute political obstacle that reflected the growing skepticism toward globalization in much of the developed world.
-
On October 25, thousands of Icelandic women went home at 2:38PM, after 86% of their work-days had passed, to protest the fact that they only earn 86% of their male counterparts’ wages.
They turned out for a mass demonstration that echoed the 1975 protests over pay equity, which saw over 90% of the country’s women take to the street.
-
On Sunday, the president of the European Commission Jean-Claude Juncker, president of the European Council Donald Tusk, prime minister of Slovakia Robert Fico, and Canadian prime minister Justin Trudeau signed the Comprehensive Economic and Trade Agreement (CETA) between the EU and Canada. It followed more than a week of frenzied negotiations after Belgian regions refused to give permission to the central government of Belgium to proceed with the deal.
-
Don’t be fooled by the triumphant rhetoric emanating from Brussels today – the controversial EU-Canada trade deal known as CETA might have returned from the dead in time for Halloween, but it’s very much a zombie agreement. While CETA will now be approved by the European Council and head towards the Parliament, its future looks bleak.
And it gets worse for Brussels. Because Belgium’s regional parliaments have, in the process of hobbling CETA, driven a stake into the heart of European trade policy. No wonder Financial Times columnist Wolfgang Munchau hailed the so-called ‘breakthrough’ as “a huge victory for Belgium’s Ceta opponents”.
CETA (the Comprehensive Economic & Trade Agreement) is the sister deal of the better known TTIP trade deal between the US and EU. Just like its sibling, it is essentially not about reducing tariffs, but deregulation, liberalisation, and the handing of further powers over law-making to big business. Despite some fancy footwork by the EU to reform the hated “corporate court” system, which gives foreign investors their own special legal process to sue governments, that system is very much still in place in CETA.
-
AstroTurf/Lobbying/Politics
-
Hillary Clinton’s campaign chairman, John Podesta, last year signed a $7,000-a-month contract with the foundation of a major Clinton donor who made a fortune selling a type of mortgage that some critics say contributed to the housing collapse, hacked emails show.
In February of last year, as Podesta was working to lay the groundwork for Clinton’s soon-to-launch campaign for the Democratic presidential nomination, he signed the contract with the Sandler Foundation, which was started by Herb Sandler and his late wife Marion Sandler.
-
Donald Trump has been warning supporters left and right about the potential devastating consequences of voter fraud. But the first arrest for voter fraud in this election season is actually a staunch Trump supporter. Terri Rote, 55, was arrested on first-degree l misconduct charges after she cast two ballots in the election. She was released on a $5,000 bond.
So why did Rote, a registered Republican, decide to cast two ballots? She was apparently afraid that her first ballot would be counted as a vote for Hillary Clinton. “I wasn’t planning on doing it twice, it was spur of the moment,” Rote told Iowa Public Radio. “The polls are rigged.”
-
At a campaign event in Miami on Tuesday that was more in keeping with the norms of politics in North Korea, Donald Trump brought reporters to one of his golf courses and invited 10 of his employees on stage to praise him.
[...]
Siegel also boasted about helping to secure Florida for George W. Bush in 2000, by pressing thousands of employees to vote for the Republican candidate. In an interview with the same publication, the developer explained that he gave employees not-so-subtle hints about what he wanted them to do by putting negative articles about Al Gore in envelopes along with their paychecks.
As The Atlantic explained in 2012, after Siegel’s anti-Obama memo was leaked to Gawker, employers cannot explicitly pay workers to vote a certain way, but, in most states, they are permitted to make their preferences known before election day.
Unlike Florida, California does have a law stating that “no employer shall coerce or influence or attempt to coerce or influence his employees through or by means of threat of discharge or loss of employment to adopt or follow or refrain from adopting or following any particular course or line of political action or political activity.”
-
Government ethics watchdogs have long warned that the Clintons’ nonprofit would present serious conflict-of-interest concerns should the former secretary of State obtain the oval office.
Republicans — led by Donald Trump — have accused the Clintons of using the foundation to peddle influence and line their own pockets.
The details in Band’s memo gave new ammunition to critics who have pressed for the foundation to be shuttered.
In it, Band describes how Bill Clinton’s personal wealth skyrocketed with the help of the same consultants raising money for the foundation, and the same donors who poured millions into the charity.
“I think it’s going to be a continuing problem unless they close the thing down after she’s elected,” said Democratic strategist Brad Bannon.
Those calls were echoed by the press.
“Let me go to bottom line: There is no way under any circumstance the Clinton Foundation should be operating if she becomes president,” Chuck Todd, moderator of NBC’s “Meet the Press,” told WGN Radio in Chicago on Thursday. “I just don’t see how they can keep that going.”
-
WikiLeaks has continued to reveal Schmidt’s cozy relationship with the Clinton campaign.
-
More hacked emails released Sunday by WikiLeaks appear to show Hillary Clinton campaign chairman John Podesta’s apparent continued connection to Joule Unlimited Technologies, despite his claims that he divested from the Kremlin-financed energy company, The Daily Caller reported.
Podesta has said he transferred his 75,000 shares from Joule to a holding company named Leonidio Holdings. But included in the released emails is information that Podesta received a K1 income tax form indicating that he was a partner sharing income with Leonidio Holdings, while another form was made out to Podesta’s daughter Megan Rouse, who is a financial planner.
A June 5, 2015 email from Rouse to John, Mae and Gabe Podesta shows the extent to which other family members were involved: “Mae and Gabe, Please see attached K1 for Leonidio. You can use this to complete your 2014 tax return. We will each report 1/3 share of what’s on the form. Mom and Pa, Please see attached K1 showing the distribution to Leonidio.”
-
Clinton campaign chairman John Podesta received a K1 income tax form indicating that he was a partner sharing income with Leonidio Holdings, according to emails released Sunday by WikiLeaks. Another form was made out to Podesta’s daughter, Megan Rouse, his partner in Leonidio Holdings.
Podesta has always maintained that he transferred his 75,000 shares from Joule Unlimited Technologies, a Kremlin-financed energy company, to an “anonymous” holding company named Leonidio Holdings. Not only does Leonidio share an address with Podesta’s daughter, Rouse, but they share a tax return.
The other beneficiaries are all in the family too.
