Microsoft stack is a mutual fund’s assured destruction
Summary: SunGard, which is a Microsoft shop, is clearly failing to provide what it calls mission-ciriticaal [sic] solutions
IT HAS been an exceptionally long time since we last heard from or wrote about the London Stock Exchange (LSE) [1, 2, 3, 4, 5] because now that it runs a lot of Free software, including GNU/Linux at the very core, it is so stable that the architecture is not newsworthy. It’s uneventful. There are, however, some who still insist on using Windows in mission-critical systems. They are paying a high price for this, first at acquisition and later when things go awry, repeatedly even.
Not only the LSE moved to GNU/Linux (dumping Microsoft after many severe problems and a huge bill). Wall Street is famously GNU/Linux-powered after many years with UNIX (it never relied on Windows), but there are private firms that rely on Microsoft and they have just paid a very high price for that. “Bank of New York Mellon Corp.,” says the Wall Street media, “is still working to provide closing prices for certain mutual funds and exchange-traded funds after a technology used to generate net asset values broke down on Monday.”
“Computer Glitch rocks the Mutual Fund Industry,” wrote to us a reader, pointing to more articles about the collateral impact (it’s disrupting the market as a whole). “There’ll be no mention of the Microsoft connection,” he noted. So far he has been right. Nobody calls out Windows. Here is Microsoft’s page about the “Microsoft and SunGard Alliance”. To quote parts of it: “As is demonstrated by the IntelliMatch Operational Control Windows 8, SunGard is innovating utilizing Microsoft technology to ubild mission-ciriticaal [sic] solutions for the global financial services community”
Yes, mission-ciriticaal [sic] (not our typo) is what it’s really for. They can’t even deal with English, so how about real-time systems with trillions of transactions? Based on Google’s cache, the page has contained this typo for quite some time. SunGard is a joke and it relies on Microsoft’s amateurish software.
Having looked for stronger evidence of Windows being the cause, a reader told us, sarcastically: “If it wasn’t Windows they would be singing it to the rafters. On the other hand maybe it was a pretext to shutdown trading as the market was in the middle of another panic selling. Remember when a whole days trades was ‘lost’ on the NY stock exchange. The computers recovered just at the end of day trading.”
“There are many reasons why no firm should ever use Windows, as Stuxnet serves to remind anyone who is still wilfully ignorant. This is especially true for financial firms, law firms, politicians, and journalists.”There are many reasons why no firm should ever use Windows, as Stuxnet serves to remind anyone who is still wilfully ignorant. This is especially true for financial firms, law firms, politicians, and journalists. They don’t need to be “foreign” to be targetted, they just need to be viewed as “hostile” towards some of those who are presently in Power. The government wishes to meddle and disrupt opposition or risk to Power. That’s a universal problem.
The author at TechDirt , as well as others , neglect to mention right now that CIPAV, which the FBI turns out have used to disrupt journalists based on the explosive revelations below, specifically targets Microsoft Windows, a platform with back doors. █
Related/contextual items from the news:
AP Sues FBI Over Impersonating An AP Reporter With A Fake AP Story
Last fall, we wrote about how the FBI had set up a fake AP news story in order to implant malware during an investigation. This came out deep in a document that had been released via a FOIA request by EFF, and first noticed by Chris Soghoian of the ACLU. The documents showed the FBI discussing how to install some malware, called a CIPAV (for Computer and Internet Protocol Address Verifier) by creating a fake news story…
Associated Press sues FBI over fake news story
The Associated Press filed a lawsuit (PDF) this morning, demanding the FBI hand over information about its use of fake news stories. The case stems from a 2007 incident regarding a bomb threat at a school. The FBI created a fake news story with an Associated Press byline, then e-mailed it to a suspect to plant malware on his computer.
The AP sent a Freedom of Information Act request to the FBI last year seeking documents related to the 2014 sting. It also seeks to know how many times the FBI has used such a ruse since 2000. The FBI responded to the AP saying it could take two years or more to gather the information requested. Unsatisfied with the response, the Associated Press has taken the matter to court.
Software patents demolition in the United States
Summary: The crackdown on software patents is coming along nicely and the Alice case is now being utilised even in the capital of patent trolls
WE RECENTLY gave many examples where Alice demolished software patents [1, 2, 3, 4, 5, 6]. The Alice v. CLS Bank case (at SCOTUS) led even the CAFC (overzealously in favour of software patents and their original endorser decades ago) to — believe it or not — overturning decisions/biases. They must all simply obey the new rules/laws and examiners at the USPTO cannot grant patents on software like they used to. It’s huge news, even if many news sites continue to overlook these developments (patent lawyers’ sites try to counter these worrisome — to them of course — developments and precedents using propaganda and cherry-picking of facts).
“Business method patent app[lications] get no respect,” says Patently-O‘s article, according to Richard Beem (patent lawyer). He just says (or whines) that it harms his parasitic business. “The chart above shows the USPTO patent grant rate across a variety of major technology areas,” says Patently-O, but notice the reluctance to distinguish software patents from the rest. The survey does not list “software” separately from other things. Therein lies a potentially strong bias, like that of the originator of software patents, Martin Goetz. He recently wrote no less than two articles dismissing altogether the existence of a “software patents” category/classification.
“If this trend continues, then perhaps the trolls epidemic too will stop, not because of some corporate lobbyists who ask for a bogus ‘reform’ but because of the US Supreme Court.”The EFF, taking note of some recent developments, writes about the quick demise of software patents in the US, owing to courts’ decisions (each reinforcing predecessors). “With Kafkaesque Flourish,” says the title, “the Eastern District of Texas Penalizes Parties for Following the Rules” (we have already written some articles about corruption in Eastern District of Texas courts).
The Eastern District of Texas is the worst court when it comes to patents (favourable to software patents and patent trolls who wield these). To quote the EFF: “In the wake of the Supreme Court’s June 2014 decision in Alice v. CLS Bank, most courts have been quickly and efficiently getting rid of patents that improperly claim “abstract ideas.” In Alice, the Supreme Court held that “abstract ideas,” without more, were unpatentable under 35 U.S.C. § 101. According to one source, at least 150 patents have had claims invalidated as “abstract” since Alice. Those accused of infringing these invalid patents have regularly filed motions to dismiss at the outset of a case, having the issue heard before too much time and energy is spent. Courts have, for the large part, embraced these “Alice motions” and invalidated abstract patents as soon as practicable.”
Here comes the new part: “Following the Eastern District of Texas’s unconventional rules, the defendants filed a letter asking permission to file their Alice motion. Given the potential for wasted time, effort, and money, the defendants very shortly thereafter filed a motion for a stay of the case while the court decided the issue of whether the asserted patent claims are invalid under Alice. The patent owner did not oppose the motion to stay. Presumably the patent owner also recognized that it was more efficient to hear the issue at the outset, without incurring costs that may prove to be wasted if the Alice motion is granted.”
It is nice to see Alice being brought up even in Eastern District of Texas courts. If this trend continues, then perhaps the trolls epidemic too will stop, not because of some corporate lobbyists who ask for a bogus ‘reform’ but because of the US Supreme Court. Even corrupt courts must sooner or later follow the law to avoid being throughly discredited and potentially abolished. █
Apple’s Patent Cases Against Android Are Falling Apart, as Acknowledged Even by the Anti-Android Lobby
Patents on trivial concepts can’t carry water for Apple
Summary: Apple’s attacks on Android (and by extension Linux) run short of results
DESPITE Apple’s ‘generous’ payments to IDG (e.g. for advertisements), IDC‘s parent company, IDC now reports (as widely covered in the media) that Apple is unlikely to ever catch up with Android and Apple’s stock rapidly collapsed recently, costing the company around $100 billion in overall value.
Apple saw the writings on the wall some years ago. It started suing Android half a decade ago, taking advantage of a notorious patent system (the USPTO) that is such an utter joke that it actually let McDonalds have patents on making burgers (patents protectionism) just when in the US, based on this new report, some people are copyrighting a chicken sandwich (or at least trying to). Remember that Oracle attacks Android not only using patents but also copyrights (on APIs). CPTN, a consortium built around Novell’s patents with Apple, Microsoft and Oracle at its core, shows that there is a proprietary software collusion against Android/Linux. Microsoft has been destroying Nokia to turn it into a patent troll, using its patents to feed Android-hostile trolls like MOSAID.
Outside the US (although increasingly in the US too) Apple has not been so lucky when it comes to fighting Android. Watch Europe for instance. Aside from the fact that the system isn’t biased in favour of US companies (like the ITC tends to be), Apple’s slide-to-unlock patent, to give just one example, is nothing more than an old gate lock (thousands of years old) borrowed for digital metaphors. It’s just not patentable in many places, including in Europe. Apple has ultimately embarrassed itself by even trying to follow Steve Jobs' "thermonuclear" (apocalyptic) plan.
“Apple’s anti-Android/anti-Samsung patents are an endangered species in every jurisdiction in which they get challenged (and may soon be an extinct species in Europe)…”
–Florian MüllerAccording to Florian Müller, who has been working for Microsoft (and based on some reports also for Apple) as a sort of lobbyist, Apple continues to be defeated in Europe. To put it in his own words: “The spring 2014 armistice with Google has a major downside for Apple: it related only to infringement cases, not to challenges to the validity of its patents, a fact that was not clear at the time of the original announcement. Five months ago, the European Patent Office revoked Apple’s iconic rubberbanding patent on a Europe-wide basis. The sole remaining party opposing the grant of that patent was Motorola. I have no doubt that Google (not Lenovo) is the driving force behind this continuing effort to shoot down Apple patents, and I guess Google is paying Quinn Emanuel for representing Motorola in cases such as that one.
“Today, Google and QE’s continuing efforts have succeeded once again (and most probably not for the last time): the Federal Court of Justice, Germany’s highest court (besides, theoretically, the Federal Constitutional Court, which has never heard a patent case in its history), today announced (German-language press release) affirmance of the Federal Patent Court’s April 2013 decision to invalidate the German part of Apple’s European slide-to-unlock patent.”
In another article from Müller the failures of Apple are shown to be broader than just in Europe. To quote: “Apple’s anti-Android/anti-Samsung patents are an endangered species in every jurisdiction in which they get challenged (and may soon be an extinct species in Europe), except for the Northern District of California, where Judge Lucy Koh has so far acted as if she was the World Wildlife Fund for Apple patents. But a tipping point may have been reached at which conservation will come to an end even in her district court.”
When even Müller has no favourable opinion on Apple’s case it’s easy to conclude that Apple totally lost the plot.
Let’s hope that Apple will rot on its own, without (any longer) trying to take Android down along with it. █
GTX 760 Vs R7 370 4G In Company Of Heroes 2
Liam has done his initial port reports and such so it’s my turn to feed you some information. I’m once again putting my GTX 760 against the R7 370 to see what kind of performance we can expect from Company of Heroes 2.
- GTX 760 Vs R7 370 4G In Company Of Heroes 2
- NetworkManager 1.0.6 brings metered connections API and more
- NetworkManager 1.0.6
NetworkManager 1.0.6 Adds Support for Wake-on-LAN Configurations, More
Lubomir Rintel informs users about the release and immediate availability for download of the sixth maintenance version of the open-source NetworkManager network connection management utility for GNU/Linux operating systems.
Gnome Boxes – A Front-end Tool For QEMU And KVM
As we all know, there are is no doubt that Linux has tremendous support for Virtualization. There are so many virtualization softwares available including VMWare, VirtualBox, OpenVZ, XEN, KVM, Docker and the list goes. These software are mainly for intermediate and advanced Linux users. If you’re a beginner and having very little knowledge in Virtualization, then it is bit difficult to use the above mentioned tools. You may, probably, need an Intermediate or an expert user’s help. I bet you what? you don’t need anyone help. Yes. Meet Gnome Boxes, a beginner friendly, lightweight, graphical tool that makes virtualization lot easier.
- Zbackup 1.4.3 Has Been Released. Install It On Ubuntu Or Arch Linux Now
- Getting started with syslog-ng 3.7.1 and Elasticsearch / Hadoop / Kafka
- SiteBios – A Free, Open Source, Linux Control Panel
- BluRay playback and ripping on Fedora (AACS, BD+, BD-J)
- Setting up storage for docker on Fedora22 cloud image
- [Howto] Accessing CloudForms updated REST API with Python
- How To Install Notepadqq 0.50.2 on Ubuntu And Arch Linux
- How To Install App Grid 0.252 (Free Alternative to The USC) On Ubuntu 15.10, Ubuntu 15.04 And Ubuntu 14.04 Systems
- Build a network router and firewall with Fedora 22 and systemd-networkd
- Installing the Linux VDA on Red Hat or CentOS 6
- How to Convert From RPM to DEB and DEB to RPM Package Using Alien
- Docker: Installation and Basic usage on Ubuntu 15.04
- Ddrescue-GUI: Front-End for Ddrescue Command-line Tool
Company of Heroes 2 Released on Mac and Linux
Developed by Relic Entertainment and previously published by SEGA for PC, Company of Heroes 2 is also available now for Mac and Linux via Steam, with the Mac App Store version to follow shortly afterwards, Feral Interactive announced.
Carmageddon: Reincarnation Is Still Coming to Linux
Carmageddon: Reincarnation is a game developed by the same team that made the first title all the way back in 1997. They have already released the game on Windows, and they plan to make it available for Linux users as well.
- Company of Heroes 2 Released on Mac and Linux
K Desktop Environment/KDE SC/Qt
KDE Plasma 5.4 Enhances Linux Desktop Experience
The K Desktop Environment (KDE) is one of the earliest Linux desktop environments, dating all the way back to 1996, predating even the popular GNOME desktop environment, which was started in 1999. On Aug. 25, the core KDE desktop, Plasma, got an incremental update to version 5.4 that builds on the innovations that the first Plasma 5 release introduced in July. Among the many changes that users will notice with Plasma 5.4 are more than 1,400 new icons for all KDE applications, providing a more streamlined, modern look and feel to the desktop. Also new to Plasma 5.4 is an optional Application Dashboard that provides a different way to open up applications. Finding an application, or anything else on the KDE desktop, is also improved by way of enhanced search history in the integrated KRunner search tool that is part of the desktop. Plus, the 5.4 update now provides initial support for the Wayland display server that is intended to be a replacement for the decade-old X-Window server. KDE as a desktop environment is available on multiple Linux distributions, including Ubuntu, Fedora and openSUSE. In this slide show, eWEEK examines some of the key features of the KDE Plasma 5.4 desktop.
KDE Sprints – who wins?
To start with, KDE sprints are intensive sessions centered around coding. They take place in person over several days, during which time skillful developers eat, drink and sleep code. There are breaks to refresh and gain perspective, but mostly sprints involve hard, focused work. All of this developer time and effort is unpaid. However travel expenses for some developers are covered by KDE. KDE is a frugal organization with comparatively low administrative costs, and only one paid person who works part time. So the money donated for sprints goes to cover actual expenses. Who gets the money? Almost all of it goes to transportation companies.
- KDE Plasma 5.4 Enhances Linux Desktop Experience
GNOME 3.17.91 beta tarballs due (and more) (responsible: jjardon)
Tarballs are due on 2015-08-31 before 23:59 UTC for the GNOME 3.17.91 beta release, which will be delivered on Wednesday. Modules which were proposed for inclusion should try to follow the unstable schedule so everyone can test them. Please make sure that your tarballs will be uploaded before Monday 23:59 UTC: tarballs uploaded later than that will probably be too late to get in 3.17.91. If you are not able to make a tarball before this deadline or if you think you’ll be late, please send a mail to the release team and we’ll find someone to roll the tarball for you!
GNOME Developers Discuss Codenames, GNOME 3.18 Might be Dubbed “Gothenburg”
Allan Day, a GNOME UX designer working for Red Hat and renowned GNOME developer/contributor, opened an interesting discussion on the official GNOME mailing list, about possible codenames for upcoming releases of the acclaimed desktop environment for GNU/Linux operating systems.
- GNOME 3.17.91 beta tarballs due (and more) (responsible: jjardon)
- K Desktop Environment/KDE SC/Qt
4MParted 13.1 Beta Is a Cool Small OS Based on GParted
4MParted, a Linux distribution based on the 4MLinux and GParted, is now at version 13.1 Beta and is ready for download and testing.
- 4MParted 13.1 Beta Is a Cool Small OS Based on GParted
Red Hat Family
- Red Hat Stock Rating Lowered by Zacks (RHT)
- Red Hat, Inc. (NYSE:RHT) Price Target Update
- The New #155 Most Shorted S&P 500 Component: Red Hat
Red Hat Inc. (RHT) Pops 5.93% for August 26
One of the S&P 500’s big winners for Wednesday August 26 was Red Hat Inc. (RHT) as the company’s stock climbed 5.93% to $73.05 on volume of 2.2 million shares.
ReadySpace Joins Red Hat Certified Cloud and Service Provider Program
Hong-Kong based cloud service provider ReadySpace announced Thursday that it has joined the Red Hat Certified Cloud and Service Provider program. The new Red Hat partner program, launched in July, allows ReadySpace to deliver solutions based on Red Hat’s open source technologies.
ReadySpace CEO David Loke said customers building on open source software and Linux servers had been asking for Red Hat solutions by name to run critical workloads in private and hybrid environments. The company will now offer private cloud build-outs, Linux infrastructure and PaaS solutions based on Red Hat.
Update on Wayland support in Fedora 23
One of the newest features outlined by Christian that is in Fedora 23 is the ability to properly use two or more monitors with vastly different DPIs. This means that if you have a High DPI monitor and a standard DPI monitor the window and text sizes will no longer be tiny (or large) on one monitor and not the other. When dragging windows between the monitors the window will automatically scale to work with the DPI of the screen they are on.
Wayland in Fedora 23 Linux Allows for Use of Multiple Monitors with Different DPIs
Fedora Project, through Christian Schaller, was proud to report on the progress made for the next-generation Wayland display server that it might be used by default on the upcoming major release of the Fedora Linux operating system, Fedora 23.
- Lennart Poettering merged “su” command replacement into systemd: Test Drive on Fedora Rawhide
Fedora 23 Alpha in boot.rackspace.com
When it boots, you’ll be able to select Fedora 23’s Alpha release from the menus. The Workstation, Atomic, and Server images are available.
- Update on Wayland support in Fedora 23
Ubuntu: Wily Werewolf Beta 1 Released
The first beta of the Wily Werewolf (to become 15.10) has now been released!
This beta features images for Kubuntu, Lubuntu, Ubuntu GNOME, Ubuntu Kylin, Ubuntu MATE, Xubuntu and the Ubuntu Cloud images.
Pre-releases of the Wily Werewolf are *not* encouraged for anyone needing a stable system or anyone who is not comfortable running into occasional, even frequent breakage. They are, however, recommended for Ubuntu flavor developers and those who want to help in testing, reporting and fixing bugs as we work towards getting this release ready.
Windows 10: is it finally time to migrate to Ubuntu
Ubuntu continues to grow in popularity, not only with mainstream consumers, but also with Fortune 500 companies. Moreover, government and top notch education entities across the globe have realized they can save millions of USD, and invest funds more prudently for social programmes.
Unity 8 Shows Off Task Switcher and Multiple Desktops – Video
We’ve recently written how Canonical is making Unity 8 act and looks like a proper Linux desktop, and developers have been quick to show us the progress.
Ubuntu Touch Users Can Technically Dial a Number from Terminal
Ubuntu Touch is actually a Linux distribution and it’s easy to forget that sometimes. This means that most of the stuff you can do in the OS can be done from the terminal, including dialing a number, for example.
Ubuntu Archive Still Free Software
In conclusion there is nothing which restricts people making derivatives of Ubuntu except the trademark, and removing branding is easy. (Even that is unnecessary unless you’re trading which most derivatives don’t, but it’s a sign of good faith to remove it anyway.)
Which is why Mark Shuttleworth says “you are fully entitled and encouraged to redistribute .debs and .iso’s”. Lovely.
Ubuntu Linux continues to rule the cloud
Let’s have a pop quiz.
The most popular desktop operating system is… Windows. Right.
The most popular mobile operating system is… Android! Correct.
And, the most popular operating system on the public cloud is… Ubuntu Linux.
Canonical: give Windows 10 the shove and embrace Ubuntu [Ed: see his recent articles to better understand his agenda]
I use two desktop operating systems regularly — Windows 10 and Ubuntu. The former is on my main PC, while the latter came pre-installed on a laptop. I’ve always liked Ubuntu, but never enough to make it my primary OS. Because I spend my days writing about Windows it’s kind of a no brainer that I should immerse myself in Microsoft’s operating system.
Ubuntu 15.10 Beta 1 Releases Now Available for Download, Here’s What’s New
Canonical, through Martin Wimpress, announced just a few minutes ago the immediate availability for download and testing of the first Beta builds for opt-in flavors of the forthcoming Ubuntu 15.10 (Wily Werewolf) operating system.
Ubuntu Core Supports Raspberry Pi 2 I/O
Although it isn’t official, Ubuntu Core–the tiny Internet of Things version of Ubuntu–now runs on the Raspberry Pi 2. There are prebuilt binaries as well as instructions for how to roll your own, if you prefer. You can even access GPIO
- The Ubuntu Touch Users Can Dial Numbers Directly From The Terminal
Mycroft’s AI Could Power Ubuntu’s Unity and Give Users Voice Control
The makers of Mycroft, a device based on Raspberry Pi 2 that is governed by an AI and is capable of making your house a smart one, have just announced that they plan to release the voice recognition software to help users control their desktops.
Upcoming GPS Navigation App for Ubuntu Touch Will Be Amazing, Says Developer
We wrote numerous articles related to the GPS Navigation app available for Canonical’s Ubuntu Touch mobile operating system, but the next release promises to bring even more features, as well as a major facelift.
Firefox 40.0.3 Arrives in All Ubuntu OSes
Canonical have announced that the latest Firefox 40.0.3 version has been made available in the repositories for the users of Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS.
Second Successful Ubuntu Hackathon Ends in China
A second Hackathon has just been completed in China, and developers from all over the country came ready to play with Ubuntu and all sorts of gadgets.
Ubuntu, Canonical, and IP
Recently there has been a flurry of concerns relating to the IP policy at Canonical. I have not wanted to throw my hat into the ring, but I figured I would share a few simple thoughts.
Canonical urges customers to ditch Windows 10 for Ubuntu
In a recent posting, Canonical has tried new methods to appeal to Chief Technology Officers (CTOs) and cost conscious home users that they should switch to Ubuntu in lieu of Windows 10.
Flavours and Variants
Xubuntu 15.10 Beta 1 Drops Gnumeric and Abiword in Favor of LibreOffice Writer and Calc
Canonical has announced the release of the first Beta build for Ubuntu 15.10 (Wily Werewolf) opt-in flavors, which include the well-known Xubuntu distribution built around the lightweight Xfce desktop environment.
Kubuntu Wily Beta 1
The first Beta of Wily (to become 15.10) has now been released!
Ubuntu Kylin 15.10 Beta 1 Is Out with Updated Software Center, Linux Kernel 4.1 LTS
As part of the release of Ubuntu 15.10 (Wily Werewolf) Beta 1 for opt-in flavors, the Ubuntu Kylin team had the pleasure of announcing the immediate availability for download and testing of the first Beta build of the upcoming Ubuntu Kylin 15.10 distro.
Lubuntu 15.10 Beta 1 Still Doesn’t Use LXQt, Now Powered by Linux Kernel 4.1 LTS
The development team of the Lubuntu Linux operating system were among the last to announce the release of the first Beta build of the Ubuntu 15.10 (Wily Werewolf) release for opt-in flavors.
- Xubuntu 15.10 Beta 1 Drops Gnumeric and Abiword in Favor of LibreOffice Writer and Calc
- Ubuntu: Wily Werewolf Beta 1 Released
- New Releases
- Accelerated Releases Embedded Linux Distribution for IoT
Rugged Bay Trail Pico-ITX SBC has multiple expansion paths
Advantech’s COM-like “MIO-3260″ Pico-ITX SBC runs Linux on a Bay Trail SoC and offers a PCIe/mSATA slot, MI/O expansion, and optional -40 to 85°C operation.
BOAR’S Board: the ultimate board!
This development board merges three different worlds: pure OS, microcontroller, and FPGA. For the first time, the best of these three technologies can be found in a single board, and can work together for an improved programming experience.
Unity Linux Experimental Build now available, Supports Tizen
Unity, a development platform for creating multiplatform 3D and 2D games, has today finally been released for Linux as a 951Mb .deb file download. This is an Experimental Build, with future support not yet guaranteed and very much depends on user adoption and feedback.
- Unity Linux Experimental Build now available, Supports Tizen
- CEO John Chen Says BlackBerry Devices Need More Apps, but Won’t Confirm Android Plans
Cyanogen Tapped For New Wave of Affordable Smartphones
After many delays, all four major mobile Linux alternatives to Android have finally arrived on smartphones. Mozilla’s Firefox OS was first out of the gate two years ago, followed by Jolla’s Sailfish OS, and this year they were joined by the first Ubuntu and Tizen phones. Yet, a fifth open source mobile Linux platform may have already eclipsed them all. The CyanogenMod flavor of Android is rapidly expanding from its role as the most popular alternative mobile phone mod for flashing onto Android phones to being a much sought after pre-installed OS.
Motorola, LG reportedly unveiling new Android Wear smartwatches alongside ASUS and Huawei at IFA 2015
It’s been a little over a year since we the first crop of Android Wear smartwatches popped up around the time of Google I/O 2014. While many of us are expecting followups to some these devices by now (Samsung’s got a new Tizen powered smartwatch with a round face ready to go) it almost feels like we’re waiting on something. It could be that Android Wear’s biggest OEMs — Motorola, LG, ASUS, and Huawei — are planning to introduce their new round of smartwatches during this year’s IFA 2015.
- Google finally responds to Europe’s antitrust charges [Ed: Microsoft and pals initiated this by heavy lobbying]
New smartphones keep Samsung at head of Android class
Samsung’s new smartphones and tablets might not offer enough to entice current iPhone and iPad users to switch, but they keep Samsung at the head of the class among Android gadget makers.
The new Galaxy devices come weeks before comparable updates from Apple are expected. In a sense, if Samsung can’t beat the competition in sales, it can at least beat it to store shelves.
- Android Auto now has a desktop emulator for developers
- Devs can now emulate in-car experience with Android Auto Desktop Head Unit
Google adds some visual flair to Android app searches
Google has transformed Android search for apps and now displays the results in a pictorial, grid-like fashion. For instance, searching for “music apps” (either in Now or a browser) brings up the above grid, and clicking on a given app will take you straight to Google Play, as you’d expect. The feature, spotted by Android Police, appears to have rolled out over the last few days. Regular search results are still displayed below, but the grid images take up the entire first page, in much the same way as Google’s Knowledge Graph. It only works on Android, so far — doing a similar search on iOS yields a regular app list with the option to install.
- Google Revamps How Apps Appear in Android Search Results
- Google details new runtime permissions in more secure Android 6.0 Marshmallow
- Android 6.0 apps can ask permissions only when needed
- Android Marshmallow Update: Granting Permission
DeNA’s Mirrativ App Livestreams Any Game Or App On Your Android Device
YouTube isn’t the only one to introduce a live-streaming app this week. Just days after YouTube Gaming was outed, Japan’s DeNA — a prolific producer of games itself — has entered the scene with its own take, called Mirrativ.
- Cool Android browser Link Bubble is now completely free
- Three-quarters of WhatsApp users are on Android, 22% on iOS (study)
- Android Marshmallow coming to Galaxy S6, Note 5, not S5
- Android 6.0 Marshmallow Update In The Mixing Bowl For LG G4 And LG G3: Report
- OnePlus One With Android 5.1.1 Lollipop Update – Top Changes and Bug Fixes
- Android 5.1.1 Lollipop, 6.0 Marshmallow Update Status For Galaxy Note 4, Galaxy Note Edge, Galaxy S6, Galaxy S6 Edge And Galaxy S5
- Android Marshmallow update coming to LG G4, G3, not G2
- Android Marshmallow Update: Samsung Galaxy S5 Misses Latest Android Update Despite Launching 16 Months Ago
- Free app completely reimagines Android notifications – and it’s awesome
- Former security intern admits developing super-stealthy Android spyware
- Pintasking brings easy multi-tasking to just about any Android device
- How to get genuinely free Android apps and free Android games
- Amazon Underground aims to make Android apps and games ‘actually free’
- Android Pay confirmed to be coming ‘soon’
Huawei Watch preorders suggest Android Wear will soon support iPhone
The Huawei Watch, another nice-looking, round Android Wear smartwatch, is now up for preorder at Amazon. Pricing starts at $349 for a stainless steel model with black leather strap and goes all the way up to $799 for a gold-plated stainless steel watch with matching gold-plated steel band. That’s soundly Apple Watch territory, so it’ll be interesting to see what type of demand exists for an ultra-premium Android Wear device. Amazon says the Huawei Watch will begin shipping September 2nd.
5 open source alternatives to Trello
But most kanban board tools are multi-purpose, and you can also use them to track next actions, someday/maybe lists, or even just what groceries you need to pick up. The killer feature of almost all of them is the ability to share your boards with a team, allowing group collaboration and keeping everyone on the same page. When looking for an open source tool to fit my needs, I came across five great options and wanted to share a little bit from my experience with each.
Migrate from Proprietary Software to Linux to Create Cost Savings
Amongst the top IT trends of the moment is the development of Linux Containers. Financial and technical investors, Linuxsoftware programmers and customers believe that Linux Containers will transform the way organisations manage their Linux environments from deployment to maintenance. A recent survey by Red Hat and Techvalidate says that 56% of the respondents plan to use Linux containers as vehicles for rolling out web and eCommerce over the next two years. The respondents included a number of Fortune 500 companies and public sector organisations. Any development in the world of e-Commerce is definitely worth taking a look.
Why business should bet on open source
Among the benefits of OSS is that it is hardly ever a standalone product. Most OSS is built on other open-source projects. Because of the way it is licensed, these enhancements are then passed back to the open-source community, so the software constantly evolves.
So, if such open-source technology is readily available, and has proved its scalability in webscale businesses, why reinvent the wheel?
Open source is certainly more accepted in the enterprise, said Tony Lock, distinguished analyst at Freeform Dynamics. “It is suitable for all businesses, not just for webscale businesses.”
5 Open Source Data Backup Options for Small Business
Data backup is an essential, yet often neglected, part of running a successful small business.
Your business is vulnerable to unstable power grids, hackers, failing hardware, new employees, and big-thumbed interns. The loss of your business contacts, contracts, employee data, tax and regulation compliance documents, work projects, images, and video could result in a costly disaster.
The FCC Builds Open-Source Video Calling For The Deaf
The FCC has gotten behind a new platform that helps the deaf talk to each other over video link. The idea of Accessible Communications for Everyone, or ACE as it’s being called, is that it lets all kinds of different apps talk to each other. It’s kind of how you can email anyone without worrying what app they use, only for video, and text and audio, all together.
- Why Intel made Stephen Hawking’s speech system open source
NodeConf EU all set for blarney in ‘Nodeland’
It’s NodeConf EU time again — the third annual gathering of what is hoped to be 400 of the top influencers in Node.js at Waterford Castle from September 6th to 9th.
- 3 steps for planning a successful open source meetup
- NodeConf EU all set for blarney in ‘Nodeland’
Starting in September, Chrome will stop auto-playing Flash ads
Google has announced that, beginning September 1, Chrome will no longer auto-play Flash-based ads in the company’s popular AdWords program
- Starting in September, Chrome will stop auto-playing Flash ads
Mozilla Releases Firefox 40.0.3 Hotfix to Plug GStreamer and DisplayLink Bugs
Just a few minutes ago, Mozilla pushed the third hotfix update to its popular, open-source, and cross-platform Mozilla Firefox 40.0 web browser for GNU/Linux, Mac OS X, and Microsoft Windows operating systems.
- Mozilla Releases Firefox 40.0.3 Hotfix to Plug GStreamer and DisplayLink Bugs
Hortonworks Buys Onyara
…the new owner just got itself a bunch of ex-NSA guys…
- Hortonworks to Acquire Onyara: It’s all about The Internet of Anything! [Ed: recall CIA’s Gus Hunt On Big Data: We ‘Try To Collect Everything And Hang On To It Forever’]
Hortonworks Acquires Onyara, Early Startup With Roots In NSA
Hortonworks, the big data company built on Hadoop, bought early-stage startup Onyara today. The company, which launched at the end of last year, has its roots in the NSA — yes that NSA.
Hortonworks buys Onyara, the company behind Apache NiFi, which was developed at NSA
Hortonworks, a publicly traded company selling a commercial distribution of the Hadoop open-source big data software, announced today that it has acquired Onyara, an early-stage startup whose employees developed Apache NiFi, a piece of open-source software that was first used inside the National Security Agency (NSA).
- Hortonworks buys the startup behind the NSA-developed Apache NiFi to target IoT data
- Hortonworks Acquires Onyara For Real Time IoT Analytics
- Hortonworks bags US-gov inspired Big Data tech
- Hortonworks Buys an Internet of Anything Play
- Hortonworks to acquire Apache NiFi firm Onyara for real-time dataflow management
- Hortonworks Acquires Onyara, Launches DataFlow Product
- Hortonworks Hears An Opportunity With Onyara
- Hortonworks acquires Onyara to bring analytics to a world of sensors
- Hortonworks buys better Hadoop data flow management
- Hortonworks: how to pin down data inside the ‘Internet of Anything’
- Hortonworks Acquires Data Collection Technology Startup, Debuts DataFlow Software
- Hortonworks To Buy Onyara
- Hadoop vendor Hortonworks acquires Apache NiFi creator Onyara
- Hortonworks Inks Deal to Acquire Onyara to Leverage ‘IoAT’ Data
Apache Software Foundation Makes Lens, a Big Data Tool, a Top Level Project
Whenever the Apache Software Foundation graduates an open source project to become a Top Level Project, it tends to bode well for the project. Just look at what’s happened with Apache Spark, for example.
Now, the Foundation (ASF), which is the steward for and incubates more than 350 Open Source projects, has announced that Apache Lens, an open source Big Data and analytics tool, has graduated from the Apache Incubator to become a Top-Level Project (TLP).
- Intel Pumps OpenStack Up
- Hortonworks Buys Onyara
LibreOffice 5.0.1 Turns a Great Release into an Excellent One
The Document Foundation has just revealed that LibreOffice 5.0.1 has been released, making this the first maintenance version for the new generation of the famous office suite.
- LibreOffice 5.0.1 released, to keep the momentum going
First Update to LibreOffice 5 Lands
The Document Foundation today announced the first update to the milestone LibreOffice 5.0 released a few weeks ago. This is a bug fix release bringing over 75 commits since version 5.0 was unveiled August 5. It is recommended that those using the 5.0 branch upgrade their LibO installs with today’s update.
- LibreOffice 5.0.1 Turns a Great Release into an Excellent One
Developer lowers Drupal’s barrier to entry
From a consumer perspective, I’d like open source to be ubiquitous to the point of invisibility. Using recent Ubuntu distros, I’m always shocked at how professional the environment feels. Just five years ago, you’d need to hunt down drivers and do a bunch of fiddling to get basic things like a sound card working. Now there are so many pushbutton ways to deploy open source tech, from OSes to CMS distros on Pantheon to buying an Android-powered mobile phone.
We’re not quite to the point where CMS users can feel like open source is transparent; there’s still a huge investment in vendors to give you the expertise to manage your Drupal or WordPress site, for example. But we’re closer than we were a decade ago, and that’s pretty exciting.
- Developer lowers Drupal’s barrier to entry
Salesforce Aura ventures into open source — to a point
Salesforce’s splashy new UI, the Lightning Experience, is more than a pretty face. It was built with Aura, the company’s open source UI framework, available for use independent from Salesforce’s services.
With Lightning — and Aura — Salesforce emphasizes how users can design applications that not only look great, but plug into more than Salesforce. Where, then, does Salesforce’s open source offering end with Aura, and where do its own services begin?
Infosys talks open source, cloud and value
Last year, when Infosys hired Abdul Razack to own the company’s platform division, he came with a mandate to use open source first. Eleven months on and Infosys Information Platform (IIP) is flourishing with 120 projects on the go, some proofs of concept, many moving to production, but with open source at their heart in most situations.
- Salesforce Aura ventures into open source — to a point
- Eclipse Foundation Moving to Donations to Support Open Source Projects
Intel invests $60 million in drone venture
Intel is investing $60 million in UAV firm Yuneec, whose prosumer “Typhoon” drones use Android-based controllers.
Intel Corp. CEO Brian Krzanich and Yuneec International CEO Tian Yu took to YouTube to announce an Intel investment of more than $60 million in the Hong Kong based company to help develop drone technology. No more details were provided except for Krzanich’s claim that “We’ve got drones on our road map that are going to truly change the world and revolutionize the industry.” One possibility is that Intel plans to equip the drones with its RealSense 3D cameras (see farther below).
Friday Free Software Directory IRC meetup: August 28 [Ed: out of date now]
Join the FSF and friends every Friday to help improve the Free Software Directory by adding new entries and updating existing ones.
- Friday Free Software Directory IRC meetup: August 28 [Ed: out of date now]
Croatian policy encourages open source adoption
Earlier this year, Croatian political party Sustainable Development of Croatia (ORaH) published a new policy that encourages the government to pursue open source solutions, addresses the dangers of vendor lock-in, and insists on open document standards. Best of all, they did it the open source way.
- Croatian policy encourages open source adoption
Technology, the law and you: Open-source software
But “free as in beer” isn’t really the point – huge numbers of corporate open-source users opt for paid commercial versions of open-source projects, for simplicity and support. And then there are all those various licenses that protect the openness of the software – GPL, Apache, Eclipse. But the good news is that, with very few exceptions, there aren’t many legal issues for the average company to worry about.
- Technology, the law and you: Open-source software
Estonia to promote its eResidency in the USA
Estonia will be promoting its eResidency for online business in the United States. The country’s Ministry of Economic Affairs and the Information System Authority (RIA) want to launch a media campaign, hoping to reach potential users such as business developers and software developers.
Portugal adds 103 eGovernment services access points
Portugal’s Agency for Administrative Modernisation (AMA) this summer added another 103 Espaços do Cidadão (Citizen Spots, or Citizen Places), where citizens can access eGoverment services using computer facilities managed by AMA and local public administrations. These access points offer users access to over 170 eGoverment services. Users will be assisted by local staff members, when needed.
Dutch minister calls for more government data to be published
Dutch government data should be made available for free to the public as much as possible. “Public agencies should change their attitude towards the publishing of open data,” the Dutch Minister of the Interior, Ronald Plasterk said. “They are often not aware of the value of the data they collect. Publishing should become a basic principle.”
- Dutch minister calls for more government data to be published
What Will Become of the World’s First Open Source GPU?
Dr. Karu Sankaralingam, who led the team’s effort at the University of Wisconsin, where the project is based, says that building an open source or any other hardware project is bound to incur legal wrangling, in part because the IP almost has to be reused in one form or another. Generally, he says that for open source hardware projects like this one, the best defense is to use anything existing as a base but focus innovation on building on top of that. He says that to date, AMD has not been involved in the project beyond a few individuals offering some insight on various architectural elements. In other words, if the team is able to roll this beyond research and into any kind of volume, AMD will likely have words.
- What Will Become of the World’s First Open Source GPU?
- Estonia to promote its eResidency in the USA
The 20 toughest job interview questions in the world
Impossible to prepare for; unrelated to the job: jobseekers are facing tougher and weirder questions than ever in job interviews.
Employers are turning to tricky questions to quickly sort through high numbers of candidates, so that only the very best shine through, according to Joe Wiggins, spokesman for Glassdoor in the UK.
“Often it is to see how you react under pressure,” Wiggins said. “It’s to see what happens when the rug is pulled from under you – how do you prepare for the completely unexpected?”
- Tech nightmares that keep Turing Award winners up at night
Study reveals that a lot of psychology research really is just ‘psycho-babble’
Psychology has long been the butt of jokes about its deep insight into the human mind – especially from the “hard” sciences such as physics – and now a study has revealed that much of its published research really is psycho-babble.
LG’s new Rolly wireless keyboard turns into a pocket stick
LG just announced the “Rolly,” a Bluetooth keyboard that folds up along the four rows of keys to create a wand-like device that can be tossed in a purse or pocket. LG is hardly the first electronics company to introduce a foldable, ultra-portable wireless keyboard — or even the first to introduce a gadget called the Rolly — but it might be the first to market either as a stick for your pocket.
- LG’s new Rolly wireless keyboard turns into a pocket stick
London Calling: Two-Factor Authentication Phishing From Iran
This report describes an elaborate phishing campaign against targets in Iran’s diaspora, and at least one Western activist. The ongoing attacks attempt to circumvent the extra protections conferred by two-factor authentication in Gmail, and rely heavily on phone-call based phishing and “real time” login attempts by the attackers. Most of the attacks begin with a phone call from a UK phone number, with attackers speaking in either English or Farsi.