-
Now we know Obama was lying. His own aides said so, in e-mails uncovered by WikiLeaks and made public this week.
-
Robert Creamer, the operative behind sending provocateurs to Donald Trump rallies, was close to Robby Mook, Hillary Clinton’s campaign manager, according to new emails released by WikiLeaks.
Creamer, who allegedly spearheaded the dirty tricks for the Democrats, wasn’t just consulting for the Democratic National Committee, according to videos made by Project Veritas. He was sending people to provoke Trump at events.
-
In an exclusive interview with Breitbart News, the former U.S. Attorney for the District of Columbia Joseph DiGenova gave a stark assessment of what led to FBI Director James Comey’s recent decision to reopen the investigation into Hillary Clinton’s use of a private email server, after an investigation into Anthony Weiner’s sexting scandal led to the discovery of thousands of emails on the computer of Weiner’s estranged wife, top Hillary Clinton aide, Huma Abedin.
-
I have always glazed over at any mention of Hillary Clinton’s emails. The USA is not my country, and it seemed like a rather boring argument about classifications and document security. I also had a natural resistance to anything that appeared to promote the interests of Donald Trump. I now realise that is how a complicit media was deliberately presenting it, and my lack of interest was the desired effect. They are still presenting the issues in a manner which I hope I will be able to prove to you is entirely tendentious. So this weekend I request you to grit your teeth, set aside your disinterest and read through this article. Please.
Those Hillary server emails are largely a separate thing to those which WikiLeaks has been releasing. What the WikiLeaks release of the Democratic National Committee and Hillary campaign chair Podesta emails has proved beyond any reasonable doubt, is the extent of Hillary’s corruption. Both in terms of the fixing of the primary election against Bernie Sanders by the people who were supposed to be organising it, and the vast sums of money the Clinton family were receiving personally through Clinton Foundation and consultancy activity linked to State Department access, decisions and activity.
Before Clinton handed over her private email server to the FBI investigation into her handling of classified material, she scrubbed over 30,000 emails and had drives physically treated to ensure permanent destruction. It is obviously very likely that many of those emails referred to the kind of nefarious activity we are now seeing from the DNC and Podesta leaks.
It is also of course a fact that those 30,000 emails all had recipients, as well as Hillary as a sender. We can be sure that a major effort will have been undertaken to make sure recipients deleted them too. But from time to time some are sure to turn up. That is what has just happened and prompted yesterday’s announcement of a renewed investigation. In the course of an unrelated investigation into alleged paedophile grooming, the FBI has come across some of Hillary’s deleted emails on the device of a close political aide.
-
—In an email containing information from intelligence sources, Clinton detailed a strategy for defeating the Islamic State and noted Qatar and Saudi Arabia are funding ISIS operations. (Dan Wright, Shadowproof)
—Hillary Clinton’s letter to mega-donor Haim Saban against the boycott, divestment, and sanctions (BDS) movement against Israel was leaked to press to attract pro-Israel donors. (Rania Khalek, Electronic Intifada)
—During one of her paid speeches for Goldman Sachs, Clinton admitted a no fly zone in Syria would mean the United States and NATO would “kill a lot of Syrians.” (Zaid Jilani, The Intercept)
—Representatives of Qatar wanted to meet for “five minutes” with Bill Clinton to present a $1 million check to him for his birthday (New York Times)
-
As it turns out, most other news outlets did not share the Times‘ sense of newsworthiness.
-
It’s hard to pick the most ominous or disturbing thing Donald Trump has said, but his call for supporters to “go and watch” polling places in “certain areas” because “you know what I’m talking about” is up there. But Trump’s claim that the election is rigged—unless he wins, in which case it isn’t—didn’t spring full-blown from his head. Republicans have claimed voter fraud benefiting their opponents for a long time. And for a long time, corporate media have set those claims alongside concerns about voter suppression, of African-Americans and immigrants in particular, as though they were equally grounded, or just analogous partisan gripes.
-
The FBI stumbled upon a trove of emails from one of Hillary Clinton’s top aides weeks ago, law enforcement officials told CNN Sunday.
But FBI Director James Comey didn’t disclose the discovery until Friday, raising questions about why the information was kept under wraps and then released only days before the election.
Meanwhile, the Justice Department has obtained a warrant that will allow it to begin searching the computer that is believed to contain thousands of newly found emails of top Clinton aide Huma Abedin, two law enforcement sources confirmed to CNN.
The timeline behind the discovery of the emails came into greater clarity Sunday.
Investigators took possession of multiple computers related to the inquiry of Anthony Weiner in early October, U.S. law enforcement officials said. Weiner is Abedin’s estranged husband and is being probed about alleged sexting with a purportedly underage girl.
-
The Democratic leader in the US Senate says the head of the FBI may have broken the law by revealing the bureau was investigating emails possibly linked to Hillary Clinton.
Harry Reid accused FBI director James Comey of violating an act which bars officials from influencing an election.
News of the FBI inquiry comes less than two weeks before the US election.
The bureau has meanwhile obtained a warrant to search a cache of emails belonging to a top Clinton aide.
Emails from Huma Abedin are believed to have been found on the laptop of her estranged husband, former congressman Anthony Weiner.
-
A top Democrat in Washington says the FBI has shone a spotlight on a new trove of emails potentially associated with Hillary Clinton’s use of a private email server while sitting on “explosive information” allegedly tying Donald Trump to the Russian government.
Senator Harry Reid, the Democrat leader of the US Senate, accused the FBI of double standards in a letter sent late on Sunday to James Comey, the agency’s director, who jolted the presidential race on Friday by revealing the existence of a new cache of emails.
-
Now that the presidential debates are over, Facebook wants to help you prepare for the last political battleground: the voting booth.
The social-media company unveiled a feature this week designed to help users create a voting plan, showing not just presidential candidates but also information on statewide elections. Should you want to dive down to the local level, you can give Facebook your address and the company will tell you what’s on the ballot in your neck of the woods.
-
Eric Schmidt, the chairman of Google’s parent company Alphabet, submitted a detailed draft to a key Clinton aide on 15 April 2014, outlining his ideas for a possible run for the presidency and stressing that “key is the development of a single record for a voter that aggregates all that is known about them”.
Though Schmidt did not mention it, this kind of information is the lifeblood of Google’s business.
The ideas, in an email released by the whistleblower website WikiLeaks, were sent to Cheryl Mills, former deputy White House counsel to Bill Clinton. Mills forwarded it to Clinton campaign chairman John Podesta, campaign manager Robby Mook and Barack Obama’s 2012 campaign manager David Plouffe.
-
Eric Schmidt, the chairman of Google’s parent company Alphabet, expressed a desire more than two years ago to be the “head outside adviser” to Hillary Clinton’s presidential campaign, according to an email released by WikiLeaks.
The email, dating back to 2014, was part of a bigger trove released by the whistle-blower website, all of which were from the Gmail account of Clinton campaign chairman John Podesta.
There have been unproven claims by the Democratic Party that the leaked material has been provided by Russian sources.
In the email, sent to campaign manager Robby Mook, Podesta wrote that he had met Schmidt on 2 April 2014 and that he (Schmidt) was “ready to fund, advise recruit talent, etc”.
Podesta apparently expected Schmidt to be a pushy sort, as he wrote, “He (Schmidt) was more deferential on structure than I expected. Wasn’t pushing to run through one of his existing firms. Clearly wants to be head outside advisor, but didn’t seem like he wanted to push others out. Clearly wants to get going.
“He’s still in DC tomorrow and would like to meet with you if you are in DC in the afternoon. I think it’s worth doing. You around? If you are, and want to meet with him, maybe the four of us can get on the phone in the am.”
Mook was in Australia at the time, but wrote back to Podesta that he would “to do a call w him before I get back or meet with him after the 23rd”.
-
Has America become so numb by the decades of lies and cynicism oozing from Clinton Inc. that it could elect Hillary Clinton as president, even after Friday’s FBI announcement that it had reopened an investigation of her emails while secretary of state?
We’ll find out soon enough.
It’s obvious the American political system is breaking down. It’s been crumbling for some time now, and the establishment elite know it and they’re properly frightened. Donald Trump, the vulgarian at their gates, is a symptom, not a cause. Hillary Clinton and husband Bill are both cause and effect.
FBI director James Comey’s announcement about the renewed Clinton email investigation is the bombshell in the presidential campaign. That he announced this so close to Election Day should tell every thinking person that what the FBI is looking at is extremely serious.
This can’t be about pervert Anthony Weiner and his reported desire for a teenage girl. But it can be about the laptop of Weiner’s wife, Clinton aide Huma Abedin, and emails between her and Hillary. It comes after the FBI investigation in which Comey concluded Clinton had lied and been “reckless” with national secrets, but said he could not recommend prosecution.
-
The Clinton Foundation spent less than 6 percent of its budget on charitable grants in 2014 and less than 10% the year prior, according to documents the organization filed with the Internal Revenue Service (IRS).
-
For much of the summer, the F.B.I. pursued a widening investigation into a Russian role in the American presidential campaign. Agents scrutinized advisers close to Donald J. Trump, looked for financial connections with Russian financial figures, searched for those involved in hacking the computers of Democrats, and even chased a lead — which they ultimately came to doubt — about a possible secret channel of email communication from the Trump Organization to a Russian bank.
Law enforcement officials say that none of the investigations so far have found any link between Mr. Trump and the Russian government. And even the hacking into Democratic emails, F.B.I. and intelligence officials now believe, was aimed at disrupting the presidential election rather than electing Mr. Trump.
Hillary Clinton’s supporters, angry over what they regard as a lack of scrutiny of Mr. Trump by law enforcement officials, pushed for these investigations. In recent days they have also demanded that James B. Comey, the director of the F.B.I., discuss them publicly, as he did last week when he announced that a new batch of emails possibly connected to Mrs. Clinton had been discovered.
-
Donald Trump’s self-inflicted wounds and propensity for public meltdowns had pushed the public-opinion needle toward Hillary Clinton, according to recent polls. That may have changed a little in the aftermath of the FBI’s renewing of its email probe last week. But even so, the fears of many voters that a Donald Trump presidency might become a reality have abated.
Those fears are not unfounded. Trump’s failings as a candidate and a person are manifest, and he would be in a position to wreak considerable havoc if elected. That’s especially true at the agency level, with the judiciary and in other arenas where the president can wield executive power. The wildcard aspect of his personality poses risks that can’t be predicted, nor can anyone know the degree to which congress would be inclined to obstruct or approve his most damaging initiatives.
What has been lost in the salacious and obsessive media coverage of the Republican nominee’s outrageous behavior, bigoted remarks and appeal to the worst instincts of the electorate, however, is a critical examination of what a Clinton administration will mean for the nation. The FBI probe, information on tangled interests within the Clinton Foundation, evidence of influence peddling and Wikileaks revelations detailing manipulation of media and the democratic process, signal a plutocratic style of governance that is all too familiar and increasingly dominant at the federal level.
The content of what has been revealed in these leaks, as well as her lengthy track record in government and policy statements as a candidate yield an inescapable conclusion: Hillary Clinton represents the entrenched interests of the status quo. Her election will expand the excesses of global interventionism and corporate welfare that have characterized US policies for several decades – at tremendous, almost incalculable cost both domestically and internationally.
-
“We could for example cancel the obsolete F-35 fighter jet program, create a Wall Street transaction tax (where a 0.2% tax would produce over $350 billion per year), or canceling the planned trillion dollar investment in a new generation of nuclear weapons. Unlike weapons programs and tax cuts for the super rich, investing in higher education and freeing millions of Americans from debt will have tremendous benefits for the real economy.”
-
Ira Magaziner, the CEO of the Clinton Health Access Initiative, asked former President Bill Clinton to thank Morocco’s King Mohammed VI for “offering his plane to the conference in Ethiopia.”
“CHAI would like to request that President Clinton call Sheik Mohammed to thank him for offering his plane to the conference in Ethiopia,” Magaziner gushed in a November 22, 2011 email released by WikiLeaks.
Clinton frequently has expected free, luxurious private jet travel during his post-presidential life. Clinton, his wife and daughter have artfully secured free air travel and luxurious accommodations since they left the White House. It’s an effective way to accept gifts of great value without declaring them for the Clinton Foundation.
-
Last week, WikiLeaks dropped a 2011 memo by top Bill Clinton aide Doug Band that lays bare Team Clinton’s sordid financial dealings when Hillary Clinton was secretary of State.