The attacks point to extensive knowledge of the targets’ activities, and share infrastructure and tactics with campaigns previously linked to Iranian threat actors. We have documented a growing number of these attacks, and have received reports that we cannot confirm of targets and victims of highly similar attacks, including in Iran. The report includes extra detail to help potential targets recognize similar attacks. The report closes with some security suggestions, highlighting the importance of two-factor authentication.
Ins0mnia: Unlimited Background Time and Covert Execution on Non-Jailbroken iOS Devices
FireEye mobile researchers discovered a security vulnerability that allowed an iOS application to continue to run, for an unlimited amount of time, even if the application was terminated by the user and not visible in the task switcher. This flaw allowed any iOS application to bypass Apple background restrictions. We call this vulnerability Ins0mnia.
Why is the smart home insecure? Because almost nobody cares
It’s easy to laugh-and-point at Samsung over its latest smart-thing disaster: after all, it should have already learned its lesson from the Smart TV debacle, right?
Except, of course, that wherever you see “Smart Home”, “Internet of Things”, “cloud” and “connected” in the same press release, there’s a security debacle coming. It might be Nest, WeMo, security systems, or home gateways – but it’s all the same.
Critical PayPal XSS vulnerability left accounts open to attack
PayPal has patched a security vulnerability which could have been used by hackers to steal users’ login details, as well as to access unencrypted credit card information. A cross site scripting bug was discovered by Egyptian ‘vulnerabilities hunter’ Ebrahim Hegazy — ironically on PayPal’s Secure Payments subdomain.
Important Notice Regarding Public Availability of Stable Patches
Grsecurity has existed for over 14 years now. During this time it has been the premier solution for hardening Linux against security exploits and served as a role model for many mainstream commercial applications elsewhere. All modern OSes took our lead and implemented to varying degrees a number of security defenses we pioneered; some have even been burned into silicon in newer processors. Over the past decade, these defenses (a small portion of those we’ve created and have yet to release) have single-handedly caused the greatest increase in security for users worldwide.
Finland detains Russian accused of U.S. malware crimes
Finland confirmed on Thursday it has detained a Russian citizen, Maxim Senakh, at the request of U.S. federal authorities on computer fraud charges, in a move that Russia calls illegal.
Finland confirms arrest of Russian citizen accused of crimes in the US
Finnish authorities have confirmed the detention of Maxim Senakh, a Russian citizen accused of committing malware crimes in the US. The Russian Foreign Ministry has expressed concern and called on Finland to respect international law.
More than 80% of healthcare IT leaders say their systems have been compromised
Eighty-one percent of healthcare executives say their organizations have been compromised by at least one malware, botnet or other kind of cyberattack during the past two years, according to a survey by KPMG.
The KPMG report also states that only half of those executives feel that they are adequately prepared to prevent future attacks. The attacks place sensitive patient data at risk of exposure, KPMG said.
The 2015 KPMG Healthcare Cybersecurity Survey polled 223 CIOs, CTOs, chief security officers and chief compliance officers at healthcare providers and health plans.
- Removal of SSLv3 from LibreSSL
Kansas seeks to block release of voting machine paper tapes
The top election official in Kansas has asked a Sedgwick County judge to block the release of voting machine tapes sought by a Wichita mathematician who is researching statistical anomalies favoring Republicans in counts coming from large precincts in the November 2014 general election.
- Friday’s security updates
- Security updates for Thursday
nsenter gains SELinux support
nsenter is a program that allows you to run program with namespaces of other processes
Iceland boosts ICT security measures, shares policy
Iceland aims to shore up the security of its ICT infrastructure by raising awareness and increasing resilience. And next to updating its legislation, Iceland will also bolster the police’s capabilities to tackle cybercrime.
A Project to Guarantee Better Security for Open-Source Projects
Open-source developers, however, can take steps to help catch these vulnerabilities before software is released. Secure development practices can catch many issues before they become full-blown problems. But, how can you tell which open-source projects are following these practices? The Core Infrastructure Initiative has launched a new “Best Practice Badge Program” this week to provide a solution by awarding digital badges to open-source projects that are developed using secure development practices.
- London Calling: Two-Factor Authentication Phishing From Iran
Declassified CIA documents reveal how disastrous America’s post-9/11 plans really were
First, the disastrous failures of US policy in Afghanistan and Iraq have led to an unprecedented programme of declassification of documents (some with significant redactions) as part of the cathartic process of trying to understand how so many mistakes were made before and after 9/11.
Second, the cache of cables dumped by WikiLeaks, coupled with further revelations from material leaked by Edward Snowden, has provided an exceptional level of insight into the workings of the intelligence agencies over the past three decades, together with priceless new information about the decision-making processes and about operational activities.
And third, there has been a cache of materials found locally following the military interventions of the past 12 years – such as audio tapes recovered from the presidential palace in Baghdad in 2003 that recorded thousands of hours of meetings, discussions and even phone calls made by Saddam Hussein and his inner circle, or boxes of cassettes that belonged to Osama bin Laden that were retrieved from a compound in Kandahar two year earlier.
This treasure trove allows us to understand the failures, incompetence and poor planning that accompanied the invasions of Afghanistan and Iraq in astonishing detail, but also to frame these within the context of a wider region – and a wider period. These two countries form part of a belt that stretches from the Mediterranean to the Himalayas, linking East and West, and that for millennia has served as the world’s central nervous system. Trade, commodities, people, even disease, spread through the webs of networks that connect these locations to each other and ultimately connect the Atlantic coasts of Europe and North Africa to the Pacific coast of China and South-east Asia.
- Declassified CIA documents reveal how disastrous America’s post-9/11 plans really were
Sweden and Ecuador to begin Julian Assange talks next week
Sweden will begin talks with Ecuador about Julian Assange on Monday, after Stockholm moved to break the deadlock over five-year-old rape allegations against him.
Sweden initially rejected a demand by Ecuador that the two countries establish a formal agreement on judicial cooperation before Swedish prosecutors could interrogate the WikiLeaks founder in Ecuador’s embassy in London, saying it did not negotiate bilateral treaties.
Exclusive: Read Julian Assange’s Introduction to The Wikileaks Files
One day, a monk and two novices found a heavy stone in their path. “We will throw it away,” said the novices. But before they could do so, the monk took his ax and cleaved the stone in half. After seeking his approval, the novices then threw the halves away. “Why did you cleave the stone only to have us throw it away?” they asked. The monk pointed to the distance the half stones had traveled. Growing excited, one of the novices took the monk’s ax and rushed to where one half of the stone had landed. Cleaving it, he threw the quarter, whereupon the other novice grabbed the ax from him and rushed after it. He too cleaved the stone fragment and threw it afield. The novices continued on in this fashion, laughing and gasping, until the halves were so small they traveled not at all and drifted into their eyes like dust. The novices blinked in bewilderment. “Every stone has its size,” said the monk.
At the time of writing, WikiLeaks has published 2,325,961 diplomatic cables and other US State Department records, comprising some two billion words. This stupendous and seemingly insurmountable body of internal state literature, which if printed would amount to some 30,000 volumes, represents something new. Like the State Department, it cannot be grasped without breaking it open and considering its parts. But to randomly pick up isolated diplomatic records that intersect with known entities and disputes, as some daily newspapers have done, is to miss “the empire” for its cables.
Assange: What Wikileaks Teaches Us About How the U.S. Operates
At the time of writing, WikiLeaks has published 2,325,961 diplomatic cables and other US State Department records, comprising some two billion words. This stupendous and seemingly insurmountable body of internal state literature, which if printed would amount to some 30,000 volumes, represents something new.
Like the State Department, it cannot be grasped without breaking it open and considering its parts. But to randomly pick up isolated diplomatic records that intersect with known entities and disputes, as some daily newspapers have done, is to miss “the empire” for its cables.
Each corpus has its size.
To obtain the right level of abstraction, one which considers the relationships between most of the cables for a region or country rather than considering cables in isolation, a more scholarly approach is needed. This approach is so natural that it seems odd that it has not been tried before.
The study of empires has long been the study of their communications. Carved into stone or inked into parchment, empires from Babylon to the Ming dynasty left records of the organizational center communicating with its peripheries.
- Sweden and Ecuador to begin Julian Assange talks next week
Naomi Klein on climate change: ‘I thought it best to write about my own raw terror’
Naomi Klein, the Canadian author, film-maker and social activist, will arrive in Australia this month for a series of events.
WTO Ruling Against India’s Solar Push Threatens Climate, Clean Energy
The World Trade Organization (WTO) on Wednesday ruled against India over its national solar energy program in a case brought by the U.S. government, sparking outrage from labor and environmental advocates.
As power demands grow in India, the country’s government put forth a plan to create 100,000 megawatts of energy from solar cells and modules, and included incentives to domestic manufacturers to use locally-developed equipment.
SeaWorld criticism surges online after Harry Styles speaks out, analysts report
It’s hard to imagine Wall Street bankers worrying about what One Direction heartthrob Harry Styles thinks. But, it turns out at least some of them do.
Bankers at Credit Suisse on Thursday warned that Styles had sparked a surge in negative sentiment towards SeaWorld, the controversial aquatic theme park, which is already suffering a collapse in profits.
“Does anybody like dolphins?” Styles asked his fans during a concert in San Diego, home to one of SeaWorld’s biggest parks, last month. Following a roar from the crowd, he told them: “Don’t go to SeaWorld.” Styles’s comments were captured by hundreds of people, including Game of Thrones’ Maisie Williams, and spread across social media.
- Naomi Klein on climate change: ‘I thought it best to write about my own raw terror’
More Than 4,000 Died Within Six Weeks Of Being Deemed ‘Fit For Work’, Reveal Government
More than 4,000 people died within six weeks of being found “fit for work”, the Department for Work and Pensions (DWP) has revealed.
Figures released today show that between December 2011 to February 2014, 4,010 people died after being told they should find work following a “Work Capability Assessment”.
Of that figure, 1,360 died after losing an appeal against the decision.
Labour branded the figures a “wake-up call” for the Government, who has faced criticism for the way the assessment tests are carried out.
TTIP deal: Business lobbyists dominate talks at expense of trade unions and NGOs
European Commission officials have held hundreds of meetings with lobbyists to discuss the proposed Transatlantic Trade and Investment Partnership (TTIP) treaty – yet only around one in ten is with public interest groups.
The world’s biggest companies in finance, technology, pharma, tobacco and telecoms are dominating discussions with the EU executive body’s trade department responsible for the proposed EU-US free trade treaty, which could become the biggest such deal ever made.
Jeb Bush Hits Up Hedge Funds in the Hamptons
Jeb Bush is visiting the Hamptons today on a lucrative fundraising tour, hitting up multi-billionaires like hedge fund manager Julian Robertson to support his 2016 campaign.
According to invitations obtained by the Center for Media and Democracy, the events over the next few days include a coffee reception in the morning, and a brunch at 11, and an evening reception. The fundraisers in the wealthy New York beach community are officially organized by Bush’s 2016 campaign–even though many of the hosts and attendees have already reached the legal maximum on contributions to Bush’s primary election effort.
- More Than 4,000 Died Within Six Weeks Of Being Deemed ‘Fit For Work’, Reveal Government
Phone hacking: CPS may bring corporate charges against Murdoch publisher
The Crown Prosecution Service (CPS) is considering bringing corporate charges against Rupert Murdoch’s British newspaper publisher over phone hacking, it has emerged.
The Metropolitan police handed over a file of evidence on News International – now renamed News UK – to the CPS for consideration after an investigation that stretches back to 2011, when the News of the World was closed at the height of the scandal.
“We have received a full file of evidence for consideration of corporate liability charges relating to the Operation Weeting phone-hacking investigation,” a spokeswoman confirmed.
The file was transferred on 23 July and reignites the controversy for Rupert Murdoch’s News Corp, News UK’s parent company, which believed it had been through the worst and come out the other side after an eight-month trial of former News of the World journalists that concluded in June 2014.
- On Fox, Rudy Giuliani Claims VA Shooter’s Suspected Mental Health Issues Went Unreported Because Of Equal Employment Regulations
Felicia Kornbluh on ‘Welfare Reform’ Anniversary
Would that even that degree of critical consideration would be granted to the anniversary of another disaster for low-income communities of color: the move to “end welfare as we know it,” signed into law in August 1996 by Bill Clinton. If you don’t remember the media stampede — Black women having babies for government checks! Pregnant teenagers draining public resources! — that’s partly because elite media, having championed hard for the dismantling of the safety net, were markedly less interested in tracking the human fallout.
- Phone hacking: CPS may bring corporate charges against Murdoch publisher
United In Flight WiFi Blocks Popular News Sites
So, just last month, we wrote about United Airlines idiotic inflight video system that forces you to install DRM on your own devices to watch a movie. And, now, it appears that the company is filtering out all sorts of news sites. The EFF’s Nate Cardozo was on a flight yesterday when he started noticing that he couldn’t get to certain tech websites, including Ars Technica and The Verge — instead receiving messages they were blocked due to United’s “access policy.” The same was true for political news site Daily Kos. Eventually he even realized that United also blocks the NY Times (via his phone after the laptop battery ran out).
Kimmel spices up the 2016 campaign with some creative censorship
In this week’s installment of “Unnecessary Censorship,” Jimmy Kimmel Live uses its well-placed [bleeps] to make Trump’s bragging, Ted Cruz’s thoughts on political correctness, the Jeb Bush campaign’s plans, and a fan of President Obama all sound more vulgar than they were. In this week’s installment of “Unnecessary Censorship,” Jimmy Kimmel Live uses its well-placed [bleeps] to make Trump’s bragging, Ted Cruz’s thoughts on political correctness, the Jeb Bush campaign’s plans, and a fan of President Obama all sound more vulgar than they were.
Jimmy Kimmel censors Donald Trump on ‘This Week in Unnecessary Censorship’
In the clip, the presidential candidate speaks to a crowd of his supporters, bragging about having a huge … something. Being bleeped twice makes whatever Trump is saying sound worse, and yet, oddly believable!
Tool Makes It Easier to Evade Online Censors
He’s already talked with Tor developers about Marionette’s open-source code.
US bioethicist quits over censorship row at Northwestern University
The edition had sparked controversy as it included a salacious account of a consensual sexual encounter between Syracuse University professor William J. Peace with a nurse in the 1970s, when he was an 18-year-old hospital patient.
Northwestern University bioethics professor resigns over censorship claim
A Northwestern University professor has resigned her position at the Feinberg School of Medicine after, she said, her complaints of academic censorship were ignored.
Alice Dreger, who worked part time as a clinical medical humanities and bioethics professor, initially complained in 2014 that the school dean removed a risque article from a website for the bioethics journal Atrium because of fear it would harm the school’s image.
Japan’s censorship of PlayStation 4 horror game Until Dawn is spectacularly bad 【Video】
…Japan’s method of handling violent video game content can be quite perplexing at times.
How censors are keeping Chinese citizens in the dark about “Black Monday”
…mentions of the country’s economic weakness were pretty much absent from major Chinese media reports.
VPN down: China goes after Astrill, other anti-censorship apps in run up to WW2 anniversary parade
A number of services used to get around Chinese internet restrictions have been taken down or disrupted in the run up to a major parade in Beijing next week to mark the 70th anniversary of the end of the second world war.
Popular virtual private network (VPN) provider Astrill warned users on Wednesday that they may suffer service outages between now and the parade on September 3.
VPNs allow users to tunnel their internet traffic through an uncensored server, bypassing the so-called Great Firewall (GFW).
Besieged Malaysian PM Doubles Down on Online Censorship Ahead of Anti-Corruption Rally
Last month we reported that the Malaysian government had censored the website of the Sarawak Report, which first broke news of the corruption allegations. A few days later, the government also suspended the publication licenses of two print publications that ran the same exposé.
Giving lip: censorship, subversion and the enduring power of the screen kiss
The humble kiss has figured in its fair share of censorship debates over time. These debates have usually centred on whether the kiss should be represented at all, as well as a monitoring of the content and duration of the amorous scene.
North-South tension causes internet censorship in Korea: Is it justified?
South Korea has the world’s fastest internet with connectivity clocked at 25.3MBps by Akamai Technologies last year. That’s over two times better than the 11.5MBps measured in the United States. Such a wired environment, coupled with wide internet use, seem optimal grounds to foster free, creative discussions among peers in a democracy.
DDoS attack hits GitHub after Chinese police force developer to remove code
GitHub has fallen prey to a DDoS attack this week, allegedly perpetrated by Chinese actors, in response to tools available on the site that would help users circumvent censorship.
On Tuesday the site found that it was under attack from malicious sources, following a similar tirade against the site in March of this year. This time, though, the attacks have been much more intense.
How censorship divides us
Political correctness has made us more wary of one another.
Istanbul fest director steps down after censorship scandal
Azize Tan has stepped down after nine years following protests over censorship at the latest edition in April, which led to the cancellation of the festival’s competitions and closing ceremony.
Egypt interferes with printing of three newspapers
The Committee to Protect Journalists condemns a recent wave of newspaper censorship in Egypt. Three privately owned newspapers were prevented from going to print or into circulation because of content critical of President Abdel Fattah el-Sisi, according to news reports.
CPJ denounces recent wave of newspaper censorship
The Committee to Protect Journalists (CPJ) condemned Tuesday the recent wave of newspaper censorship in Egypt, citing the new anti-terrorism law as the pretext for this phenomenon.
Over the past two weeks, three newspapers were subjected to censorship, due to the presence of content critical of President Abdel Fattah Al-Sisi.
A Sout Al-Omma newspaper issue was confiscated on 14 August for containing reports on the health condition of President Abdel Fattah Al-Sisi’s mother, as well as reports on a corrupt network of Mubarak-era figures.
A curious incident of censorship
The book shows that differing opinions — and even vastly differing ways of thinking — exist and should be considered.
Trigger Warning Advocates Say They’re Not For Censorship
Many of the responses to the article focus on the authors’ status as “rich, white-skinned and well-established men, who work at the moment in business-type jobs,” (though a lawyer working at a non-profit and a career academic might take issue with a few of those descriptors). Some accuse Lukianoff and Haidt of “hysteria,” “scaremongering,” and wanting to “silence discussions.” Others offered some nuance by conceding that trigger warnings “run the risk of students avoiding or disengaging the material out of fear of being triggered,” but think the threat to free expression in higher education is over-hyped.
Researchers create P2P Alibi Routing to avoid censorship and government surveillance
University of Maryland researchers developed P2P Alibi Routing to allows users to choose where they do NOT want their packets to go, thereby avoiding ‘censorship of Internet traffic and suspicious boomerang routing.’
Takedown Resistant ‘Hydra Proxy’ Launches to Beat Censorship
One year ago UK police noisily took down Immunicity, a site dedicated to providing access to blocked websites. To mark this anniversary a new platform titled Hydra Proxy has launched with the aim of providing a takedown resistant service for all. TorrentFreak caught up with its founder to learn more.
Censorship in Ridgefield
Censorship often occurs because of power abuse, personal prejudice and ideological differences.
- United In Flight WiFi Blocks Popular News Sites
Google Has a Secret Interview Process… And It Landed Me a Job
I was in the midst of a career transition. I had spent three years working as a management consultant and then at a startup, but I wanted to become a computer engineer. I was earning a Master’s in computer science through Georgia Tech’s online program. I knew that I was slowly developing the skills that I would need in an engineering role, but I still lacked the confidence to apply for a full-time software role.
One morning, while working on a project, I Googled “python lambda function list comprehension.” The familiar blue links appeared, and I started to look for the most relevant one.
Ashley Madison hack: Just three in every 10,000 female accounts on infidelity website are real
Just three in every 10,000 Ashley Madison members are real women, it has been revealed, as the huge scale of fake female accounts on the infidelity website was exposed.
Despite the website claiming 5.5 million of its 37 million customer accounts are “female” there was “a good chance” just 12,000 users actually are according to an analysis of the leaked data by the Editor-in-Chief of technology website Gizmodo.
- Mark Zuckerberg — thanks 1,000,000,000 sheep for using Facebook login on Monday
- US appeals court backs NSA phone data collection
- U.S. court hands win to NSA over metadata collection
- Government wins narrow victory in NSA case
- The NSA Can Keep Tracking Phones After All, Rules Appeals Court
- Appeals court rejects challenge to NSA’s ongoing mass collection of phone data
- Read the Ruling: Appeals Court Reverses on NSA Phone Surveillance
- Appeals court deals blow to lawsuit over NSA’s bulk phone data collection
- NSA phone data collection ‘not illegal’, US court rules
- Setback for Suit Against N.S.A. on Phone Data
- Federal Court Hands Rare Win to NSA
- Appeals court reverses ruling that found NSA program illegal
- US court ruling allows NSA to continue surveillance programme
- Court allows NSA sweep of phone records
- Court rules for government on NSA data collection
- NSA wins battle over phone records collection as court lifts injunction
- US court upholds NSA bulk phone spying
- Judge’s Order To Shut Down NSA Phone Surveillance Reversed By Federal Appeals Court
- NSA Phone Surveillance Ruling Reversed
- Spy court renews NSA phone records program for last time
- Judges Give NSA More Time to Suck Up Your Data
- U.S. Appeals Court Overturns Decision That NSA Metadata Collection Was Illegal
- Court Hands Win to NSA Over Metadata Collection Challenge
- Federal court rules in favor of NSA bulk snooping, White House happy
- Court reverses ruling that found NSA program illegal
- Court overturns ruling against NSA
- Should NSA Be Immune from Constitutional Scrutiny?
- Federal court lifts injunction on NSA phone surveillance program
- NSA phone-snooping program approved through November
- NSA Wins, Sort Of, at Appeals Court
- Court Overturns Ruling Against NSA Surveillance Program
Why It’s Hard to Sue the NSA: You Have to Prove It Spied on You
Here’s a big problem with secret spying programs in the US: To dismantle them with a lawsuit, someone has to prove that their privacy rights were infringed. And that proof is almost always a secret.
That’s the Catch-22 that an appeals court served up Friday to plaintiffs who for the last two years have been attacking the NSA’s metadata collection program authorized under section 215 of the Patriot Act. The plaintiffs are led by constitutional lawyer and conservative activist Larry Klayman, who had sued the Obama administration for violating his fourth amendment privacy rights. In 2013, a lower court granted his a request for an injunction to stop the NSA’s spying on his data. But the Obama administration appealed that ruling, and an appellate court has now thrown out that injunction based on a familiar and vexing problem for those who sue the government’s secret spying apparatus: The plaintiffs couldn’t sufficiently prove that the NSA secretly spied on them.
Court: We Can’t Rule on NSA Bulk Data Collection Because We Don’t Know Whose Data Was Collected
On Friday, an appeals court overturned a U.S. District Court decision last May that had declared that the National Security Agency’s bulk collection of Americans’ phone records was beyond the authorization of the law. The three-judge panel of the U.S. Court of Appeals for the District of Columbia Circuit kicked the matter back to the lower court for additional deliberation.
Appeals Court Falls for Government’s Shell Game in NSA Spying Case
The U.S. Court of Appeals for the D.C. Circuit’s opinion today in Klayman v. Obama is highly disappointing and, worse, based on a mistaken concern about the underlying facts. The court said that since the plaintiffs’ phone service was provided by one subsidiary of Verizon—Verizon Wireless—rather than another—Verizon Business—they couldn’t prove that they had standing to sue. The court sent the case back to U.S. District Judge Richard Leon to give the Klayman plaintiffs an opportunity to prove that their records were in fact collected. The appeals court did not rule one way or the other of the constitutionality of the mass collection program.
Snowden Effect: Intel Agency Restrictions Reflects Global Spying Crackdown
Authorities in the UK and Germany are cracking down on intelligence activities as public opinion swings against mass surveillance, coupled with heavy criticism from human rights groups and setbacks at the European Court of Human Rights.
- Is impact of new Snowden revelations diminishing?
- GCHQ and me [Ed:reprinted]
- Digital privacy: Subverting surveillance
- US Appears to Control Parts of German Gov’t – Ex-German Defense Official
- German Intelligence Provides Data to the NSA
- NSA Provided German Intelligence With Spyware in Exchange for Data
- German spies cede citizen data in exchange for NSA spyware
Spies ‘traded Germans’ data for US software’
Media reports on Thursday alleged that German spies traded access to information about the country to the US National Security Agency (NSA) in exchange for surveillance software.
- German Gov’t Concealed Deal With US on NSA Spying List
New Report Shows Germany Was In Bed With NSA
Behind the public admonishment of the National Security Agency’s spying techniques, Germany has been secretly in cahoots with the intelligence agency. The country’s national intelligence agency, Office for the Protection of the Constitution, arranged to share surveillance data with the NSA in exchange for high-powered spyware that excavated citizens’ chat and browser histories, and webcam photos, according to a German media report.
- German intelligence agency delivers data to NSA in exchange for software use
- German spies sold out citizens to the NSA in exchange for super-snoop-ware XKeyscore
Germany hands over citizens’ metadata in return for NSA’s top spy software
In order to obtain a copy of the NSA’s main XKeyscore software, whose existence was first revealed by Edward Snowden in 2013, Germany’s domestic intelligence agency agreed to hand over metadata of German citizens it spies on. According to documents seen by the German newspaper Die Zeit, after 18 months of negotiations, the US and Germany signed an agreement in April 2013 that would allow the Federal Office for the Protection of the Constitution (Bundesamtes für Verfassungsschutz—BfV) to obtain a copy of the NSA’s most important program and to adopt it for the analysis of data gathered in Germany.
German spooks trade domestic data for use of NSA XKeyscore spy programme
The exposure of an intelligence-sharing agreement between the US National Security Agency (NSA) and German spy agency the Federal Office for the Protection of the Constitution (BfV) shows that German spooks traded domestic data in exchange for the use of the XKeyscore spying programme.
Documents analysed by German publication Die Zeit revealed a secret deal set up with the NSA that allowed the use of XKeyscore to rapidly analyse the huge amounts of metadata collected by the German agency on the condition that no data on US citizens was kept.
The BfV, unlike the Bundesnachrichtendienst foreign intelligence agency, does not carry out so-called dragnet surveillance, instead having to go through parliament to get permission to collect metadata on individual citizens.
- Paper Says German Spies Got Access to NSA Internet Surveillance Tool
Germany’s spy agency gave the NSA the private data of German citizens in exchange for Xkeyscore access
SHARE TWEET STUMBLE
The Federal Office for the Protection of the Constitution (BfV — Germany’s domestic spy agency) coveted access to Xkeyscore, the NSA’s flagship tool for searching and analyzing mass-surveillance data, so they secretly, illegally traded access to Germans’ data with the NSA for it.
In internal memos, the German spy agency said the deal had “far-reaching legal implications” — which is spookese for “we are totally breaking the law here.” The German Data Commissioner was not informed about the arrangement.
US Mass Surveillance Mindset Infects Germany, Democracies Worldwide
The NSA whistleblower claimed that the German intelligence spyware scandal illustrated how the US “collect it all” domestic surveillance philosophy that infected other democracies around the world.
- US, German Gov’ts Use Spy Software to Control Population – NSA Whistleblower
Why government surveillance won’t protect your data
The need to find a balance between privacy and security has become a truism in American media and political rhetoric. Surveillance makes us safer, we’re told, and too much concern with keeping personal lives private would reduce protection against terrorism. Such pie-chart depictions of privacy and security might seem logical, but they’re badly flawed.
NSA Mass Surveillance: Biggest Big Data Story
When people talk about the US National Security Agency/Central Security Service (NSA), the talk usually centers on privacy, with good reason. Still, it’s not the only subject worth discussing. The volume of data collected by the NSA and the associated costs make it the ultimate in Big Data case studies. What can it tell us about data and business? What can it tell us about business risk and the potential benefits and consequences of Big Data investments?
The agency’s exact budget is a government secret, but estimates put it around $10 billion per year. Although not all of that is devoted to surveillance, it’s reasonable to conclude that something in the ballpark of $5 billion goes to fund NSA data gathering each year. This may not be the clear-cut biggest Big Data application (Google’s revenue was $66 billion last year, for example), but it’s substantial, focused and paid for by the public. We ought to discuss what we’re getting for the money.
- NSA Whistleblowers Seek $100 Million for Their Troubles
Government Whistleblowers File $100 Million Lawsuit Against NSA, FBI, DOJ For Malicious Prosecution, Violations Of Civil Rights
After blowing the whistle on the NSA for wasteful spending and civil rights violations, the plaintiffs say they were threatened with prison time, subjected to illegal searches and seizures and had raids conducted on their homes.
Whistleblowers sue DOJ, FBI, and NSA for malicious prosecution, civil rights violations
Five whistleblowers are suing the Justice Department, National Security Agency, FBI and their former directors for violating their constitutional and civil rights after they complained about government waste and fraud through proper channels.
According to the complaint, filed in Washington, DC’s federal district court, all five were subjected to illegal searches and seizures, raids on their homes and places of business, false imprisonment, and cancellation of their security clearances after they complained about government waste and fraud at the NSA.
Four of the five whistleblowers worked at the National Security Agency: Thomas Drake, Ed Loomis, J. Kirk Wiebe and William Binney. The fifth, Diane Roark, worked at the Department of Energy. They are seeking some $100 million in damages.
- Japan premier urges Obama to probe alleged US spying
- Japan’s Abe asks Obama to investigate alleged NSA spying
- Abe asks Obama to investigate alleged NSA spying
- Japan PM Abe Requests Investigation Of U.S. NSA Spying
- Japanese PM asks Obama to probe US spying allegations
- Obama calls Japanese leader over spying concerns
- Obama Seeks To Reassure Japan’s Abe Over NSA Spying
Obama apologizes to Japan over NSA spying claims
President Barack Obama has apologized to Japan’s Prime Minister Shinzo Abe after WikiLeaks claimed the US had spied on Japanese politicians. Abe said the allegations “could shake our relationship of trust.”
Obama ‘very sorry’ over WikiLeaks’ NSA spying revelations
US President Barack Obama has apologised to Japan over revelations from WikiLeaks that the US National Security Agency (NSA) undertook systematic mass surveillance of Japanese government officials and major companies. In a telephone conversation with Prime Minister Shinzo Abe, Obama expressed regret for causing concern but failed to confirm whether or not the spying claims were true.
- Obama apologizes to Japan’s Abe over spying: Spokesman
- Barack Obama Says Sorry to Japan After WikiLeaks Claims of US Spying
- Obama calls Japanese leader to express regret for WikiLeaks spying scandal
- Obama expresses regret to Japan’s Abe over WikiLeaks spying allegations
- Obama apologizes to Abe over spying allegations
Japan’s response to WikiLeaks’ NSA espionage allegations was muted
The disclosure follows similar WikiLeaks revelations of US spying on Brazil, France and Germany. Yet while the previous exposés triggered widespread indignation and anger in those countries, Japan’s reaction has been muted by comparison.
NSA veteran: Hillary Clinton’s greatest mistake is not up for debate
From the first time I fired a .22 rifle at camp the summer after second grade, to my first read-in and access to classified information, and then to advanced weapons training and combat deployments with various NAVSOF elements, there was never a doubt that I was being entrusted with weapons that, when used improperly or negligently, could severely wound or kill the innocent.
Irony: NSA worried hackers with super computers might break current encryption standards
Why is this ironic? Because the NSA and other spy agencies want to break that encryption that protects your communications and are unhappy when online services and products can protect the user’s privacy with built-in encryption. The NSA also wants quantum computers of its own.
According to a report in the International Business Times, experts at the NSA are “deeply” worried that quantum computers will be able to break encryption if used by the hackers of the future.
How an NSA Contractor Morphed into a Startup Incubator
The incubator’s current class of 9 startups includes entrepreneurs that are working on technology for everything from cybersecurity to healthcare data—with the common theme being a connection to government-regulated industries. The CIC has the capacity to house 10-12 teams, but the location also allows for “planned” expansion.
This cryptic site is meant to remind you of a sweeping NSA program
Does the phrase “XKeyscore” mean anything to you? If your answer is “huh?” then Daniel McCarney has a site you can visit.
McCarney, a security engineer and hacker, set up join.xkeyscore.club over the weekend as a reminder of the National Security Agency’s XKeyscore tool. Internally the NSA said the program, which Glenn Greenwald reported first reported on for The Guardian back in 2013, gave analysts access to “nearly everything a typical user does on the internet.”
- Utah Residents Sue FBI and NSA for Spying During Winter Olympics
- Prominent Salt Lake City Residents Sue The NSA Over Mass Warrantless Surveillance During The 2002 Olympics
- Former mayor of SLC suing NSA for warrantless Olympic surveillance
- New species of crayfish discovered in Indonesia named after NSA whistleblower Edward Snowden
- Meet the crayfish species named after NSA whistleblower Edward Snowden
- Snowden of the Sea: Researchers Name New Crayfish After NSA Leaker
- New species of crayfish named after NSA leaker Edward Snowden
- Google Has a Secret Interview Process… And It Landed Me a Job
Associated Press sues FBI over fake news story
The Associated Press filed a lawsuit (PDF) this morning, demanding the FBI hand over information about its use of fake news stories. The case stems from a 2007 incident regarding a bomb threat at a school. The FBI created a fake news story with an Associated Press byline, then e-mailed it to a suspect to plant malware on his computer.
The AP sent a Freedom of Information Act request to the FBI last year seeking documents related to the 2014 sting. It also seeks to know how many times the FBI has used such a ruse since 2000. The FBI responded to the AP saying it could take two years or more to gather the information requested. Unsatisfied with the response, the Associated Press has taken the matter to court.
AP Sues FBI Over Impersonating An AP Reporter With A Fake AP Story
Last fall, we wrote about how the FBI had set up a fake AP news story in order to implant malware during an investigation. This came out deep in a document that had been released via a FOIA request by EFF, and first noticed by Chris Soghoian of the ACLU. The documents showed the FBI discussing how to install some malware, called a CIPAV (for Computer and Internet Protocol Address Verifier) by creating a fake news story…
- Fox Host Complains That NYPD Officers Have To Justify Their Stop-And-Frisks
How a Gun in a Suitcase Became a Permanent Ball and Chain
For carriage of the gun, she was delivered to Rikers Island and charged with attempted criminal possession of a weapon and eventually posted a bail bond of $10,000. Appearing in court in Queens, she was told by a judge, she said, “‘This ain’t Texas; we don’t carry guns here.’”
Online identity theft to become a crime
As of September 4, online identity theft will be illegal in Finland. Many people may soon find that even creating a fake social media profile can be considered a misdemeanour.
First State Legalizes Taser Drones for Cops, Thanks to a Lobbyist
North Dakota police will be free to fire ‘less than lethal’ weapons from the air thanks to the influence of Big Drone.
It is now legal for law enforcement in North Dakota to fly drones armed with everything from Tasers to tear gas thanks to a last-minute push by a pro-police lobbyist.
With all the concern over the militarization of police in the past year, no one noticed that the state became the first in the union to allow police to equip drones with “less than lethal” weapons. House Bill 1328 wasn’t drafted that way, but then a lobbyist representing law enforcement—tight with a booming drone industry—got his hands on it.
The bill’s stated intent was to require police to obtain a search warrant from a judge in order to use a drone to search for criminal evidence. In fact, the original draft of Representative Rick Becker’s bill would have banned all weapons on police drones.
Here’s What Actually Gets Terrorists To Tell The Truth — And It’s Not Torture
Hollywood has a lot to answer for. Thanks to the hit TV show 24 and movies like Zero Dark Thirty, we think we know what terrorist interrogations look like: After being roughed up and threatened, the suspect breaks down and reveals all. Mass murder is thwarted. Osama Bin Laden is shot.
The end, we tell ourselves, justifies the ugly means.
Even after the abuses committed at CIA “black sites” were laid bare last year by the U.S. Senate Intelligence Committee, most Americans stuck to this view. Some 59% believed the CIA’s harsh interrogation methods were justified, in a December 2014 poll run for the Washington Post and ABC News.
The UK Hits Moral Rock Bottom
The conduct of the political class is utterly shameless. Meantime they indulge their fantasies of stripping workers of all protection and of stopping aid to the needy, and while the politicians gorge and gorge, the poor are quietly being slipped away to die.
Beware of Chilcot
I am worried that the continued delay in the publication of Chilcot’s report is giving rise to expectations that it will be forthright and damning of Blair and his supporters. Nothing could be further from the truth. Even though Blair plunged us into an illegal war with dreadful long-term consequences, the report has always been designed to be a typical Whitehall fudge. Mistakes made – errors of judgement – all in good faith – lessons learned. You don’t have to wait for it, that is it.
The Chilcot team was handpicked by Gordon Brown – himself up to his neck in guilt for the illegal invasion – and three of the five had been aggressive proponents of the war. The remaining two, Chilcot and Baroness Prasad, are “sound” for the Establishment. Let me remind you of my analysis of the committee members in 2009. Sir Lawrence Freedman was an active propagandist for the invasion while Sir Martin Gilbert (died while contributing to the committee) was so enamoured of the invasion he compared Bush and Blair to Roosevelt and Churchill. Rod Lyne was actively involved in selling the WMD lies and arguably in danger of war crime accusation himself.
Katrina’s ‘Golden Opportunity’: 10 Years of Corporate Media Celebrating Disaster
Americans love, above all, a narrative. Preferably a moral one, marked by a clear good and evil. For many so-called “school reformers,” the tragedy of Katrina, which marks its ten-year anniversary today, provided that narrative. Its stark before-and-after provided a clear A/B test as to the righteousness of their cause. Before was a “broken school system,” and after is a glossy, privatized education system.
We’ll set aside the fact that this is largely a fantasy. Torture the data enough, and the “New Orleans miracle” can be teased out if one wants it enough. Despite studies and reporting showing otherwise, for the sake of this piece it doesn’t actually matter if radical post-Katrina New Orleans school reform was a “success,” a failure or somewhere in between. What is important is that so many corporatists think this “miracle” was not just an incidental positive but was, all things considered, worth it. Worth the 1,800 people killed and the 100,000 African-Americans permanently ejected from the city.
The most popular examination of this pathology is, of course, from Naomi Klein, who coined the idea of the ”shock doctrine” in her 2007 book of the same name. In it, she explores how Katrina and other manmade and non-manmade disasters are exploited to rush through a radical right wing corporate agenda.
10 Years After Hurricane Katrina, Media Need To See The Link Between Climate Change And Social Justice
Ten years after Hurricane Katrina devastated the Gulf Coast, environmental justice advocates feel the time is long overdue for the media to start connecting the dots between climate change and social justice.
There may be no clearer example of this intersection than in the impact and aftermath of 2005′s Hurricane Katrina. Between the devastating effects of the storm itself, and the decade-long effort to restore destroyed communities afterwards, the region’s African-American population has demonstrably suffered the most.
13 Simple But Exciting Ways To Lose Your Citizenship In Tony Abbott’s Team Australia
The government’s proposed citizenship stripping laws are about a lot more than taking citizenship off people who try to blow up a train. In fact, they may well rip away the rights of a vast range of people for a staggering number of reasons.
We’ve gone though the expert responses to the bill – currently before a parliamentary inquiry – and picked out the best ways to see your citizenship disappear if you are a dual national.
If you’re going to end up banished from Australia, you may as well have some fun doing it.
Before we go on we should note that it’s not exactly clear how many dual nationals there are in Australia but if you’re one of them, this could soon apply to you. We’re looking at you, John Pilger… Germaine Greer, et al.
The Future of One-Party Rule in Singapore
At the talk titled The Future of One-Party Rule in Singapore, Dr Chee spoke about the implications of one-party rule in the past, present and future and how the next general election will influence democratic politics in Singapore. Students and faculty posed questions after Dr Chee gave brief opening remarks, leading to a lively discussion in an already overflowing room of more than 100 members of the Yale-NUS community.
I am frustrated at how a country this economically advanced can be so socially backward, but to think about it, it is not surprising at all. With all that has been going down in recent years (e.g. Amos Yee, the National Library Board penguin saga), the world is looking at us. What Singapore needs right now is for people in power to put their foot down and say, “Hey, this is wrong, and I’m going to fight for what is right.” Unfortunately, at the end of the day, elections are a race for votes, and few are willing to risk losing votes this way. After all, the less people you piss off, the higher the chances you have at winning. We need social change, and we need it now. Yet how can we ever have real change if advocating for it only puts people off or gets you shut down?
- Associated Press sues FBI over fake news story
Armors, Glory and… religion in a US trade mark clash
Regardless of spelling, Armor&Glory’s market impact appears minimal. According to the story, “it has so far made less than $100,000 in revenue since 2013 — about 0.003 percent of Under Armour’s sales just last year. The company’s online store sells $20 shorts and $25 shirts designed largely for a core Christian audience, with slogans like “Be spiritually attractive” and ‘Put on God’s armor and receive His glory.’”.
- Armors, Glory and… religion in a US trade mark clash
Piracy: Hollywood’s Losing a Few Pounds, Who Cares?
Following news this week that a man is facing a custodial sentence after potentially defrauding the movie industry out of £120m, FACT Director General Kieron Sharp has been confronted with an uncomfortable truth. According to listeners contacting the BBC, the public has little sympathy with Hollywood.
Pirate Bay Founder Released From Jail But Immediately Re-Arrested
Pirate Bay founder Gottfrid Svartholm was released from a Danish prison yesterday, only to be immediately re-arrested by police. The Swede is now expected to be extradited back to his home country where he will be returned to prison, but not before appearing in court today to appeal the decision.
Tech Giants Want to Punish DMCA Takedown Abusers
The CCIA, which represents global tech firms including Google, Facebook and Microsoft, has published an extensive research paper on the future of copyright in the digital landscape. One of the main suggestions is to extent current copyright law, so that senders of wrongful DMCA takedown notices face serious legal consequences.
Facebook Wants to Crack Down on Pirated Videos
Facebook says it will give video creators and publishers a way to remove copyrighted videos that have been uploaded to its popular social network without the proper permission.
- Piracy: Hollywood’s Losing a Few Pounds, Who Cares?
This is what Microsoft staff distributes to attendees in FOSS events:
Photo credit: Neil McAllister
Summary: Microsoft’s relentless attacks on GNU/Linux and Free software in general (even if it runs on Windows) are so evident that claims of ‘love’ remain laughable at best (if not infuriating)
MICROSOFT JUST CANNOT HELP itself. It’s like a scorpion riding a tortoise over a river. It keeps attacking GNU/Linux while claiming that it “loves Linux”. The truth is, Microsoft loathes Linux with a deep passion, but it doesn’t want to show this because it needs to infiltrate Linux events such as LinuxCon. It’s a strategy of entryism. It’s really ugly.
Imagine Microsoft having Linux folks as its keynote guests/speakers in its developers’ events, preaching passionately in favour of Free software (GPL for instance). Microsoft keeps infiltrating every single Linux event that matters. Microsoft is paying for it and it knows that it’s annoying people who pay a lot of money to attend (or whose employers are sponsors). Microsoft runs many developers’ events. Imagine Linux ‘infiltrating’ these. That would be entryism in reverse. But FOSS doesn’t play dirty. We leave the crimes and the unethical deeds to Microsoft.
Several days ago someone wrote to point out that Microsoft speaks nonsense and spread FUD again. To quote:
The giant from Redmond must be desperate since it has to use a controversial story from a relatively small Italian city to combat open source software, as in the mean time many larger deployments also in Italy are happy with LibreOffice and the numbers produced by Provincia di Perugia prove the opposite of the Microsoft-publication.
As Robert Pogson put it: “Why do they keep spreading it? Every time they get caught lying they destroy their own credibility amongst their loyal followers, if there are any left…”
Microsoft and its goons recently spread some more lies about Munich, using media partners which took the words of just two people and made that seem like the whole of Munich was upset with GNU/Linux. “Most people don’t really realize that they have Linux and they do not really care,” wrote Mr. Heath yesterday . He was the first person who wrote a story about this in English, foreseeing and properly preparing for Microsoft’s FUD attacks (Microsoft advocacy sites soon took the story out of context to lie about Munich).
Susan Linton, writing her daily column, said that “everyone reading of this knew that couldn’t be entirely right and today Heath reported, “the bulk of users have not taken issue with the move.” He quoted Munich IT developer, Jan-Marek Glogowski, at DebConf15 saying, “Most people don’t really realize that they have Linux and they do not really care, they want to do their stuff.” That’s not to say there aren’t issues and growing pains, primarily keeping up with hardware support with LTS Ubuntu-base, but plans are to keep forging ahead. Robert Pogson linked to the actual video from DebConf15.”
So basically we have just Microsoft FUD going on. Here is a new article that is just more utter lies, maybe ‘prepared’ propaganda from Microsoft (misleading, inaccurate) . They have totally made up the ‘facts’ to sell people the illusion that GNU/Linux is a failure. It’s that same old tired Munich lobbying from Microsoft Germany. As Pogson noted:
Lately, in the news, we read that agitators are still pushing to roll back GNU/Linux desktops.
They really are just “agitators”; there are only 2 of them at the moment, but they are joined by Microsoft spinners who have access to newspapers and/or news sites. “Munich councillors want to return to proprietary software,” wrote Gijs Hillenius in the European press, but we are speaking about just “two councillors [who] have not yet responded to emails seeking their position on interoperability” (if they know what it is at all, as they’re non-technical). Maybe they need to ask Microsoft Germany.
This headline, “Munich Officials Who Dumped Windows For Linux Want Microsoft’s OS Back” , is also a lie because it’s not the same officials, there’s no change of mind, there are just 2 dissenting voices.
This latest round of anti-GNU/Linux FUD is not something that we are unfamiliar with. We wrote dozens of in-depth articles about this. Munich is a large-scale migration and as we showed in previous years, Microsoft usually orchestrates this FUD behind the scenes. Sometimes some information leaks out to the media, showing Microsoft’s role in it (occasionally through proxies like HP). All we have here is a PR exercise, not news. █
Related/contextual items from the news:
Here’s the one ‘major problem’ facing Munich after switching from Windows to Linux
In spite of complaints from a couple of councillors about the Limux OS, the city council said the bulk of users have not taken issue with the move.
“Most people don’t really realize that they have Linux and they do not really care,” said Jan-Marek Glogowski, a developer in the IT team at the City of Munich told the DebConf Debian developers meeting earlier this month.
Report: 1 major Linux migration that went awry
Whatever the case, the city of Munich will have to wait it out for another year at least. According to The Inquirer, a review and subsequent response into the future IT policy will not take place until the end of 2016.
- Munich Officials Who Dumped Windows For Linux Want Microsoft’s OS Back
Summary: The European Patent Office has ceased even trying to pretend that it respects human rights, including the right to free speech
Staff suicides at the EPO are a frequent occurrence [1, 2, 3] as the last/latest one was just a week ago. This can reasonably well be blamed on a regime of terror, led by the arrogant, Napoleonic Battistelli. He rules with an iron fist and violates many rules, laws, regulations, etc. There’s no real protection from a thug like him who pretends to be above the law (impunity), so people are rightly afraid. It’s the same with armed policemen who destroy video evidence and do as they wish, basically acting like unaccountable goons.
Worst among all is probably Battistelli’s so-called Investigation Unit, which is basically just a bunch of goons, who even hire the ‘British Blackwater’ to go after staff and after journalists. Just for the uninitiated, who haven’t been following what we covered here before, here are some reminders:
- More Utter Shame Unveiled at Battistelli’s EPO: Intimidation Tactics With Help From ‘Control Risks’
- Süddeutsche Zeitung Article About the EPO’s Investigation Unit and Control Risks Group
- The EPO Sinks Deeper in a Scandal After Paying Public Money for Military-Connected Control Risks to Stalk Journalists and Staff
- EPO May be Creating Its Own Lawless NSA (or GCHQ) With Control Risks Group Deal
- EPO Officially Confirms That It Specifically Hired Control Risks Group (CRG) to Spy on Journalists and Their Sources
- EPO Corruption Compared to FIFA Corruption While ‘Control Risks’ Helps EPO Hide/Suppress Evidence of Corruption; Calls on German Authorities to Crack Down on Both
- The European Patent Office Has Become Militarised
- EPO Reluctantly (and Privately) Confirms Giving Public Money for Military-connected ‘Control Risks’ to Spy on Journalists and Their Sources While Techrights is Under Fresh DDOS Attacks
- EPO Data Protection Officer ‘Just a Dictator’s Minion’, Approved Keyloggers and Hidden Cameras
- European Patent Office (EPO) Now Uses Keyloggers to Spy on Staff
- Investigation Unit a Complete Farce Inside the EPO
- Süddeutsche Zeitung Says Talking Helps While EPO Management Back-stabs Other Side of the Table
- EPO Surveillance, Threats, and Patronisation of Dutch Legal System Covered in Dutch Article From De Volkskrant
- Techrights Confirmed as a Target of EPO Surveillance, With Help From Control Risks Group (CRG)
“The Office continues to filter emails sent to EPO staff and containing the word SUEPO in the subject,” SUEPO wrote on the 26th of this month (an update titled “Filtering of SUEPO emails”). It’s not exactly surprising anymore. The EPO is nuts, so this is expected. “A SUEPO lawyer addresses Mr Battistelli,” wrote SUEPO, “by pointing out the legal implications and requests the end of the filtering. A copy of the letter can be found here.”
In a very crude, undemocratic fashion they do not just try to completely gag opposition, even if that opposition is the staff union, i.e. EPO staff rather than outsiders. For the record, here is the text of this complaint from SUEPO (it’s in German, so translations would be well received) █
Patent Practitioners: “The Unitary Patent Might be Able to Open the Floodgates for Software Patents in Europe”
The US patent system may be getting exported to Europe (a silent occupation), without even consulting European citizens on this matter
Summary: The EPO-backed Unitary Patent scheme threatens to bring software patents to Europe and along with them a lot of patent trolls from all around the world (especially the United States)
“The Unitary Patent might be able to open the floodgates for software patents in Europe,” says this new analysis, published earlier today in a lawyers’ site. It echoes many of the warnings from the likes of FFII, among other European groups that have repeatedly warned about the Unitary Patent (UPC).
“It echoes many of the warnings from the likes of FFII, among other European groups that have repeatedly warned about the Unitary Patent (UPC).”The long piece is titled “The Murky Waters Of Software Patents” and it’s not as positive as one might expect. Given the publication it comes from (pro-patents), it’s hardly surprising at all. “Software patents,” says the author, “have been the subject of much debate – not only in the US, but also in Europe. This has been a thorny issue for many years and the future of software patents still remains unknown. At the outset, a breakdown of the differences between patents and copyrights will highlight why the patent is the form of intellectual property which is proving to be the most problematic with regards to software.”
The author later alludes to Alice, which we may write a lot more about tomorrow. “In the US,” he says, “software patents have been in existence since the early 1970s, but courts have recently started to reject software patents. The courts have ruled that simply “doing something on a computer” does not enable one to obtain a software patent on the matter. After hundreds of thousands of patents being issued, it became clear that there needed to be more restriction and the courts have recently been invalidating patents that were already granted. In 2014, in the landmark Alice Corp judgment, the courts stated “the mere recitation of a generic computer cannot transform a patent ineligible abstract idea into a patent eligible invention.” Thus the US is now retreating from its original position of granting software patents somewhat liberally.”
Then the author writes about Europe, in particular about the effects of the UPC. “The Unitary Patent,” he explains, “is a very recent brainchild of the European Patent Office. Through one single request, one will be able to obtain patent protection in 25 member states (Spain, Italy and Croatia are not currently participating). This patent will be subject to the exclusive jurisdiction of the Unitary Patent Court, which will comprise of a court of first instance, a court of appeal and a registry.
“The rulings of this court will affect the Member States who have ratified the agreement. The EPO hopes that the establishment of the court will add to more predictability in proceedings and avoid parallel litigation. Since all unitary patents will thus have their own court, there is also an expectation of faster and more efficient procedures than if these were to be held in the relevant Member States. So far, seven Member States have ratified the agreement – and Malta was among the first to do so. It will come into force once it has been ratified by thirteen states, which is expected to be around 2016. Nevertheless, the position of software patents under this new patent system will remain to be seen. When it comes into force, it will lay the cornerstone for more debate on the subject – as being able to achieve a unitary software patent will mean that it will automatically be recognized in all the Member States.
“The Unitary Patent might be able to open the floodgates for software patents in Europe, since if it allows for software patents, they will become immediately applicable in all the EU Member States. The same might be said for the contrary – however, the fact that the EPO allows for a Unitary Patent court of appeal means that this discussion might go on for years to come.”
Another site of patent lawyers now informs us of “Progress on the Unitary Patent”. It says that “[o]n 10 July 2015, the Preparatory Committee (which handles all the subsidiary issues arising from the creation of the Unified Patent Court (“UPC”), such as HR or IT management) met to discuss the last (18th) draft of the Rules of Procedure for the UPC. They are expected to reach an agreement on a final set of Rules in October 2015.
“The draft Protocol on Provisional Application of parts of the Agreement on a Unified Patent Court was also on the agenda as well as the salary package of the judges, the privileges and immunities of the UPC and the division of costs and responsibilities.”
According to this, Portugal too has caved in without even consulting or liaising with its citizens. What a coup!
“Confirmation of Portugal’s ratification of the UPC Agreement was published on 6 August 2015,” says a site about the UPC, “in the country’s Official Gazette of legislation. In the Diário da República Eletrónico, the Decree of the President of the Republic No. 90/2015 indicated that Aníbal Cavaco Silva had approved the UPC Agreement on 30 July 2015 following Parliament’s approval (No 108/2015) on 10 April 2015; a certified copy of the original UPC Agreement was also published in English and Portuguese. See here.”
Here in the UK as well, without even consulting citizens, the government is now preparing for the UPC. Nobody voted for it. This just serves to show how undemocratic the European Union has become, possibly even worse than the EPO alone.
What happens here is similar to what happens in New Zealand right now [1, 2, 3], with persistent efforts to thwart the law (a law banning software patents) through all-encompassing ‘trade’ deals, effectively ‘laundering’ the law at the behest of rich and powerful people who collude in secret. In New Zealand, the loopholes for software patenting have thus far been similar to Europe’s “as such”. █
Microsoft Lies About Vista 10 and Increases Microsoft Surveillance (Even Beyond Vista 10 and Into Android, Vista 7/8)
Summary: Windows surveillance expands retroactively, making its way into platforms other than Windows and also expanding to predecessors of Vista 10
IN TERMS of sales and technical weaknesses, Vista 10 is a huge disaster, doing probably worse than its predecessor, which also did worse than the mythically ‘great’ Windows Vista. It really is a total disaster, but Microsoft employees won’t say this to the media for fear of personal retribution (firing).
“…Microsoft is putting Bing inside Cyanogen OS, not just from the company Cyanogen but also in OnePlus.”The unprecedented spyware problem is no longer limited to just Vista 10, so users of Windows on PCs are all affected. They should escape all of Windows as soon as possible because even older versions have spying features silently added to them. Well, this has actually been known for a while and we wrote about it several weeks ago. Now it appears as though more people become aware of it (the latest headline says “Updates Make Windows 7 and 8 Spy On You Like Windows 10″). Based on [1-3], Microsoft is putting Bing inside Cyanogen OS, not just from the company Cyanogen but also in OnePlus. This company, OnePlus, should dump Cyanogen OS, for reasons we covered here before [1, 2].
Mind this new article titled “Windows 10 automatically sends parents detailed dossier of their children’s internet history and computer use”. To quote just the opening paragraphs: “Windows 10 sends a weekly “activity update” on childrens’ internet browsing and computer history to parents, by default and without telling anyone. The feature could be dangerous as well as embarrassing, users have pointed out, allowing parents to watch everything their children do on the computer.
“Microsoft has become just a surveillance company and Windows the surveillance platform.”“The operating system sends a weekly note that includes a list of websites children have visited, how many hours per day they have spent on the computer, and for how long they have used their favourite apps, according to reports.”
Microsoft has become just a surveillance company and Windows the surveillance platform.
Vista 10 lies (“marketing”) now grow in lieu with Munich propaganda (anti-GNU/Linux myth-making, in order to scare CIOs who are fed up with Windows). Beware Microsoft’s fake vista 10 figures. These are being pushed by Microsoft into its boosters and moles in the media right now. The company has a long history gaming numbers to lie about number of ‘sales’ or ‘useds’ [sic]. Here is one Microsoft booster disseminating what it essentially Microsoft marketing with a sloppily-made image that cement the Big Lie (carving it in stone, within an image that cannot be edited for correction). “The only question,” wrote to us iopkh, “is how they are fiddling the stats.”
These claims are pulled directly from Microsoft, or rather, they are being pushed by Microsoft onto gullible journalists or complicit ‘journalists’. The author is a known Microsoft booster with history. Microsoft’s own figures hysterically debunk some early claims that the media cited a lot (between 45 million and 55 million ‘upgrades’ after 3 days). We warned that these were baseless claims from the rumour mill and Microsoft’s trolls army.
This time too we cannot trust the figures since they come from Microsoft. Based on how it has always gamed the numbers (‘sales’ not meaning actual sales or even users), we know these are lies. Look at web statistics from some of the more respected sources. Maybe 5% market share (or less) is what Microsoft’s latest beast has got at the moment, which given the price and other exceptional factors, is truly (and quite frankly) pathetic. █
Related/contextual items from the news:
Summary: Yet another EPO member of staff has just committed suicide, leading to the inevitable question: how many people need to die before Battistelli and his minions are out of the Office for good?
THE EPO‘s management has been so rogue that suicides have been happening, as we previously covered in [1, 2, 3]. Any outsider would agree that this may be a sign of terrible, incompetent management that over-stresses staff and rules by fear, reigning by terror.
Hearing from sources that 5 people at the EPO have committed suicide under the Battistelli regime is going to motivate more activism against the EPO, including staff demonstrations. Staff at the EPO needn’t be suicidal or depression-leaning. Many employees — and examiners in particular — are highly qualified, often with Ph.D.-level degrees and many years of technical experience. Money is not an issue and these people are a lot smarter than their ‘boss’, Battistelli, who merely comes from a prestigious (expensive) French school and has plenty of powerful connections other than his cabal inside the EPO’s management.
“Yet another EPO employee committed suicide last week,” wrote a person to us. This person managed to secure possession of a note that Ciaran McGinley published and disseminated among all EPO staff this week. We have deleted the name of the dead person in order to respect the wishes of his family.
“Just watch how negative the work atmosphere has become.”“The note of Ciaran McGinley looks poetic,” said our source, “but it is highly hypocritical and cynical. The term suicide has been carefully omitted. The suicide rate has now become extremely worrying. This is the fifth suicide in 39 months during the mandate of Mr Battistelli. And it is the third one in the principal directorate of Mr McGinley since his appointment. Mr McGinley systematically refuses any independent investigation whether the workplace could have played a role in these tragedies. And his lyrical note would be sufficient to make his staff forget that they are told that they are overpaid and will soon be replaced by machines. Their professional pride has been completely destroyed.”
The EPO scandals are far from over. We have some exclusive stories about the EPO’s other abuses. They are lined up for publication next month and we are eager to expose corruption with more tenacity than before as the regime of Battistelli is costing more than just money (not to mention the harm to European citizens). Some people prefer not to live under it.
When Battistelli doesn’t just eliminate people by illegally ‘suspending’ them (like a house ban) he just turns out to be ruling by intimidation. That’s never a healthy way to manage. If some staff are opting to eliminate themselves rather than eliminate corrupt elements in the institution that employs them, who wins?
Just watch how negative the work atmosphere has become. It now including censorship, self-censorship, suspicion that ill staff are just lying to get a day off, and so on. This must end.
Our colleague ██████████ passed away
A message of PD 2.1 Ciaran McGinley
By now, most of you will have been made aware of the unexpected passing away of our colleague ███████████. ██████, who was only 42 years old, leaves behind a wife and two young children. Our thoughts and deepest sympathy must, first and foremost, go to them. We have lost a colleague, a friend and a future leader. His family have lost something much more precious – a son, a husband and a father. I think I speak on behalf of everyone in PA when I express my shock and sadness about this tragic loss. His family have asked the EPO to be discreet and to respect what is a very private matter. We all therefore need to behave in a way that fully supports their wishes on this point. The best way to do this is to remember ██████ for how we at the EPO knew him – instantly likeable, open and always with a sincere, warm and caring smile.
Arrangements are currently being made for him to be flown home. The family has indicated that they prefer that the funeral takes place in a close, intimate circle. The family very much appreciate all the good wishes and expressions of sympathy, but they also want, and need, their privacy. The EPO social services have offered full support to the family as is usual in such tragic circumstances. Finally, I would like to take this opportunity to thank ████ OHS for the support she has offered and given to colleagues in the past two days – it has been much appreciated and I know that it will continue to be necessary in the coming weeks as we all try to get to terms with what has happened.
PD Patent Administration
How to find out if your PC is compatible with Linux
Linux’s hardware support is better than ever, but you still can’t take it for granted. Not every laptop and desktop you see at your local computer store (or, more realistically, on Amazon) will work perfectly with Linux. Whether you’re buying a PC for Linux or just want to ensure you can dual-boot at some point in the future, thinking about this ahead of time will pay off.
How to Ready Yourself for Linux: Nine Tips
These days, I rarely give unsolicited technical advice. However, if people ask me how to explore and install Linux, I urge them to be systematic. To the average computer user, installing a Linux operating system is an unfamiliar procedure — to say nothing of an exercise in unprecedented diversity.
Is There Such a Thing as Too Many GNU/Linux Distributions?
I think it’s time to clarify the matter of “too many Linux distributions” once and for all. For a Linux veteran like myself, it is getting annoying to see all sorts of comments on the Internet from people complaining that there are way too many distributions of Linux.
What Is The Oldest Linux Installation CD You Have?
Just found these two (both from early 1996) and thought we could have a little fun. The member who posts a genuine picture of the oldest Linux installation CD they have in their possession by September 4th will be upgraded to a contributing member and will be able to pick one item out of the LQ Merchandise Store paid for by me.
- Is There Such a Thing as Too Many GNU/Linux Distributions?
Intel Invests in BlueData for Spinning Up Spark Clusters on the Fly
Intel Capital’s investment, its third in BlueData since 2012, is part of a $20 million funding round led by the chip maker’s strategic investment arm and announced today. Doug Fisher, senior vice president of Intel and general manager of its Software and Services Group, will also join BlueData’s board of directors.
Google Declares its Cloud Container Engine Ready for Production
About 10 months since it first announced the managed version of Kubernetes, its open source Linux container management system, Google has launched the cloud service, called Google Container Engine, into production today, announcing the service is now production-ready.
Cloud: Enabling innovation in the third platform era
Cloud is not virtualization, nor is it a computer sitting in a remote data center; it is a wide range of disciplines that enable the third platform era, spanning from software-defined infrastructure to the API economy to new service acquisition models. Cloud even redefines relationships between those who use services and those who provide services—between, for example, lines of business and the IT organization, or between developers and system administrators—in what is commonly known as DevOps.
- Intel Invests in BlueData for Spinning Up Spark Clusters on the Fly
Linux Foundation Wants to Pin a Badge on Secure Open Source Software
“The badging system seems too rooted in video games and social media,” said Raytheon | Websense engineer Tom O’Connor. “Building secure software is not really a game, and I worry that a badge system reduces security to checklists. That said, I can certainly see value in having some sort of rudimentary assessments of open source projects to see that they meet some minimal standards.”
Linux Foundation starts security vetting program for FOSS
The Core Infrastructure Initiative (CII), a collaborative project run by the Linux Foundation, is aiming to develop a free security best practices program for open source software.
- Happy Birthday, Linux. You’ve Taught Us Much.
Happy 24th birthday Linux!
It isn’t an overstatement to say that the modern world runs on Linux. If you look around you, almost everything is running on Linux — from your home router to stock exchanges. Thanks to Linux, open source has become a phenomenon that is fast becoming a norm in the enterprise and consumer segments. Fierce competitors like Google, Facebook, Yahoo!, Twitter, Red Hat, SUSE are all working together to make open source software even better.
Happy Birthday Linux, Thank you Linus
The twenty-fourth birthday of the Linux kernel was the top story today. Linux’ birthday is widely celebrated on August 25, the day of Linus’ original post, while others mark the birthdate as October 5, the day of the first public release. Lots of sites paid homage with several running through the time-line of its life. Elsewhere, a couple articles sang Open Source praises today and DarkDuck seemed confused by Knoppix.
Hardened Linux stalwarts grsecurity pull the pin after legal fight
The gurus behind the popular and respected Linux kernel hardening service Grsecurity have decided to stop providing support for its stable offering.
Patches will be ceased in the next two weeks in response to an expensive and lengthy court case between the small outfit and a “multi-billion dollar” corporation which it says flagrantly infringed its trademark.
The Liquorix Kernel Is Still Ticking, Currently Based On Linux 4.1
It’s been two years since I last tested / reported on the Liquorix kernel, which advertises itself as “the better distro kernel” with optimizations for desktop, multimedia, and gaming workloads.
The Liquorix kernel has Zen interactive tuning, hard kernel preemption, utilizes Budget Fair Queue (BFQ), Vegas TCP congestion control, smaller TX net queues, AuFS support, etc.
At 24, Linux Has Come Out of the Basement
Linux is a very functional operating system. It “led to the collapse of the infrastructure decision debates of many IT shops,” said Guy Smith, chief strategist for Silicon Strategies Marketing. “Before Linux, long-term choices concerning the OS, database, development language, and more divided IT shops — and the resulting incompatibilities led to dysfunctional applications.”
- Linux Turns 24 Years Old Today
For Linux, It’s Another Day, Another File System
Overstreet further explains that Bcachefs is a modern Copy-on-Write (COW) file system “with checksumming, compression, multiple devices, caching, and eventually snapshots and all kinds of other nifty features.”
- BcacheFS Gets Traction On Linux
- Kernel 4.2 RC8 Has Been Released, The Final Version Is Excepted To Arrive Next Monday
Libinput 1.0 Officially Released
At long last, libinput 1.0 has been released. Libinput is the input handling library commonly used by Wayland compositors and is optionally used in the X.Org world via the xf86-input-libinput driver and is starting to be used by the Ubuntu Mir display server.
- Libinput 1.0 Officially Released
- Linux Foundation Wants to Pin a Badge on Secure Open Source Software
RedNotebook 1.10.2 Has Been Released. How To Install It On Ubuntu
The latest version available is RedNotebook 1.10.2, which has been released recently, coming with changes.
Qmmp (Winamp-like Mediaplayer) Has Reached Version 0.8.8
Qmmp is a popular open-source, cross-platform multimedia player, similar to Winamp and written in Qt. It has support for popular multimedia file formats, including MPEG1 layer 2/3, Ogg Vorbis, Ogg Opus, Native FLAC/Ogg FLAC, Musepack, WavePack, WMA, Midi.
ownCloud Desktop Client 2.0 Arrives with Support for Multiple Accounts, More
ownCloud, a software company known for developing and deploying the most popular self-hosting cloud server solution on the market, announced today, August 25, the immediate availability for download of ownCloud Desktop Client 2.0.
Retweet 0.2 : bump to Python 3
Especially useful to broadcast news through a network of Twitter accounts, Retweet was improved to bump Python version to 3.4 and to improve pep8 compliance (work in progress).
- RProtoBuf 0.4.3
Play SRT Subtitles On Top Of Any Video With Penguin Subtitle Player
Penguin Subtitle Player is a simple open source Qt5 subtitle player which can be used to display SRT subtitles on top of online video streaming websites that don’t support subtitles or don’t allow using custom subtitles.
Tomato 1.1 (Pomodoro App For Elementary OS) Has Been Released
Tomato App is a time management application based on the Pomodoro technique, specially developed for the Elementary OS 0.3 Freya and Elementary OS 0.2 Luna systems.
GStreamer 1.6 Open Source Multimedia Backend Gets Closer to Release, Here’s What’s New
The hard-working team of developers behind the powerful GStreamer open-source multimedia backend, used by numerous audio/video tools and deployed by default in dozens of GNU/Linux distribution published details about the new features coming to GStreamer 1.6, a major release of the acclaimed software.
- IncrediBuild Releases Acceleration Solutions For Linux and Android
VMware Workstation and Player 12.0 Arrive with Support for Ubuntu 15.04, Windows 10
VMware, a software company, known for some of the most acclaimed virtualization solutions on the market, announced the release of the VMware Workstation 12.0 and VMware Player 12.0 apps.
- VMware Workstation 12 Brings Better Performance, OpenGL 3.3 Support
- Opera 32.0.1963.0, Based On Chromium 46 Has Been Released
- jenkins has a fourth state
- The USB inhibitor
- 3-finger-drag on Linux
- Citadel – A Free, Open Source, Email And Collaboration Suite
- Use of Valgrind in Fedora packages
- How To Install Xdman 5.0 On Ubuntu 15.04 And Ubuntu 14.04 Systems
- How To Install Wine Staging 1.7.50 On Ubuntu And Derivative Systems
- Some fancy things in YAML-based QML replacement
- Switching to a Kobo e-reader
- Kobo Japanese Dictionary Enhancer 1.0
- Adding lower thirds in Kdenlive
- 8 new tutorials for OpenStack users and developers
- [Short Tip] show processes accessing a file: fuser & lsof
- An alternative to Linaro’s HWPacks
- Build a network router and firewall with Fedora 22 and systemd-networkd
- Fast and painless NFS for your Vagrant environment
- Install And Configure PXE Server On Ubuntu 15.04
- Install KDE Plasma 5.3 In Ubuntu
- How To Install FreeNAS 9.3
Pillars of Eternity: The White March Part One review: Just another chapter in a long tale
If you’ve played Baldur’s Gate any time in the past decade, chances are you’ve also (whether you knew it or not) played through its 1999 expansion, Tales of the Sword Coast. The two have been packaged together for years now, and for good reason—there’s no reason not to play Tales of the Sword Coast. It’s thirty hours of side content, integrated so seamlessly into the base game it’s hard to tell where Baldur’s Gate ends and Sword Coast begins.
Pillars of Eternity Is Now 33% Off on Steam for Linux
The amazing Pillars of Eternity party-based RPG developed by Obsidian Entertainment and published by Paradox Interactive is now discounted on Steam for Linux with 33%.
- 1 of 4 Games Is Now Available On Steam For Linux
Looks Like Feral Interactive’s Linux Ports Will See More AMD Love
Feral Interactive are awesome, that’s not exactly news, but they did send out an interesting tweet earlier showing off some new kit.
- The New Starbound Update Has Arrived With A Great Trailer, Huge Update
Teeworlds, The Free & Open Source 2D Battle Game Is Now On Steam For Linux
Teeworlds is a great little 2D battle game, and while it has been around for a while it’s now just become available on Steam.
Exclusive First Look at Falldown, a Fast-Paced and Addictive Game for Ubuntu Touch
Ubuntu app developer and Open Source enthusiast Riccardo Padovani had the great pleasure of informing Softpedia about his upcoming game for Canonical’s Ubuntu Touch mobile operating system used on Ubuntu phone devices.
1 in 4 Games on Steam Now Has Linux Support
The Steam for Linux platform is expanding, and it’s now home to more than 1,400 games and applications. The number of new titles, ported or released natively, has been increasing in the past year or so, and there is no sign that it’s slowing down.
Humble PC & Android Bundle 13 Just Got Bigger with New Linux Games
The Humble PC & Android Bundle 13 collection was released just a few days ago, and a few games have been added. Users who paid above the average price will get these new titles for free.
- Humble Bundle Brings Humongous Entertainment To Android
- Three More Games Added To The Humble PC And Android Bundle 13—Plus We’ve Got 10 Free Codes To Give Away
Experimental Unity Editor Arrives On Linux [Ed: watch out, Mono]
Unity, the popular indie gaming engine, will arrive on Linux after being created for Mac OS X first and then ported to Windows in 2009.
Unity Game Engine Editor Now on Linux, Experimental Build Available for Free
Unity Technologies announced a while back that they intend to launch the Unity game engine tools on Linux as well. Today we just received the first experimental build and it looks like developers are testing the waters.
- Unity Comes to Linux: Experimental Build Now Available
The Linux Version Of Dying Light Is Broken
A little warning announcement for you, it seems the latest update for Dying Light has broken the game for Linux gamers.
Pump-Action Captain Is A Game To Avoid On Linux
It’s not often I tell you to outright avoid a game, but Pump-Action Captain is a game you really need to just walk away from.
I really don’t like to put a downer on anything, but this is something that I feel needs highlighting.
I decided on a whim to pick up Pump-Action Captain with my own personal money to test it out, and to see if it’s worthy of covering at all. What I found was pretty shocking, and something that needed to be mentioned here. This is the first Leadwerks game that I’ve tried, and so far it’s not leaving a good impression.
The game doesn’t really work, at all. The executable is named incorrectly, so it won’t even load up. This is a simple case sensitivity issue, which could be forgiven. When I re-named the executable it worked, so that was okay. It wouldn’t be so bad if that was the only issue, but that alone tells you enough—it wasn’t even tested, not once.
- SOMA, The Next Horror Game From Frictional Games Should Have Day-1 Linux Support
- Nova Blitz Trading Card Game Might Be My New Addiction On Linux
- OlliOlli2 Welcome To Olliwood Has Been Fixed Up, Gamepads Now Work Properly
Hearthlands Is Exactly The Type Of City-builder A Lazy Sunday Needs For Linux Gamers
Hearthlands is a cute city-builder I haven’t really touched since December last year, so I decided to pick it up again today and the progress is amazing.
The Enchanted Cave 2 Available On Linux
The dungeon crawler rogue-like was released for Linux last week. It brings a few twists to the familiar formula that might interest fans of the genre. A free version is available for those curious to try the game out.
- Pillars of Eternity: The White March Part One review: Just another chapter in a long tale
- RedNotebook 1.10.2 Has Been Released. How To Install It On Ubuntu
K Desktop Environment/KDE SC/Qt
Advanced Metadata Hub implemented
First, we have a number of default namespaces which digiKam was using before. Default namespaces can’t be deleted or edited. They can only be disabled. These entries are essential for digiKam, so I decided that users might delete it by accident and then will be very hard to recover without a reset to default. Some namespaces hold special parameters designed for particular cases, so editing them is a bad idea, hence, the disabled edit.
- KDE control module usability using the example of KCM for pointing devices
- My contributions to KDE and Kubuntu since Akademy
- Support Randa Meetings 2015
Mobile development sprint in Randa: KDE Connect, and more!
This September a bunch of KDE developers, me included, will gather for a week in Randa, Switzerland, to work on awesome new ideas for KDE. The theme of the sprint is around mobile apps, so KDE Connect will be one of the focus of attention.
GSoC 2015 Wrap Up Report
My work over the summer was to port the Amarok code-base to use Qt5/KF5 as much as possible because it was tough to port the entire base under the GSoC time-frame. I have ported a considerable portion of the code-base and now I will be continuing the project along with the community to see it to the end
- GSoC 2015 – Wrap Up
Even Free software needs to be funded. Apart from being nice to have, money is really useful: it can buy transportation so contributors can meet, accommodation so they can sleep, time so they can code, write documentation, create icons and other graphics, hardware to test and develop the software on.
Kronometer 2.0 released
Kronometer 2.0, the next major version of Kronometer, is now publicly available. This is the result of the port to Qt5 and KDE Frameworks 5, started one year ago.
KDE’s Plasma 5.4: The most advanced and beautiful Linux desktop
There is something interesting going on desktop computers — the UI is becoming heavily influenced by mobile operating systems. From Windows to Gnome you can see heavy influence of mobile OSes. KDE’s Plasma desktop, which I consider to be the most advanced desktop environment is, however, an exception. The KDE community just released Plasma 5.4, a major update to their desktop environment and it continues to shows the prowess of this ‘leaderless’ community.
Just another manic monday
The difference surprised me. I think it gives a strong indication that Plasma 5 is being used more for work than as a hobby, with people more likely to encounter an area needing to improvement during the normal office week.
ksuperkey 0.4 released
ksuperkey is a small utility that allows you to use your Super key (sometimes called Meta or Windows key) to open your application menu, while keeping the functionality to use Super in keyboard shortcuts. In other words, ksuperkey won’t interfere with any of your existing shortcuts. It achieves this by letting Super act as a normal modifier key when pressed in combination with other keys, but generating a different keyboard combination (Alt+F1 by default) when the Super key is pressed and released on its own.
Gemini at Randa 2015
Last year, I wrote a blog entry about the iminent release of Calligra 2.9 and the Calligra Gemini application which became a fully fletched member of the suite. In the latter half of that entry, I touched on what the future might potentially hold, and I mentioned the possibility of extending the concept from the application level to the complete system.
Virtue of Necessity. Canary, sublime your company.
This Free Software Office is well known in Spain for managing the biggest KDE deployment in Spain with 3k computers spread in several computer labs, laboratories and libraries, among other internal projects.
- KDE Plasma 5.4 Lands with Cool New Alternative Launcher and Much More
- KDE Plasma 5.4 Released, Wayland In Tech Preview State
- Advanced Metadata Hub implemented
GNOME Video Arcade Gets a Major Release with Compatibility for Latest MAME and GTK3
The GNOME Video Arcade software, an open-source app that acts as a front-end to the well-known and cross-platform MAME (Multiple Arcade Machine Emulator) emulator, has been updated to version 0.8.4.
Boston Summit 2015 to be held 10-12 October
Boston Summit is GNOME’s annual event in North America. It is held every year on the Columbus Day weekend, and is an informal opportunity for contributors, enthusiasts and newcomers to get together. Previous summits have included planning meetings, tutorials for newcomers, hacking sessions, hardware testing, and more. There is also typically a social event in the evening.
- GNOME Documents collections dialog redone
- GNOME Video Arcade Gets a Major Release with Compatibility for Latest MAME and GTK3
- K Desktop Environment/KDE SC/Qt
Puppy Linux’s Sister Quirky 7.1 Distro Arrives with Tools for Android App Developers
Barry Kauler, the creator of the Puppy Linux project, announced the release and immediate availability for download of the first point release of Quirky Linux, a sister project of the Puppy Linux operating system.
OpenELEC 6.0 Beta 4 Is Now Based on Kodi 15.1 Isengard and Linux Kernel 4.1.6 LTS
The developers of the popular OpenELEC Linux kernel-based operating system for embedded devices have announced the immediate availability for download and testing of the forth Beta build of the upcoming OpenELEC 6.0 OS.
- Kali Linux 2.0 Now Available As Docker Image
- Puppy Linux’s Sister Quirky 7.1 Distro Arrives with Tools for Android App Developers
All of Your Favorite PCLinuxOS Editions Are Now Available into a Single ISO Image
The Linux AIO project has spent all summer creating new ISOs for various popular GNU/Linux distributions that have multiple editions, so they have had the great pleasure, as always, of informing us about some of them.
- All of Your Favorite PCLinuxOS Editions Are Now Available into a Single ISO Image
Manjaro Now Has Full AUR Support, Pacmac Has New Options
Manjaro developers have just released the tenth update for the Manjaro 0.8.13 version of the operating system and they have upgraded quite a few packages.
- Manjaro Now Has Full AUR Support, Pacmac Has New Options
Teradata Extends Commitment to SUSE Linux Enterprise
SUSE® today announced Teradata, the big data analytics and marketing applications company, has renewed and extended its commitment to SUSE Linux Enterprise Server as the strategic platform across Teradata’s entire product portfolio. The new agreement extends the two companies’ original seven-year partnership an additional seven years.
- Teradata Extends Commitment to SUSE Linux Enterprise
Red Hat Family
- ReadySpace Achieves Red Hat Cloud and Service Provider Certification
Scientific Linux 6.7 Officially Released, Based on Red Hat Enterprise Linux 6.7
The Scientific Linux team, through Pat Riehecky, has had the great pleasure of announcing the release and immediate availability for download of the Scientific Linux 6.7 computer operating system.
Red Hat Certifies Midokura’s SDN for OpenStack
Looking to keep its options open when it comes to networking in virtualization environments, Red Hat has certified Midokura Enterprise MidoNet network virtualization software for use on the Red Hat Enterprise Linux OpenStack Platform Version 7. The announcement comes before the kick-off of the OpenStack Silicon Valley event later this week.
- Red Hat Lowered to Sell at Zacks (RHT)
- Red Hat Downgraded to “Sell” at Zacks (RHT)
- Red Hat (NYSE:RHT) Cut by Zacks to “sell” from “hold” Rating
- Stock Update – Red Hat, Inc. (NYSE:RHT)
- Red Hat, Inc. Short Interest Update
- Red Hat, Inc. (NYSE:RHT) Given PT Range of $70-$90
- Red Hat Inc. (RHT) Pops 5.93% for August 26
Triangle companies rally Wednesday, make back $1.5B on market
The Triangle’s biggest public companies, Red Hat Inc. (NYSE: RHT) and Quintiles (NYSE: Q), performed the best. They actually surpassed their valuation from Friday, though in neither case touched a 52-week high. Although the other Triangle-area companies bounced back from Monday and Tuesday, they mostly finished below their market value set Friday, leaving investors to hope that the remainder of this week looks more like Wednesday and less like Monday.
- Red Hat ranks No. 26 on Forbes ‘World’s Most Innovative Companies’ list
Forbes: Triangle has one of ‘World’s Most Innovative Companies’
Raleigh open-source tech giant Red Hat (NYSE: RHT) has landed on Forbes’ latest list of ” The World’s Most Innovative Companies.”