Band describes how the Clinton Foundation served as a conduit for what he called “Bill Clinton Inc.” — the former president’s for-profit arm. Other documents show State Department involvement.
The result is an unsavory mix of charity work, profiteering, and pay-to-play politics that potentially reaches the highest levels of US foreign policy and screams for IRS and Department of Justice reviews.
At center is Band and his consulting firm Teneo. Band served as gatekeeper to all things Bill Clinton. Those wanting a former president as golf partner ponied up. Requests for Foundation dough followed. Next came Clinton Inc. — the steady stream of speeches, books, and honorary titles that enriched Bill Clinton. Teneo managed it all.
Huge corporations and others seeking Clinton’s orbit lined up. Teneo’s clients included major U.S. corporations Coca-Cola and Dow Chemical, which donated huge sums.
Foreign firms like UBS donated and greased Clinton Inc.
For-profit Laureate International Universities went further, buying Clinton “advice” and rights to his prestige for $3.5 million annually. In all, Band states Teneo’s management yielded the former president $50 million — including a $2 million upfront slice of Band’s firm — with another $66 million queued. Band also facilitated political activity including securing campaign donors and managing Clinton’s political schedule.
-
Public Corruption: As the unseemly ties between the Clinton Foundation and Hillary Clinton’s State Department become more glaring and disturbing, the rhetoric from the Democratic side is getting more desperate. Now Clinton hatchet man James Carville says critics of the foundation are going to hell.
-
The race for the White House is tight, but it has not been radically changed by the FBI director’s bombshell announcement last week.
Hillary Clinton has a slim three-point lead over Donald Trump one week before Election Day, according to a new POLITICO/Morning Consult poll conducted entirely after FBI Director James Comey announced the discovery of new emails that might pertain to the former secretary of state’s private server.
Clinton leads Trump 46 percent to 43 percent in a two-way race, and 42 percent to 39 percent in a four-way race, with Libertarian nominee Gary Johnson at 7 percent and the Green Party’s Jill Stein at 5 percent.
The poll was conducted using an online panel of 1,772 likely voters on Saturday and Sunday, beginning one day after Comey’s announcement. The poll carries a margin or error of 2 percentage points.
-
Republican presidential nominee Donald Trump has overtaken Democratic rival Hillary Clinton for the first time since May in a national tracking poll.
Trump has a 1-point lead over the former secretary of State, 46 to 45 percent, in the ABC News/Washington Post poll released Tuesday morning.
-
While vote preferences have held essentially steady, she’s now a slim point behind Donald Trump — a first since May — in the latest ABC News/Washington Post tracking poll, produced for ABC by Langer Research Associates.
Forty-six percent of likely voters support Trump in the latest results, with 45 percent for Clinton. Taking it to the decimal for illustrative purposes, a mere .7 of a percentage point divides them. Third-party candidate Gary Johnson has 3 percent, a new low; Jill Stein, 2 percent.
-
Censorship by Facebook has become a thorn in the side of nearly anyone with an opinion differing from the narrative touted by the corporate press — for instance, sentiments not praising Hillary Clinton — and now, through both a new report from Reuters and emails published by Wikileaks, we have insight into why certain posts are targeted.
-
Now that the FBI has obtained the needed warrant to start poring over the 650,000 or so emails uncovered in Anthony Weiner’s notebook, among which thousands of emails sent from Huma Abedin using Hillary Clinton’s personal server, moments ago the US Justice Department announced it is also joining the probe, and as AP reported moments ago, vowed to dedicate all needed resources to quickly review the over half a million emails in the Clinton case.
-
People trust the “unbiased” internet search giant Google so much it can actually influence up to 10 million undecided voters to choose Hillary Clinton for president, prominent US psychologist and author Robert Epstein told RT following years of research.
Despite being a supporter of the Democratic presidential nominee, Dr. Epstein believes Google’s unchecked algorithm of placing one candidate over the other in search results constitutes a “threat to democracy.”
-
Censorship/Free Speech
-
Oscar-nominated director Andrei Zvyagintsev on Thursday launched a furious attack on the Kremlin over government censorship that he said is strangling the arts. “It’s completely obvious that censorship has fully entered into the cultural life of the country,” Zyagintsev posted on the website of the Kommersant daily.
-
A bill to censor pornography on the internet by default has passed unanimously in a vote on Sunday by the Ministerial Committee for Legislation. It was sponsored by Bayit Yehudi MK Shuli Mualem-Refaeli, who said she is “not interested in blocking a campaign for breast cancer awareness,” but rather wants to be sure that local websites clearly tag content in a way that assists the filters.
The bill forces Israeli internet service providers (ISPs) to censor pornography by default, and requires users to notify their service providers either in writing, by phone or via the ISP website in order to opt out of the censorship.
-
Following Monday’s raid on Turkey’s leading secular paper, “Cumhuriyet,” and the shuttering of 15 opposition news outlets over the weekend, the nation’s journalists are facing an increasingly restrictive media environment.
More than 160 news organizations have been closed since July’s coup attempt for alleged terror links and charges of spreading anti-government propaganda. In response, a group of laid-off journalists launched a social media-based newscast to subvert state censorship and keep citizens informed.
Dubbed “#HaberSIZsiniz,” the campaign is a play on words between “you are unaware” and “you are the news.” Organizers held their first broadcast from the capital, Ankara, on Sunday via Periscope and Facebook live streams to report news excluded from mainstream media coverage.
“We are seeing new levels of oppression on journalism,” said Aysegul Dogan, a former anchor for the shuttered IMC TV and main host for the event. “This movement has been created to help people raise their voices and to make sure events in Turkey don’t go unnoticed.”
-
WHAT does a film certification board do? In Kenya, at least according to Ezekiel Mutua, the head of the Kenya Film Classification Board (KFCB), the job seems to have expanded a lot. As well as certifying films, Mr Mutua and his officials have also promised to raid strip clubs to prevent a wave of “bestiality”, raged against homosexuality and threatened to regulate Netflix to prevent it from becoming a threat to national security. The wave of censoriousness has amused the Kenyan press—and made Mr Mutua into a national figure. But some Kenyans worry that it hints at a growing willingness on the part of the government to use censorship ahead of a tense general election next year.