- Read along and participate in The Open Organization book club
Outreachy and the road toward diversity
Diversity has a new full-time ally. Marina Zhurakhinskaya (zhoo-ra-HEEN-ska-ya) recently won an O’Reilly award for her work in diversity for free and open source software (FOSS), and she just successfully created a new position for diversity at Red Hat. Oh, and, she’s a new mom.
Fedora 23 Alpha For AArch64/POWER
The alpha release for Fedora 23 was released two weeks ago while today it’s been released for the non-primary AArch64 (64-bit ARM) and POWER architectures.
Peter Robinson announced the Fedora 23 Alpha release today for AArch64 and POWER. Those wishing to learn more about these AArch64 and POWER builds can read the release announcement.
Fedora 23 Alpha Server Released for ARM 64-Bit and POWER Hardware Architectures
The Fedora Project, through Peter Robinson, has announced the release of the Server edition of the Fedora 23 Alpha operating system for ARM 64-bit (AArch64) and POWER (PPC64 and PPC64le) hardware architectures.
Slides from my Texas Linux Fest 2015 talk
The slides are a little different from the slides at Fedora Flock, but they’re mainly the same…
- Fedora 23 Alpha For AArch64/POWER
Reproducible builds: week 17 in Stretch cycle
Hugging people with whom one has been working tirelessly for months gives a lot of warm-fuzzy feelings. Several recorded and hallway discussions paved the way to solve the remaining issues to get “reproducible builds” part of Debian proper. Both talks from the Debian Project Leader and the release team mentioned the effort as important for the future of Debian.
Tor-enabled Debian mirror, part 2
A natively hidden service is more secure than accessing a non-hidden service via Tor because there is no way for a third-party exit node to mess with your traffic
Plex Home Theater 1.4.1 updated for Debian/sid
Debian/sid is going through a big restructuring with the switch to a new gcc and libstc++. Furthermore, libcec3 is now the default. So I have updated my PHT builds for Debian/sid to build and install on the current status, both for amd64 and i386.
Knoppix 7.4: whom is it for?
I faced no particular issue when working with Knoppix 7.4.2 in Live session. It was responsive, quick and more or less reliable.
Linux Kernel 4.2 RC8 Arrives in Ubuntu 15.10, Breaks the AMD Catalyst Driver
Canonical’s Joseph Salisbury has informed us all about the latest work done by the Ubuntu Kernel Team for the upcoming Ubuntu 15.10 (Wily Werewolf) operating system, during the meeting that took place earlier today, August 25, 2015.
Ubuntu Touch OTA-6 Is Almost Done, but BQ Aquaris Users Must Wait Until Next Week
On August 25, Canonical’s Łukasz Zemczak sent in his daily report informing all Ubuntu Phone owners about the progress made on the soon-to-be-released OTA-6 software update for the Ubuntu Touch mobile operating system.
Superb Ubuntu-Powered Sable from System76 Has a $50 Discount
Sable is a superb all-in-one PC from System76, and you can now purchase one at a $50 discount. It ships with the latest Ubuntu OS, and you can customize it to better fit your needs.
GDK-PixBuf Vulnerability Closed in Ubuntu 15.04
A vulnerability that would allow users to crash GDK-PixBuf with specially crafted file has been found and fixed in Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS operating systems.
Ubuntu Touch OTA-6 Officially Released with Wi-Fi Hotspot, Custom Alarm Sounds, More
As we reported the other day, the Ubuntu Touch developers were hard at work to release the OTA-6 software update for Ubuntu for phones today, Wednesday, August 26, 2015, for Meizu MX4 Ubuntu Edition, Nexus 4, and Nexus 7 devices.
Ubuntu Touch’s Telegram App 2.0 to Arrive Next Month Based on TelegramQML
As we reported the other day, the Ubuntu Touch developers were hard at work to release the OTA-6 software update for Ubuntu for phones today, Wednesday, August 26, 2015, for Meizu MX4 Ubuntu Edition, Nexus 4, and Nexus 7 devices.
Ubuntu Developer Contest in China Was a Great Success, Here are the Winners
Canonical, through April Wang, had the great pleasure of announcing the winners of the “And your Dream come true” innovation contest for its Ubuntu Touch mobile operating system created in collaboration with China Mobile.
Ubuntu Developer Suggests Non-Windowing Display Server Layer for Wayland
Joel Leclerc, an independent Ubuntu developer, known for various apps, hacks, tweaks, tips, and tutorials for the Ubuntu Linux operating system, has posted an interesting article on his blog about the proposal of a non-windowing display server.
Ubuntu Touch OTA-7 Arrives in October with Vibration and Accelerometer Access for Web Apps
Immediately after announcing the release of the OTA-6 software update for the Ubuntu Touch mobile operating system, Canonical’s Łukasz Zemczak sent in his daily report to inform us all about the next major update for Ubuntu for phones, OTA-7.
- Snappy Ubuntu Core Now Supports Raspberry Pi 2’s GPIO And I2C
- Ubuntu Touch OTA-6 Update May Be Released By The End Of The Week
- Every Ubuntu User Can Now Install Kernel 4.1.6 Easy, Via Black Lab Software’s Installation Kit
- The Ubuntu Touch Clock App Has Been Redesigned
- The Ubuntu Comunity Is Happy With Canonical’s New Video Driver PPA. So Are The Vendors
Flavours and Variants
Cinnamon 2.8 Will Brings Interesting New Features
Linux Mint’s Clement Lefebvre has recently announced that Cinnamon 2.8 will bring better box pointers and information about the laptop’s model and manufacturer.
- Cinnamon 2.8 Will Brings Interesting New Features
- Linux Kernel 4.2 RC8 Arrives in Ubuntu 15.10, Breaks the AMD Catalyst Driver
- Knoppix 7.4: whom is it for?
- Reproducible builds: week 17 in Stretch cycle
- New Releases
Astro Pi Is the Name of the Raspberry Pi 2 That’s Going to Space
A Raspberry Pi 2 is going to space, but for that it need to undergo some serious testing. It’s going to use the most awesome case you’ve ever seen, and it’s all happening very soon.
Media player adds high-end analog audio and XLR out
Cloud Media has launched a dual-boot Linux and Android “Popcorn Hour A-500 Pro” media player with 3840 x 2160 video, high-quality analog audio, and XLR out.
Formerly known as Syabas, Cloud Media has been selling Linux-based Popcorn Hour and Popbox media players for years. Last year, Cloud Media found Kickstarter success with its Linux-based Stack Box home automation box. This week it achieved its $50K Kickstarter funding goal for the new top-of-the-line Popcorn Hour A-500 Pro media player and music system, which adds high fidelity stereo analog audio to its usual media player and home theater functions.
The Raspberry Pi is succeeding in ways its makers almost imagined
When the Raspberry Pi shipped to a planet excited geeks in the middle of 2012, it changed the way we taught IT. That had always been the intention of creator Eben Upton. Give the kids the goods and they’ll do the rest.
At first, it seemed as though the grownups were more excited than the kids, creating all sorts of wacky Pi-based projects. Fortunately, those grownups – eager for the respect of their peers – shared everything they learned, posting to blogs, StackOverflow, and thousands of other websites. Want to know how to blink an LED? Drive a motor? Read a sensor? Set up a web server? Within the first year, all of that was out there, all of it indexed, searchable, and useful to kids.
Accelerated Announces New Embedded Linux Distribution For The Internet Of Things
Accelerated is excited to announce the availability of its Embedded Linux Distribution for the Internet of Things (IoT). With the unprecedented growth of the IoT and reliance on a new generation of connected devices pushing organizations to use even more data, businesses need to be prepared today for the connectivity and security challenges of tomorrow. Linux is in a prime position to be leveraged to overcome those challenges and shorten time to market.
Obi Worldphone SF1 and SJ1.5 launched by former Apple CEO – super unique and affordable
Any sub-$200 smartphone worth its salt must come from a Chinese company, right? Former Apple CEO John Sculley is trying to change that perspective by co-founding Obi, a Silicon Valley-based company that has just announced a couple devices that will definitely turn heads and keep wallets healthy. These new handsets are the Obi Worldphone SF1 and SJ1.5.
Review: New gadgets keep Samsung at Android helm, but might not be enough to lure Apple users
Samsung has been facing competition not just from Apple but also from Android manufacturers such as Motorola and Xiaomi, which offer good-enough features while keeping prices low. Consumers will have to decide whether the premium features in the latest Samsung devices will be worth the premium price tags.
The Galaxy S6 Edge Plus and Note 5 phones arrived last week, while the Galaxy Tab S2 tablets come out next Thursday.
Former Apple CEO, Beats Design Firm Team on Sleek, Low-Cost Android Phones for Developing World
John Sculley — now there’s a name you may not have heard in a while.
The former Apple CEO is back, and is teaming with a top San Francisco design firm on a $199 Android smartphone designed to bring high-end features and looks to the low-end smartphones increasingly popular in much of the world.
Samsung Galaxy Tab S2 hands-on: Finally, new Android tablets
It’s been a dry year for high-end Android tablets, something Samsung aims to change with the new Galaxy Tab S2. Directly taking on the iPad Air 2 and iPad mini 2 with both 9.7-inch and 8-inch screen sizes, each running at a crisp 2048 x 1536, the two slates come in WiFi-only and WiFi+LTE form.
Samsung Galaxy Note 5 Review: The Best Android Phone That Spares No Expense
The Galaxy Note has been through five years of changes. Better screens, better processors, better software. And like any new smartphone, the Note 5 represents the very best of what’s come before. But despite being a fantastic phone—even foreseeing the big smartphone way of life—the Note 5 is mired in the overpriced premium past. You’ll definitely be shelling out for the very best.
Here’s why the iPhone isn’t going to catch up to Android any time soon
In short: Even as previous Android-heavy markets mature, new ones will continue to grow across the globe. As tens of millions of people in emerging markets start buying smartphones, the ongoing Android price war will make the platform more attractive than ever — securing Google’s lead for years to come.
‘Father of Android’ Andy Rubin Joins Lineup for October’s Code/Mobile
Back in 2002, Rubin launched the the Sidekick, one of the first devices to merge threaded messaging, e-mail and the full Web into a phone. Then, of course, he built a little startup called Android, which was bought in 2005 by Google and under Rubin’s continued leadership became the biggest smartphone operating system in the world.
With the smartphone now ubiquitous and mobile heading in new directions, we are thrilled to have Rubin joining us on stage at Code/Mobile. This year, we’ll be asking what comes next, now that we all have the smartphones he helped pioneer. For instance, we’ve noticed that technology that debuted in the smartphone is expanding into lots of places, including cars and wearables.
Two new Cyanogen smartphones hit the market: Wileyfox launches Storm and Swift
Following in the footsteps of OnePlus, UK startup Wileyfox has released two low-cost, but decently specced, smartphones running on Cyanogen OS.
The more expensive of the two, Storm, will cost £199 and features a 5.5-inch full HD display, 20-megapixel auto-focus main camera from Sony and an eight-megapixel front shooter. The device runs on Qualcomm’s 1.5GHz Snapdragon 615 processor with integrated LTE, and offers 32GB onboard storage, 3GB RAM, as well as expandable memory up to 128GB.
A unique twist on Android for broke college kids
For those who still remember, it’s been well over a year since China’s Smartisan launched the T1, which turned out to be a surprisingly good effort from the teacher-turned-entrepreneur, Luo Yonghao. Today, the startup has finally launched its second Android device, the U1 aka JianGuo (which means “nuts” in Chinese), to cater to the younger audience with an 899 yuan (about $140) base price. That’s about the same as the Redmi Note 2, though some may find this to be a more fun design with what’s arguably a more intuitive interface, as we first saw back in April 2013.
- Android 6.0 Marshmallow: Samsung Galaxy Note And S6 Variants Will Get Update, What About Galaxy S5?
- Contrary To Reports, Android Pay Not Launching This Week
- Why Future Android Devices Will Have Less Bloatware
- 7 Android Marshmallow features Google ‘borrowed’ from iOS
Pintasking brings easy multi-tasking to just about any Android device
Sure, I could use my Android phone to keep an eye on Twitter for leads for a story, download images using Chrome, and write and publish my post in WordPress — but can you imagine switching between those apps to get it all done?
Amazon Underground Features An Android App Store Focused On “Actually Free” Apps
Amazon just announced a new Android app with everything you can find in the normal Amazon app as well as a revamped store for Android apps and games. While the company already had the Amazon Appstore, Amazon Underground is a brand new app that can potentially replace both the Amazon app as well as the Appstore. In particular, the new app lets you download premium apps for free. Here’s how it works.
- HTC One M9 Android 5.1.1 Lollipop not a go just yet; Android 5.1 update heads to Verizon devices
This free Android app does something awesome that no iPhone can
Smartphones can be used to control computers remotely with the right apps installed on both devices, but there may be cases where you want to do the opposite – control a smartphone from a computer. One new app for Android allows users to do exactly that, manage the Android device from a computer. The app, however, is only available for Android devices, which means it can’t be used to operate an iPhone or any other iOS devices.
IDC projects Apple unlikely to make market share gains against Android in coming years
Even with iPhone sales continuing to be strong, Apple is unlikely to make deeper inroads into Android’s global marketshare in the near future, according to projections from an IDC research report released on Tuesday.
Vodafone UK rocks the bloat with demands for vanilla Android
Vodafone UK wants to sell Android phones which are as close to stock (as Google intended) as possible, and the red company’s favourite device for this is the Moto G.
Writing on the Vodafone company blog, Motorola senior marketing director Marcus Frost unsurprisingly extoled the virtues of the new phone – but he’s not just trying to flog more smartphones.
The post points to two future directions, which can only be seen as an endorsement from both the handset company and the mobile network.
- Consumers on Apple CarPlay and Android Auto: meh
- 5 great new amazing apps for your Android phone or tablet, #4 is incredible
- Life-Consuming ‘Clicker Heroes’ Finally Arrives On iOS And Android
- Caught on film: Android runs smoothly on the BlackBerry Passport
- 5 easy ways to boost your Android phone’s battery life
- WhatsApp for Android lets you set custom notifications for your favorite contacts
- WhatsApp for Android gets 5 new features
- WhatsApp for Android lets you set custom notifications for your favorite contacts
- CMU Student Pleads Guilty To Making Spy App For Android
- Certifi-gate flaw in Android remote support tool exploited by screen recording app
- Major Android remote-access vulnerability is now being exploited [Updated]
- Security flaws exposed in Dolphin, Mercury mobile browsers
- Obi Worldphone SF1 and SJ1.5 launched by former Apple CEO – super unique and affordable
- Astro Pi Is the Name of the Raspberry Pi 2 That’s Going to Space
Google Hopes Open Source Will Give Its Cloud A Path To The Enterprise
Instead, Google expects that becoming more open — and releasing more open-source software — will create a path for the company to make inroads into the enterprise. “Google has recognized that open is a better way of building,” McLuckie also noted. “We’ve come to admire the ability of the open-source community to drive innovation.”
He argued that building out in the open not only allows it to build a better product for its customers, but also to enable faster integration cycles. In addition, having an open-source project that involves other companies also allows it to absorb the DNA of these companies into the product.
Like open source software, a book is more than its content
Instead, we chose to partner with Harvard Business Review (HBR) Press. In many ways, HBR does for books what Red Hat does for open source software; it collaborates with creators and adds value to the products of these collaborations. Like any piece of open source software (such as Red Hat Enterprise Linux, for example), a book is far more than the content it contains. Like a software application, a book is a project with multiple stakeholders. It involves an agent that works to put the book on publishers’ radars. It involves an editorial team that reviews manuscripts and suggests improvements. And it involves a marketing team that decides how best to develop and target potential audiences.
Aligning Democratic Candidates with Open Source Software OSes
A few days ago, I aligned Republican presidential hopefuls with open source Linux-based operating systems. Now, it’s the Democrats’ turn: If Hillary Clinton, Bernie Sanders et al. ran Linux, which distribution would they use? Read on for some perspective.
INSIGHT: Top 5 reasons why Open Source technology is the answer
Organisations that can effectively harness people’s innate tendency to make their lives easier will be more likely to successfully develop software and applications that genuinely disrupt, or protect against disruption, as business needs dictate.
Software Development Environment Must Be Open, Says Red Hat
The application development technology of the future must provide a framework for users to develop software quickly and get it to market fast.
That’s according to Red Hat, who says open source technology is the answer.
Red Hat says organisations that can effectively harness people’s innate tendency to make their lives easier will be more likely to successfully develop software and applications that genuinely disrupt, or protect against disruption, as business needs dictate.
10 ways open source tech is changing the rules of the game
In the last few years, open source software platforms such as Android have established themselves as essential catalysts for technology advances.
How Open Source Is Improving The Way Businesses Visualize Data
It was recently reported that the Colorado-based startup SlamData is working on creating an enterprise version of its open source analytics platform. Their solution allows users to see and understand NoSQL data and this will now enable larger businesses to visualize data more effectively. The platform will enable large businesses to visualize semi-structured NoSQL data by adding proprietary security and management features to the main open source platform.
FCC Chairman Promises Open-Source Video-Conferencing Platform for ASL-Signing Callers
FCC Chairman Tim Wheeler addressed the biannual meeting of the Telecommunications for the Deaf, Inc. (TDI) Conference in Baltimore on Thursday, with news of interest to anyone who works in assistive technologies.
For UNC scientists, open source is the way forward
But scientists know they can manipulate those kinases to combat the disease. And chemical biologists at the University of North Carolina are leading an open source effort to unlock the secrets of kinase activity—secrets they say could pioneer a new generation of drug discovery.
How open source will power tomorrow’s tech unicorns
With open source technology already powering business like Facebook, Google and Booking.com – and 70% of new apps – will it be the backbone of the next wave of unicorns?
A simple, scalable solution for storing and serving build artifacts
Now we’re making Pinrepo open source on GitHub. There you can find all of the configuration stanzas and instructions to recreate it for yourself. It also includes a pypi release tool to release and maintain pypi packages. Check it out and let us know what you think! And, feel free to contribute back with your customizations and improvements.
Stephen Hawking’s Voice Is Now Open Source And Free To Download [Ed: Windows-only, Intel commercial as an ‘article’, exploiting a disabled person as the marketing logo]
Currently, you’ll need a Windows machine to use ACAT. In the future, though, it would seem like this is exactly the kind of app that should be running on a smartphone, which is already bristling with cameras and sensors.
Markup lowdown: 4 markup languages every team should know
When I ended my Doc Dish article about why you should use a rendered language for documentation, I told you that selecting a language was a matter for another day.
Well another day has finally arrived.
There’s no shortage of languages you can use for formatting and publishing your documentation, and your choice of language will depend on your project’s needs. In this article I’ll look at several different language options, ranging from the simplest to the most complex. It’s hardly an exhaustive list, so make the case for your favorite (or most hated) language in the comments.
Docs or it didn’t happen
Many words have been written on community building, engagement, and retention. The discussion around community management is alive and kicking, with articles and blog posts everywhere about how to grow, support, and not mess up open source communities.
Linux Plumbers Conference 2015
Linux Plumbers 2015 finished up last Friday. Another great conference. The focus of Plumbers is supposed to be more problem solving/discussion and less talking/lecturing. To really get the most out of Plumbers, you need to be an active participant and asking questions or giving input. Plumbers was co-located with the group of conferences now run by the Linux Foundation. The fist day of Plumbers overlapped with the last day of Linux Con. This day was as bit more lecture focused like a regular conference. Even if Plumbers is typically a discussion conference, the talks I went to were all great.
Speakers and Agenda announced for Tizen Developer Conference 2015 Shenzhen
The Tizen Developer Conference 2015 has been moved this year from San Francisco to Shenzhen, China, from September 17 to 18. This is the annual event that brings together open source and app developers who are interested in contributing to the growth of the Tizen ecosystem worldwide.
First Round of systemd.conf 2015 Sponsors
We are happy to announce the first round of systemd.conf 2015 sponsors!
- Linux Plumbers Conference 2015
Mozilla CEO threatens to fire person responsible for anonymous hate speech on Reddit
An anonymous person complaining about “social justice bullies” at Mozilla will be fired if the person is discovered to be an employee, the company’s CEO said today. Speaking at Mozilla’s weekly public meeting, Mozilla CEO Chris Beard said Reddit user aioyama had “crossed the line” in a series of postings about women at the company, including recently departed community organizer Christie Koehler. In a series of tweets earlier this month, Koehler complained about Mozilla’s lack of diversity in the workplace and its failure to address accessibility issues.
SIMD in Rust
For the last two months, I’ve been interning at Mozilla Research, working on improving the state of SIMD parallelism in Rust: exposing more CPU instructions in the compiler, and an in-progress library that provides a mostly-safe but low-level interface to that core functionality.
Rust Gains Greater SIMD Support
A new SIMD scheme is now available in the latest nightly versions of the Rust programming language.
Mozilla Research has been working on improving SIMD (Single Instruction Multiple Data) parallelism in Rust that’s simple to use.
- Mozilla CEO threatens to fire person responsible for anonymous hate speech on Reddit
- IBM Advances Open Cloud Initiatives with BlueBox Platform
- Reports from mid-cycle meetups, NFV at scale, and more OpenStack news
Hortonworks Buys Onyara, Focused on Apache NiFi
On the heels of its introduction as a hot new publlic company a few months ago, Hortonworks, which focuses on the open source Big Data platform Hadoop, is expanding its reach. The company announced that it has acquired Onyara, a young startup whose staffers created Apache NiFi, which is open source software that has been used by the National Security Agency (NSA).
Hortonworks introduces DataFlow, acquires Apache NiFi-backer Onyara
Last month I wrote about Apache Ni-Fi, a project borne of (non-shady) work at the US National Security Agency, and now a top-level project at the Apache Software Foundation. NiFi is all about building data flow orchestrations, and features a browser-based “boxes and lines” graphical user interface for getting the work done.
- Hortonworks Acquires Open Source Data Flow Expertise
- Hortonworks: how to pin down data inside the ‘Internet of Anything’
- Hortonworks looks to ‘Internet of Anything’ with acquisition
- Which open source cloud infrastructure tool is right for me?
Five challenges with open source cloud infrastructure tools
Open source cloud infrastructure platforms like OpenStack offer many benefits to an enterprise — but first, IT must clear these five adoption hurdles.
Explore open source cloud software in five quick links
When dealing with open source cloud computing, there are many factors to consider, ranging from support to hidden costs. Make informed decisions with these five quick links.
Viewing LibreOffice Documents In GNOME Will Soon Be A Better Experience
Viewing LibreOffice documents inside GNOME Documents (the Evince Viewer) will soon yield a better experience thanks to work accomplished this year as part of Google’s Summer of Code.
Second-time GSoC student developer Pranav Kant focused this year on improving the LibreOffice support within GNOME Documents. His GSoC project summary explained, “Integrate gtktiledviewer into GNOME-Documents – Today, GNOME Documents spawns LibreOffice via a rather unreliable unoconv command-line that converts documents to PDF. It is not only unreliable but also the results are not good, for example, spreadsheet rendering results are quite bad. With this project, we would be improving the existing libreofficekit based gtk tiled renderer, which would, then, be a very good replacement of the unreliable unoconv command in gnome-documents.”
Here’s How Ubuntu Touch’s LibreOffice Document Viewer App Looks Like
We reported a couple of months ago that a group of Ubuntu Touch developers started developing a new core app for Canonical’s mobile operating system, a viewer for documents created with the open-source LibreOffice office suite.
- LibreOffice Document Viewer 5.0 For Ubuntu Touch Will Be Released Soon
- Ubuntu Document Viewer update – 10th August 2015
LibreOffice 5.0.1 to Feature Improved Rendering When Scrolling
The Document Foundation has just released the second Release Candidate for the LibreOffice 5.0.1 branch and the developers have fixed quite a few issues that have been spotted by the community.
LibreOffice-from-Collabora 4.4 Released with Better Microsoft Office 2007 Compatibility
Collabora, through Sam Tuke, had the pleasure of announcing the immediate availability for download of the LibreOffice-from-Collabora 4.4 office suite, a modified, commercial version of the open-source LibreOffice software.
- Viewing LibreOffice Documents In GNOME Will Soon Be A Better Experience
Eclipse seeks donations for open source development
The Eclipse Foundation, best known for its Eclipse IDE, is moving into funding its open source projects via donations.
Previously, all Eclipse development was done by individuals and organizations contributing their time. “Today, we are significantly lowering the barriers for companies and individuals to actively invest in the ongoing development of the Eclipse platform,” Eclipse Executive Director Mike Milinkovich said in a recent blog post.
- Mirantis Raises Another $100 Million, This Time from Intel
- Eclipse seeks donations for open source development
Why FreeBSD should not adopt launchd
I have been keeping an eye on NextBSD for some time, when it was initially just openlaunchd, an effort initially started by R. Tyler as a GSoC student in 2005 to, unsurprisingly, port the launchd system and service manager to FreeBSD. It was stalled for a long time until its revival in late 2013, but again moving very slowly.
Around November of 2014 at the MeetBSD conference, Jordan Hubbard delivered a talk entitled “FreeBSD: The Next 10 Years,” which outlined a general desire for a more “event-driven” and unified configuration approach to FreeBSD, strongly implying the use of launchd as system bootstrap and service daemon, as well as other parts of the OS X low-level userspace.
LLVM 3.7 & Clang 3.7 Are Bringing Exciting Compiler Features, Improvements
The LLVM 3.7 release is imminent so here’s our usual look at the new features/improvements for this open-source compiler stack. Complete OpenMP 3 support is a big one but there’s also many other big ticket items to find in this major compiler update.
LLVM 3.7′s Release Is Imminent
The release of LLVM 3.7 is imminent.
Days after preparing the 3.7-RC3 release, Hans Wennborg of Google has announced the release of 3.7-RC3.
- Why FreeBSD should not adopt launchd
Sysutils is getting some new life.
Some more shinny code and a lot of bug fixes are coming.
- [GNU Health] Join us at IWEEE 2015 : Social Medicine
- IceCat 31.8.0-gnu2 release
New version of the Emacs Manual plus GNU Press discounts
GNU Press announces the release of Emacs Manual Version 24.5, which contains approximately 2.5 more years of Emacs documentation than version 24.2. Each manual comes with an Emacs Reference Card Version 24.5, which can also be purchased separately. Also, there are a few copies of Emacs Manual Version 24.2, which has now been reduced to $35.
- GNU Parallel 20150822 (‘Hans Vibeke’) released
- Sysutils is getting some new life.
Umeå University computer club supports open source
The Academic Computer Club at the Umeå University in Sweden is a major supporter of open source projects. ACC UMU hosts one of the popular free software mirrors, and is one of the official sponsors of the Debian open source software distribution, maintaining a few of the project’s servers. The club supports two more well-known projects, the Open and Free Technology Community (OFTC) and Freenode. Both projects provide communication facilities that benefit free software communities.s
How Scotland can protect itself from GCHQ spying by going open source
One of the key lies out out in last years referendum was that we couldn’t exist securely without the British Security Services (the ones that brought you extraordinary rendition).
Digital Assembly developing list of digital rights for interaction with public agencies
Citizens and businesses should have to provide basic information only once, eGovernment services should be user-friendly and intuitive, and users should be digitally literate in order to use online (public) services. These are the most important digital rights for citizens and businesses when interacting with public agencies, as identified by panellists and the audience at the workshop ‘Promoting e-society’.
- Umeå University computer club supports open source
Sweden contributes responsive design interface to CKAN software
The code was developed by Open Knowledge and the Swedish company Metasolutions on behalf of the Swedish innovation agency Vinnova for the Swedish open data portal. The graphical design of the portal was not overhauled in the latest update but it now automatically provides a consistent user interface for all visitors, independent of the device they are using.
Intel’s Open-Source Fabric Supersizes Comm for Data
Intel has concentrated all its internal and externally acquired expertise in networking to create what it believes is a multi-generational interconnection fabric scalable to any sized data-center or supercomputer array. Called Omni-Path Architecture (OPA), the fabric, announced today (Aug. 26) at the IEEE’s Hot Interconnects Symposium 2015 (Santa Clara, Calif.), is an open-source architecture designed specifically for both high-performance computing (HPC) and servers.
Open-source DIY housing launches in Queensland
An open-source design for a flat-pack timber home that can be erected by four people in around two days with no more than a drill and a mallet will be prototyped on the Gold Coast later this year.
An Open Source Map That Tracks the Government’s Hard Work
Data is immensely powerful. The trick lies in organizing the stuff. The good news is that so many organizations are now offering tools that help with this—and so many of these tools are open source.
La Rioja organises its first open data contest
As part of its global digital strategy, the government of La Rioja region in Spain has organised an open data contest, the goal of which is to promote the use and exploitation of data published on the regional open data portal.
- An Open Source Map That Tracks the Government’s Hard Work
Cheaper, Faster, Better: The Plan to Build an Open Source Prosthetic Hand
Over the past five years, 3D printers have gotten cheaper, hardware has gotten smaller, and tinkerer communities have boomed. All of that has spurred a renaissance of prosthetic design, bolstered by an open source ethos and crowdfunded budgets.
- Open Bionics shows off its robot arm
- Open Bionics robotic hand for amputees wins Dyson Award
- Open Bionics lands £2000 James Dyson Award for its 3D-printed prosthetic hand
- Cheaper, Faster, Better: The Plan to Build an Open Source Prosthetic Hand
- Sweden contributes responsive design interface to CKAN software
Facebook open-sources Hack code generator
Hack is Facebook’s spinoff of the PHP language, working with the HHVM virtual machine. The library, meanwhile, generates code that is written into signed files to prevent undesired modifications. “The idea behind writing code that writes code is to raise the level of abstraction and reduce coupling,” Facebook said on its GitHub page for Hack Codegen.
- Facebook open-sources Hack code generator
When everything’s a request for comments
The Internet’s foundational documents are called “requests for comments” or “RFCs.” Published by the Internet Engineering Task Force (IETF), the organization whose stated goal is “to make the Internet work better,” RFCs define and explain the operational standards by which our worldwide network of networks functions. In other words, they specify the rules everyone should follow when building and implementing new Internet technologies. Engineers working on the Internet discuss potential RFCs, debate their merits, then post their decisions online for anyone to read.
Centimeters and Points are the best [ODF]
For example, when saving ODF with LibreOffice, the unit that is used for storage depends on the user preferences. This can lead to inconveniences and rounding errors. If I specify a margin of 1.25cm and send it to someone who has the preferences set to use inches, the margin will be stored as 0.4925in. When that number is converted back to centimeters, the value is 1.25095cm which is 1‰ more than the original value.
- When everything’s a request for comments
Angry Birds maker Rovio plans deep job cuts as profits fall
Finland’s Rovio, maker of mobile phone game Angry Birds, forecast its earnings would fall for a third consecutive year and said it planned to slash up to 39 percent of its workforce to try to improve its prospects.
Rovio has failed to create new hit games since the 2009 launch of Angry Birds, the top paid mobile app of all time, though it has tried to capitalise on its most successful brand by licensing its use on string of consumer products.
Google Express Workers Vote ‘Yes’ to Union, as Warehouses Plan to Shut Down
On Friday afternoon, 151 warehouse and shipping workers for Google Express, the search engine’s delivery service, voted in favor of joining a union. Last month, workers at the Palo Alto, Calif., facility agreed to join Teamsters Local 853, which has unionized shuttle drivers for eBay, Apple, Yahoo and other companies.
MIT creates file system that will survive unexpected crashes
IT’S A SITUATION that will be familiar to most computer users. Your computer crashes, and when you manage to get it back up and running the disk has corrupted some data. Probably the bit that was vital and so new that it hadn’t been backed up yet.
- MIT creates file system that will survive unexpected crashes
NYT: Not Believing in Climate Change Is Like Believing in Food Shortages
Is rejecting climate science, though, really like having believed that unchecked population growth would lead to food shortages? Contrary to Leonhardt’s glib “it hasn’t,” food shortages are a serious problem in the world right now. According to the UN World Food Programme, “Some 795 million people in the world do not have enough food to lead a healthy active life…about one in nine people on Earth.” The WFP notes that about 3.1 million children die from malnutrition a year–and that one in four children on Earth are stunted by lack of food. That seems fairly widespread.
Unlike climate change denial, which if anything has exacerbated the problem of global warming, warnings about overpopulation may have had the intended effect of curbing population growth. China’s draconian one-child policy was directly inspired by the warnings of limits-to-growth advocates like the Club of Rome, along with numerous less coercive family planning initiatives. Partially as a result of these programs, the global population growth rate declined from above 2 percent in the 1960s and early ’70s to close to 1 percent and falling today. Without this reduction in growth, the population would be about 2 billion higher today than its current 7.3 billion.
- NYT: Not Believing in Climate Change Is Like Believing in Food Shortages
- Tuesday’s security updates
- Security updates for Wednesday
Court rules FTC can prosecute companies over lax online security
The Third Circuit US Court of Appeals in Philadelphia has ruled that the Federal Trade Commission does have the right to prosecute firms who mishandle their customers’ data.
Between 2008 and 2009, hotel chain Wyndham Worldwide – which runs hotels under the Days Inn, Howard Johnson, Ramada, Super 8, and Travelodge brands – suffered three computer intrusions. The hackers stole the personal information and credit card numbers of over 619,000 customers, causing at least $10.6m in thefts.
The Basic Principles of Security (and Why They Matter)
Yet, despite the frequent complaints about the unrealistic demands of security, today the problem is just as likely to be the insistence on convenience. With the rise of desktop Linux and the popularity of Android, the pressure to be as easy to use as Windows is almost irresistible. As a result, there is no question that the average distribution is less secure than those of a decade ago. That is the price we pay for automounting external devices and giving new users automatic access to printers and scanners — and will continue to pay.
GitHub combats DDoS cyberattack
At the time, the code repository said the cyberattack involved “a wide combination of attack vectors,” as well as new techniques including the hijacking of unsuspecting user traffic to flood GitHub, killing the service.
Jails – High value but shitty Virtualization
Virtualization is nothing new, and depending how fundamentalist you define “virtualized environment” one can point to the earliest of timesharing systems as the origin.
IBM’s mainframe hardware, the 360 machine series, introduced hardware virtualization, so that it was possible to run several of IBMs different and incompatible operating systems on the same computer at the same time.
It’s more than a little bit ironic that a platform which have lasted 50 years now, were beset by backwards-compatibility issues almost from the start, and even more so that IBMs patents on this area of technology prevented anybody else from repeating their mistake for that long.
Everybody else did software virtualization.
How to crack Ubuntu encryption and passwords
During Positive Hack Days V, I made a fast track presentation about eCryptfs and password cracking. The idea came to me after using one feature of Ubuntu which consists in encrypting the home folder directory. This option can be selected during installation or activated later.
AT&T Hotspots: Now with Advertising Injection
While traveling through Dulles Airport last week, I noticed an Internet oddity. The nearby AT&T hotspot was fairly fast—that was a pleasant surprise.
But the web had sprouted ads. Lots of them, in places they didn’t belong.
Advertising malware rates have tripled in the last year, according to report
Ad networks have been hit with a string of compromises in recent months, and according to a new report, many of the infections are making it through to consumers. A study published today by Cyphort found that instances of malware served by ad networks more than tripled between June 2014 and February 2015, based on monthly samples taken during the period. Dubbed “malvertising,” the attacks typically sneaking malicious ads onto far-reaching ad networks. The networks deliver those malware-seeded ads to popular websites, which pass them along to a portion of the visitors to the site. The attacks typically infect computers by exploiting vulnerabilities in Adobe Flash, typically triggered as soon as an ad is successfully loaded.
How security flaws work: the buffer overflow
The most important central concept is the memory address. Every individual byte of memory has a corresponding numeric address. When the processor loads and stores data from main memory (RAM), it uses the memory address of the location it wants to read and write from. System memory isn’t just used for data; it’s also used for the executable code that makes up our software. This means that every function of a running program also has an address.
Lessons learned from cracking 4,000 Ashley Madison passwords
When hackers released password data for more than 36 million Ashley Madison accounts last week, big-league cracking expert Jeremi Gosney didn’t bother running them through one of his massive computer clusters built for the sole purpose of password cracking. The reason: the passwords were protected by bcrypt, a cryptographic hashing algorithm so strong Gosney estimated it would take years using a highly specialized computer cluster just to check the dump for the top 10,000 most commonly used passwords.
UN Official Says Human Suffering in Yemen “Almost Incomprehensible”
With a staggering four in five Yemenis now in need of immediate humanitarian aid, 1.5 million people displaced and a death toll that has surpassed 4,000 in just five months, a United Nations official told the Security Council on August 19 that the scale of human suffering is “almost incomprehensible”.
Briefing the 15-member body upon his return from the embattled Arab nation on Aug. 19, Under-Secretary-General for Coordination of Humanitarian Affairs Stephen O’Brien stressed that the civilian population is bearing the brunt of the conflict and warned that unless warring parties came to the negotiating table there would soon be “nothing left to fight for”.
An August assessment report by Save the Children-Yemen on the humanitarian situation in the country of 26 million noted that over 21 million people, or 80 percent of the population, require urgent relief in the form of food, fuel, medicines, sanitation and shelter.
Media and Nuclear Deal Opponents Continue to Spread Debunked Myth Iran Will Monitor Itself
There is no dearth of rumors about the Iran nuclear deal. In the latest scare, two allegations have filled the media: the first, that the International Atomic Energy Agency (IAEA) and Iran made “secret side deals”; the second, that the IAEA, in those negotiations, put the Iranian government in charge of investigating alleged nuclear research at its Parchin military base.
The latter supposed exposé comes from a now-debunked story by Associated Press (8/19/15). The piece, in its first draft, was full of errors and distortions (Vox, 8/20/15; War on the Rocks, 8/24/15). But its supposed revelations filled the airwaves.
The Iran Nuclear Deal: Give Diplomacy a Chance
A war with Iran would be a catastrophe, yet by opposing diplomacy, hundreds of members of Congress may be blundering into just such a conflict. The Iran nuclear deal, as the complex diplomatic arrangement is popularly called, was agreed upon on July 14 by a consortium of key powerful countries, the European Union and Iran. The goal of the agreement is to limit Iran’s nuclear activities to peaceful purposes, and to block Iran’s ability to construct a nuclear bomb. Despite what its critics say, this agreement is not based on trust. It grants the International Atomic Energy Agency the power to conduct widespread, intrusive inspections to ensure that Iran keeps its many pledges. In return, many, but not all, of the sanctions on Iran, which have been crippling its economy, will be lifted.
The alternative to diplomacy is to pour gasoline on a region of the world already on fire with intense, complex military conflicts. Iran’s military has more than half a million soldiers, no doubt with many more who could be mobilized if threatened with invasion. Iran shares a vast border to its west with Iraq, and to its east with Afghanistan, two nations with ongoing military and humanitarian disasters that have consumed the U.S. military since 2001, costing trillions of dollars and untold lives.
Autoplay Is for a G-Rated World
Tragedy struck Bedford County, Virginia this morning when two journalists, Alison Parker and Adam Ward, were shot to death on live TV.
The people viewing the broadcast at home had no choice but to watch the horror unfold, and neither did many social media users. Video of the shooting autoplayed on Twitter, Facebook (despite a content warning feature reportedly implemented in January), and other sites that support autoplay video.
- UN Official Says Human Suffering in Yemen “Almost Incomprehensible”
Tourist Unclear On Concept Of Wild Animals Demands Yellowstone Provide Better Bears
Mashable reports that the following note was left by a guest at Yellowstone and then posted on Reddit by a friend of someone who works at the park. The note was left upon checkout by someone who does not understand how wild bears work (they don’t fuck with you unless you’ve got a pool) but is nonetheless quite polite; it’s refreshing that they were so kind about their disappointment, unlike the woman who threatened to shit herself in anger at Town Hall when Disneyland didn’t have fireworks the last time I went.
Environmentalists Blast Obama’s Decision to Let Shell Drill in Arctic
Apparently the president cares more about Big Oil than the environment, endangered animals, indigenous people — even his own climate legacy.
“This is a disaster,” said Kristin Brown, director of digital strategy at the League of Conservation Voters, in an email. “Shell has an awful safety track record — even the Interior Department says there’s a 75 percent risk of a large oil spill if these leases are developed, and in the unpredictable Arctic Ocean, cleanup would be next-to-impossible.”
The Nations That Will Be Hardest Hit by Water Shortages by 2040
Water access is going to be one of the most pressing issues of the 21st century. As climate change dries out the already dry areas and makes the wet ones wetter, we’re poised to see some radical civilizational shifts. For one, a number of densely populated areas will come under serious water stress—which analysts fear will lead to strife, thirst, and even violent conflict. With that in mind, the World Resource Institute has assembled a new report projecting which nations are most likely to be hardest hit by water stress in coming decades.