-
Editorial cartoonists in Canada occasionally experience censorship, and perhaps more often, self-censor to avoid getting into trouble with their bosses. But the seriousness of this issue depends on whom you speak to in the profession.
“I would say that the censorship thing is not a huge problem,” says Wes Tyrell, a Toronto-based cartoonist and illustrator and president of the Association of Canadian Cartoonists (ACC) which “promotes the interests of staff and freelance cartoonists in Canada.” But he also concedes he may not have a clear picture since his colleagues are loath sometimes to publicly discuss their conflicts with their editors.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Privacy/Surveillance
-
Putting the word out: I was interrogated by the Finnish police today for
multiple alleged counts (15+) of identity crimes, fraud and attempts of
fraud. The invitation letter to be interrogated was sent out on
2016-10-21 and received by me on 2016-10-25. Today is 2016-10-31.
The police suspects me because of an “IP-address assigned to my name”,
which I can’t confirm or deny to have a relation to me. As a suspect, I
was not told what this aclaimed IP-address was on a specific date to my
knowledge. It is only speculation if these allegations wrongly against
me have something to do with my relation with the Tor community or
activism about digital rights online.
Pending ongoing investigation, I am not allowed by law to share more
specific details about to the investigation. I’d be glad to reveal more
details about the case once the investigation is over and share/hear how
I became a suspect, once I know about it. (Note that my story is at
least slightly opinionated.)
I had a witness with me and I feel like my rights were being violated
during the interrogation. The officer (not to be named publicly in
respect for privacy) didn’t want to allow me to write down their badge
number by taking the badge away from me while trying to write down the
numbers. The officer looked slightly anxious.
-
If all that is meaningless to you, don’t worry. Researchers at the Georgia Institute of Technology have found a way for humans to learn Morse code in four hours just by playing games.
The subjects were given Google Glass headsets (ask your parents) and continued to play games while vibrations near the ear slowly embedded subconscious Morsey goodness into their brains, reported Phys.org.
-
The South African company best known for selling Muammar Gaddafi’s regime spy equipment used to monitor millions of Libyans’ international phone calls is now claiming it can intercept communications on a scale that rivals a government spy agency, according to a company brochure obtained by The Intercept.
In a 2016 pamphlet produced by VASTech SA Pty Ltd., the company outlines its current capabilities for governments, militaries, and law enforcement agencies around the world, claiming it can conduct “passive detection” of communications transmitted from satellites, fix-and-mobile phones, and fiber optic cable.
The company is offering multiple tools to vacuum up communications from around the globe undetected, or what the company calls “communication intelligence extraction solutions” — a capability not unlike the U.S. National Security Agency’s PRISM program.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
The US National Security Agency’s (NSA) latest alleged leaker apparently raised no red flags despite a history of abnormal behaviour. The New York Times reported on 29 October that Harold T. Martin III, who is accused of stealing 50 terabytes of data from the NSA, apparently dealt with divorces, unpaid taxes, legal charges and drinking problems and was still allowed access to top secret information.
In a detention hearing on 28 October, Judge Richard D. Bennett noted that Martin had a history of drinking problems. In 2006, he faced a drunk driving charge. Martin is known to have been called up for unpaid taxes in 2000, which he did not pay off for over a decade. Martin’s other run ins with the law include a computer harassment charge and an incident where he pretended to be a police officer during a traffic dispute.
Martin’s house would eventually be raided by the Federal Bureau of Investigation in August 2016. He was arrested when investigators found thousands of pages of classified material on several storage devices, apparently taken from a variety of jobs he held as an NSA contractor, most recently for Booz Allen. It is not clear whether Martin was merely hoarding this information, or intended to leak it. His lawyers have stated that “there is no evidence that he intended to betray his country”.
-
A bunch of organizations concerned with privacy, free press, and human rights are gently reminding the outgoing president that he still hasn’t fully responded to a We the People petition about encryption.
-
Montreal police strongly defended a highly controversial decision to spy on a La Presse columnist by tracking his cellphone calls and texts and monitoring his whereabouts as part of a necessary internal police investigation — while the journalist involved called what they did “indefensible.”
“Lives were not at stake, this was not a question of national security,” La Presse columnist Patrick Lagacé said in an interview Monday. “The leaks made them look bad, that’s why they decided to go after me in the way they did.”
Opposition politicians are also condemning Montreal police for spying on Lagacé, though Montreal Mayor Denis Coderre stood by police chief Philippe Pichet on Monday, noting that a mayor should not intervene in police operations, but did say he was troubled by the news.
For several months this year, police were monitoring Lagacé’s iPhone to determine the identity of his sources, La Presse reported. This was confirmed to Lagacé last Thursday by Montreal police.
At least 24 surveillance warrants were granted by courts in 2016, at the request of the Montreal police department’s special investigations section, which probes crime within the police force. The warrants allowed police to track the telephone numbers of incoming and outgoing calls on Lagacé’s phone, and to monitor the phone’s location, although Pichet denied at a hastily convened press conference Monday that the GPS on his phone was monitored.
Lagacé said he is sure many judges around the world have been asked by police departments to grant similar warrants, but refused because it was too “vulgar” to spy on a reporter. “It was incredibly aggressive,” he said, questioning the judgment of the judge involved.
-
The Investigatory Powers Bill will have its third reading, a final chance to tidy up the bill and make changes, in the House of Lords on Monday 31 October.
-
The court, failing to understand anything but its power to order people around, demanded Skype turn over communications. Skype turned over the only thing it could actually obtain, explaining that its architecture didn’t support the interception of calls. No dice. That only made the court angry.
The court was no more happy to have pointed out to it that Microsoft didn’t actually fall under its jurisdiction. It maintains no data centers in Belgium, nor does it have anyone employed there. Microsoft suggested the court work with governments of countries where it actually maintains a presence and utilize their mutual assistance treaties.
-
Corporate journalists rely on the First Amendment, but it’s increasingly unclear if the First Amendment can rely on them. The relative lack of interest in the impact of spying on activists—a practice with a long and disturbing history given new power by technology—is the latest example.