- Tourist Unclear On Concept Of Wild Animals Demands Yellowstone Provide Better Bears
Armando Iannucci urges BBC to monetise its programmes overseas and resist ‘prejudiced’ Tory attacks
“If it was a car industry, our ministers would be out championing it overseas, trying to win contracts, boasting of the British jobs that would bring. And if the BBC were a weapons system, half the Cabinet would be on a plane to Saudi Arabia to tell them how brilliant it was,” he said.
Latest Seattle Jobs Numbers Disprove Fox’s Minimum Wage Misinformation
New data from the Bureau of Labor Statistics (BLS) disproves allegations promoted by Fox News that the 2015 increase in Seattle’s minimum wage has destroyed restaurant jobs.
The stock market roller coaster is not being felt by most Americans for one simple reason
That’s because fewer people are invested in the stock market today than at any time in nearly the last two decades — the product of dogged wage stagnation and a dramatic loss of faith in markets.
Prof. Wolff speaks to The Big Picture’s Thom Hartmann about Market Meltdown
Prof. Wolff talks to The Big Picture’s Thom Hartmann about Monday’s historic lows in the financial markets. Prof. Wolff breaks down China’s economy and if the devaluation of the yuan is the root to this market meltdown. Then Prof. Wolff and Thom take a look at the U.S. economy and review wage growth, inequality, and pensions.
The Stock Market Is Not the Economy
We are seeing the usual hysteria over the sharp drop in the markets in Asia, Europe, and perhaps the US. (Wall Street seems to be rallying as I write.) There are a few items worth noting as we enjoy the panic.
First and most importantly, the stock market is not the economy. The stock market has fluctuations all the time that have nothing to do with the real economy. The most famous was the 1987 crash, which did not correspond to any real-world bad event that anyone could identify.
- WSJ Editorial Blames Progressives For Student Debt, Claims Government Loans Send “Deadbeats” To College
Fox Exploits Stock Market Turbulence To Push GOP Policies, Major Tax Cuts
On August 24, major stock markets in the United States opened their trading sessions with significant declines and sustained losses of 3 to 5 percent throughout much of the morning. Fox News used the event to advocate on behalf of numerous failed Republican policy demands, such as major tax cuts for the wealthy and a significant roll back of federal regulations.
- Sanders Sends Letter to Postmaster General
‘Suicide guidance’ given to benefits staff preparing for desperate calls on welfare reform
GUIDELINES on how to deal with suicidal benefits claimants have been handed out by the Department for Work and Pensions to Scots workers tasked with rolling out the UK Government’s controversial welfare reforms.
As part of a six-point plan for dealing with suicidal claimants who have been denied welfare payments, call-centre staff in Glasgow have been told to wave the guidance, printed on a laminated pink card, above their head.
The guidance is meant to help staff dealing with unsuccessful applicants for Universal Credit who are threatening to self-harm or take their own life.
A manager is then meant to rush over to listen in to the call and workers – who insist they have had no formal training in the procedure – must “make some assessment on the degree of risk” by asking a series of questions.
One section of the six-point plan, titled “gather information”, demands that staff allow claimants to talk about their intention to commit suicide.
The call-centre workers, who earn between £15,000 and £17,000 a year, must “find out specifically what is planned, when it is planned for, and whether the customer has the means-to-hand”, according to the guidance seen by the Sunday Herald.
- Armando Iannucci urges BBC to monetise its programmes overseas and resist ‘prejudiced’ Tory attacks
- National Association Of Hispanic Journalists Condemns Donald Trump For Ejecting Univision’s Jorge Ramos
- Trump Has Now Shut Down Two Of The Most Well-Respected Hispanic Journalists At His Press Conferences
- Fox’s Tucker Carlson Dismisses Jorge Ramos As “An Activist”
- Trump Rejects Fox News Chief Roger Ailes’ Call For Apology: Megyn Kelly “Should Be Apologizing To Me”
- Bill O’Reilly Calls On Donald Trump To Cease His Attacks Against Megyn Kelly
- Trump Renews Attack On Megyn Kelly, And She Gets A Full-Throated Fox Defense
LA Times’ ‘Independent’ Education Project Bankrolled by Charter School Backers
The problem with Education Matters’ promise to create “independent journalism,” however, is that several of the organizations funding it have a direct stake in a very specific education reform agenda. Education reform, as a project, is far from value-neutral: Reformers promote specific policies, ranging from firing teachers based on their students’ test scores to replacing public schools with privately run charter schools. Their rhetoric often directly attacks teachers unions and even public education as an institution, in favor of “market-driven” “school choice” solutions. And the organizations funding the LA Times’ new project are no exception.
The Broad Foundation, in particular, has a prodigious record. According to its website, Broad currently invests in organizations that invest in charter-school expansion, including Aspire Public Schools (whose goal is to “expand its network of public charter schools in the Los Angeles area”), the California Charter School Association, the Charter School Growth Fund, charter loan provider Excellent Education Development, Jeb Bush’s Foundation for Excellence in Education, Green Dot Public Schools (a charter network), the KIPP Foundation, New Schools Venture Fund, Pacific Charter School Development, Silicon Valley-based charter management organization Rocketship Education, Success Charter Network and Uncommon Schools. It funded the popular pro-charter documentary Waiting for Superman. It also invests in the US Department of Education’s “Race to the Top” grant program.
Bernie Sanders is wrong about the Koch brothers: They’re even more dangerous than he thinks
Bear with me for a second, because this is going to sound like a #Slatepitch or a hot take at first, I know. But after catching up on the latest from U.S. senator and presidential aspirant Bernie Sanders, who “delighted” a crowd of roughly 3,000 South Carolinians at a campaign rally this weekend, according to the Associated Press, I feel compelled to register a mild criticism. And it’s probably one of the last you’d expect to be leveled against this longtime, unapologetic democratic socialist.
Election Day: What would Darwin Think?
I wish, although without much hope, that this theory would spread and become accepted. The reason is simple: it could help break the deadlock in Washington that has cursed us for the last four years. And from a more self-interested point of view, I’m not sure that my own genes can survive another election year like the last one.
T-Mobile Refuses to Block The Pirate Bay
The Austrian branch of T-Mobile is refusing to block access to The Pirate Bay and several other popular torrent sites. T-Mobile was asked to do so by a local music rights group, who want the ISP to voluntarily follow a court order that was issued against rival Internet provider A1.
- Moscow Lifts Ban on Russian Wikipedia
- Russian watchdog cancels Wikipedia ban over cannabis entry
In a remarkable case study of censorship, author and political cartoonist Ted Rall recounts how he was dropped from the Los Angeles Times, purportedly for giving an untrue account of a 2001 encounter with an LAPD officer, who cited Rall for jaywalking.
- T-Mobile Refuses to Block The Pirate Bay
The Illusion of Online Privacy
As the Ashley Madison hack demonstrated, Web companies can’t guarantee privacy.
Almost None of the Women in the Ashley Madison Database Ever Used the Site
When hacker group Impact Team released the Ashley Madison data, they asserted that “thousands” of the women’s profiles were fake. Later, this number got blown up in news stories that asserted “90-95%” of them were fake, though nobody put forth any evidence for such an enormous number. So I downloaded the data and analyzed it to find out how many actual women were using Ashley Madison, and who they were.
Here’s what Ashley Madison members have told me
As someone said to me in one of the comments on my blog, trying to remove your data from the web is “like trying to remove pee from a swimming pool”. I added the DMCA comment in there as well because this has come up many times in the press. There’s a good piece on it in an article that emerged after news of the attack first broke last month (paradoxically, stating that DMCA is the reason the full data hadn’t been leaked), do read Parker Higgins’ comment about the “fraudulent” use of the act in terms of its’ use for removing data breaches. Regardless, a US law will in no way stop the mass distribution of this data, particularly via a decentralised mechanism like torrents.
Digital surveillance ‘worse than Orwell’, says new UN privacy chief
The first UN privacy chief has said the world needs a Geneva convention style law for the internet to safeguard data and combat the threat of massive clandestine digital surveillance.
Speaking to the Guardian weeks after his appointment as the UN special rapporteur on privacy, Joseph Cannataci described British surveillance oversight as being “a joke”, and said the situation is worse than anything George Orwell could have foreseen.
He added that he doesn’t use Facebook or Twitter, and said it was regrettable that vast numbers of people sign away their digital rights without thinking about it.
Canada’s Police Want Laws That Will Give Them ‘Real Time’ Access to Your Data
Thanks to a recent Supreme Court decision, Canadian cops need a warrant before they can get subscriber information from telecommunication companies—which is why police are now lobbying for a legal workaround so they can access that same information without court approval.
In 2014, the Supreme Court of Canada decided that subscriber information such as names and addresses carries with it a reasonable expectation of privacy, and that accessing such information without a warrant constitutes an unlawful search. The ruling has caused “substantial resource and workload challenges for law enforcement,” according to a resolution adopted by the Canadian Association of Chiefs of Police (CACP) at its annual convention in August.
Vint Cerf Echoes Widespread Concerns About the Internet of Things
According to a study from HP Security Research, 70 percent of the most widely used Internet of Things devices have notable security vulnerabilities.
Facebook promotes Scheeler to managing director
Facebook has promoted Stephen Scheeler to the role of managing director of its Australia and New Zealand region business.
9 steps to make you completely anonymous online
The default state of Internet privacy is a travesty. But if you’re willing to work hard, you can experience the next best thing to absolute Internet anonymity
Everybody Hates When You Use Your Phone at Dinner
It’s official: using your cell phone during a family dinner is frowned upon by pretty much everybody.
A new survey by Pew Research Center found that 88% of respondents believe it’s “generally” not OK to use a cell phone during dinner. An even larger percentage, 94%, say cell phone use is inappropriate during meetings, while 95% say they shouldn’t be used at theaters and 96% say they shouldn’t be used during religious services.
Abe Asks U.S. to Investigate Alleged NSA Spying on Japanese Government
Prime Minister Shinzo Abe on Wednesday asked U.S. President Barack Obama to investigate alleged spying by the National Security Agency on the Japanese government and companies, Mr. Abe’s spokesman said.
- Concerns new Tor weakness is being exploited prompt dark market shutdown
IBM Tells Companies To Block Tor On Security Grounds
Tor is increasingly being used to scan organisations for vulnerabilities and to launch attacks
The Tor anonymisation network is increasingly used as the point of origin of attacks on public- and private-sector organisations, according to a new report by IBM, which recommends administrators ban access to the network.
The report also noted increases in SQL injection and distributed denial-of-service attacks and of “ransomware” incidents that encrypt data belonging to an individual or an organisation, and then charge a fee to decrypt it.
UN privacy rapporteur invokes Orwell and calls for global digital privacy
UN PRIVACY RAPPORTEUR Joseph Cannataci has suggested – and he is not the first – that citizens need better data protection from technology companies, governments, the internet, heck the 21st century.
Cannataci, who assumed the position last month after a 29-person battle royal/interview process, has made it clear that, as a representative for privacy, he will represent privacy.
Ashley Madison faces proposed class-action lawsuit over half-deleted data
After a breach of the site’s database, people combing through the information found that Ashley Madison, and other properties owned by parent company Avid Life Media (ALM), had retained quite a bit of information pertaining to users who purchased a “full delete” of their profile for £15, including GPS coordinates, date of birth, gender, ethnicity, weight, height, among other details. Although e-mail addresses, phone numbers, and descriptions written by users who sought “full deletes” were eliminated by the time the hackers accessed the database, the incidental data that Ashley Madison kept on those users could still paint quite a picture. The Register has a table that nicely illustrates what information Ashley Madison kept on “deleted” users and what it actually deleted.
In addition, when Ars investigated the “full delete” option on Ashley Madison a year ago, we found that there was little difference between a “full delete” and the “hiding your profile” option, except that messages that a user sent to another user would be deleted if exiting users paid the fee.
- The Illusion of Online Privacy
Former head of the Army leads the calls for translators to be given safe haven in Britain
Generals, decorated war heroes, grieving families and politicians last night urged soldiers and members of the public to sign a petition to save Afghan interpreters from the Taliban.
General Sir Richard Dannatt, former head of the Army, led the calls as he pledged to sign a petition asking David Cameron to give all translators a safe haven in Britain.
He praised the Daily Mail for its Betrayal of the Brave series of articles highlighting the plight of frontline Afghans who risked their lives for UK troops in the battlefield.
He said: ‘We have a moral obligation to look after these people and if they feel once we have left that they cannot assume their normal lives because of fear having worked for us, then it is our obligation to have them in this country.
Saudi Arabia executed 175 people in past year, says Amnesty International
On average, one person every two days was put to death in kingdom, says new report, with figures for 2015 already ahead of those for whole of last year [...] on average one person every two days [...] Saudi courts allow for people to be executed for adultery, apostasy and witchcraft.
Instead of Releasing Dashcam, Cops Hire PR Firm to Help Cover Up Murder of Unarmed Teen
A former police captain recently signed an affidavit affirming that several formal reprimands are missing from the personnel file of the officer who killed a 19-year-old during a marijuana bust. Although the police chief claims that no disciplinary actions have been taken against the officer, his former supervisor lists multiple performance issues resulting from the officer’s negligence. In an attempt to improve public relations, city officials have hired a PR firm at the expense of taxpayers’ dollars instead of releasing the dash cam videos of the shooting.
Woman ‘too drunk to fly’ after downing hundred-pound bottle of cognac airport security officials attempted to confiscate
A woman reportedly downed a £120 bottle of cognac after airport security officials attempted to confiscate the liquid – only to be denied boarding as she was “too drunk to fly”.
The woman, who is being identified only by her surname of Zhao, was allegedly seen rolling about on the floor of Beijing Capitol International Airport, according to the Beijing Times.
Feds’ cyberbullying reverses cops’ convictions for shooting unarmed people
In the immediate aftermath of Hurricane Katrina back in 2005, five former New Orleans police officers were sentenced to six to 65 years in prison in connection to on-the-job deadly shootings of unarmed civilians. But recently, these five officers had their convictions set aside by a federal appeals court. Why? Federal prosecutors’ anonymous online comments posted underneath local news accounts of the officers’ ongoing 2011 trial “contributed to the mob mentality potentially inherent in instantaneous, unbridled, passionate online discourse,” the court said. In light of that, the appellate court found a fair trial wasn’t possible.
The New Orleans-based 5th US Circuit Court of Appeals ruled last week (PDF) that the prosecutors’ behavior, unearthed by the same forensic expert who helped identify the Unabomber, created an “air of bullying” that federal prosecutors were “sworn to respect.”
Virginia Police Force BBC Reporters To Delete Camera Footage Of Police Pursuit Of Shooter
…apparently two BBC reporters who were covering the police pursuit of the apparent shooter (who then shot himself) were forced by police to delete their own camera footage. This is illegal. I don’t know how many times it needs to be repeated. Even the DOJ has somewhat forcefully reminded police that they have no right to stop anyone from photographing or videotaping things, so long as they’re not interfering with an investigation.
Is using your mobile phone in public ruder than you think?
Some 23% of Americans think it’s not OK to use your phone while walking down the street, but that’s nothing compared to how they feel about the cinema or church
Katrina: The Logic of Genocide
The very upscale New Yorker magazine marked the tenth anniversary of Hurricane Katrina with a celebration of the benefits that supposedly accrued to the 100,000 mostly Black and poor people forced into exile from New Orleans. “Starting Over,” by magazine staff writer Malcolm Gladwell, a biracial Canadian who made his bones promoting the hyper-aggressive “broken windows” police strategy, concludes that involuntary displacement is a good thing for people who are stuck in “bad” neighborhoods or bad cities where poverty is high and chances for upward mobility are low. Since every heavily Black city in the country fits that description, the logic is that Black people should be dispersed to the four winds and prevented from forming concentrated populations.
- Former head of the Army leads the calls for translators to be given safe haven in Britain
Google Lobbied Against Real Net Neutrality In India, Just Like It Did In The States
While Google is still seen as (and proclaims to be) a net neutrality advocate, evidence continues to mount that this is simply no longer the case. Back in 2010 you might recall that Google helped co-write the FCC’s original, flimsy net neutrality rules with the help of folks like AT&T and Verizon — ensuring ample loopholes and making sure the rules didn’t cover wireless at all. When the FCC moved to finally enact notably-tougher neutrality rules for wired and wireless networks earlier this year, Google was publicly mute but privately active in making sure the FCC didn’t seriously address the problems with usage caps and zero-rated (cap exempt) content.
- Google Lobbied Against Real Net Neutrality In India, Just Like It Did In The States
Man tries to copyright a chicken sandwich, learns that that’s completely ridiculous
In 1987, Norberto Colón Lorenzana had what we can all agree is a pretty unremarkable idea. Colón, who had just started working at a fast food joint called Church’s Chicken in Puerto Rico, suggested to his employer that they try adding a basic fried chicken sandwich to a menu that was mostly chicken-by-the-piece.
UK Police ‘Hijack’ Ads on 251 Pirate Sites
Data obtained through a Freedom of Information request reveals that City of London Police have targeted the ad revenue of 251 suspected pirate sites, replacing their banners with anti-piracy messaging. The police won’t reveal the domain names as that would raise their profiles, but the most prominent pirate sites are believed to be included.
Megaupload Wants U.S. Govt to Buy and Store its Servers
Megaupload’s legal team is asking the court to preserve essential evidence hosted on its seized servers. The data is at risk of being destroyed and Kim Dotcom’s lawyers argue that the authorities should buy the servers and transfer them to a safe facility where they can be preserved at the Government’s cost.
DIY Tractor Repair Runs Afoul Of Copyright Law
John Deere would not talk on tape, but in an emailed statement the company said ownership does not include the right to modify computer code embedded in that equipment.
Carl Malamud Asks YouTube To Institute Three Strikes Policy For Those Who Abuse Takedowns
We write frequently about those who abuse the DMCA either directly for the sake of censorship or, more commonly, because some are in such a rush to take down anything and everything that they don’t bother (or care) to check to see if what they’re taking down is actually infringing. The latter, while common, could potentially expose those issuing the takedowns to serious legal liability, though the courts are still figuring out to what extent.
- Man tries to copyright a chicken sandwich, learns that that’s completely ridiculous
Data Center Operating System (DCOS) is a proprietary trap
“I’d be glad to help tilt lotus into into the death spiral. I could do it Friday afternoon but not Saturday. I could do it pretty much any time the following week.”
–Brad Silverberg, Microsoft
Summary: Hiding behind a misleading ‘open’ label while actually backed by Microsoft (and based on new rumours may join Microsoft), Mesosphere wishes to eradicate Free and back doors-free software in large datacentres hosting a lot of physical and virtual servers
WE have patiently been watching with great concern a company called Mesosphere. We have been watching it for quite some time, but have not yet properly covered it in Techrights (except incidentally). I personally complained about it many times in social media sites, not just because it’s backed by Silverberg (some Microsoft-centric publications call him “Mr. Windows” these days) but because it’s basically proprietary yet pretends to be ‘open’. It’s a big deception. Mesosphere is a parasite that has been often (and mostly) promoted by friends of Microsoft over the past year. Mesosphere is one of those companies that only people bribed by Microsoft (like Om Malik and his increasingly-defunct ‘news’ network) would actually openwash, excepting perhaps some gullible journalists who truly believe that there is genuine openness at Mesosphere or merely repeat what others are writing (the corrupting effect of manufactured hype).
Thankfully, Mesosphere is now showing its true colours, so we need not merely speculate or accuse Mesosphere with relatively weak evidence. Mesosphere has nothing to do with FOSS, except the fact that it wants to replace it with its own proprietary operating system. It can be viewed as a Microsoft Trojan horse with Microsoft veterans backing it — the same sorts of people who would distribute “Microsoft loves Linux” buttons (spreading a Big Lie) to help themselves devour the GNU/Linux market.
“Avoid Mesosphere, Mesos, and the Data Center Operating System (DCOS). Treat them as a creation of Microsoft, emanated silently to entrap the competition.”A Microsoft propaganda site (and by extension a network) recently showed Microsoft’s anti-Linux plan of entryism [1, 2], trying to make GNU/Linux just subservient to Windows, essentially demoting it. Other Microsoft propaganda sites did the same thing at the same time. Then we saw rumours that Microsoft was essentially ‘buying’ its own moles, just as it had done with Xamarin (now bankrolled by Microsoft veterans). All one has to do now is watch headlines from the financial press, for instance:
- Is Microsoft Acquiring Cloud Computing Startup Mesosphere?
- Is $1 Billion Price Tag Justified For Microsoft Corporation (NASDAQ:MSFT) To Buy Mesosphere?
- Is Microsoft mulling a $1 billion cloud acquisition?
There are many more like the above, but we omit them for the sake of brevity.
I personally feel somewhat vindicated, having repeatedly accused Mesosphere of serving Microsoft’s agenda. I said the same about Mono about a decade ago, well before it officially became a sort of Microsoft adjunct in the form of Xamarin. These are more like moles. They serve as Microsoft’s bridge into the heart of the competition.
Mesosphere ought to be treated as a Trojan horse or a proprietary software company with Microsoft roots (intending to replace GNU/Linux at datacentres). It shows true colours with articles such as “Why Microsoft Could Reportedly Want To Buy Cloud Startup Mesosphere Even At $1 Billion”.
Watch what Microsoft boosters are writing right now [1, 2, 3]. Headlines such as “Windows Server Getting Open Source Mesos Container Technology for Scaled Operations” or “Mesosphere And Microsoft Bring Mesos To Windows Server” speak volumes.
Microsoft’s many attacks on GNU/Linux and Free software can only be as effective as GNU/Linux users can be dumb, gullible, defeatist, or lenient. Scott M. Fulton III, a Microsoft expert, wrote the other day that:
Developers outside of Microsoft will be able to experiment for the first time with new classes of applications that run partly on Windows, partly on Linux.
As one response to this framed the key message: “It’s hard to imagine anyone actually wanting to build an application that is part-Linux, part-Windows. Or, to go one step further, to intentionally engineer a server-based program that straddles two very, very different flavors of operating system.
“Why on Earth would anyone build or use an application that needs two operating systems to function?”
Why would anyone need a platform from Mesosphere to manage GNU/Linux? It’s not even Free software, so back doors are to be expected (voluntary or not), compromising the security of everything down the hierarchy/stack.
Avoid Mesosphere, Mesos, and the Data Center Operating System (DCOS). Treat them as a creation of Microsoft, emanated silently to entrap the competition. Time will tell what Mesosphere really is and where it’s heading. █
Summary: A look at the recent assault on GNU/Linux in Munich and the likely cause for this assault (in such a timely fashion, too)
Over the past couple of days we have been writing about what Microsoft does in Munich, basically trying to stereotype/stigmatise this city’s GNU/Linux migration (also on the desktops) as a failure, doing so repeatedly, each time just quoting a person or two at most. There is now a good article on the subject, noting: “This “story” surfaces every several months and, for some reason I always fail to fathom, everybody starts parroting it. It goes thus: Munich is sick and tired of how inadequate Linux is for everyday use and is ready to ditch years of work and millions of euros to return to Windows.
“As usual, the facts say something different: all that has happened this time around is that two (count ’em: 2) councillors have sent a letter to the mayor requesting that some new devices that have had Limux (Munich’s tailored Linux flavour) installed on them, be equipped with Windows because the Linux distro comes with “no programs (text editing programs, Skype, Office, etc.)” that the councilors can use.”
This “story” has once again been amplified by Microsoft propaganda sites and then some blogs, perpetuating old myths and factual inaccuracies (some more gross than others). Microsoft AstroTurfing is quite possible here. As one person, Michael Matthew, put it this morning, “Microsoft Germany has their own dedicated team to wrest Munich away from Linux” (and Free software at large).
“They are trying to scare those who wish to move governments to GNU/Linux, especially in light of Vista 10′s serious failings.”It is not hard to see why Microsoft is nervous about Munich. The city’s success story with GNU/Linux can lead to the spread of a new trend, so McCarthyism (like witch-hunt against Communism) is what Microsoft now resorts to. Vista 10′s overt privacy violations combined or conjoined with NSA leaks that show Microsoft collusion in espionage can potentially destroy the Windows monopoly everywhere in the world, including parts of the US. There are “Lots of Reasons to Avoid Windows 10″, as the Goodbye Microsoft Web site put it earlier today, and “Meanwhile, Linux is getting easier to install and more capable every year. And it doesn’t snoop. Some applications issue crash reports that ask me if I want to send them to the developers; “no” is always presented as an option.”
Ken Starks, in the mean time, says it’s time to target (and boycott) Lenovo for spyware that it adds to Windows. Lenovo merely piggybacks Microsoft when it comes to surveillance, so it would make sense to target everything that runs Windows, not just Lenovo. It’s a tool of espionage. It is also not secure (by design), so even Five Eyes oughtn’t use it in governments. It’s a bait or a trap.
Microsoft is understandably nervous right now because Vista 10 is failing in a very big way, as we last showed last night.
The large army of Microsoft boosters at IDG (some are existing Microsoft employees, not just former ones) continues to belittle Vista 10 issues. Remember that IDG receives a lot of money from Microsoft in order to promote Vista 10 (advertisements in IDG sites), so IDG appointing many Microsoft people as “writers” simply makes business sense. Preston Gralla is the latest among the boosters of Vista 10, doing his usual Microsoft propaganda (he has been doing this for over a decade) which iophk calls “spin and lies” because it’s hardly hinged on facts at all. It’s jaw-dropping drivel which might only fool the most gullible among readers.
Having already made a beautiful Spanish word, “Vista”, get a bad connotation (Like Isis), Microsoft now does the same thing to a special decimal number, “10″. Attacking Munich’s story of successful migration to GNU/Linux is a priority at the moment. They are trying to scare those who wish to move governments to GNU/Linux, especially in light of Vista 10′s serious failings. In many countries and in many occupations the EULA of Vista 10 is not even compatible with the law. █
Message to LinuxCon Regarding Microsoft: “It is Necessary to Get Behind Someone in Order to Stab Them in the Back.” -Sir Humphrey Appleby
“I’ve killed at least two Mac conferences. [...] by injecting Microsoft content into the conference, the conference got shut down. The guy who ran it said, why am I doing this?”
Summary: Jim Zemlin, executive director of the Linux Foundation, helps Microsoft gain influence in the Foundation after payments are received
SEVERAL days ago LinuxCon ended. It was probably the biggest Linux-centric conference not only in the US but in the whole world. Microsoft, as usual, infiltrated and “injected Microsoft content into the conference,” to use the company’s own words. There’s a reason for this.
“This once again shows us an inherent weakness in the operations of the Linux Foundation. Microsoft moles or provocateurs managed to get in and change the agenda after they had paid.”We give some credit to Sean Kerner for writing about this as almost nobody else did. The first article from Kerner reminded us that the Linux Foundation is selling out again. It lets an anti-Linux company speak at Linuxcon because this company paid the Linux Foundation. Would the Linux Foundation also let SCO give some talks if SCO paid (hypothetical question as SCO is a defunct company now)? Remember that Intel (key funder of the Linux Foundation and OSDL before it) helped fund a SCO conference.
Kerner wrote repeatedly about this, noting that “Microsoft was a sponsor of the event and also had a booth in the vendor area [...] When Jim Zemlin, executive director of the Linux Foundation, held up a Microsoft Tux penguin during a keynote session on Aug. 18, he was actually heckled.”
It is reported that these 'Microsoft loves Linux' buttons (see below) emerged at this event at well.
People who paid a lot of money to attend this event are reportedly upset, to use an understatement. And rightly so. See the quote at the top again. Microsoft succeeds at discrediting the event. Microsoft sure delivered its entryism first thing in the morning as “LinuxCon [was] infiltrated by Microsoft,” to quote one of our readers who sent us mail about it, as several other have done since then (many are furious as the Linux Foundation serves to legitimise Microsoft, in exchange for generous, self-serving payments).
This once again shows us an inherent weakness in the operations of the Linux Foundation. Microsoft moles or provocateurs managed to get in and change the agenda after they had paid. Microsoft entryism needs to be recognised as a potent threat and tackled accordingly. Such entryism and marketing not only reduces the popularity of GNU/Linux but also removes freedom because anything that Microsoft does around Linux merely promotes proprietary software like Hyper-V, Windows, and so on.
A third and final such article from Sean Kerner (not that it’s an issue, as he clearly helped raise awareness of what Microsoft had sneakily done again) got titled “LinuxCon Highlights: From Linus Torvalds to Microsoft”, demonstrating quite well that Microsoft interjected itself into the competition and it worked; it served to distract almost everybody and that’s how people may remember this event.
For those who believe that Microsoft actually likes GNU/Linux, recall the 6-part series below and see what Microsoft is distributing in FOSS conferences as though it is trying to deliberately provoke and upset attendees.
- Microsoft Hates Linux – Part I – The UEFI Attack on GNU/Linux
- Microsoft Hates Linux – Part II – Patent Lawsuits Against Android/Linux Still Going On, New Ones Filed
- Microsoft Hates Linux – Part III – Abducting the Competition (Android)
- Microsoft Hates Linux – Part IV – Deleting, Attacking Android/Linux From Within
- Microsoft Hates Linux – Part V – Dumping and Surveillance to Counter GNU/Linux Insurgence
- Microsoft Hates Linux – Part VI – Propaganda Wars Against Free Software Facilitated While Media Control is Secured and Abused
Photo credit: Neil McAllister
Summary: Confirmatory evidence that Vista 10 is failing in the market about a month after its much-hyped (paid coverage) release
“Microsoft has been on a tear with Windows 10 updates,” Ryan wrote in our #techrights IRC channel (he used to be a Microsoft MVP and he follows Microsoft very closely). “It hasn’t even been a month and they’ve apparently already patched so many bugs it’s like an entire service pack has happened.”
“Vista 10 adoption is pathetic, especially when one considers the cost of an ‘upgrade’.”Vista 10 is clearly a failure (technically speaking and also in terms of sales), so Microsoft now wants to attract GNU/Linux users into its arms (to suffocate them with lock-in). It has gotten so bad that Microsoft (through Yahoo) is entering old versions of Ubuntu for surveillance purposes. If Canonical is pressured by Mozilla to make Firefox link to Microsoft (through Yahoo as a proxy/middleman), then users should move to IceWeasel or IceCat, if not drop Ubuntu altogether. There have also been several articles recently about how Microsoft was trying to sneak its surveillance and propaganda engine into Android.
“One common concern right now is privacy, not just the heap of serious bugs.”Vista 10 adoption is pathetic, especially when one considers the cost of an ‘upgrade’. This week it’s said that “Windows 10 now has 5.95 per cent of the desktop operating systems market, according to the folks at StatCounter.”
That’s hardly a gain since a week ago. “Windows 10′s growth has slowed, according to StatCounter Global Stats,” which means that it will possibly plateau at around 10%, despite so many people being ‘eligible’ for a ‘free’ ‘upgrade’.
One common concern right now is privacy, not just the heap of serious bugs. One has to wonder if Microsoft’s secret (proprietary) code in Vista 10 implements any callback functions for option buttons that relate to privacy. It is worth pursuing these questions. Did Microsoft add privacy ‘controls’ for a false sense of control or is this a bug? Is this just being disguised as a bug but is actually intentional? A lot of people were surprised that Microsoft does not obey privacy preferences from users; maybe they forgot it’s a company of cheaters and liars, not to mention bribes. Watch what Microsoft is still up to in Munich. █
The Microsoft Mafia shows extreme hypocrisy
Summary: Possibly the world’s biggest patent abuser and monopolist, which also creates many patent trolls (including by far the biggest one), takes on a far smaller abuser in Court
“I owned the domain name http://nokiaplanp.com ,” wrote the President of the FFII this week, “p for patents, and now Nokia is turning in a patent troll” (we wrote about this before). Microsoft not only turned Nokia into a troll, but also used Nokia’s patents to feed other trolls, MOSAID for example (not to mention that Microsoft is behind the world’s biggest patent troll). Based on some of the latest reports from Finland [1, 2], Microsoft pushes Nokia further towards the cliff of patent trolling, turning the former mobile giant (bigger than any of its kind ever!) into nothing but a pile of patents. Reuters wrote that “initially announced in July, [additional cuts] are part of Microsoft’s plan to cut 7,800 jobs globally, most from the phone hardware business that it bought from Nokia last year.”
Microsoft layoffs are a Microsoft thing, not a Nokia thing, for reasons we explained before, so reject the Microsoft spin, but either way, Microsoft killed Nokia and quickly turned it into nothing but a parasite that taxes Microsoft’s competition, including Apple.
Now that InterDigital gives Microsoft a taste of its own medicine “Microsoft sues InterDigital for ‘monopoly power’ over mobile patents” (patents of InterDigital were covered here before [1, 2, 3, 4). Putting aside the obscenity of Microsoft suing for “monopoly power”, who’s really the troll and the patent abuser here? The hypocrisy is so fascinating. To quote one of the earliest articles about this (we found it last week), “Microsoft files antitrust suit against InterDigital in patent feud”:
InterDigital has violated U.S. antitrust law by failing to keep its promise to fairly license its technology considered essential to mobile phone communications, Microsoft said in a lawsuit on Thursday.
The complaint against InterDigital, filed in federal court in Wilmington, Delaware, deepens a long-standing fight over patent licensing between the two companies.
It comes as the U.S. International Trade Commission is set to rule this month on whether Microsoft smartphones should be banned from being imported into the United States for infringing two of InterDigital’s patents.
For Microsoft to accuse InterDigital of abuses with patents, monopoly abuse (and use antitrust laws to tackle these abuses) is a bit like President Putin accusing President Obama of freedom of speech violations. Let that sink in for a moment. █
Summary: Microsoft and its minions refuse to leave Munich alone, even though the vast majority in Munich are perfectly happy with Free/libre software
A story that we covered here on Monday has received quite some attention, far more than we anticipated. It’s basically about a letter composed by two technically-incompetent people, which means it’s full of factual errors and serves more as Microsoft endorsement and scare tactics against GNU/Linux, ODF, and Free software. It’s about Munich, where two officials got a lot more press than they deserved (even in English-speaking media [1, 2, 3]). As one article put it, “proprietary software companies are known for their public affairs (lobby) large budgets.” The article recalls “90 percent discount from then Microsoft CEO Steve ‘I’ve had the time of my life’ Ballmer to keep Windows” (a form of bribery in a sense).
“The article recalls “90 percent discount from then Microsoft CEO Steve ‘I’ve had the time of my life’ Ballmer to keep Windows” (a form of bribery in a sense).”Continuing the trend and the line which we went along the other day, in this article from the Monday Glyn Moody said that Russian “Members of parliament [are] worried about personal and classified data being sent to the US.”
The British media covered this as well, saying that “Russian lawyers have filed a complaint calling for an outright ban – or at least tight restrictions – over the sale of Windows 10 in Russia.”
Well, they’re right and Munich would be ever so dumb to abandon software Freedom, having already paid a lot to escape the lock-in/exit barrier, whereupon it chooses to be spied on by a hostile country which targets Germany (political espionage). Moving to Windows would mean Vista 10 or later (our contacts at Microsoft says that future version will have even more spying).
Munich is going to stay with Free software, as before, but the Microsoft camp keeps trying to maintain the mythology of failure there. The negative press gives many officials the wrong impressions and scares them, discouraging any other nation-wide moves to GNU/Linux. That’s what it’s all about. █
Is Linux Right For You?
I enjoy using Linux on the desktop. Not because of software politics or because I despise other operating systems. I simply like Linux because it just works.
It’s been my experience that not everyone is cut out for the Linux lifestyle. In this article, I’ll help you run through the pros and cons of making the switch to Linux so you can determine if switching is right for you.
Why is Linux So Great? Because It’s Open Source!
What can’t Linux do? Nowadays you hear Linux powering just about any device imaginable — all the way from dime-sized computers via the Raspberry Pi all the way to most of the top 100 supercomputers in the world. We interact with it daily, whether it be on our personal computers, Android devices, Steam boxes (gaming), flight entertainment systems, web servers that power behemoths such as Google, Facebook, and Wikipedia, or more.
Tweaking the Linux desktop
NO operating system is perfect and Linux is no exception.
In contrast to Windows and Mac OS X, however, Linux gives you a lot of choices—some might say, too many choices. DistroWatch.com lists more than 200 active distributions (or flavors) of Linux—and what’s more, each of these distributions allows you to customize the desktop environment.
I know of no other OS that is, as modular, or allows you this much control, over the ability…
Why I gave up on the Linux Desktop repeatedly, and why I migrated back to it
I wasn’t initially accepted as an intern via the application process. But the 2 IT staff saw me helping a teacher with his laptop, and reconsidered my application on the spot.
My high school was, and still is, a strong partner with Microsoft.
- Tweaking the Linux desktop
Top 10 Linux Server Distributions of 2015
The Top 10 Linux server operating system distros ranked by ease of use, cost, available support and data center reliability.
We’ve researched, crunched the numbers and put dozens of Linux distros through their paces to compile our latest list of the top ten Linux server distributions (aka “Linux server distros”) — some of which you may not be aware.
IoT server is loaded with Linux “Candi”
Logic Supply’s Atom N2800 based “CC150″ industrial IoT gateway is loaded with a version of the Linux-based IoT Server software from Candi Controls.
The CC150 Internet of Things Gateway with Candi IoT Server is designed for “managing and controlling energy and operational data in commercial buildings and industrial sites with Internet of Things devices,” says Logic Supply. The hardware vendor teamed up with Candi, whose Linux-based IoT gateway software of the same name stands for Cloud-Assisted Network Device Integration. The preconfigured server enables connections to hundreds of IoT devices,” says Logic Supply
LinuxCon 2015 in Seattle: It’s all about the servers
Then again, I always have a good time at Linux conferences. Whether they be the more community-driven events like the Southern California Linux Expo and LinuxFest Northwest or the more company-run expos like SUSECon and LinuxCon, these moments give me an opportunity to, quite simply, be around Linux nerds. Lots and lots of Linux nerds. These are my people.
IBM adds Java to Bluemix for open source agility
IBM has made improvements to a set of services available through its cloud platform Bluemix, with the aim of enabling developers to integrate Java-based resources into their cloud-based applications.
With the new IBM Cloud tools, developers will be able to broaden the capabilities of their applications by utilising additional security and flexibility, providing users with a more robust cloud experience.
NCI launching new computing courses with IBM partnership
IBM is partnering with the National College of Ireland as part of its Academic Initiative for Cloud programme which will train new developers.
NCI is one of more than 200 colleges and universities globally that are developing new curricula using IBM’s Bluemix development platform.
- New IBM Cloud Services Give Developers More Flexibility to Integrate Java-based Resources into Bluemix
- IBM brings better Java support to Bluemix developer cloud
- Top 10 Linux Server Distributions of 2015
Linux Machines Produce Easy to Guess Random Numbers
A study carried out by two security researchers revealed that the internal system used by Linux systems to produce random numbers, which are later utilized to encrypt data, is much weaker than previously thought.
The Top Features Of The Linux 4.2 Kernel
If all goes well, the Linux 4.2 kernel will be officially released before the day is through. If you haven’t been keeping up with the flow of Phoronix articles over recent weeks, here’s a look at some of the highlights for Linux 4.2.
Linux 4.2-rc8: .. one more last -rc after all
So rc8 isn’t a big rc, and most of it is actually some last-minute reverts for stuff that just wasn’t quite ready. Mostly drivers, with some networking, an x86 fix, and a smattering of perf tooling fixes. The shortlog gives an overview of the details.
Linux Turns 24, Happy Birthday!
Dear all, today is August 25, 2015, and the time has come for us, Linux users, to party in celebration of the 24th anniversary of the Linux project, announced by none other than its creator, Linus Torvalds, on the sunny day of Sunday, August 25, 1991.
Collabora contributions to Linux Kernel 4.2
A total of 63 patches were contributed upsteam by Collabora engineers as part of our current projects.
In the ARM multi_v7_defconfig we have the addition of support for Exynos Chromebooks, all options that had a tristate Kconfig option were added as module. After this change it was found that a few drivers weren’t working properly when built as module, so this was fixed. This work was done by Javier Martinez.
How Linux was born, as told by Linus Torvalds himself
Many people have read that post by Linus Torvalds in the comp.os.minix newsgroup on Usenet, or at least heard about it. Many more are aware of how that (free) operating system ended up taking over vast swathes of the computing world, and becoming both “big” and “professional.” But what about before that famous moment? What were the key events that led to Linus creating that first public release of Linux?
- Happy 24th birthday, Linux kernel
- 24 years young: The best of Linux is yet to come
- Linus Torvalds Chickened Out and Delayed the Release of Linux Kernel 4.2 for One Week
- Linux 4.2-rc8 Kernel Released: Official Release Pushed Back
Why systemd Linux containers make sense
Why complicate container management with a new platform when systemd can help you deploy and manage containers today?
Heavyweight Firms Team on Open Ethernet, Object Storage Initiative
The Linux Foundation is putting together a consortium that could have a big impact on cloud connectivity and storage. It is organizing a joint effort involving 13 tech companies to promote open source software and standards for cloud object storage technologies. Companies supporting the just launched Kinetic Open Storage Project include Cisco, Cleversafe, Dell, Huawei, NetApp, Red Hat, Seagate, Toshiba and Western Digital.
Self-generated metadata with LVFS
This weekend I finished the penultimate feature for the LVFS. Before today, when uploading firmware there was up to a 24h delay before the new firmware would appear in the metadata. This was because there was a cronjob on my home server downloading files every night from the LVFS site, running appstream-builder on them locally and then uploading the metadata back to the site. Not awesome at all.
Does Linux need a new file system? Ex-Google engineer thinks so
Former Googler Kent Overstreet has announced that a long-term project to craft a new Linux file system is at a point where he’d like other developers to pitch in.
- Ex-Google engineer unveils new file system for Linux
- Ex-Google engineer unveils Bcache, new file system for Linux
Mesa 10.6.5 Brings Nouveau and Radeon Fixes, Mesa 11 Release Candidate Arrives
The developers of the open-source Mesa 3D Graphics Library that is currently used by default in numerous, if not all GNU/Linux operating systems, have announced the release of the fifth maintenance version of Mesa 10.6.
- Mesa’s Loop Analysis & Range Propagation Passes
Intel Continues To Divest In Wayland
In the earlier days of Wayland, Intel was known for contributing a lot of resources toward this next-generation display technology to unseat the X.Org Server, but these days their contributions have been minimal.
While Wayland 1.9 is coming next month, Intel’s Open-Source Technology Center hasn’t had much of a hand in the development of this new version along with the Weston 1.9 compositor. Wayland’s releases continue to be managed by Bryce Harrington over at Samsung’s open-source group.
- Mesa 10.6.5 Brings Nouveau and Radeon Fixes, Mesa 11 Release Candidate Arrives
Intel Core i5 6600K Skylake Linux CPU Benchmarks
Earlier this week I began my Intel Skylake Linux benchmarking by posting some initial results from the HD Graphics 530, the new Intel “Gen9″ graphics. While more Intel Linux HD Graphics 530 results are on the way, completed for this weekend are the initial CPU benchmark results comparing the Core i5 6600K to various other Intel Haswell/Broadwell processors as well as some AMD APUs and CPUs.
- Intel Core i5 6600K Skylake Linux CPU Benchmarks
- Linux Machines Produce Easy to Guess Random Numbers
Shotcut – Video Editor Based on MLT Framework and Support for 4K UHD
Shotcut is an free, open-source video editor app based on the MLT Multimedia Framework which works flawlessly on major operating system (Linux, Mac OSX and Microsoft Windows). Dan Dennedy as main developer shotcut video editor was started shotcut project in 2011, it is amature and stable application; both professionals and armatures use this to fulfill their video editing needs.
A pure maintenance release 0.1.3 of the RcppDE package arrived on CRAN yesterday. RcppDE is a “port” of DEoptim, a popular package for derivative-free optimisation using differential optimization, to C++. By using RcppArmadillo, the code becomes a lot shorter and more legible.
Opera 33 Dev Adds Window Vibrancy Effect on Mac OS X, Better Windows 10 Support, Based on Chromium 46
Opera Software, through Tomasz Procków, has informed all users of the Opera web browser that version 33 of the cross-platform software is now in development with lots of new features and numerous bugfixes.
Redbooth launches a desktop app for Mac, Windows, and Linux
Redbooth, a company that sells software with task management, videoconferencing, and messaging features, is announcing today that it has built a new native desktop client for Windows, Mac, and Linux. Until now people were only able to use Redbooth in a web browser, or on iOS and Android.
Redbooth is beginning a four-week beta program for the new desktop client. The company will roll it out for all of its customers later.
The company chose to develop desktop apps to meet the needs of some of its large enterprise customers.
- Opera 33 Dev Adds Window Vibrancy Effect on Mac OS X, Better Windows 10 Support, Based on Chromium 46
- How to create an AP in Ubuntu 15.04 to connect to Android/iPhone
- Perl 5 Regex Cheat sheet
- Update Motorola Moto E with CyanogenMod CM12.1 (Stagefright Bug-fix) Android 5.1.1 Lollipop Custom ROM [How to Install]
- Here’s How to Watch Hulu Movies and TV Shows on Ubuntu Linux
- Install PXE Server And Configure PXE Client On CentOS 7
- Install Speedtest.net Server In CentOS 7
- How to get Oracle Virtual Box 5.0 installed on (Ubuntu) Linux
- How to configure virtual hosts in Apache HTTP server
- How to Install PunBB on a Debian 8 VPS
- How to Run Kali Linux 2.0 In Docker Container
- Compare PDF Files With DiffPDF In Ubuntu Linux, Debian, Fedora & Other Derivatives
Shadowrun: Hong Kong Arrives for Linux Players
Shadowrun: Hong Kong, the third stand-alone game in the new Shadowrun series developed by Harebrained Schemes has been released on Steam, GOG, and Humble Bundle, and a Linux version is also available.
Five Super Cool Open Source Games
In 2014 and 2015, Linux became home to a list of popular commercial titles such as the popular Borderlands, Witcher, Dead Island, and Counter Strike series of games. While this is exciting news, what of the gamer on a budget? Commercial titles are good, but even better are free-to-play alternatives made by developers who know what players like.
Old and Famous TuxRacer Game Arrives on Ubuntu Touch
The Ubuntu Touch platform needs a lot of apps to attract more users, but it also needs games. There aren’t a lot of complex, 3D titles available, and now TuxRacer is one of them.
Dying Light Crashes on Linux After Latest Patch, Here’s the Solution
Some users are reporting that Dying Light for the Linux platform no longer starts after the latest patch has been released.
Dying Light is one of the newest triple A games that landed on Linux in the past few months. The performance wasn’t great, and many users complained about the fact that it didn’t seem like a quality port. The developers pushed a few patches out the door, and the quality of the game for Linux users increased tremendously, even if it’s still not up to par with Windows.
Feral Interactive Buys More AMD Hardware to Optimize Linux Games
Feral Interactive is a studio that specialized in porting games for the Linux and Mac OS X platforms, and they have already launched a number of titles. The developers are now making an extra effort to make their games work better on AMD hardware.
- Shadowrun: Hong Kong Arrives for Linux Players
- Shotcut – Video Editor Based on MLT Framework and Support for 4K UHD
Enlightenment 0.19.9 Open-Source Desktop Environment Is Out with 28 Bugfixes
The developers of the Enlightenment open-source desktop environment used in numerous GNU/Linux operating systems have announced the release and immediate availability of the ninth maintenance version of Enlightenment DR 0.19.
- Themes of the day [linuxandubuntu.com]
K Desktop Environment/KDE SC/Qt
KDE Ships Plasma 5.4.0, Feature Release for August
Tuesday, 25 August 2015. Today KDE releases a feature release of the new version of Plasma 5.
This release of Plasma brings many nice touches for our users such as much improved high DPI support, KRunner auto-completion and many new beautiful Breeze icons. It also lays the ground for the future with a tech preview of Wayland session available. We’re shipping a few new components such as an Audio Volume Plasma Widget, monitor calibration tool and the User Manager tool comes out beta.
Another KDE success story – the Incubator – Part 4
Kdenlive, one of the rare free-as-in-speech video editors, started its life more than 12 years ago using KDE3 libraries. At that time, it was mostly the effort of a single person—coding, fixing bugs, publishing releases, managing the website. There was no real connection with the KDE Community. Good contributions came in from other people, but no team was built, a risky situation. In 2013, the main developer, Jean-Baptiste Mardelle, was not able to work on the project, so it was on hold for several months and had some technical problems. We tracked him down like a “Giant Spy” to get the project running until his return! That taught us a lesson. When Mario Fux presented the KDE Manifesto, it was the exact answer to our problem.
- KDE Ships Plasma 5.4.0, Feature Release for August
- Enlightenment 0.19.9 Open-Source Desktop Environment Is Out with 28 Bugfixes
Zorin OS 10 Core – A good OS if you’re coming from a heavy Windows background
Zorin OS Zorin OS is a GNU/Linux distribution that attempts to mimic the appearance of the Microsoft Windows operating system. I gave it a go roughly about a year and eight months ago (Zorin OS 8 Core) and my general impression was that it succeed in doing so, meaning that it was quite appealing in the eyes of a Microsoft Windows user.
OpenSUSE 13.2 on Lenovo G50 – Bald and beautiful
So this time around, the grade is going to be much lower. About 6.5/10. SUSE, please, you’re better than that.
New MakuluLinux Aero 10 Beta Build Looks like Windows Vista – Gallery
Jacque Montague Raymer is currently in Hong Kong (lucky him) and has just informed Softpedia about the new features implemented in the upcoming Beta build of his MakuluLinux Aero 10 distribution, which uses the Cinnamon desktop environment with a theme that resembles the look of Windows Vista.
- Zorin OS 10 Core – A good OS if you’re coming from a heavy Windows background
Solus Operating System Arrives on October 1, but It Needs Your Help
The Solus operating systems is on track for an October 1 release, but its makers do need help from the community. A fundraiser has been put forth by the Solus team, and anyone can contribute.
OpenELEC 6.0 Beta 4 released
The OpenELEC team is proud to announce the fourth beta of OpenELEC 6.0 (v5.95.4)
The most visible change is Kodi 15.1 (Isengard). Beginning with Kodi 15.0 most audio encoder, audio decoder, PVR and visualisation addons are no longer pre-bundled into OpenELEC but can be downloaded from the Kodi addon repo if required. PVR backends such as VDR and TVHeadend will install needed dependencies automatically. For further information on Kodi 15.1 please read http://kodi.tv/kodi-15-1-isengard-maintenance-release/.
Mageia 5 – So Much Better Than Last Time
The Mageia Control Centre is a good tool for managing your software installations, your hardware and internet connections.
There haven’t been any crashes since I started using Mageia. The only real issue I had was the lack of sound whilst watching MP4 videos which I can’t give an answer to because it suddenly started working again. (Cue the people saying “you had the volume turned down, didn’t you?”.
So with everything that has been written can I now recommend Mageia to the readers of this blog? Absolutely.
- Solus Operating System Arrives on October 1, but It Needs Your Help
Linux Top 3: Sabayon Linux Embraces Docker, Q4OS Updates and PC-BSD 10.2
The Docker container format makes it easier than ever to run application images on a Linux host, but what if you the application you want to run is an operating system? That’s what Sabayon Linux is now enabling with Docker based images for its upcoming releases. Sabayon is a desktop-friendly version of Gentoo Linux.
- Linux Top 3: Sabayon Linux Embraces Docker, Q4OS Updates and PC-BSD 10.2
Manjaro Update 2015-08-24 (stable)
We are happy to announce our tenth update for Manjaro 0.8.13.
With this we updated most of our kernels, KDE frameworks to 5.13.0, mesa to 10.6.5, virtualbox to 5.0.2, fixed some issues with our steam client and renewed our KDE theme Maia. This new look will be included in our Manjaro 2015.09 release. Some work went into consolekit and the development branch of Calamares.
- Manjaro Update 2015-08-24 (stable)
Red Hat Family
Red Hat Recognized by Forbes as One of the World’s Most Innovative Companies
Red Hat was ranked at 26 on the list, which recognizes a total of 100 companies from around the world. It is the third time Red Hat has been honored by Forbes.
Relative Strength Alert For Red Hat
Legendary investor Warren Buffett advises to be fearful when others are greedy, and be greedy when others are fearful. One way we can try to measure the level of fear in a given stock is through a technical analysis indicator called the Relative Strength Index, or RSI, which measures momentum on a scale of zero to 100. A stock is considered to be oversold if the RSI reading falls below 30.
- Shares of Red Hat, Inc. (NYSE:RHT) Drops by -7.65%
- Commit To Purchase Red Hat At $62.50, Earn 5.8% Using Options
Fedora 22 Release Party, Bangalore
The Fedora Project announced the release of Fedora 22. To celebrate the release a Fedora 22 a release party was organized at HackerEarth, Bangalore on August 01, 2015 with the help of rtnpro and lalatendu.
Collaboration Express – the train is coming…
Fedora is one of my favourite systems, because provides to me the best tools ever…
- Fedora 22 Release Party, Bangalore
- Red Hat Recognized by Forbes as One of the World’s Most Innovative Companies
Tor-enabled Debian mirror
During Jacob Applebaum’s talk at DebConf15, he noted that Debian should TLS-enable all services, especially the mirrors.
His reasoning was that when a high-value target downloads a security update for package foo, an adversary knows that they are still using a vulnerable version of foo and try to attack before the security update has been installed.
Updates to the sources.debian.net editor
Debconf is a great opportunity to meet people in real life, to express and share ideas in a different way, and to work on all sort of stuff.
- Debian/TeX Live complete update
Regardless, my contributions to Debian were never noteworthy so it’s also not that big of a deal. I just need to close cycles myself and move forward, and the ten year anniversary looked like a significant mark for that.
Even though Debian has moved to systemd as default a long while ago now, I’ve stayed with sysv as I have somewhat custom setups (self-built trimmed down kernels, separate /usr not pre-mounted by initrd, etc.).
- remove systemd for the love of Yog-Sothoth already
SteamOS Brewmaster 2.30 Brings a New Linux Kernel and Autorepair Service
Valve is working on SteamOS version based on Debian 8, and it’s making good progress with it. The operating system is still considered a Beta, and it’s not ready for prime time, especially since developers are still making important upgrades.
Deprecated Wubi Tool “Mysteriously” Survives on Ubuntu Images Until Today
Wubi was a tool made by Canonical that acted as an Ubuntu installed for Windows XP, Windows Vista and Windows 7, allowing users to install Ubuntu alongside those OSes. It’s been deprecated for two years, but it somehow “mysteriously” survived on the installation media until now.
Ubuntu 16.04 Stupendously Hot Concept Is About to Become Real
We wrote just a few days ago about a Ubuntu 16.04 Stupendously Hot Charmander concept and a lot of people liked it. Because it’s the work of someone from the community, it’s unlikely that it will be become more than just that, a concept, but it seems to have taken a life of its own.
The New Ubuntu-Supported Video Driver PPA Is Well Received by Community
Ubuntu will have a dedicated PPA for video drivers, for now only for the Nvidia ones, and third-party developers are already praising the devs for this decision.
Ubuntu Touch to Get a LibreOffice Doc Viewer Soon
LibreOffice 5.0 was released a week ago, and one of the things mentioned in the announcement was the fact that it’s a cornerstone of the mobile clients for Ubuntu Touch and Android. A developer wanted to clarify what that actually meant.
Ubuntu Core Receives Support For GPIO and I2C on the Raspberry Pi 2 – Video
Canonical’s Kyle Fazzari wrote an interesting article on his blog informing about the latest work done by him and his team of Ubuntu developers at Canonical for the Ubuntu Core operating system.
- Snappy Scope: Progress Update
OTA-6 Update for Ubuntu Touch Could Arrive by the End of the Week
The new OTA update for Ubuntu Touch is almost here, but developers still need to work in order to fix all the problems. Some issues have been recently discovered, and the launch has been pushed back for few days, but it looks like we might get it this week.
Ubuntu on the Mainframe: Interview with Canonical’s Dustin Kirkland
Dustin Kirkland, from Canonical’s Ubuntu Product and Strategy team, told me in a long interview at LinuxCon, “We are really steamrolling towards a GA release of Ubuntu on z Systems. Users of z Series systems are the types that buy hardware for 5 and 10 years and that lines up very well with our LTS of Ubuntu.” He also said they need to do some work on tool chain to ensure they have components like gclib libraries on all of the compilers, including other bits such as Perl, PHP, Ruby, Python, etc., which are needed to build the Ubuntu universe. Users will start seeing that work coming out later this year and alpha/beta builds of Ubuntu in early 2016.
Review: Canonical continues cloud push with Ubuntu 15.04
According to the latest statistics from The Cloud Market, Ubuntu now accounts for 59% of all images on the Amazon EC2 platform. Windows has 8%, and the other distributions of Linux split the remaining 33%.
Ubuntu’s popularity is due to the operating system’s regular updates, easily accessible images, and availability of enterprise-grade support. And, of course, the lack of license fees.
Canonical Kills Desktop Ubuntu Software Center, Focuses on Mobile Apps
Desktop apps stores are dead, and their mobile-oriented equivalents are the future. That’s the message from Canonical, which has quietly made clear that it intends to jettison the Software Center in Ubuntu Linux to focus on mobile apps for Snappy Ubuntu Core.
Ubuntu 15.10 Needs Some Awesome Wallpapers from Talented Artists, Contribute Now
Canonical’s Nathan Haines has informed us all about the launch of a new event for members of the Ubuntu Linux community, where they can contribute with photographic and illustrative wallpapers, as well as other multimedia content in order to celebrate the release of Ubuntu 15.10 (Wily Werewolf) operating system.
Introducing MrRobot, Ubuntu Touch App Enabled Robotics Powered by Raspberry Pi
Today we have the great pleasure of introducing you to a brand-new project developed during the Ubuntu ShenZhen hackathon by Joseph Wang. It is called MrRobot, just like the TV show we taked about in a couple of articles right here on Softpedia.
Ubuntu Touch OTA-6 Images to Arrive on Wednesday for Meizu MX4 and Nexus Devices
On August 24, Canonical’s Łukasz Zemczak has sent in his daily report informing us all about the latest work done by the Ubuntu Touch developers in prepration for the major OTA-6 software update for the mobile operating system.
Watch: Ubuntu MATE 15.04 (Vivid Vervet) Running on Banana Pi BPI-M1
We’ve seen them all, Ubuntu running on virtually anything, Ubuntu powering all sorts of devices, from mobile phones to embedded and industrial PCs. Today, we want to show you Ubuntu MATE 15.04 running on Banana Pi BPI-M1.
No, Canonical Is Not Killing the Ubuntu Software Center
We wrote a couple of weeks ago about the poor state of the Ubuntu Software Center, but it looks like other publications took this little too far. No, Canonical is not killing the Ubuntu Software Center, it’s just evolving.
Thunderbird 38.2.0 Finally Arrives in Ubuntu
Canonical just announced that a number of Thunderbird vulnerabilities have been closed in Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04, which also updates the version of the browser to 38.2.0.
- Subversion Vulnerabilities Closed in Ubuntu OSes
BQ announces Ubuntu running Aquaris smartphones in India via Snapdeal
After being introduced earlier this year in European countries, the first Ubuntu phones are now been announced in India. A Spanish manufacturer, BQ has unveiled its Aquaris E4.5 and Aquaris E5 HD smartphones in India with the price tag of Rs. 11,999 and Rs. 13,499, respectively. The firm has reported that these handsets will be available in Black and White color variants, exclusively at e-commerce retailer, Snapdeal by the end of the month.
Flavours and Variants
Cinnamon 2.8 to Add Device Vendor and Model Information, Better Box Pointers
Apparently, the creator and lead developer of the Linux Mint project, Clement Lefebvre, already works on the next major release of the acclaimed Cinnamon open-source desktop environment.
- Cinnamon 2.8 to Add Device Vendor and Model Information, Better Box Pointers
- Deprecated Wubi Tool “Mysteriously” Survives on Ubuntu Images Until Today
- SteamOS Brewmaster 2.30 Brings a New Linux Kernel and Autorepair Service
- Tor-enabled Debian mirror
Logic Supply Announces Fanless, Intel Atom-Based Internet of Things Gateway
The Logic Supply hardware company, known for selling all sorts of industrial and embedded computers powered by GNU/Linux operating systems like Ubuntu, announced the general availability of a fanless Internet of Things (IoT) gateway.
Intel aims “5×5″ at gap between NUC and Mini-ITX
Intel showed off a 147 x 140mm “5×5″ SBC form-factor slotted between NUC and Mini-ITX, designed for socketable, LGA-based Intel Celeron and Core processors.
Spurred on by the success of its reference design for 102 x 102mm (4.0 x 4.0-inch) NUC (Next Unit of Computing) mini-PCs, many of which run Linux, Intel showed off a “5×5″ mainboard form-factor at last week’s Intel Developer Forum. Billed as being the “smallest socketed board standard,” 5×5 measures 147 x 140mm (5.79 x 5.51 inches), or 29 percent less than the 170 x 170 (6.7 x 6.7-inch) Mini-ITX.
Google’s Android is Digging Deeper into Africa
Google just launched its Android One initiative in Africa, a move that should help stave off competition and give the company even more mobile control in the region.
- BlackBerry Passport shown running Android in new video
- Vulnerabilities Identified in Dolphin, Mercury Android Browsers
- Android M AOSP Changelog Posted For Preview 2 And Preview 3
- Line for Android updated with big focus on low-cost calling
- Vysor Puts Your Android Device’s Screen On Your Desktop
- Google Maps for Android Update Brings Street View Thumbnails and More
Latest version of Google Maps for Android gives you quick access to Street View
Google’s Street View allows you to see panoramic views of streets from your mobile device, allowing you to “take a walk” along a street so that you can check out a neighborhood. The latest version of Google Maps for Android, which happens to be version 9.13.0, includes a link to a Street View for your destination. All you need to do is click on the thumbnail at the lower left of the screen to get there. The thumbnail will appear when you search for an address inside the app, or with a long press to the map.
Android 6.0 Marshmallow: The Best Features it Offers
Google finally has a name for the next generation in Android OS, and it’s Marshmallow. While the update itself made its debut at Google’s I/O conference back in May, as reported by The Verge, it was then known as Android M. The new name follows Google’s pattern of naming individual releases after sweets alphabetically, something it has done for year
First Look: Dell Venue 10: A hybrid for Android lovers
Dell entered the Android tablet market late last year by releasing the Venue 8 7000, a device with an understated though appealing form that contains good specs and an interesting camera technology.
BlackBerry Passport sports Android in demo video
An Android-powered slider may not be the only phone BlackBerry has pegged for Google’s mobile OS. Following the leaks of a device codenamed “Venice” that’s said to be offered in both Android and BB10 versions, a video of the recently announced Passport Silver Edition surfaced. The square QWERTY handset isn’t running BlackBerry’s software, though, it’s sportin’ Lollipop. In the video from Dudu Rocha Tec., a prototype version of the new Passport is equipped with what appears to be stock Android. It’ll be interesting to see if this phone also packs in some of BB10′s notable features like Venice is rumored to do. BlackBerry hasn’t tipped its hand on Android devices just yet, so we’ll have to wait and see if another model of the silver Passport will be the second model that’ll tempt those who prefer Google’s mobile software. BlackBerry is already working with Mountain View on a more secure enterprise version of Android, and a number of reports indicate that the company is planning it’s own Lollipop (or Marshmellow) phones in the near future.
BlackBerry ‘Venice’ Android Phone Leak Shows Productivity Suite of Apps
BlackBerry’s anticipated ‘Venice’ Android slider smartphone has been in the news for weeks now. While the Canadian company is yet to make the handset official, there’s no shortage of leaks about the it.
Android lock patterns are highly predictable, could give people access to phones
Despite there being nearly 400,000 possible combinations of codes, an analysis by Martle Løge of the Norwegian University of Science and Technology of 4,000 of them found that they largely bore huge similarities.
- Do this now: A step-by-step guide for encrypting your Android phone
- Use Clipper to Supercharge Android’s Clipboard
- Samsung Galaxy Note 3 With Android 5.1.1 Lollipop Update – Features and Installation
- Android 5.1 Lollipop To Hit UMi eMax Devices Soon
- Android Pay Will Launch This Week Beating Samsung Pay By Weeks, According To Leak
- Android lock patterns as predictable as common passwords
- Fallout Shelter Android Game First Impressions: Tips, Tricks And Killer Bug
- Hoping to get Android 6.0 Marshmallow on your new Samsung phone soon? Good luck
- Android Marshmallow Release News For LG G4, LG G2 and LG G3
- Motorola Moto G, 2, 3, E 2013 and 4 2014 With Android 5.1.1 Lollipop Update – Features and Bug FIxes
- LG G2, LG G3 and LG G4 To Receive Android Marshmallow Instead of 5.1.1 Lollipop
Google is finally solving Android’s bloatware problem
There is good news on this front, however, as upcoming Android devices won’t be infused with as much bloatware as you’ve grown accustomed to.
Nokia Android Phone News, Rumors: Finnish Brand Will Rise from Ashes Once It Embraces Android Platform
Nokia may technically be non-existent in the mobile market right now as far as new devices are concerned. However, the Finnish manufacturer may already be looking for potential partner companies to help it make a comeback next year.
Based on the buyout deal between Microsoft and Nokia last year, Nokia may not be able to manufacture any mobile devices during that time as part of a non-compete agreement.
Rumor: Android Pay To Arrive August 26th
When Google introduced Android Pay back at Google IO 2015 this year at the end of May, it displayed that Google would be taking the mobile payments solutions seriously, but at the time they didn’t give a hard date for a launch of the service. Alongside that, since there has been no confirmed launch date for Android Pay by Google, it means there is no confirmed date for when users can expect to see the app available to download to their devices. A new rumor circulating the internet over this weekend claims that Android Pay will be launching on August 26th, that’s this Wednesday.
Huawei Honor 7i Specs, Release Date: Android Smartphone With Rotating Camera, Side Fingerprint Sensor Launched In China
In the announcement, Huawei also boasted that the Honor 7i had a fingerprint sensor. However, unlike smartphones from other brands, the Honor handset’s sensor is neither located in front or at the back, but on its side.
In the report, the sensor can be easily reached by the thumb and can be used to take camera shots on the go. Like other fingerprint scanners, this sensor also enables the user to unlock the phone from sleep. Hopefully, there are more features and functions for this fingerprint sensor.
Android Smart lock: Should you be using it?
Here’s my suggestion… at least on a user level. If you want to use Smart lock to be able to gain quick and easy access to certain aspects of your device (such as the phone), but keep a modicum of security on other aspects (such as email, messages, etc), employ an app locker app (such as AppLock) to lock down the applications that require security.
New leaks provide more details surrounding BlackBerry’s first Android device
With BlackBerry reportedly planning to release its first Android phone in November, the number of leaks surrounding the company’s rumored Venice slider are starting to come in at a furious pace.
BlackBerry Venice Will Reportedly Use BlackBerry 10 As Android Skin
New details about the BlackBerry’s upcoming Venice smartphone have cropped up via the credible tipster Evan Blass of @evleaks fame. According to one of his latest tweets, the BlackBerry Venice will be using BlackBerry 10 as the Android skin.
BlackBerry Passport Successor Rumored To Run Android
A new leak shows an image of the BlackBerry Passport Silver Edition running the Android 5.1 Lollipop operating system. This handset will reportedly be called the “BlackBerry Passport 2.”
LG’s latest 10-inch Android tablet comes with a sharper screen
Still (still?) looking for the Android tablet that fits your lifestyle? Maybe LG will capture your imagination, / wallet with a G Pad sequel that cranks up the processor speed (now a quad-core Snapdragon 800) while pairing it with a battery that’s actually smaller (7,400mAh) than its name-based predecessor. It’s now got a sharper 10.1-inch 1,920 x 1,200 display and while there’s an LTE option, there’s only a single color choice: Brilliant bronze. We’ll ignore those with third-place connotations from the outset, but it otherwise sounds like pretty inoffensive Android tablet.
Micromax Is Planning To Release An Android-Based OS
This Android-based OS is quite probably being developed by Micromax’s Bengaluru team, and 75 people (mostly designers) acquired from Nokia‘s R&D department. Micromax’s co-founder has also mentioned that the developers will have the option to port their apps to the new OS, and that they’ll release far more details about the operating system in the coming months, though he did not provide any specific dates regarding unfortunately. He did, however, say that the first smartphones sporting this new OS will be available by the end of the financial year.
Should You Root Your Android Phone?
Android is known for offering users a greater degree of customizability and control than any other mobile operating system, but there are still limitations to what you can do with an Android phone right out of the box. To push beyond those limits, you need to root your device, which means you gain admin rights to it. This somewhat complicated process could void your warranty or, if something goes wrong, break your handset. Are the benefits of having administrative control of your phone worth the risks? Android enthusiasts would give you an unequivocal “yes,” but we’ve gathered a list of pros and cons to help you decide for yourself.
New wave of Android Wear watches aims to make up for lost time
Can’t get enough of smartwatches? Well, a whole new batch is on its way.
Will Android Pay launch TOMORROW? McDonald’s accidentally leaks release date…and it’s weeks earlier than expected
Android Pay will give millions of people a new way to buy goods and services using their phones.
It was thought the payment system would launch alongside Google’s Marshmallow operating system, expected in October, but a leaked document suggests it could launch as soon as tomorrow.
However, other details in the document have since been proved to be inaccurate so it is unclear how reliable the leak is.
- Google’s Android is Digging Deeper into Africa
- Logic Supply Announces Fanless, Intel Atom-Based Internet of Things Gateway
For open source legend Eric S. Raymond, user-centric design is long overdue
It took a while for Eric S. Raymond, one of the founding fathers of the open source movement, to prioritize the end user. But now that he has, he wants you to know how easy it can be.
The Open Source Greatness of Linux
Ubuntu grabbed a large portion of the headlines today with Canonical’s decision to abandon its paid software for desktops to concentrate on mobile devices. The Everyday Linux User reviewed Mageia 5 and Distrowatch.com has added “Release Model” to their database search options. Elsewhere, Danny Stieben said Linux is so great because it’s Open Source and Munich is consdiering switching back to Linux on some machines because folks said there were no text editors, Skype support, or office suites installed. All this and more in today’ Linux news round-up.
The open source movement needs folk songs
So if you have a musical bent, try composing an open source folk song. It’s fine to be silly, too. Surprise us with what you make. Share your story and your song(s) right here on Opensource.com
- Open source for products in four rules (and 10 slides)
Apache Twill: real abstraction is a decoupled algorithm
To be clearer, this term decoupling arises time & time again in relation to the cloud computing model of service-based processing and storage power.
Great Open Source Collaborative Editing Tools
In a nutshell, collaborative writing is writing done by more than one person. There are benefits and risks of collaborative working. Some of the benefits include a more integrated / co-ordinated approach, better use of existing resources, and a stronger, united voice. For me, the greatest advantage is one of the most transparent. That’s when I need to take colleagues’ views. Sending files back and forth between colleagues is inefficient, causes unnecessary delays and leaves people (i.e. me) unhappy with the whole notion of collaboration. With good collaborative software, I can share notes, data and files, and use comments to share thoughts in real-time or asynchronously. Working together on documents, images, video, presentations, and tasks is made less of a chore.
Parse open sources its SDKs
Earlier this month, mobile backend-as-a-service provider Parse open sourced its iOS, OS X, and Android SDKs, and will be open sourcing additional SDKs in the future.
Parse, which was acquired by Facebook in 2013, says that its SDKs are used by more than 800 million active app-device pairs per month. By open sourcing those SDKs, Parse believes it can help developers facing challenges similar to those it faced. Specifically, according to Parse, “We’ve had to figure out a way to make a public-facing API easy to understand and use, but continue shipping features fast without breaking any existing functionality. To solve this, we structured our public API as a facade for internal code and functionality that could be consistently changing.”
A word to the Wise…
I have been recently reminded that while it may be hard enough to discuss the role and importance of communities for Free and Open Source Software, it is equally important to understand the complexities and the challenges that a Free and Open Source Software foundation has to meet.
Mozilla’s self-destruct course continues: major add-on compatibility changes announced
Mozilla announced major upcoming changes to Firefox add-ons on the official Add-ons Blog today. These changes affect add-on developers and Firefox users alike, and will have a major effect on add-on compatibility and permissions.
Holes found in Pocket Firefox add-on
Information security man Clint Ruoho has detailed server-side vulnerabilities in the popular Pocket add-on bundled with Firefox that may have allowed user reading lists to be populated with malicious links.
The since-patched holes were disclosed July 25 and fixed August 17 after a series of botched patches, and gave attackers access to the process running as root on Amazon servers.
Ruho says the bookmarking app functioned as an internal network proxy and subsequent poor design choices meant he could glean information on users including IP address data and the URLs customers saved for later reading. Adding redirects meant he gained access to the etc/passwd file.
- Mozilla’s self-destruct course continues: major add-on compatibility changes announced
Intel and Others Lead Massive New Funding Round for Mirantis
It was just last October that I put up a post noting that Mirantis, which has steadily remained a nimble player in the OpenStack cloud computing arena, had nailed down a massive $100 million Series B funding round led by Insight Venture Partners. The financing was billed then as the largest Series B open source investment in history.
- Intel backs OpenStack’s Mirantis with $100 million
Intel puts engineering and financial muscle behind OpenStack with $100m Mirantis funding boost
The OpenStack open-source cloud-computing platform stands to gain more enterprise features thanks to a major financial and engineering deal between Intel and Mirantis.
- Intel and Others Lead Massive New Funding Round for Mirantis
LibreOffice 5.0 and Microsoft Office 2013 Full Comparison
The latest LibreOffice 5.0 is out for some time and it looks like the feature parity with Microsoft Office 2013 is now a lot better. The official wiki from The Document Foundation that shows off the differences and similarities between the two office suites has been updated, and it paints a pretty accurate picture of the progress that’s being made.
LibreOffice-from-Collabora 4.4 introduces OOXML, PDF, and configuration management improvements
Today’s release of LibreOffice-from-Collabora 4.4 combines Collabora’s latest compatibility, deployment management, and document integrity features with a host of improvements from the LibreOffice community. Redesigned toolbars, menus, rulers, and dialogues make these powerful additions more attractive and efficient to use.
- LibreOffice 5.0 and Microsoft Office 2013 Full Comparison
Airbnb’s pricing algorithm and Aerosolve, its open-source machine learning tool
Dan Hill, product lead at Airbnb, wrote the company’s pricing algorithm after the British-based rival startup he cofounded, Crashpadder, was acquired by Airbnb, the short-term rental giant, a few years ago.
- Airbnb’s pricing algorithm and Aerosolve, its open-source machine learning tool
- Semi-Open Source
OpenSSH 7.1 Fixes Root Access Authentication Issue, Adds Better Support for WinSCP
OpenBSD, through Dave Wreski, announced the immediate availability for download of the first point release of the OpenSSH 7 and Portable OpenSSH 7 open-source SSH (Secure Shell) protocol 2.0 implementations.
- OpenSSH 7.1 Fixes Root Access Authentication Issue, Adds Better Support for WinSCP
- Project Releases
Open source part of Poland’s animal tracking project
Poland’s Agency for Restructuring and Modernisation of Agriculture (ARMA) wants to modernise its animal identification and tracking system. The new solution is required to use Zabbix, an open source solution for IT security monitoring.
- Open source part of Poland’s animal tracking project
- DataLook Hosts #openimpact to Encourage Replication of Civic Good Open Source Projects
Port of Rotterdam preparing for annual World Port Hackaton
On September 4-5, the Port of Rotterdam is to hold the third edition of what has now become its annual World Port Hackaton. Hackers, programmers, stakeholders and enthusiasts are invited to attend the two-day event and join the teams. Together they will work on concepts and prototypes that deploy new technologies and (open) data, aiming to strengthen the safety, sustainability and competitiveness of the port.
FPGAs get into open source virtual reality eco
Fully upgradable virtual reality headset, the Open-Source Virtual Reality (OSVR) Hacker Development Kit is now powered by Xilinx FPGAs. Buyers of this kit are provided with modules based platform, positioning and head tracking device, a display, and double lens optics.
- FPGAs get into open source virtual reality eco
Now anybody can create Ransomware using open source kit on GitHub
Ransomware are a pain for PC and laptop owners because they encrypt PCs/Laptop in return for a ransom which if not paid may permanently lock away users important folders like your images, word and excel files etc. However upto now the malware for Ransomware was only available on Dark Web, but that will change now thanks to a Turkish security researcher, Utku Sen.
- GitHub figures show huge rise in open source languages
- Most popular programming languages shift at Github
PHP 7 drops first release candidate
Faster PHP is approaching. PHP 7.0.0, which has been promoted as a much quicker upgrade to the server-side scripting language, has just gone into a release candidate stage, bringing its general availability even closer to fruition.
I’m writing a replacement for libthread_db. It’s called Infinity.
We’re still catching up to Perl
That’s from a great little article by Chromatic about modern Perl in the latest issue of PragPub. The article goes in to discuss a number of other strengths of Perl, such as its strong community dedication to testing across numerous architectures, services for understanding package dependencies (that sound like they go beyond anything presently available for Ruby), and legendary standards of documentation.
- Now anybody can create Ransomware using open source kit on GitHub
Government seeks open standards feedback
The government has launched a consultation on how best to proceed with several open standards proposals that will support inter-connected systems and more cost efficient digital transformation across Whitehall.
UK launches its next OGP Action Plan
Open policy making, Open Data and international cooperation are three pillars that UK Minister for the Cabinet Office Matt Hancock wants to be included in the 2015 UK Action Plan, according to a speech given by the minister to mark the launch of a new Open Government Partnership (OGP) action plan (Transcript is accessible on the gov.uk website).
Flash is dying a death by 1,000 cuts, and that’s a good thing
Adobe’s Flash, hated the world over for slowing down computers, containing more holes in security than swiss cheese and stubbornly being the video carrier of choice until recently, is dying.
Video players are migrating to other systems, even if Microsoft’s Silverlight isn’t much better. HTML5-based video and animations are becoming mainstream, and uploaders and other more advanced web-based features can now be replaced with code that doesn’t rely on Flash.
Kill Flash? Be careful what you wish for
Back when Steve Jobs launched the first salvo in the war against Adobe Flash, declaring in no uncertain terms that the iPhone would never support the ubiquitous Web media framework, the anti-Apple crowd was much amused. No one is laughing now — least of all the many IT vendors that have built their management interfaces in Flash, for whom the death of Flash poses huge challenges.
At the time, Jobs seemed to be climbing out on a limb. But eventually, everyone came to see how painful it was to support Flash on mobile devices, and how much better HTML5 was at delivering the same basic functionality. Developers began skipping over Flash and going with alternative technologies so that they could support mobile and desktop clients with the same codebase.
- Government seeks open standards feedback
Why developers have more power than you think
Jeff Lawson is a walking, talking example of the rise of the developer.
Today, he’s the CEO of API economy darling Twilio, a cloud platform that offers API-accessible telecom services to marquee customers like Home Depot and Uber. But 20 years ago, he was another computer science student who saw the power of the Internet and wanted to try his hand at building Web applications.
My Network Go-Bag
I often get teased for taking so much tech hardware with me on trips—right up until the Wi-Fi at the hotel, conference center or rented house fails. I’m currently on vacation with my family and some of our friends from Florida, and our rental home has a faulty Wi-Fi router. Thankfully, I have a bag full of goodies for just this occasion.
- My Network Go-Bag
Pesticides in paradise: Hawaii’s spike in birth defects puts focus on GM crops
Local doctors are in the eye of a storm swirling for the past three years over whether corn that’s been genetically modified to resist pesticides is a source of prosperity, as companies claim, or of birth defects and illnesses
- Pesticides in paradise: Hawaii’s spike in birth defects puts focus on GM crops
Linus Torvalds: Security is never going to be perfect
One of the best kept secrets at this week’s LinuxCon was the presence of Linus Torvalds. I’ve never not seen Linus at any of the LinuxCons I’ve attended since 2009, whether in Europe or North America, but no matter who you asked, the answer was, “He’s not here.” This morning, though, a little bird sang that the surprise guest for the upcoming keynote was none other than Torvalds.
Linux Foundation to Launch New Security-Focused Badge Program for Open-Source Software
During the LinuxCon and CloudOpen events that took place last week in Seattle, North America, Linux Foundation’s Core Infrastructure Initiative announced that they were developing a new free Badge Program and that they wanted to know the open source community’s opinion on the matter.
Securing the Internet: Let’s Encrypt to release first security certificates September 7
Some days it seems like the Internet is about as secure as an over-filled diaper. There’s always crap leaking from seamy businesses, such as Ashley Madison; the Federal government, OPM and IRS; and even security companies like LastPass. One of the weakest security links is the connection between you and unsecured web sites. Now almost a year since it was proposed, Let’s Encrypt is almost ready to enable any Internet site to protect its visitors with free Transport Layer Security (TLS) certificates.
- Security advisories for Monday
- John McAfee: McAfee antivirus is one of the worst products on the planet
Highway to hack: why we’re just at the beginning of the auto-hacking era
Imagine it’s 1995, and you’re about to put your company’s office on the Internet. Your security has been solid in the past—you’ve banned people from bringing floppies to work with games, you’ve installed virus scanners, and you run file server backups every night. So, you set up the Internet router and give everyone TCP/IP addresses. It’s not like you’re NASA or the Pentagon or something, so what could go wrong?
That, in essence, is the security posture of many modern automobiles—a network of sensors and controllers that have been tuned to perform flawlessly under normal use, with little more than a firewall (or in some cases, not even that) protecting it from attack once connected to the big, bad Internet world. This month at three separate security conferences, five sets of researchers presented proof-of-concept attacks on vehicles from multiple manufacturers plus an add-on device that spies on drivers for insurance companies, taking advantage of always-on cellular connectivity and other wireless vehicle communications to defeat security measures, gain access to vehicles, and—in three cases—gain access to the car’s internal network in a way that could take remote control of the vehicle in frightening ways.