-
Over the past week, we’ve been talking a lot about the need for more transparency and user control for privacy on the internet, so it’s only fitting that the FCC has officially adopted its new privacy rules for ISPs that will require broadband providers to be much more explicit concerning what information it collects and shares with others, and provide (mostly) clear “opt-in” requirements on some of that data collection. This isn’t a surprise. It was pretty clear that the FCC was going to approve these rules that it announced earlier this year. And, of course, the big broadband providers threw a giant hissy fit over these rules that just ask them to be more transparent and give users at least a little bit of control over what data is collected.
Comcast has caused these proposals “irrational” and various think tankers paid for by the broadband providers tried to tell the world that poor people benefit from a lack of privacy. And magically new studies came out claiming that broadband providers are cuddly and lovable, rather than snarfing up everyone’s data.
And, of course, the various broadband providers want to blame Google for the rules, because everyone wants to blame Google for everything. The issue here is that the broadband access providers have these rules, while online service providers, like Google and Facebook do not. There are, of course, a few responses to this. The first, is that the FCC doesn’t have authority over those sites, like it does have over the access providers under the Telecom Act. The second is that users are much more locked in to their broadband access provider, and there is much less competition. Switching is much more difficult. The third argument is, basically, that Google and Facebook don’t have nearly the same history as the broadband access providers of really nasty privacy violations. Hell, just as these new rules were coming, Verizon was being fined for stealth zombie cookies. Finally, the simple fact is that broadband access providers have the power to spy on a lot more internet activity than Google or Facebook. Yes, those other services are in more and more places, but it’s not difficult to block them. With your ISP everything goes through their pipes, and unless you carefully encrypt your traffic via a VPN, they get to see everything.
-
In recent weeks, the Hollywood film about Edward Snowden and the movement to pardon the NSA whistleblower have renewed worldwide attention on the scope and substance of government surveillance programs. In the United States, however, the debate has often been a narrow one, focused on the rights of Americans under domestic law but mostly blind to the privacy rights of millions of others affected by this surveillance.
-
Civil Rights/Policing
-
While elite media wait for the resistance to the Dakota Access Pipeline to go away so they can return to presenting their own chin-stroking as what it means to take climate change seriously, independent media continue to fill the void with actual coverage.
One place you can go to find reporting is The Intercept (10/25/16), where journalist Jihan Hafiz filed a video report from North Dakota, where the Standing Rock Sioux and their allies continue their stand against the sacred site–trampling, water supply–threatening project.
-
Schlosberg was arrested in Walhalla, North Dakota, on October 11 for filming activist Michael Foster — a member of the group known as Climate Direct Action — as he shut off a valve of a Canadian tar sands pipeline. In solidarity with protesters opposing the Dakota Access Pipeline in North Dakota, activists shut down similar valves in Washington, Montana, and Minnesota on the same day.
However, authorities in North Dakota have charged the filmmaker with two Class A felonies and one Class C felony, including conspiracy to theft of property, conspiracy to theft of services, and conspiracy to tampering with or damaging a public service.
-
Descendants of the tens of thousands of German Jews who fled the Nazis and found refuge in Britain are making use of their legal right to become German citizens following the Brexit vote.
German authorities have reported a twentyfold increase in the number of restored citizenship applications – a right reserved for anybody who was persecuted on political, racial or religious grounds during the Nazi dictatorship, as well as their descendants.
-
Baby factories in Nigeria are pumping out babies for sale on the illegal adoption market. Swedish journalist Therese Cristiansson infiltrated these baby-trafficking networks with a hidden camera.
-
The Presidential Committee on North-East Initiative has revealed that the nation lost about $9bn to the violent activities of the Boko Haram insurgents in Borno, Yobe and Adamawa states.
According to the committee, a strategic framework would soon be set up by President Muhammadu Buhari in line with his determination to rebuild the North-East.
The Vice-Chairman of the PCNI, Alhaji Tijani Tumsah, said this on Thursday in Abuja, while briefing newsmen on the outcome of its inaugural meeting.
According to him, the focus of the meeting was to discuss the mandate given to the PCNI to fashion out a way that would be most direct, in terms of the delivery of that mandate, analyse the enormity of the task and fulfil the presidential mandate to give succour to the people of the North-East.
Tumsah said, “We are not investigating anybody; there are people who are investigating such diversions. I’m glad you mentioned the Senate, the House of Representatives, police and the EFCC. Our mandate, going forward, is to provide a strategic framework for the implementation of all interventions going into the North-East in terms of humanitarian works, resettlement and eventual rebuilding of the North-East.
-
On Monday, Iranian intelligence authorities broke the apartment door of writer and human rights activist Golrokh Ebrahimi Iraee, raided her apartment and took her by force to serve a 6 year prison sentence for writing a story on stoning women in Islam, that was never published.
Golrokh Ebrahimi Iraee 35 years old, is the wife of political prisoner Arash Sadeghi, 36 who is now serving a 19 year prison sentence in Iranian prisons. The family has suffered much mistreatment since the 2009 disputed presidential election in Iran and have been in and out of prison. They have also lost their mother who had a stroke the minute the authorities raided their home in 2009.
-
Iranian authorities must immediately repeal the conviction and sentence of Golrokh Ebrahimi Iraee, a writer and human rights activist who is due to begin serving six years in prison on charges including “insulting Islamic sanctities” through the writing of an unpublished story about the horrific practice of stoning, Amnesty International said today.
“The charges against Golrokh Ebrahimi Iraee are ludicrous. She is facing years behind bars simply for writing a story, and one which was not even published – she is effectively being punished for using her imagination,” said Philip Luther, Research and Advocacy Director for the Middle East and North Africa at Amnesty International.
-
A woman has described being strip-searched by police when she was 12 years old.
Georgia Wood, now 20, said the officers were “horrible and demeaning” and the incident had “really affected” her life, leaving her lacking confidence and suffering panic attacks.
Ms Wood was taken into police custody in south Wales eight years ago with her mother, who was suspected of possessing drugs.
No illegal substances were found on Ms Wood or her mother, Karen Archer, who wasn’t charged with an offence.
According to figures acquired by the BBC from 13 police forces in England and Wales, more than 5,000 children aged 17 and under were strip-searched between 2013 and 2015.
-
A young Saudi Arabian Shi’a activist, who was sentenced to death last year, has lost his final appeal for justice and is due to be executed by beheading, followed by the mounting of his headless body onto a crucifix for public viewing.