In addition to unforgettable life experiences and personal growth, one thing I got out of DEF CON 23 was a copy of POC||GTFO 0×08 from Travis Goodspeed. The coolest article I’ve read so far in it is “Deniable Backdoors Using Compiler Bugs,” in which the authors abused a pre-existing bug in CLANG to create a backdoored version of sudo that allowed any user to gain root access. This is very sneaky, because nobody could prove that their patch to sudo was a backdoor by examining the source code; instead, the privilege escalation backdoor is inserted at compile-time by certain (buggy) versions of CLANG.
- Linus Torvalds: Security is never going to be perfect
Two planes crash at Swiss airshow
Two light planes have crashed at an airshow in Switzerland, killing one of the pilots.
Swiss police said they were two of three C-42b aircraft from Germany, flying in formation. They crashed after they touched in mid-air on Sunday morning.
America as the Neo-British Empire
For some writers, imperial freedom floats all boats (and not just the capitalists’). They thank hegemonic powers for liberalism itself, asserting that imperial naval (or air) power deployed overseas leaves domestic liberalism unharmed. By contrast, standing armies are said to threaten domestic liberty. Yet embracing imperial means, we might expect very thin liberalism indeed; with Machiavelli’s “republic for increase” walking the earth, we might at least speak frankly of “free trade imperialism.”
French train gunman ‘dumbfounded’ by terrorist tag
French Interior Minister Bernard Cazeneuve said on Saturday there had been “several shots” before the Moroccan was subdued by the passengers, who included three Americans.
North, South Korea reach agreement to ease tensions
North and South Korea reached agreement early on Tuesday to end a standoff involving an exchange of artillery fire that had pushed the divided peninsula into a state of heightened military tension.
Under the accord reached after midnight on Tuesday morning after more than two days of talks, North Korea expressed regret over the recent wounding of South Korean soldiers in a landmine incident and Seoul agreed to halt anti-Pyongyang propaganda broadcasts, both sides said.
- Two planes crash at Swiss airshow
Prof. Wolff speaks to RT News about Soros coal investment
Prof. Wolff joins RT News to discuss Soros coal investmens. Billionaire philanthropist George Soros has invested more than $2 million in US coal giants Peabody Energy and Arch Coal despite having once called the coal industry the “lethal bullet” of climate change.
Greenland’s fastest-melting glacier may have just set a terrifying new record
It’s a well-worn truth of our current, globally warming times that the glaciers are melting, but Greenland’s Jakobshavn Isbrae glacier is putting the rest to shame. The glacier, already one of the world’s fastest-melting, just lost what may have been its biggest chunk of ice to date.
- Professor Richard Wolff talks about Divestment from Fossil Fuels on Climate Jam
- Prof. Wolff speaks to RT News about Soros coal investment
Did Tim Cook Violate Regulation “Fair Disclosure” By Emailing Jim Cramer To Save AAPL Stock This Morning
Earlier today, as AAPL stock was plummeting and had lost a whopping $75 billion in market cap, dropping as low as $92/share, CNBC’s Jim Cramer pulled a rabit out of a hat, or in this case a previously undisclosed email out of his inbox.
- Carnage: Worst Week For Stocks In 4 Years, VIX Soars Most Ever
Police detain nine protesters at anti-austerity demonstration
A demonstration in Helsinki opposing the current government’s proposed cuts to social services drew thousands of people on Saturday. Although the Helsinki Police say the event proceeded peacefully, they detained nine people that were blocking roads and refused to make way for traffic even after the march had reached its final destination.
Prof. Wolff on Follow The Money Daily
Prof. Wolff discusses with Jerry Robinson the dark side of capitalism on Follow The Money Daily podcast.
Quality of life: German government engages in dialogue with citizens
This global public consultation, initiated by the German government, started in April 2015. It aims at creating a national dialogue on the quality of life in Germany. “The German government aims to identify yardsticks that can be used to pinpoint the many different facets of the quality of life”, according to a statement on the government website. Now members of the government are directly participating in the debate.
Markets ‘Black Monday’: China panic grips investors, rouble collapses and stocks undergo selling “bloodbath” – live
Chinese market suffer worst day in eight years and Russia’s rouble falls to all time low in chaotic trading which has seen more than €5 trillion off global stocks in two weeks
China stocks: Black Monday sees shares slump 8% as panic spreads to Europe and US
The Chinese market slumped 8.45 per cent on Monday trading as a terrifying selloff raised fears that Black Monday could spread to European and US markets.
The Shanghai Composite index, China’s most important index of shares, dropped 8.45 per cent, erasing gains made this year, while the tech-focussed Shenzhen Composite also slid 7.6 per cent.
Bank and energy stocks were worst hit, but the falling price of commodities such as oil and gas has also weighed on markets.
FTSE plunges below 6,000 on China’s ‘Black Monday’
The FTSE fell below 6,000 for first time since 1 January 2013 as the meltdown in China accelerated with the Shanghai composite crumbling by 8.5%.
- Bitcoin Price Slumps Following Bitfinex Outage
- Did Tim Cook Violate Regulation “Fair Disclosure” By Emailing Jim Cramer To Save AAPL Stock This Morning
Paul Haggis: ‘shame on’ press for not asking Tom Cruise about Scientology
The Oscar-winning director of Crash, who left the church in 2009, has criticised journalists for failing to address the Mission: Impossible star’s beliefs
Wall Street rattles Washington
The stock market closed a wild Monday with the Dow Jones industrial average down over 500 points, setting off fresh fears about the health of the global economy.
The Wall Street drama quickly spread to the 2016 campaign trail and Washington, as flashbacks to the 2008 financial crisis drew responses from the political world.
Renewed concern about the strength of China’s economy kicked off a brutal opening, as the Dow opened down more than 1,000 points in the first minutes of trading. While the index largely erased those gains later in the day, it still ended Monday down 588 points, adding to large losses suffered the two days prior.
Jeremy Corbyn: Personal attacks by Gordon Brown and Labour grandees are ‘pathetic’
Labour leadership candidates quizzed on BBC 5 live, Andy Burnham accused of making sexist remark and Yvette Cooper attacks Jeremy Corbyn
- Paul Haggis: ‘shame on’ press for not asking Tom Cruise about Scientology
Twitter shuts down 30 sites dedicated to saving politicians’ deleted tweets
Twitter has shut down a network of sites dedicated to archiving deleted tweets from politicians around the world. The sites — collectively known as Politwoops — were overseen by the Open State Foundation (OSF), which reported that Twitter suspended their API access on Friday, August 21st. Twitter reportedly told the OSF that its decision was the result of “thoughtful internal deliberation and close consideration of a number of factors,” and that the social media site didn’t distinguish between politicians and regular users.
Twitter cuts off Diplotwoops and Politwoops in all remaining 30 countries
On Friday night, August 21, Open State Foundation was informed by Twitter that it suspended API access to Diplotwoops and all remaining Politwoops sites in 30 countries. After Twitter suspended API access for the US version of Politwoops for displaying deleted tweets of US lawmakers on May 15, Open State Foundation was still running Politwoops in 30 countries, including the European parliament.
Malaysia considers forcing news websites to register with gov’t, as political scandal unfolds
Malaysia’s new Communications and Multimedia Minister has proposed amending the country’s Internet laws to force news websites to register with the government. Human rights groups have been quick to denounce the proposal as a threat to free speech.
Come on, how did the Air Force screw up ‘loose tweets sink fleets?’
Hey, remember when this designer made a whole bunch of amazing internet-themed World War II propaganda parodies? Well, one of those just cropped up in the actual military, albeit not for the first time. In an online bulletin earlier this month, the US Air Forces Central Command repurposed the iconic “loose lips sink ships” slogan to warn service members about the potential dangers of social media. As you might have guessed from the photo above, it’s now “loose tweets destroy fleets.”
- Russia threatens to ban Wikipedia
- Twitter shuts down 30 sites dedicated to saving politicians’ deleted tweets
Amazon.com will stop accepting Flash ads on September 1
Amazon has decided to stop accepting Adobe Flash ads starting next month. The move, which goes into effect on September 1, affects not just the company’s website, but its whole advertising platform.
Police secretly track cellphones to solve routine crimes
The crime itself was ordinary: Someone smashed the back window of a parked car one evening and ran off with a cellphone. What was unusual was how the police hunted the thief.
Detectives did it by secretly using one of the government’s most powerful phone surveillance tools — capable of intercepting data from hundreds of people’s cellphones at a time — to track the phone, and with it their suspect, to the doorway of a public housing complex. They used it to search for a car thief, too. And a woman who made a string of harassing phone calls.
In one case after another, USA TODAY found police in Baltimore and other cities used the phone tracker, commonly known as a stingray, to locate the perpetrators of routine street crimes and frequently concealed that fact from the suspects, their lawyers and even judges. In the process, they quietly transformed a form of surveillance billed as a tool to hunt terrorists and kidnappers into a staple of everyday policing.
Canadians are suing Ashley Madison because a lack of prophylactic protection
A BRACE OF LAW FIRMS ARE BEHIND A class action lawsuit against Ashley Madison because it did not do enough to protect personal and private information.
The class action case, from two Canadian law firms, argues that the hookup stations failed users by not protecting their information and for not deleting it after a fee had been paid to ensure its deletion. It seeks $578m.
According to the New York Post the lawyers want some satisfaction for a cluster of punters who are currently wearing outraged expressions and regretting joining a site that does what it does in the way that it does it.
‘Security Was An Afterthought,’ Hacked Ashley Madison Emails Show
It’s already clear that, despite handling very sensitive data, Ashley Madison did not have the best security. Hackers managed to obtain everything from source code to customer data to internal documents, and the attackers behind the breach, who call themselves the Impact Team, made a mockery of the company’s defenses in an interview.
- Amazon.com will stop accepting Flash ads on September 1
- Bernie Sanders: The Vox conversation
- [Old] Russia begins blacklisting ‘undesirable’ organizations
The Crackdown On NGOs In Russia
In early March, Russian prosecutors launched spot inspections of nongovernmental organizations (NGOs) across the country. Hundreds of groups have already been targeted, from human rights NGOs to environmental groups to health-care associations. Formally, prosecutors are checking compliance with a new law forcing organizations that receive foreign funding and are deemed to engage in “political activity” to register as “foreign agents” — a derogatory term that critics say aims to stigmatize NGOs. Russian authorities say the legislation, which entered into force in November 2012, aims at increasing the transparency and accountability of NGOs. But the audits have drawn international condemnation and raised fears of an unprecedented crackdown on civil society. The number of NGOs subjected to such inspections is difficult to assess due to the absence of an official registry. Most are still waiting for the inspection findings. RFE/RL is closely monitoring developments and will regularly update this chart and map.
How Moscow came to embrace fringe anti-Western conspiracy theories
Black’s interest in the air traffic controller is not insignificant: testimony by “Carlos the Spanish air traffic operator” is one of the earliest versions of the MH17 catastrophe touted by RT and other Kremlin-aligned media, which were immediately exposed as fake. There’s no evidence that WikiSpooks is Kremlin-funded or in any way aligned, but its motivation is explicitly expressed in their mission statement: any fact promoted by the “official narrative” via the “commercially-controlled media” is inherently false and must be disputed. Hence, to WikiSpooks and other similar websites, the position that Russia or Russia-backed rebels shot down MH17 is false simply because it is endorsed by the American government and must be confronted, even if it leads to a jumble of contradictory versions of the same event, based on spurious evidence.
Once, firms cherished their workers. Now they are seen as disposable
…big companies offered paid holidays, guaranteed pensions related to your final salary, sickness benefit and recognised trade unions. Above all, they offered the chance of a career and personal progression…
Sai Gets FOIA Docs On The TSA
Lisa Simeone posts at TSA News Blog on some of what’s been revealed through the docs released in the request by Sai, “an intrepid, indefatigable young man.” As Simeone writes, “He has been forced to tangle with the TSA more than once, when the agency’s workers have bullied, harassed, and illegally detained him.” Chasing illegal movie downloaders proves an unprofitable exercise
Google joins Facebook in trying to prevent IAMAI from taking strong anti-Zero Rating stand
Google joined hands with Facebook to try and prevent the Internet and Mobile Association of India, which represents some of the largest Internet companies in India, from taking a stand that counters Zero Rating. According to emails exchanged between IAMAI’s Government Relations committee members, of which MediaNama has copies, Vineeta Dixit, a member of Google’s Public Policy and and Government Relations team, strongly pushed for the removal of any mention of Zero Rating from the IAMAI’s submission, as a response to the Department of Telecom’s report on Net Neutrality. Please note that Google hasn’t responded to our queries, despite multiple reminders.
- Google joins Facebook in trying to prevent IAMAI from taking strong anti-Zero Rating stand
Two Danes face up to six years in jail for explaining how to use Popcorn Time
Danish police have arrested two men alleged to be the operators of sites related to the open-source program Popcorn Time, which adds a user-friendly front-end to a BitTorrent client to make the whole process of finding, downloading, and viewing video torrents extremely simple. The two domains, Popcorntime.dk and Popcorn-time.dk, have now been shut down, but copies on the Wayback Machine show that both were merely information sites, and neither offered material that infringed on copyrights, nor any version of the Popcorn Time software itself. Both sites warned users about potential copyright infringement issues.
The men are accused of “distributing knowledge and guides on how to obtain illegal content online,” as TorrentFreak reports, and have apparently pleaded guilty. Moreover, distributing information is considered such a serious violation of Danish copyright law that “they could face punishment under section 299b of the penal code—offenses which carry a maximum prison term of six years.” That seems an extraordinarily harsh and disproportionate upper limit for merely explaining how to use a program, just because copyright is involved in some way.
A similar case has already been heard in the UK, where it was found that sites offering downloads of the Popcorn Time software contributed to the copyright infringement that results from its use. In April of this year, the English High Court ordered a number of sites to be blocked for this reason. However, in that case the sites enabled the program to be downloaded directly, whereas in Denmark, the accused simply offered basic information about how the software worked and could be used, together with links to other sites where the program could be obtained.
Former Megaupload User Asks Court to Return His Files
Millions of users lost access to their personal files when Megaupload was raided, and after nearly four years their files are still stashed away in a Virginia warehouse. The company that owns the servers wants to get rid of them, so former Megaupload user Kyle Goodwin has once again asked the court if he can have his files back.
Chasing illegal movie downloaders proves an unprofitable exercise
It has been a bad week for companies wanting to build businesses around make money from illegal movie downloaders. Last Friday saw an Australian judge refuse Voltage Pictures the rigth to send downloaders of Dallas Buyers Club a letter demanding an undisclosed payment. Justice Nye Perram decided that Voltage and its lawyers, were engaging in “speculative invoicing”, a practice that is a form of legal blackmail: “pay us a large enough sum so that we don’t take you to court where you will possibly face an even larger but unspecified fine”.
Will Australian Government Use Cost-Benefit Analysis To Kill Off Fair Use Proposal Once And For All?
Discussions about copyright reform in Australia are now entering their fourth year, and the longer they go on, the worse the proposals become. That’s in part because there has been a change of government in the interim, and the present Attorney-General, George Brandis, has made it clear he’s firmly on the side of copyright companies, and indifferent to the Australian public’s concerns or needs in a digital world.
This Anti-Piracy Campaign Will Leave You Speechless
Anti-piracy campaigns come in all shapes and sizes and usually aim to prod the public into action. To capture the imagination they are often provocative, but just how far is too far? A new campaign for Virgin Radio is currently testing those boundaries to an extent rarely – if ever – seen before.
- Two Danes face up to six years in jail for explaining how to use Popcorn Time
Sabine Pfeiler and Otto Seidl Should Take Note as Russia — Like China — is in the Process of Banning Microsoft Windows for Security Reasons
Strapping NSA back doors onto Munich oughtn’t be an option
Summary: A look at a strange suggestion, signed by Sabine Pfeiler (above) and Otto Seidl, who suggest going back to Microsoft which is basically a spyware company now
THE enormous long-term cost of Microsoft Windows, deferred and inevitably incurred due to blackmail and espionage (possibly more expensive then dealing with script kiddies/crackers alone), was detailed in the previous post. No nation other than the US (not even other Five Eyes nations) should procure proprietary software from the United States. Britain has just repeated this error  and some Microsoft fans in Germany apparently want to revert back to making this error, having already undone this error (dumping proprietary software, including Microsoft, in Munich).
We wish to start with some rather exciting news. Thankfully enough, Russia is now following China’s footsteps and may ban Vista 10 (China also banned Office in government, not just Vista 8, recognising that it’s a collective Trojan horse from the NSA). Last year or the year before that Russia had already taken first steps towards banning Windows by banning x86 in government (Wintel) and days ago it went further. Citing Russian media, Linux Veda writes: “The vice speaker of Russia’s State Duma, Nikolai Levichev, has written to Prime Minister Dmitry Medvedev asking for the Russian government to ban the use of Windows 10 amongst Russian civil servants. Levichev is concerned that Microsoft may allow US agencies to access data collected from Russian officials.”
Based on countless leaks from the NSA (many mention Russia by name), the above is undoubtedly being done. To think otherwise would be willful ignorance. Germany too is a target (political and industrial espionage), as recently demonstrated by Wikileaks, not just Snowden’s leaks and subsequent unattributed leaks.
It then leads us to our main topic, which is bogus stories from Microsoft propaganda sites, distorting the stories that were originally published in Germany about a week ago. We have a misleading headline about just two people, making them sound like the whole city of Munich. These people are Sabine Pfeiler and Otto Seidl.
Microsoft propaganda sites will latch onto anything and anyone, as they have been doing for years, never leaving Munich alone because it has become an embarrassment to Microsoft and a winning example/trophy for GNU/Linux on the desktop. What Microsoft does in Munich right now is definitely not sitting on its hands and accepting defeat. There is lobbying that is difficult for outsiders to see, but evidence occasionally comes out, as we have shown here over the years (we wrote dozens of articles about this). Partner companies, not just moles or lobbyists, are involved in this. Munich is constantly under attack.
A European reader of ours helped us understand what is happening in Munich right now. “Two ‘softers,” he said, is what it boils down to. “Annoying that they get any press at all. [...] it does look like only two ‘softers and not two independent people. More can be done to bring up the games that Microsoft continues to play against competitors, especially FOSS. Too many are falling for that “another chance” tactic, one that’s been used every few years for decades.”
We tried to find out more, for instance anything suspicious in the professional background of the troublemakers. Microsoft recently blackmailed members of the British Parliament, as it had previously done in Norway and other places (if you do what we say, we’ll do this thing for your area, but if you don’t, we’ll punish you). There are plenty of bribes and blackmail examples; Microsoft is full of those.
Our reader tracked down the original PDF. It is signed by these two people:
Sabine Pfeiler, Stadtrat
Otto Seidl, Stadtrat
“Your German is certainly better than mine,” said the reader, “but there are probably these two. They’re both in office through 2020. The main argument that the laptops have no programs for text editing, Skype, Office etc does not hold water. LibreOffice and even nasty ol’ unsafe Skype are available for GNU/Linux on x86, though the latter has not been approved by the IT dept there. But the Tech Republic article does say they are using Intel processors and that LibreOffice is on them.
“Seidl had in 2014 defended LiMux against mayor Dieter Reiter and Josef Schmid. However, I think that something is fishy, but cannot find anything with just a cursory search.”
“Microsoft just remotely modifies Vista 10 and won’t explain how, why, and when.”Vista 10 is an unacceptable risk, especially for government, and German has been more strict than most nations about digital control over its computing (even UEFI 'secure boot' is verboten). Vista 10 can add back doors, bug doors, delete files, add files etc. and it won’t even tell the user. We covered this the other day, noting that RMS (Richard Stallman) was right all along. This is why Microsoft will consider doing almost anything (even blackmail and bribes) to get its way here, enabling the Trojan horse to slip inside the whole of Germany. The NSA would certainly like for this to happen.
According to Manish Singh, “[i]f you’re having trouble deciphering what exactly Microsoft is bundling in Windows 10 updates, it is not your fault. Moreover, it is about to get worse. Microsoft has confirmed that it might choose to not offer a detailed changelog with new Windows 10 updates.”
Microsoft just remotely modifies Vista 10 and won’t explain how, why, and when. It is virtually as though one’s own computer is rented or leased. Even the British media took note. Simon Sharwood spoke to Microsoft and then reported that “Microsoft has explained its policy about how much information it will offer on the content of Cumulative Updates to Windows 10.”
Remember that for most users it will be impossible to even deny automatic updates. Microsoft Peter, not only Microsoft sceptics, reminds us right now that Microsoft has no plans to tell us what’s in Windows patches. Vista 10 already has back doors (and worse, it turns networks into botnets), but the point is, additional ones can be added at any time, silently. What would happen at times of war? Germany simply mustn’t consider going back to Windows and more cities should now follow Munich’s lead, maybe adopting much of the same Free software that Munich developed over the years.
Have politicians actually been following what’s happening right now? BND collusion with the NSA makes it simpler to blackmail German politicians, this we know for sure… █
Related/contextual items from the news:
UK government signs new deal with Oracle
The UK’s Crown Commercial Service (CCS) yesterday revealed that it would be teaming up with software giant Oracle, in a three-year partnership which will see the two collaborate to deliver services to public sector bodies including the National Health Service (NHS).
Just weeks after the government announced that it would be cutting back on its use of Oracle software, the new deal instead extends the existing agreement signed in 2012 and aims to bring new cost-saving solutions. The CCS has promised the that the signing of the Oracle memorandum of understanding (MoU) will “deliver additional savings for the taxpayer.”
“Our products just aren’t engineered for security.”
–Brian Valentine, Microsoft executive
Summary: Another news overview, detailing high-profile examples of high-cost Windows deployments (including the cost of litigation and settlement)
THE “IRS hack [is] far larger than first thought,” according to this new report. It’s no secret that the IRS is a Microsoft Windows shop (which was warned about security breaches as far back as 6 years ago), so it makes one wonder if Windows was to blame here, as in the OPM breach, the Sony breach, and most recently the Ashley Madison breach (not to mention Stuxnet in Iran). Based on our information, all these high-profile breaches one way or another involve Microsoft reliance. The corporate media failed to call out Windows, but a little bit of research often helps boil it down to Microsoft’s NSA-accessible (through back doors) platforms.
“The parent company can now be sued into bankruptcy. It’s the (hidden) high cost of Windows.”Below is a new story which shows how Argentina targets  a large number of dissidents for surveillance using a fake “confidential document [that] was intended to infect a Windows computer.” GNU/Linux users needn’t worry about such things. Then of course there is the latest high-profile breach, the one affecting tens of millions of members of Ashley Madison (including almost ten thousand members of the military, including high-ranked ones), some of whom are suing  (what’s the price of a failed marriage or blackmail?). The parent company can now be sued into bankruptcy. It’s the (hidden) high cost of Windows. According to , “Security Was An Afterthought” at Ashley Madison. Well, that’s quite evident. Ashley Madison is hardly even hiding it (DMCA rampage is not a substitute) and it has been made ever more obvious by the fact that they were using Microsoft Windows.
Microsoft and security are mutually exclusive, unlike Microsoft and insecurity. No secure application can be mounted on top of a base with back doors. It ought to be crystal clear after Snowden’s many revelations. █
Related/contextual items from the news:
Inside the Spyware Campaign Against Argentine Troublemakers
Alberto Nisman, the Argentine prosecutor known for doggedly investigating a 1994 Buenos Aires bombing, was targeted by invasive spy software downloaded onto his cellular phone shortly before his mysterious death. The software masqueraded as a confidential document and was intended to infect a Windows computer.
Canadians are suing Ashley Madison because a lack of prophylactic protection
A BRACE OF LAW FIRMS ARE BEHIND A class action lawsuit against Ashley Madison because it did not do enough to protect personal and private information.
The class action case, from two Canadian law firms, argues that the hookup stations failed users by not protecting their information and for not deleting it after a fee had been paid to ensure its deletion. It seeks $578m.
According to the New York Post the lawyers want some satisfaction for a cluster of punters who are currently wearing outraged expressions and regretting joining a site that does what it does in the way that it does it.
‘Security Was An Afterthought,’ Hacked Ashley Madison Emails Show
It’s already clear that, despite handling very sensitive data, Ashley Madison did not have the best security. Hackers managed to obtain everything from source code to customer data to internal documents, and the attackers behind the breach, who call themselves the Impact Team, made a mockery of the company’s defenses in an interview.
Why do you use Linux?
In the early 2000’s I had repurposed an older PC by installing an early version of Red Hat Enterprise Linux and enabling it as a file server, hosting both NFS and SMB. The computer ran well and gave me almost zero issues once it was fully configured. It ran 24/7 and unless we experienced power outages, it was never turned off. It is important to highlight that the system, upon boot, would only load in runlevel 3. In Red Hat speak, this equates to CLI only with networking support; that is, no GUI.
IBM partners with Linux in new mainframe push
Earlier this year, IBM launched the new z13 mainframe, its first in nearly three years. Bolstered by strong sales, the company is putting more of a focus on mainframes, partnering with Linux in a new strategy.
- IBM partners with Linux in new mainframe push
Some Features To Look Forward To With The Linux 4.3 Kernel
With Linux 4.2 hopefully being released this weekend, here’s a look at some of the features that are currently out on the horizon for likely merging into the Linux 4.3 kernel.
Linux about to gain a new file system – bcachefs
A five year old file system built by Kent Overstreet, formerly of Google, is near feature complete with all critical components in place. Bcachefs boasts the performance and reliability of the widespread ext4 and xfs as well as the feature list similar to that of btrfs and zfs. Notable features include checksumming, compression, multiple devices, caching and eventually snapshots and other “nifty” features.
Bcachefs is a new speed-focus Linux filesystem from Kent Overstreet
Bcache was first announced by ex-Google engineer Kent Overstreet a little over five years ago. Now the Linux kernel block layer cache is being used as the basis for a new open source filesystem. The focus is on speed, but it is also hoped that the file system could be used for servers and storage arrays because of its reliability.
- bcache grows into a full file system
- A New Linux File-System Aims For Speed While Having ZFS/Btrfs-Like Features
Linuxcon North America 2015: Linus Keeps it Real
The annual Linuxcon North America conference was once again highlighted by none other than Linux creator Linux Torvalds. Torvalds was not on the original scheduled for the event, rather he filled a slot originally identified as ‘surprise guest.”
Rather than the typical Linux kernel panel keynote where Torvalds has typically participated, Torvalds did a one on one question and answer ten minute session with Linux Foundation Executive Director Jim Zemlin. It’s a format that seemed to suit Torvalds well, though the questions ranged from the mildly technical to the personal.
The Linux Vendor Firmware Service Continues Maturing
The Linux Vendor Firmware Service (LVFS) continues maturing for making it easy for Linux users to update their system firmware/BIOS from the Linux desktop.
- Mesa 11.0 Has Been Branched, The Release March Begins
- Gallium Direct3D 9 Improvements Land For Mesa 11.0
- RadeonSI With OpenGL 4 Showing Nice Performance Against Catalyst
- Libinput 1.0 Nears Release With Its First RC Now Out The Door
- NVIDIA’s Current Pricing & Line-Up For The Maxwell Graphics Cards
- Gallium3D Gets A Hack So It Can Now Play BioShock Infinite
- Intel Scratches Another OpenGL ES 3.1 Item Off The List
- AMD Lands Fiji Support & Initial AMDGPU Scheduler For Linux 4.3
- NVIDIA’s GeForce GTX 950 Is A $150+ Bargain For Linux Gamers
- Intel Skylake HD Graphics 530 Performance On Linux
Libdrm 2.4.64 Brings Fixes For AMDGPU & Freedreno
Just days after the big libdrm 2.4.63 release that brought initial AMDGPU DRM support, version 2.4.64 of Mesa’s DRM library is now available.
Follow-Up Tests For DIRT Showdown On Linux With AMD vs. NVIDIA
In this article are more AMD vs. NVIDIA GPU tests on Ubuntu Linux for this game with slightly more demanding settings plus looking at the CPU and GPU utilization.
The Extreme Cases Where A NVIDIA GTX 950 Can Outperform An AMD R9 Fury On Linux OpenGL
Given the current state of the AMD Catalyst Linux driver, there exists games on Linux that will run with this closed-source Radeon driver but where the performance of a EVGA GeForce GTX 950 FTW that retails for $180 USD can exceed the performance of a AMD Radeon R9 Fury that sells for more than $550 USD. Here’s some of those cases where — given the current state of Catalyst on Linux — the OpenGL performance is so far down the gutter.
- Open-Source Performance-Per-Dollar Benchmarking
CS:GO & TF2 Benchmarks Updated For Linux
These games were left out since when setting up the test system for the assortment of AMD/NVIDIA graphics card tests, it turns out recent Team Fortress 2 and Counter-Strike: Global Offensive updates broke support for the pre-existing time demo tests. With the demos we’ve been using in all of the CS:GO/TF2 benchmarks for the past year or so, a recent update changed/removed some shaders and caused issues for these demos. Thus the tests failed to run.
- Interested In Linux Benchmarks Of The AMD “Carrizo” A8-7410?
BcacheFS vs. EXT4 vs. Btrfs vs. XFS vs. F2FS
Complementing the benchmarks from yesterday are some more results today with Bcachefs compared to EXT4, Btrfs, XFS, and F2FS with testing being done from the same Intel M.2 SSD as yesterday’s testing and using the same 4.1-based Bcachefs-dev kernel.
- Follow-Up Tests For DIRT Showdown On Linux With AMD vs. NVIDIA
- Some Features To Look Forward To With The Linux 4.3 Kernel
- Kdenlive Easy to use video editor for linux: Review [Install In Ubuntu, Fedora & Other Distros]
- Wine or Emulation
ET:Legacy 2.74 Released With Better Unicode Support, Lua 5.3
ET:Legacy is not available only for Linux gamers but also on OS X and Windows too. More details on this eight-month update to the open-source Enemy Territory can be found via ETLegacy.com.
- OSVR, Intel, and Xilinx! 1400 Linux ready games, and more open gaming news
- ET:Legacy 2.74 Released With Better Unicode Support, Lua 5.3
K Desktop Environment/KDE SC/Qt
- 2015 KDE Sprints Fundraiser
- digiKam | GSoC 15 the summary
- Marble Maps – Find your way and explore the world on Android!
(GSoC 2015) Merged in color space picking GUI.
So, after the Tangent Normal Brush was merged, Krita didn’t have any new releases because it was decided to do some major bugfixing. Which in turn means I haven’t had any bugreports yet.
GSoC ’15: A Summary
The next part of my summer was spent in understanding KDE terminology, how KDE software works, how to make KDE software work (pun intended), and understanding PackageKit by pinging a lot of people on IRC. After making a compilation of KDE documentation for myself and playing around with Frameworks 5 and Qt, I started working on making an application that would install a given package via PackageKit. This involved understanding the PackageKit API and also PackageKit-Qt, a Qt Wrapper for PackageKit. Building this application took more time than was estimated, but at the end of this exercise, I was pretty much well versed on using PackageKit and building a Frameworks application. This application has been put on KDE’s git repositories and would be helpful to anyone who’d want to do this exercise in the future.
- People you often write to
- GSoC 2015: Kdenlive Wrapping Things Up
- GSoC 2015 (add journald support to KSystemLog): report
Last year I went to Akademy with two notebooks and sharpies and asked people to draw or write about one thing they think would make KDE better. This year I did the same again. The question was: “What’s the one thing KDE should do to have more impact?” Here are some of the great results:
- Qt Creator 3.5 Released With Its New Scrollbars
- KDE Applications 15.08 Released With Kdenlive, Dolphin & More
Another KDE success story – the Incubator – Part 3
Continuing the series about KDE Incubator let’s hear how KXStitch went through the process. KXStitch was incubated early and quickly.
- K Desktop Environment/KDE SC/Qt
Google Rolls Out OnHub Router, Powered By Gentoo Linux
Google’s OnHub is a WiFi router that also has home automation support for their Nest products as well as support for devices using the Zigbee, ZWave, and Thread protocols. OnHub is designed to be easy to setup via a mobile app, its firmware is self-updating, and is optimized for today’s (largely streaming) web needs.
- Google Rolls Out OnHub Router, Powered By Gentoo Linux
New Manjaro Linux Spin Uses Solus’ Budgie Desktop and It Looks Grand – Gallery
While digging the Internet, we’ve found a new community spin of the ever-growing Manjaro Linux operating system, built around Solus Project’s simple, modern, and intuitive Budgie desktop environment.
- Arch-based Antergos Refreshed, Installer Overhaul
- New Manjaro Linux Spin Uses Solus’ Budgie Desktop and It Looks Grand – Gallery
Another big update in slackware-current
But the real interesting stuff is not just those sheer number of updated packages – it’s the new 4.1.6 Linux kernel, the gcc 4.9.3 compiler suite, glibc 2.22 C libraries, mesa 10.6.4, a new libepoxy package which was required to get glamor 1.0.0 into the xorg-server… exciting times for the adventurous who are running slackware-current!
- Another big update in slackware-current
Red Hat Family
Cisco, Red Hat create platform for IoT innovation
“We’re building a platform … so that people can consume on demand, as they need it, what they’re looking for,” said Chris Wright, chief technologist for Red Hat, Inc. Wright, along with Dave Ward, CTO of engineering and chief architect at Cisco Systems, Inc., joined theCUBE, SiliconANGLE Media’s production team, at OpenStack Summit Vancouver 2015 discuss the current Red Hat/Cisco partnership that aims to bring open source to the next level, making it a carrier-grade technology.
Red Hat Inc. (RHT) Falls 3.54% for August 21
One of the S&P 500’s big losers for Friday August 21 was Red Hat Inc. (RHT). The company’s stock fell 3.54% to $72.47 on volume of 1.27 million shares.
- Cisco, Red Hat create platform for IoT innovation
Debian-Based Q4OS 1.2.8 Live Distro Released with Redesigned Setup Utility, Bugfixes
The Q4OS Team sent an email to Softpedia HQ a few minutes ago informing us about the availability of the Q4OS 1.2.8 ‘Live’ operating system, a release that introduces a revamped Setup utility and fixes several annoying issues reported by users.
Quickest path to a local apt repository
As I’m writing this, DebConf 15 is coming to an end. I spend most of my time improving the situation of the Haskell Packages in Debian, by improving the tooling and upgrading our packages to match Stackage 3.0 and build against GHC 7.10. But that is mostly of special interest (see this mail for a partial summary), so I’d like to use this post to advertise a very small and simple package I just uploaded to Debian:
Canonical is letting the Ubuntu Software Center wither and die
The Ubuntu Software Center is withering away.
Canonical has silently discontinued the paid app store without informing developers, Ubuntu flavors are dropping it, and free software enthusiasts aren’t happy with it. It’s still fine for installing free software from Ubuntu’s software repositories—but it can be slow and clunky even for that.
You Can Now Run Linux Kernel 4.1.6 LTS on Ubuntu or Linux Mint, Here’s How
It’s been a while since we’ve heard from Black Lab Software’s Linux kernel enablement kit for Black Lab Linux and Ubuntu-based operating systems, but today we have been informed by Roberto J. Dohnert that the kernel 4.1.6 Update Kit has been released.
Canonical Updated Firefox On All The Supported Ubuntu Systems
Most likely, Canonical has forgot to replace Yahoo with Google as the default search engine, the Firefox browser for other platforms using Yahoo.
- The Ubuntu Touch OTA-6 Update May Be Delayed
- Canonical is letting the Ubuntu Software Center wither and die
- Debian-Based Q4OS 1.2.8 Live Distro Released with Redesigned Setup Utility, Bugfixes
- Gentoo Family
- BlackBerry’s Android device one step closer to reality
Blackphone 2 due for September release
Like the last device, Blackphone 2 will come with Silent OS, an Android-based ROM which has features like Spaces to help separate work life and personal life securely where no data is shared between the two. The ROM also features Security Center which allows configuration of spaces, management of apps in each space and fine tuning of permissions that apps have.
- Android 5.1.1 Lollipop Update For Motorola Moto G 1st Gen, Moto G 2nd Gen, Moto G 3rd Gen, Moto E 2013, Moto E 2014?
- Google Maps for Android has an awesome new feature – download the update right now
- WhatsApp 2.12.244 Download Available For Android – Top Tricks and Bug Fixes
- HTC One M9, Samsung Galaxy S6 and S6 Edge+ With Android 5.1 Lollipop Update
6 reasons to get excited for Android 6.0 Marshmallow
Expected to arrive in late 2015, the latest update to Android promises great new features and enhancements. Here are the top reasons to get excited about the new Android.
- Mozilla to beef-up Firefox private browsing capability
Firefox goes stealthy, Linux on mainframes, new Linux Foundation projects, and more news
Most modern web browsers let you surf in incognito or private mode, which ensures websites you visit aren’t saved in your browser history. But that doesn’t offer true anonimity—as Google Chrome warns: “Going incognito doesn’t hide your browsing from your employer, your internet service provider, or the websites you visit.”
Mozilla’s trying to change that with a truly private browsing mode for Firefox. According to PC World, this new feature “is designed to block outside parties like ad networks or analytics companies from tracking users through cookies and browser fingerprinting.” This feature is still in the pre-beta phase. While it’s available in the latest developer editions of Firefox, this feature will likely show up in a general release of the browser sometime in the near future.
- Mozilla To Make Add-Ons Use WebExtensions API, Compatible With Chrome
- Mozilla’s Servo Is Now Rendering Phoronix, Except For One Big Bug
- Mozilla’s Servo Engine Now Capable Of Rendering GitHub Near Flawlessly
DragonFlyBSD’s Radeon Code Catches Up To The Linux 3.17 Kernel
François Tigeot, the developer that’s been prolific in porting the DRM/KMS code from Linux to DragonFlyBSD, now has the Radeon DRM code matching that of the Linux 3.17 kernel.
- LLVM Becomes A 501(c)(3) Non-Profit
- LLVM 3.7 Is Very Close To Release
- DragonFlyBSD’s Radeon Code Catches Up To The Linux 3.17 Kernel
- GCC Developers Might Finally Switch Over To Using Git
The GCC Developers May Move The Development From SVN To Git
At the GNU Tools Cauldron 2015 in Prague, the developers have announced that they are thinking of switching to Git as the default version control system. A mailing list has been created and the developers have started asking questions.
Go 1.5 is released
Today the Go project is proud to release Go 1.5, the sixth major stable release of Go.
- Go 1.5 Released, Its Compiler Toolchain Is Now In Go
- Confessions of an Open Source Developer
- PHP 7.0 RC1 Released, PHP 7 Final Comes Closer
- Facebook’s HHVM 3.9 Has More Speed Improvements For PHP & Hack
- Go 1.5 is released
Met Office loses BBC weather forecasting contract
The Met Office has lost its BBC weather forecasting contract, it has confirmed.
The UK’s weather service has provided the data used for BBC forecasts since the corporation’s first radio weather bulletin on 14 November 1922.
The BBC said it was legally required to secure the best value for money for licence fee payers and would tender the contract to outside competition.
The Obama Administration Damages American Interests In Blocking China’s Anti-Corruption Efforts
Sometimes it is hard to find words even to describe, let alone to explain, the Obama administration’s consistently gauche, blundering, even self-damaging policy decisions and actions toward China.
A Guide to Chinese Intelligence Operations
From government hacks to industrial theft, Chinese intelligence operations are making more headlines now than ever before.
Obama Administration Warns Beijing About Covert Agents Operating in U.S.
The Obama administration has delivered a warning to Beijing about the presence of Chinese government agents operating secretly in the United States to pressure prominent expatriates — some wanted in China on charges of corruption — to return home immediately, according to American officials.
- U.S. warns China about its secret hunt for fugitives [Ed: syndicated from the above]
Josef Stalin’s daughter was a ‘spiritual orphan’
Svetlana Alliluyeva, Josef’s Stalin’s daughter, led a remarkable, if extremely ruptured, life. Her mother, Nadezhda, died in 1932 when Svetlana was 6, likely through suicide. Her father, the brutal dictator, had no compunction about sending Svetlana’s close relatives to the gulag. Her half-brother, Yakov, died in a German prisoner-of-war camp in 1943. Her other brother, Vasili, died an alcoholic. She married four times and died as Lana Peters in 2011, at age 85. In 1967, when Svetlana defected to the United States, she left her two children behind in Russia. Her story is vividly told by Rosemary Sullivan — who has also written biographies of Margaret Atwood and Gwendolyn MacEwen — in Stalin’s Daughter: The Extraordinary and Tumultuous Life of Svetlana Alliluyeva. Our conversation has been edited for length.