Human rights groups and Saudi critics are appalled by both the nature of the execution and the flimsy case against Ali Mohammed al-Nimr, though neither of these factors are unusual in today’s Saudi Arabia.
-
More than 100 Muslim women have complained about their treatment under two government probes into Sharia law.
The inquiries – one ordered by Theresa May when she was home secretary, and another by the home affairs select committee – are ongoing.
But some women have signed an open letter and said the aim is to ban Sharia councils, not reform them.
The Muslim Women’s Network UK said the inquiries risk treating women like “political footballs”.
The councils are tribunals often used to settle disputes within the Muslim community.
The first evidence session on Sharia councils is due to be held by the home affairs committee on Tuesday.
-
Leading figures from the UK’s Sharia councils will give evidence in parliament tomorrow, in the wake of accusations that a leading Sharia court has been protecting domestic abusers from criminal proceedings.
The Home Affairs Select Committee has published written evidence submitted to it that is heavily critical of the Muslim Arbitration Tribunal (Mat) in Nuneaton, Warwickshire, in advance of its session on Tuesday. The Mat states on its website that it urges the Crown Prosecution Service to “reconsider” criminal charges brought against Muslim men accused of domestic violence.
The Southall Black Sisters, a group that helps vulnerable women, have told the committee that the strategy of asking the CPS to “reconsider” cases is an “attempt to sabotage criminal proceedings”.
-
UK Chancellor Philip Hammond is due to reaffirm a pledge to spend £1.9bn up until the end of 2020 to bolster the UK’s cyber security strategy in a speech early this afternoon.
The updated strategy – which doesn’t include any new spending pledges1 – is expected to include an increase in focus on investment in automated defences to combat malware and spam emails, establish a fund earmarked to recruit 50 specialists to work on cybercrime at the National Crime Agency, the creation of a Cyber Security Research Institute and an “innovation fund” for cyber security startups. All this investment is needed because of increased threats from nation state attackers, terrorists and organised crime gangs, the Chancellor is expected to say.
-
There’s only a couple of months left until the DOJ’s proposed Rule 41 changes become law. All Congress has to do is nothing. This is a level of effort Congress is mostly amenable to. If this becomes law, worldwide deployments of malware/spyware during investigations will be unable to be challenged in court. In addition, the DOJ wants to be part of the cyberwar. It’s seeking permission to remotely access zombie computers/devices used in cyberattacks to “clean” them.
-
On Monday, supporters of the Standing Rock Sioux Tribe’s protest against the Dakota Access Pipeline began a viral campaign enticing people to “check in” to the reservation on Facebook as a way to “overwhelm and confuse” local law enforcement.
However, there is no evidence that this tactic is effective, particularly as the Morton County Sheriff’s Department expressly said on its own Facebook page that it “is not and does not follow Facebook check-ins for the protest camp or any location. This claim/rumor is absolutely false.”
In recent months, activists have been protesting at the site on the border of North and South Dakota in an attempt to halt a planned oil pipeline that many believe would damage the local water supply and desecrate tribal lands.
This Facebook plea is similar to calls in 2009, during the controversial presidential election in Iran, where supporters of the Green Movement urged people to change their Twitter location to Tehran. Similarly, there was no indication that this action mitigated local Iranian authorities’ ability to arrest protesters.
-
Turkey has detained 13 journalists in an ongoing wave of government crackdowns following a coup attempt in July.
Early Monday morning, Turkish police detained Murat Sabuncu, editor-in-chief of the newspaper Cumhuriyet, along with a dozen other reporters in a raid, according to official news agency Anadolu.
-
As if facing down violent Islamist fanatics isn’t enough, Muslim reformers now have to dodge attacks from the American left. Consider the Southern Poverty Law Center’s decision last week to brand two such reformers, Ayaan Hirsi Ali and Britain’s Maajid Nawaz, as “anti-Muslim extremists.”
-
A 20-year-old woman in Indonesia has been publicly caned for standing too close to her boyfriend, becoming the 14th person to be flogged this month in the same province.
The unnamed woman was accused of breaking Islamic Sharia law, which strictly forbids unmarried couples to become intimate, and was flogged in front of a crowd in Banda Aceh province.
She was escorted onto a stage outside a mosque wearing a headdress and was lashed with a cane.
Incidents of the punishment have reportedly increased recently in Indonesia.
-
Internet Policy/Net Neutrality
-
Over the years, we’ve noted how AT&T has a nasty habit of lying to sell the public, press and regulators on the company’s neverending attempts to grow larger. Whether it’s promising broadband expansions that never arrive, or using astroturf to try and argue anti-consumer mergers are good for toddlers, AT&T’s lobbyists, lawyers, and policy tendrils work tirelessly to argue that up is down, black is white, and any skepticism of its claims are unfounded hysteria. As we saw with the blocked T-Mobile merger, this sort of behavior doesn’t work quite as well as it used to.
Enter AT&T’s latest $85 billion planned acquisition of Time Warner. Consumer advocates worry AT&T could use its size and leverage to make content more expensive, while the usage caps and zero rating give AT&T’s own upcoming streaming video service an unfair market advantage. Wall Street hasn’t exactly been bullish on the idea either, noting how AT&T’s $69 billion acquisition of DirecTV, followed by its $85 billion acquisition of Time Warner is not only a giant risk on the eve of the cord cutting revolution, but it saddles AT&T with an absolute mountain of debt that will potentially damage the company’s credit rating.
-
On Monday, Canada’s federal telecommunications regulator debates the principle of net neutrality—the idea that every online service should be equally accessible in terms of connection speed and data costs.
It’s fitting that this hearing takes place on Halloween, because the idea that one of Canada’s telecoms could favour a certain music streaming service, for example, over another—by making Spotify free to use, while Apple Music eats away at your data plan, for example—is pretty spooky.
-
Intellectual Monopolies
-
Copyrights
-
We’ve talked often about how common it is for legitimate customers to get caught up in attempts to thwart piracy and copyright infringement. From DRM keeping legit purchasers from using what they paid for to Fair Use uses of content getting taken down by automatic systems on sites like YouTube, it’s worth noting whenever this happens. After all, there is an expression in the legal system that goes something like: I’d rather set 100 guilty people free than imprison a single innocent. The stakes when it comes to copyright aren’t as high as jail time, typically, but it’s interesting how little this mantra penetrates with those who would enforce copyright via carpet-bomb rather than a scalpel.
Take the recent incident with Sega’s Steam Workshop mod-space, for instance, where dozens and dozens of mods within the platform suddenly disappeared.
-
Last week, I mentioned that I was giving a talk at the Wikimedia Foundation about copyright. It was a fun time, and the video from the talk is now online. Unfortunately, the audio and the video are… not entirely great. I’d complain about the terrible microphone, but that sounds like a certain presidential candidate. The video is okay, but the colors are off, so my presentation looks a little weird. Either way, you should still be able to get the basics. There’s an introduction from Jan Gerlach at the Wikimedia Foundation, talking about all the important policy work they do, then my talk that runs about half an hour, followed by a Q&A with the audience that runs another half hour or so. It was a fun time, with a really great group of folks, and the conversation continued on after the official session ended for quite a while.
-
The copyright case involving Stephanie Lenz and her dancing baby is one that may finally be nearing a conclusion after many, many years — but it’s not over yet. As you may recall, Lenz posted a very brief clip of her then toddler, dancing along to a few seconds of a barely audible Prince song. This was almost a decade ago.
-
Star Athletica v Varsity Brands involves copyright protection for cheerleader uniforms. The question asked is: What is the appropriate test to determine when a feature of a useful article is protectable under Section 101 of the Copyright Act?
“It is important because the court may well strike out on a new course or at least throw its determinative hat in the ring on how to approach useful articles more generally,” says Robert Brauneis of The George Washington University Law School, who will be presenting the session.
-
Today the Supreme Court heard oral arguments in the pending copyright case of Star Athletica v. Varsity Brands. Although not a patent case, the issue involves the boundary line (if any) between patent and copyright and the “useful article” exception. Question Presented: What is the appropriate test to determine when a feature of a useful article is protectable under section 101 of the Copyright Act. The statutory test under Section 101 states that “the design of a useful article . . . shall be considered a pictorial, graphic, or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article.”
-
The Russian intellectual property industry is on the verge of a new scandal. Following the recent arrest of Sergey Fedotov, head of the Russian Authors’ Society (RAS), Russia’s leading public association for the protection of intellectual property rights, on the charge of multi-million ruble thefts, the Russian police has announced the initiation of criminal proceedings against Maxim Ryabyko, head of the Russian Association for the Protection of Copyright on the Internet (RAPCI).
-
Since it’s become mandatory for ISPs to forward piracy notifications in Canada, hundreds of thousands of people have received letters over alleged copyright infringements. One of these accused pirates is an elderly woman, who’s threatened with $5,000 in potential damages for downloading a zombie game she’s never heard of.
-
Post-nuclear war, mutant-killing video games are not Christine McMillan’s thing.
But the 86-year-old from Ontario has been warned she could have to pay up to $5,000 for illegally downloading a game she’d never heard of.
She is one of likely tens of thousands of Canadians who have received notices to pay up, whether they are guilty or not.
“I found it quite shocking … I’m 86 years old, no one has access to my computer but me, why would I download a war game?” McMillan told Go Public.
In May, she received two emails forwarded by her internet provider.
They were from a private company called Canadian Intellectual Property Rights Enforcement (CANIPRE) claiming she had illegally downloaded Metro 2033, a first-person shooter game where nuclear war survivors have to kill mutants.
-
Copyright trolling is somehow still a thing and it never seems to fail to provide ridiculous examples of miscarriages of justice. It has been long pointed out how rife with inaccuracy the process of threatening individuals with lawsuits and fines based on infringement as evidenced only by IP address is. Even courts have time and time again pointed out that an IP address is not sufficient to identify a person responsible for a given action. Yet the trolls still send out their threat letters, because bullying in this manner generally works.
The latest example of this kind of trolling misfire comes from Canada, where 86-year-old Christine McMillan received a threat letter from CANIPRE over an alleged infringing download of Metro 2033, a game in which the player slaughters zombies in a post-nuclear world.
-
The Pirate Party in Iceland booked an important victory in the local parliamentary election today, scoring 14.5% of the total vote. While lower than most polls predicted, it marks the first time that a Pirate Party, anywhere in the world, has a serious shot at taking part in a government coalition.
-
After near-constant exposure to the nausea-inducing dumpster fire that is the 2016 U.S. presidential race, it might be hard to grok that a movement of anti-establishment internet pirates has become one of the leading political parties of a small island nation.
And yet that’s what’s happening in right now in Iceland, where the hacktivist-inspired Pirate Party achieved significant victories in the country’s parliamentary elections yesterday. Yesterday they won 14.5 percent of the popular vote, putting them in third place behind the center-right Independence Party and the Left-Green Movement, who won 29 percent and 15.9 percent of the vote respectively. (Earlier results showed them beating the Left-Green Movement for second place, but that changed as more votes were counted.)
It wasn’t enough to seize majority control of the country as some polls for the extremely tight race were suggesting, but it was enough to win them 10 seats in the 63-seat parliament, up from the mere three they held after the 2013 elections. The formerly leading center-right Progressive Party, meanwhile, saw its seats drop by over half from 19 to eight, its dominance soundly trounced by the Pirates and the country’s smaller left-leaning parties: Left-Green, Bright Future, and Social Democrats. In the wake of the news, Icelandic prime minister and progressive Party member Sigurður Ingi Jóhannsson resigned Sunday.
-
We’ve seen all manner of silly claims by copyright licensing groups as to what requires what kind of license in every kind of circumstance. These licensing groups have gone after children’s charities. A UK collection society had the strategy of calling up local businesses and demanding payments should they hear music playing in the background. The Author’s Guild once claimed that reading a book out loud constituted the need for a separate license, while ASCAP asserted with a straight face that the ring of a mobile phone was a public performance. This panoply of idiocy might be funny, except for the very real harm done through this kind of harassment.
Even the good stories in this vein weigh heavily in that they are necessary at all. For instance, the advocate general for the EU’s Court of Justice recently wrote an opinion advising that hotels didn’t need a copyright license just to have televisions within guest rooms. It’s a good ruling, but conjures the frustrating question as to why it was needed in the first place. The answer, of course, is because a collection group was attempting to collect from hotels for just that reason.
Permalink
Send this to a friend