Carly Fiorina out of step with Silicon Valley
Fiorina is “wrong on the social issues as well as a lot of technology issues” and is “culturally not aligned with the ethos in the Valley,” on top of the fact that “there are also a lot of people who have negative impressions of her” from HP, said Jim Ross, a Democratic consultant in the tech hub of San Francisco.
Carson: Slavery informed my views on abortion
Former pediatric neurosurgeon Dr. Ben Carson said Sunday that the fight to abolish slavery influenced his views on abortion.
Carson was asked about a 1992 ad on abortion on CNN’s “State of the Union.” Carson had originally taken a pro-life position on a Maryland abortion referendum, but then appeared in an ad taking back his previous statement and merely asking voters to be educated on the issue before voting.
Carson said that 20 years ago, “I personally was against abortion, but I was not for causing anybody else to do anything.”
“I’ve changed, because I’ve learned a lot of things,” said Carson. “I began to think about if abolitionists … had said ‘I don’t believe in slavery, but anybody else can do it if they want to,’ where would we be today? So that changed my opinion.”
- Carson: Slavery informed my views on abortion
Chilling Artwork ‘Shoots’ Gallery-Goers From Above in Tandem to US Drone Strikes
Now, Los Angeles-based artist Jonathan Fletcher Moore has taken that data and created an interactive installation titled Artificial Killing Machine that visualizes the attacks in real time.
- Pentagon to Sharply Expand U.S. Drone Flights Over Next Four Years
Obama Administration to Increase Drone Flights 50 Percent
The increase in drone flights will give the military more intelligence access as well as increase its firepower, which is needed to take on hot spots around the world, a senior defense official told The Wall Street Journal about the upcoming plan.
- Pentagon to expand drone killing program
- US military to step up drone flights by 2019
- Pentagon increasing drone flights by 50% to meet demand for air strikes and global surveillance
- The Pentagon is planning 50 percent more drone flights by 2019
- Pentagon To Increase Unmanned Drone Flights Across The Globe By 50 Percent
- US military to step up drone flights by 2019
- Carson: Don’t use drones to kill at border
- Carson calls for drone strikes on border ‘caves’
- Ben Carson: ‘In No Way Did I Suggest Using Drones To Kill People’ Along The Border
- Carson says wants drones to blast caves, not people at U.S.-Mexico border
- U.S. Military To Privatize, Expand Drone Use In African War Zones
- Turbulence in Pentagon plans to expand drone flights
- Editorial: More eyes in the skies
- Why we fact-check political cartoons
- Covering Cuba, from Sarasota
Moral Theory and Drone Warfare: A Literature Review
“Legal, ethical, and wise”: these are the three adjectives that the Obama administration has used again and again to describe its program of conducting targeted killings by drone strikes. John Brennan, then the White House’s counterterrorism advisor, used the phrase to justify the drone program in a speech at the Wilson Center in April 2012. Almost a year later, Press Secretary Jay Carney invoked the same phrase in defense of the leaked Department of Justice White Paper on the permissible targeted killing of a U.S. citizen and senior Al Qaeda in the Arabian Peninsula operative who posed an imminent threat.
Predator Drone Maker Flying Spy Missions For the Pentagon
The U.S. military wants to boost its drone presence by 50 percent in four years, and it’s hiring help. General Atomics, maker of the ubiquitous Predator and Reaper drones, began flying intelligence missions for the Defense Department this month.
- Drone Manufacturer Has Been Flying Spy Missions For Defense Since Early August
The Former US Military Top-Brass Working for Companies Profiting from Drone Warfare
Generals and other top military staff who ran the US “Drone Wars” in the Middle East now work for the top drone firms, with lucrative positions at private contractors holding big contracts to help run the remotely controlled killing machines.
Supposedly “targeted killings” by drones have led to international concern, as victims of “surgical strikes” carried out by the unmanned weapons include wedding parties in Yemen, friendly-fire killings of Afghan soldiers, and nearly 200 children in Pakistan.
So, wreaking mass death from above is a negative, but on the positive side they have also led to big contracts for defense firms. A Bureau of Investigative Journalism report identified a bunch of large companies that have major contracts for analyzing data and providing other support work that drones need to operate.
Kill Chain: The Rise of the High-Tech Assassins, by Andrew Cockburn
There is, of course, some debate about the morality of drone warfare. Is it ethical to deliberately kill people without trial? Where is the warrior code, the moral hazard, for those who attack with impunity from thousands of kilometres away? What happens when mistakes are bloodily made? How does one define a terrorist? Which side are we on again? Why?
Shahzad Akbar fights for Pakistan’s drone victims
The U.S. contends that it’s going after Al-Qaeda and Taliban fighters, but since the CIA-led drone program is officially secret, little is known about how drone attacks are conducted or targets are chosen. According to a 2014 study by Forensic Architecture, a research project in London, and the U.K.-based Bureau of Investigative Journalism, an independent initiative, this secrecy has contributed to lax bombing practices. To date, the bureau has found that 423 to 965 civilians have been killed in the bombings — 170 to 207 of them children. Most of the victims remain unnamed and unidentified.
Simulate The Fatal Fallibility Of Drone Strikes…With A Fun Card Game!
“The primary [inspiration] was this interactive piece about drone strikes,” Udayasankar tells Co.Design. “Less than 2% of fatalities were high-profile targets. I was fascinated by the fallibility of technology itself and the collateral damage that it facilitates, and, moreover, how we do not take the time to talk about it.”
The drone warfare game where you spy on players with your smartphone
“Bycatch” is a term used by fishermen to describe the extraneous marine life that unintentionally gets caught in their nets. It’s also the name of a card game that deals with a very different sort of collateral damage: the civilians killed by drone strikes.
Islamic Militants Demanded Ransom for Bodies of Killed Hostages
Islamist militants demanded the U.S. government pay ransom for the return of the bodies of two hostages accidentally killed in a U.S. drone strike in Pakistan last January, The Wall Street Journal reports.
This top secret World War II drone mission killed JFK’s older brother
Operation Aphrodite was a top-secret attempt by the Army and Navy to turn old airplanes into suicide drones during World War II. B-17s and B-24s that were past their service life would be packed with several tons of Torpex, an explosive with twice the power of TNT, and then piloted into heavily-fortified targets.
Over 10 countries to join China’s military parade
Troops from at least 10 countries, including Russia and Kazakhstan, will join an unprecedented military parade in Beijing next month to commemorate China’s victory over Japan during the World War-II, Chinese officials said.
China is inviting foreign troops to participate in a military parade for the first time. It will also be a milestone for President Xi Jinping, who took over as Communist Party leader and military chief in late 2012.
The parade on September 3 will involve about 12,000 Chinese troops and 200 aircraft, Qi Rui, deputy director of the government office organising the parade, told reporters in Beijing on Friday.
Creech Predator crews get help coping with combat
Critics of drone strikes point out that innocent civilians sometimes die in the attacks. And, there was a friendly fire incident in 2011 involving a Predator missile strike triggered from Creech that left a U.S. sailor and a Marine dead in Afghanistan.
Forum: U.S. counterterrorism policy weak, should focus on economic issues
America actually is relatively safe. Aside from a few cases such as the tragic Chattanooga shootings, Americans killed by terrorists most often are murdered outside of our country, in war zones. However, if we don’t start focusing on the economic instability in vulnerable countries from which most terrorism originates, it is only a matter of time before we see more attacks in our country.
Israel Holds Large-Scale Military Drill on Syrian Border
The Israeli military staged a large-scale drill last week to prepare for a potential ground operation into Syria in the event of an attack by Islamist rebels or the Lebanese Shiite militant group Hezbollah, according to local media reports.
The rising number of Islamist fighters, many aligned to the Al-Qaeda-affiliated Jabhat al-Nusra, arriving near the Israeli border area in the Syrian part of the Golan Heights has placed the Israel Defense Forces (IDF) on high alert, Israeli television station Channel 2 reported.
- Israel is Helping Jordanian Special Forces Fighting ISIS on the Ground in Iraq
Israel to supply Jordan with drones to help fight Islamic State: report
As part of a new deal, Israel will supply Jordan with strategic and tactical unmanned aerial vehicles (UAVs) in order to help combat the Islamic State, according to a local media report.
- AP Interview: Jordan says Syria militants try to sneak in
Israeli forces shoot, kill Palestinian attacker in West Bank
Allan is on the 63rd day of his hunger-strike in protest of his detention by Israel without charge.
At least six Palestinians were detained late Sunday and on Monday by the Israeli authorities from the West Bank districts of Hebron and Bethlehem, according to local and security sources.
A Palestinian man who attacked an Israeli soldier with a knife was shot dead Saturday by Israeli soldiers in the north of the occupied West Bank, said the Palestine Red Crescent Society (PRCS) and the Israeli police.
Report: Israeli Drone Strike Kills 5 in Syria
Israeli airstrikes on the Syrian-controlled portion of the Golan Heights have killed at least five unarmed civilians, according to Syrian state media, in what Israel says was retaliation for rocket fire into its territory. Israel says those killed were Palestinian militants from the Islamic Jihad militant group.
- Israeli air raids kill five civilians and soldier, says Syria
Israel carries out drone strike in southern Syria – killing five
Israel’s air force has carried out a drone strike in southern Syria – killing five people – while a soldier was killed and seven wounded in an air raid, Syrian state TV has reported.
- Israeli strike kills 5 Syrian civilians in Qunaitera province
Israel Attacks Syria for The second time in 24 Hours
A new Israeli attack with a drone, killed at least five in al-Koum shanty town, in the Syrian province of Quneitra, at about 67 kilometers southwest of this capital.
The missile launched from the drone exploded at 10.35 (local time) this Friday, just 50 meters from a popular market, also causing serious material damage.
Israeli Attack on Syria’s Quneitera Leaves 5 Civilians Dead
An Israeli air strike on the Syrian Golan Heights killed at least four Palestinian militants responsible for Thursday’s rocket fire on an Israeli village, an Israeli defense official said on Friday.
50 civilians reported killed in Douma after Syrian army rocket attack
A Syrian army rocket attack on the rebel-held city of Douma reportedly killed at least 50 civilians.
US Drone Strategy Often Violates Sovereignty of Nations – Activist Group
The US drone strategy frequently undermines the sovereignty of other countries which can damage its own national security, Upstate Drone Action activist Ed Kinane told Sputnik.
‘Probability of US again bombing Libya is always there’
The US might carry out air strikes again in Libya, but it won’t improve the conditions on the ground, says Abayomi Azikiwe, editor of the Pan-African News Wire. The US would rather allow Egypt and the UAE to carry out certain aspects of this foreign policy in Libya, he adds.
US Wants To Increase Global Lethal And Surveillance Drone Flights To 30,000 By 2019
As if in complete defiance of the extensive contention at home and abroad, the Pentagon announced plans this week to dramatically ramp up global drone operations over the next four years.
Daily drone flights will increase by 50% during this time, and will include lethal air strikes and surveillance missions to deal with the increase in global hot spots and crises, according to an unnamed (and unverified) senior defense official, as reported by The Wall Street Journal.
“We’ve seen a steady signal from all our geographic combatant commanders to have more of this capability,” said Defense Department spokesperson, Navy Captain Jeff Davis to reporters at the Pentagon.
‘No Good Evidence’ Russia Behind Shootdown of Malaysia Air Flight 17 in Ukraine, Says Longtime CIA Analyst Ray McGovern: ‘BradCast’ 8/20/2015
On today’s BradCast, we are joined by retired, 27-year CIA analyst turned peace activist Ray McGovern, who personal delivered the CIA’s Presidential Daily Briefings to several Presidents, including Ronald Reagan and George H.W. Bush. His organization,Veteran Intelligence Professionals for Sanity (VIPS) — which includes several high-ranking former intelligence professionals and whistleblowers — have called, once again, on the U.S. to release any evidence to support their claims that Russia was behind the downing of MH17.
Ray McGovern: Propaganda, Intelligence, and MH-17
During a recent interview, I was asked to express my conclusions about the July 17, 2014 shoot-down of Malaysia Airlines Flight 17 over Ukraine, prompting me to take another hard look at Official Washington’s dubious claims – pointing the finger of blame at eastern Ukrainian rebels and Moscow – based on shaky evidence regarding who was responsible for this terrible tragedy.
- US MH17 Evidence ‘Sketchy as One Could Imagine’ – CIA Veteran Analyst
‘Political Hacks’ Wrote US Report Linking Russia To Crash Of Malaysia Airlines Flight MH17: Ex-CIA Analyst
A U.S. government report implicating Russia in the July 2014 crash of Malaysia Airlines Flight 17 was created by political writers rather than intelligence analysts, a former CIA analyst-turned-political activist told Russia’s Sputnik News. Sputnik is wholly owned by the Russian government, which reportedly backs Ukrainian separatists accused of firing a missile at the plane as it flew near the Russia-Ukraine border.
“What [U.S. Secretary of State John Kerry] offered was a ‘government assessment,’ which means it was written in the White House, which means it was a political document written by political hacks, and that the intelligence analysts would not sign on to it,” Ray McGovern, a CIA analyst from 1963 to 1990, told Sputnik. McGovern was previously known for implying that President George W. Bush could have prevented the Sept. 11, 2001, terror attacks in New York City and Arlington County, Virginia.
Former CIA head: Back Iran nuclear deal — with some conditions
Former CIA Director Michael Hayden, an influential and vocal critic of the Obama administration’s nuclear agreement with Iran, said Wednesday that Congress actually should consider approving the accord — but only after tacking on a number of conditions designed to pressure Iran not to cheat on the deal, including an authorization for military action.
- Britain to reopen embassy in Tehran this weekend
- The old US embassy, museum in Tehran: Inside the ‘US den of espionage’
Britain’s embassy in Iran: a reminder of a difficult shared history
When the foreign secretary visits Tehran on Sunday to reopen the British embassy after a closure of nearly four years, he will doubtless talk of new beginnings. Now Iran has signed a deal limiting its nuclear programme, the way is clear for new business contracts, new opportunities, a new chapter. That approach may appeal to the British businesspeople on the trip, licking their lips at the prospect of selling oilfield equipment or financial services, but Iranians do not discard history so easily.
- Britain to reopen embassy in Tehran this weekend after four years
What’s Really At Stake With The Iran Nuclear Deal
Nearly every major western country has recently sent trade missions to Iran in anticipation of sanctions being lifted. Representatives included major international oil companies, banks, and manufacturers. Their enormous influence and immense wealth will weigh heavily in resolving the issue.
Iran deal step in right direction
We would do well to remember that Iran didn’t start this crisis. The crisis didn’t start with Iranians overthrowing the Shah and taking of American hostages in 1979. It started when the U.S. CIA overthrew the democratically elected Iranian government of Mohammed Mosaddegh in 1953 and installed a brutal dictator (the Shah) in his place.
- Rogue States and Nuclear Dangers [Ed: reposted below]
- The Nuclear Deal
‘The Iranian Threat’
Throughout the world there is great relief and optimism about the nuclear deal reached in Vienna between Iran and the P5+1 nations, the five veto-holding members of the U.N. Security Council and Germany. Most of the world apparently shares the assessment of the U.S. Arms Control Association that “the Joint Comprehensive Plan of Action establishes a strong and effective formula for blocking all of the pathways by which Iran could acquire material for nuclear weapons for more than a generation and a verification system to promptly detect and deter possible efforts by Iran to covertly pursue nuclear weapons that will last indefinitely.”
Backers of Iran deal get key ally
President Barack Obama’s nuclear agreement with Iran gained momentum in Congress on Friday as a key Jewish Democrat from New York bucked home-state opposition to support the deal.
- Obama writes letter to reassure congressional Democrats on Iran deal
Five books on the legacy of the 1953 coup in Iran
This week’s 62th anniversary of the coup upending Mohammad Mossadegh comes with interest as strong as ever in Iran’s best-known prime minister. But while historians and journalists see the coup of 19 August 1953 as a pivotal event for Iran, they agree on little else (including the transliteration of his name into Latin letters).
Britain to reopen embassy in Tehran this weekend
Britain will reopen its embassy in Iran this weekend nearly four years after protesters ransacked the elegant ambassadorial residence and burned the British flag.
Iran says it shot down reconnaissance drone near Iraq border after it ‘confronted’ air defense
Iran’s official IRNA news agency says the military has shot down a reconnaissance drone in western Iran near the border with Iraq.
IRNA quoted Col. Farzad Fereidouni, a local air defense system commander, in a report Saturday as saying the unmanned aircraft was shot down in recent days after it “confronted” the air defense missile system. He didn’t say which country the drone belonged to, or give specifics on the timing.
Iran remembers 1953 US-led coup against then Iran PM
Iran is remembering the anniversary of the 1953 coup against the government of then democratically-elected Prime Minister Mohammad Mosaddeq.
The CIA’s Coup Against Iran’s Mohammad Mossadegh
Mohammad Mossadegh (pictured) became Prime Minister of Iran in 1951 and was hugely popular for taking a stand against the Anglo-Iranian Oil Company, a British-owned oil company that had made huge profits while paying Iran only 16% of its profits and often far less. His nationalization efforts led the British government to begin planning to remove him from power. In October 1952, Mosaddegh declared Britain an enemy and cut all diplomatic relations. Britain looked towards the United States for help. However, the U.S. had opposed British policies; Secretary of State Dean Acheson said the British had “a rule-or-ruin policy in Iran.”
COMMENTARY: Best way to get rid of enemy Iran: Get unstuck
•Quit sending arms to anyone in the region
•Quit telling Iranian people what to do
•Offer to help, but not militarily
•Start lifting sanctions slowly, unilaterally
•Wait for reciprocity and repeat (Rapoport’s tested game theory)
The CIA’s grotesque secret: How it’s partnering with human rights abusers — and sparking blowback
In a letter to three U.S. senators that recently came to light, CIA director John Brennan outlined how his intelligence agency deals with abusive partners, referring – it would appear – primarily to foreign security forces. But even more striking than the approach he outlines is his brutally honest admission that the CIA sometimes partners with human rights abusers.
The agency’s covert nature leaves its laws, rules and regulations opaque. However, it has long been known that the CIA is not subject to human rights vetting requirements when it comes to partnering with foreign security forces, as the State and Defense departments are, under what is commonly known as the Leahy Law, named for Vermont Democratic Sen. Patrick Leahy. Congress first approved the law in 1997, when it was revealed that Colombian army units were receiving U.S. funds while massacring civilians. The Leahy Law restricts the State Department and Pentagon from using U.S. taxpayer dollars to assist, train or equip any foreign military or police unit that is credibly believed to have engaged in gross violations of human rights – such as extrajudicial killings, torture, rape and forced disappearances.
On moral grounds alone there can be little objection to this restriction. But it also makes sense for national security. While Brennan may not acknowledge it, abusive security forces combatting domestic insurgencies typically exacerbate long-standing grievances and provide armed opposition and terrorist groups with a very powerful recruiting tool.
On the brink of destruction: The real NUCLEAR threat if North Korea attacks the South
North Korea’s main ally is China, which provides fuel and food aid, while it maintains a close relationship with Russia.
However positive ties with the US and South Korea are non-existent.
The promotion of Kim Jong-un has leader following the death of his father Kim Jong-Il in 2011 has done little to improve that.
Iraq ex-PM Maliki dismisses report blaming him for Mosul’s fall to ISIS
The former prime minister of Iraq, Nuri al-Maliki, who a domestic investigation has found responsible for Mosul’s conquest by Islamic State in June, 2014, has slammed the panel’s findings on the humiliating fall of the key northern city as having “no value.”
Officials: ISIS Arose From US Support For al-Qaeda In Iraq
A new memoir by a former senior State Department analyst provides stunning details on how decades of support for Islamist militants linked to Osama bin Laden brought about the emergence of the ‘Islamic State’ (ISIS).
The book establishes a crucial context for recent admissions by Michael T. Flynn, the retired head of the Pentagon’s Defense Intelligence Agency (DIA), confirming that White House officials made a “willful decision” to support al-Qaeda affiliated jihadists in Syria — despite being warned by the DIA that doing so would likely create an ‘ISIS’-like entity in the region.
J. Michael Springmann, a retired career US diplomat whose last government post was in the State Department’s Bureau of Intelligence and Research, reveals in his new book that US covert operations in alliance with Middle East states funding anti-Western terrorist groups are nothing new. Such operations, he shows, have been carried out for various short-sighted reasons since the Cold War and after.
Bombing Syria plays into Isis’ hands
Whoever the new Labour leader is, they’ll have a lot on their plate and one of the first big issues is likely to be Syria. The on-going civil war is only getting worse, and defence secretary Michael Fallon has already announced that a vote on military intervention will take place later in the year.
In one sense, the question of whether the UK military should be taking part in bombing is a moot one, because it already is. A freedom of information request from Reprieve found UK military personnel have already engaged in air strikes as part of US operations. The admission showed the public and parliament had been misled. MPs voted against bombing Syria in 2013.
How to Understand Those 60 Trainees
So said American Defense Secretary Ash Carter in testimony before an incredulous Senate Armed Services Committee on July 7, explaining that the $500 million American project, announced over a year ago, to train and arm a new Syrian rebel army to bring the Islamic State to its knees and force a political settlement on the Syrian regime simultaneously has, to date, trained just 60 fighters.
Lesson from Syrian rebel debacle
Division 30 was the first contingent of Syrian rebels deployed under a $500 million “train and equip” plan authorized last year by Congress. It’s an overt program, run by U.S. Special Forces, separate from a parallel covert program run by the CIA. The idea is to generate over 5,000 trained fighters a year who could help clear Islamic State extremists in Syria and then hold the ground.
Meet The ‘Moderates’ The U.S. Is Supporting In Syria: They’re al-Qaeda
In this regard, Obama is following the position that was expressed by his friend Brzezinski who has expressed it many times, such as, in 1998, reprinted later under the heading, “How Jimmy Carter and I Started the Mujahideen.”
Robert Fisk: The Syrian War has occupied Turkey
In a recent article, Robert Fisk, senior Middle East correspondent for the Independent, compared Turkey to Pakistan in the 1980s, and said that the recent air bombardment was no surprising given that all powers in the region have betrayed the Kurds. We spoke to Fisk both about the details of the matters he touches on in his article, and whether power balances have changed in the Middle East. Fisk says that Turkey has become a market place and when seen from this perspective there are more important issues at stake besides whether or not Turkey will enter the war in Syria. “I believe that Syria has started penetrating Turkey. Suruç is an example of this. From this view, the Syrian War but not the Syrians have occupied Turkey. It is not the reverse.”
Another Military Comedy of Errors
On July 24th, highlighting the first Turkish air strikes against the Islamic State and news of an agreement to let the U.S. Air Force use two Turkish air bases against that movement, the New York Times reported that unnamed “American officials welcomed the [Turkish] decision… calling it a ‘game changer.’” And they weren’t wrong. Almost immediately, the game changed. Turkish President Recep Erdogan promptly sent planes hurtling off not against Islamic State militants but the PKK, that country’s Kurdish rebels with whom his government had previously had a tenuous ceasefire. In the process, he created a whole new set of problems for Washington, including making life more difficult for Kurdish rebel troops in Syria connected to the PKK that the Obama administration was backing in the fight against the Islamic State. Erdogan’s acts also ensured that chaos and conflict would spread to new areas of the Middle East. So game-changer indeed!
Erdogan-ISIS pincer against Kurds
Reports from the PKK-aligned Kurdistan National Congress indicate an internal war by the Turkish state against the Kurds in the country’s east, approaching levels of violence not seen in 20 years. Several villages in Diyarbakir province are said to be under heavy shelling by the Turkish army. Many of these villages are reported to be currently burning, with many injured, and an unknown number killed. After hours of shelling, Turkish soldiers reportedly entered the village of Kocakoy, Lice-Hani district, putting homes to the torch—sometimes with families still inside, resulting in further loss of life. Troops then proceeded to force an evacuation of the villages. It is not said where the survivors fled to. A similar attack is reported from Şapatan (Turkish: Altınsu) village in Şemdinli district, Hakkari province, where the blaze has spread to surrounding forest areas. (KNC, KNC, Aug. 18)
Think the Donald Can Get Us a Better Deal on Porter Goss?
None of this is news. Turkey’s not even among the top ten spenders, as far as foreign lobbies go. (That honor usually goes to Canada, although apparently in 2013 it went to the UAE.)
But here’s the thing that chaps my hide. I’m fine with selling our politicians to foreign governments. We’re running a $43.8 billion trade deficit, after all. We can’t afford to be fussy.
But aren’t you insulted that we’re selling them so cheaply? We’re the United States of America. Shouldn’t Porter Goss be worth more than a measly 32,000 bucks a month? We borrow more than that every minute, so why should we sell him for less than 32,000 dollars a second? What kind of superpower do these people take us for?
And if we’ve already established that, and we’re just haggling over the price, we need to get serious about dollars and cents. Because that’s peanuts, and it’s not going to pay the bills.
How ‘Manageable Chaos’ Spawned ISIS In The Middle East
‘Manageable chaos’ is a myopic idea that has torn the Middle-East apart. To understand why, we need to go back a hundred years in the past. In 1916, Britain and France signed the Sykes-Picot Agreement in secret. Then, in the middle of the First World War, they decided the Ottoman Empire needed to go. Sultan Mehmed VI in Istanbul controlled crucial shipping lanes and the oil riches of the Persian Gulf. So, while T.E Lawrence duped the Arab sheikhs with promises of a “Greater Syria,” the European powers divided the Levant as it suited them.
The problem was not that outsiders drew the borders. The problem was these borders were indifferent to the people who lived within them. The clean lines carved through the Middle-East ignored sectarian, tribal or ethnic geographies. Many Shia majority areas ended up under Sunni control, and vice-versa. Thirty-million Kurds also ended up homeless. These progeny of the mighty Median Kings of Asia Minor became minorities in Turkey, Syria, Iraq and Iran.
US-trained Syrian rebel expects to fight Assad
A member of the U.S.-trained Syrian rebel forces says he expects to fight forces loyal to President Bashar Assad, even though they pledged only to combat the Islamic State in Iraq and Syria (ISIS) in order to participate the Pentagon program.
- At Security Council, UN officials spotlight need for effective and accountable security institutions
Security Council strongly condemns seizure of United Arab Emirates embassy in Yemen
The United Nations Security Council today condemned “in the strongest term” the storming and seizure of the United Arab Emirates embassy in Sana’a, Yemen, by the Houthis on the 17 August 2015.
U.S. boosts support role in Saudi-led airstrikes on Yemen
A Saudi-led military offensive against Houthi rebels in Yemen has scored major gains this month, including recapturing the strategic port of Aden and the country’s largest air base, after the Pentagon more than doubled the number of American advisors to provide enhanced intelligence for airstrikes.
First cargo docks in Aden since war came to south Yemen’s ex-capital
A commercial ship docked in Aden on Friday, the first to reach the former southern capital since Yemen’s devastating war came to the port city in March.
The Venus, operated by United Arab Shipping Co, carried a cargo of 350 containers of products ordered by businesses in Aden, said port deputy director Aref al-Shaabi.
Al Qaeda deploy in Yemen’s Aden, British hostage freed
Al Qaeda militants took control of a western district of Yemen’s main port city of Aden on Saturday night, residents said, in another sign that the group is drawing strength from five months of civil war.
- UAE army frees British hostage as Al Qaeda expands in Yemen
- Yemen officials say Al Qaeda seizes key areas of Aden
43 killed in airstrikes on Yemen city
Iranian-allied fighters controlling much of Yemen said on Friday air strikes led by Saudi Arabia killed 43 people in the central city of Taiz.
Taiz has become the latest focus of fighting for supporters of President Abd-Rabbu Mansour Hadi, who was driven into exile in Saudi Arabia by the Houthi fighters. Medical sources said Houthi attacks on the city killed 13 people, including seven children.
U.S. needs to take care of its own business
Nonetheless, we have just about bankrupted ourselves trying.
We have employed our military abroad more than 70 times since 1945, and also engaged in innumerable instances of not-so-covert CIA interference in the affairs of other sovereign nations.
The latter include instances of overthrowing democratically elected governments we considered too leftist.
And the truth is that in none of these instances have we had any long-lasting success in achieving our goals. We have, instead, uselessly wasted an enormous amount of treasure and human lives while creating more and more enemies all over the globe. We have created these enemies because almost all of our high-handed meddling has had unforeseen and unfortunate, often tragic, consequences.
We now have about 1,000 military bases abroad (the exact figure depends on the number of smaller bases included), well over 300,000 U.S. military personnel deployed abroad, 1.6 million Americans working in defense industries, and the good Lord knows how many working for the CIA and other surveillance/intelligence government agencies and private contractors.
Obama’s Secret Elite Interrogation Squad May Not Be So Elite — And Might Be Doomed
When President Barack Obama took office, he promised to overhaul the nation’s process for interrogating terror suspects. His solution: the High-Value Detainee Interrogation Group, or HIG, a small interagency outfit that would use non-coercive methods and the latest psychological research to interrogate America’s most-wanted terrorists — all behind a veil of secrecy.
US interrogation strategy gets scrutiny in Benghazi case
After a suspected militant was captured last year to face charges for the deadly 2012 attacks on Americans in Benghazi, Libya, he was brought to the U.S. aboard a Navy transport ship on a 13-day trip that his lawyers say could have taken 13 hours by plane.
Ahmed Abu Khattala faced days of questioning aboard the USS New York from separate teams of American interrogators, part of a two-step process designed to obtain both national security intelligence and evidence usable in a criminal prosecution.
Russia Laughs At U.S. Sanctions Threat
Russian Foreign Minister Sergey Lavrov, when asked about the implications of the sale, was said to have scoffed at the threat of U.S. sanctions and said they cause no worry for Moscow.
Cyanide in waters near China blast site 277 times acceptable level: government report
Chinese authorities warned that cyanide levels in the waters around the Tianjin Port explosion site had risen to as much as 277 times acceptable levels although they declared that the city’s drinking water was safe.
China: Sodium cyanide levels well past limit at Tianjin explosion site
High levels of dangerous chemicals remain at the site of last week’s deadly chemical warehouse blasts in the northern Chinese city of Tianjin — hundreds of times higher than is safe at one spot — officials said Thursday, signaling that a cleanup has a significant way to go.
Water tests show high levels of sodium cyanide, an extremely toxic chemical that can kill humans rapidly, at eight locations at the blast site, Ministry of Environmental Protection official Tian Weiyong said.
At least 7 dead after old military jet crashes at air show in England
At least seven people are dead after a vintage military aircraft crashed Saturday on a busy road in southeastern England, police said.
The Hawker Hunter jet was taking part in an air show at an airport near Shoreham in Sussex.
Why The US Turns A Blind Eye To Saudi Arabia’s Troublemaking
NOTHING gets US Republican Party politicians fired up like Iran.
In the first televised debate for candidates competing to lead the Republicans in the 2016 presidential election, Scott Walker promised that he’d tear up the Iran nuclear deal on day one of his presidency. Carly Fiorina blamed the country for “most of the evil that is going on in the Middle East.” Mike Huckabee vowed to topple the “terrorist Iranian regime and defeat the evil forces of radical Islam.”
Oddly, when the candidates complain about the “evil forces of radical Islam” or trouble in the Middle East, they never seem to mention Saudi Arabia.
Iran’s no democratic paradise. But on many counts, Washington’s Saudi allies are even worse. The Saudi royals crush dissent with an iron fist, spread extremist ideology, and invade their neighbors with impunity.
Domestically, the Saudi regime oppresses women, religious minorities, and millions of foreign workers. And it brutally represses criticism from human rights activists, prompting condemnation from both Amnesty International and Human Rights Watch.
Saudi blogger Raif Badawi, for example, was sentenced to 10 years in prison and 1,000 lashes just for writing a blog the government considered critical of its rule. Hundreds of political prisoners languish in prison — including Badawi’s lawyer, who was sentenced to 15 years for his role as a human rights attorney. New legislation effectively equates criticism of the government and other peaceful activities with terrorism.
Rebels threaten to kill observers, OSCE complains
OSCE monitoring mission in Ukraine deputy head Alexander Hug said at the Aug. 19 briefing in Donetsk that the rebels had threatened to kill OSCE observers if they would come again to Bezimenne, Novoazovsk rayon, UNIAN reports.
LETTER: Stop the manufacturing and flying of drones
When are Americans going to demand our leaders protect us against drones? Our politicians did nothing on gun control. Now they will look the other way on drones.
Drones should not be produced or manufactured. Take away permits and the right to manufacture them. The U.S. Armed Forces should be the only ones to purchase drones. If I can’t put a 10-by-10 addition on my home without bureaucratic regulations, why is it permitted to manufacture drones?
Florida shooting range to serve alcohol in restaurant
Officials in a Florida city have approved the request of a businessman to serve alcohol in a restaurant he plans to open in a building with an indoor shooting range.
CNN affiliate WFTV reported that Daytona Beach city commissioners have signed off on Ron Perkinson’s proposed facility, which Perkinson hopes to open by late November. The facility will be located near Daytona International Speedway just off Interstate 95.
9-year-old girl in Ferguson shot dead doing homework on mom’s bed: cops
Ferguson police are searching for clues about the killing of a 9-year-old girl who was shot when someone fired into a home where she was doing homework on her mother’s bad.
No arrests have been made in Tuesday night’s fatal shooting of Jamyla Bolden and police don’t yet know if the home was targeted or the shots were random, Ferguson Sgt. Dominica Fuller said Thursday. Jamyla’s 34-year-old mother was struck in the leg and treated at a hospital.
What Use Does the Los Angeles Unified School District Have for Military Grade Weapons?
On Thursday, July 30, 50 Black and Latino students wearing mock bullet proof vests with stickers that stated #StudentsAintBulletProof #End1033, from the Strategy Center’s Fight for the Soul of the Cities, once again asked the Los Angeles Unified School District to give us a list of the weapons they received from the Department of Defense 1033 Program, to return 61 M-16 assault rifles we believe are still in their possession, and to apologize for being in the program in the first place. Students said, after three public comment testimonies, four long letters (September 2014, November 2014, May 2015, July 2015), over 3,500 petitions, appeals, and every other method of persuasion “Why is the LAUSD trying to kill us?” This campaign is part of the Strategy Center’s No Cars in LA and the U.S., No Tanks in LA and the U.S.
- Chilling Artwork ‘Shoots’ Gallery-Goers From Above in Tandem to US Drone Strikes
It has happened before: President Bill Clinton PARDONED former CIA Director for home computer Classified Document mess
In truth, Hillary Clinton’s current controversy over keeping sensitive, classified information on home computers had its basis in which her husband, former president Bill Clinton pardoned former CIA director John Deutch who likewise kept classified material on unsecured, private computers.
- Former CIA chief: Hillary Clinton’s actions a danger to the nation
- Former CIA spy on Clinton emails: ‘You and I would get fired and possibly jailed’ for this
- CIA’s Bob Baer says Hillary Clinton’s email scandal is ‘deal breaker’
Hillary Clinton, in her memoir “Living History,” recounts her struggle to defend her privacy while residing in the White House. Some of her stories have a gothic tone. After Bill Clinton’s first inauguration, Harry and Linda Thomason, friends from Hollywood, found a jocular note under a pillow in the Lincoln Bedroom. It was from Rush Limbaugh, the conservative radio host. How did the note get there? “I don’t believe in ghosts, but we did sometimes feel that the White House was haunted by more temporal entities,” Clinton writes.
Now, however, the F.B.I. is involved. This is because an inspector general for U.S. intelligence agencies, and another for the State Department, reviewed a sample of Clinton’s e-mails and identified classified information in some of them. By near-automatic protocol, that finding was referred to the Justice Department. One of the F.B.I.’s tasks in the weeks ahead will be to look into whether, amid all the e-mailing to and from Secretary Clinton, any crime may have been committed, by anyone. There is no indication that Clinton is the target of a criminal inquiry.
Their View: Email problem could’ve been handled better
And, if it turns out that Clinton was indeed informed of this potential security risk, by the info security chief directly or via a trusted Clinton adviser, and that she rejected the advice and directly refused to also use a department email for major security emails, then that Washington problem will have just grown to a new level.
Obama WH Hard on Low-Level Security Leakers, Easy on Insiders
As the investigation into former Secretary of State Hillary Clinton’s use of a private email server to conduct official government business heats up, the Washington Times reports that a double-standard exists in the Obama White House for those who leak or “mishandle” classified information: Benign punishment, or none at all, for the president’s inner circle and a heavy hand for everyone else.
While the Obama administration has “investigated and prosecuted more security leakers and people who mishandled secrets than any other in history” — six people have been imprisoned — high-ranking officials who have committed similar, or more egregious, offenses have received slaps on the wrist.
Retired Army Gen. David Petraeus, the former CIA director, commander of U.S. troops in Iraq and a top Obama national security adviser, received a plea deal to a misdemeanor charge of mishandling classified information for top secret information he provided to his biographer, who was also his mistress. He reportedly lied to FBI agents during the investigation.
- Clinton probe tests FBI chief
- Obama protects White House insiders, cracks down on low-level leakers
- Ex-officials prosecuted for mishandling gov’t info see ‘double standard’ in Clinton case
- Former officials question Clinton’s email defense
- It has happened before: President Bill Clinton PARDONED former CIA Director for home computer Classified Document mess
UK councillor wants armed drones to kill seagulls
“The seagulls are a protected species and therefore it is illegal to remove nests and eggs or to kill these birds”.
Drones would alleviate the need for people to move physically close to nests to coat the eggs and could rapidly increase the number of eggs sterilised.
- A licence to kill: Seaside town given special permission to eradicate protected seagulls after a series of attacks on people and pets
Could ‘Licence to kill’ be the solution to Scarborough’s seagull woes?
FOR YEARS they have been the focus of anger along the Yorkshire coastline – squawking menacingly as the swoop to pinch visitors’ fish and chips.
Man who posted pictures of himself CHOKING a SEAGULL on Facebook probed by police
The distressed seagull is pictured flapping its wings and struggling as Mr Arkle wraps his hands around its neck.
His graphic posts suggest he carried out the act of cruelty because seagulls stopped him sleeping.The distressed seagull is pictured flapping its wings and struggling as Mr Arkle wraps his hands around its neck.
His graphic posts suggest he carried out the act of cruelty because seagulls stopped him sleeping.
SEATON: ‘Humane’ advice offered as public suspected of attacks on seagulls
LASER beams, special paint and even hooded tops are among a raft of new measures put forward to defend Seaton against nuisance seagulls.
The animal rights group PETA has written to councils across Devon and Cornwall offering them advice on how to deal with the gull problem in a “humane” way.
The call for action comes in the wake of increasing concern that members of the public are targeting gulls in vigilante attacks.
Mexico deploys drones to protect sea turtles from poachers
In the country’s bid to fight against poachers, Mexico is using a new weapon in its war against sea turtle poachers. Drones.
Mexico has one of the highest sea turtle populations in the world, with an estimated 1.1 million nests in 2014.
Protesters make aerial image to honor Cecil the lion
Rising also called for the extradition of Palmer in Zimbabwe and for UPS and FedEx to stop the transportation of trophy animals.
Typhoon Goni Impacts: 1 Dead in Japan, At Least 14 Killed in Philippines
Japan has begun to feel the first impacts of Typhoon Goni, with at least one death attributed to high waves as the storm moves towards the mainland. According to NHK, Japan’s national broadcasting corporation, a 66-year-old man drowned after falling from a fishing boat off of Miyazaki Prefecture on the southern island of Kyushu.
Obama Administration Gives Shell Final Approval for Arctic Drilling
The Obama administration has granted Royal Dutch Shell final approval to resume drilling for oil and gas in the Arctic Ocean for the first time since 2012 despite widespread protests from environmental groups.
- UK councillor wants armed drones to kill seagulls
JPMorgan enlists retired four-star general to advise CEO
Wall Street is pulling out the big guns.
JPMorgan Chase named Raymond Odierno, a retired four-star general and the former chief of staff for the US Army, to advise CEO Jamie Dimon on cybersecurity and international risks.
Odierno, a Rockaway, NJ, native, spent 39 years in the military and more time in Iraq than any other general.
Schools in Uganda Are Getting Bulldozed So Foreign Developers Can Build Stores
With dozens of campuses destroyed, the government has launched an investigation into shady-seeming land grabs by real estate investors.
Edward Snowden: ‘Bitcoin by itself is flawed’
He started off by noting that the general public likes to avoid discussing bitcoin. Although he believes there are various “informed concepts” about bitcoin, he does think “bitcoin by itself is flawed.” This may draw the ire of many diehard bitcoiners on the Internet.
Peace and the ideology of greed and division
We all want peace, don’t we? Peaceful relationships and communities, an absence of violence and conflict, a world at peace.
This is surely everyone’s heartfelt desire. Without peace nothing can be achieved, none of the subtler essential needs of our time, such as feeding everyone and providing good quality health care and education to all – let alone the urgent need to save our planet, beautify the cities and develop sustainable alternative energy sources.
- HUMILIATED: Louise Mensch Tweets Picture of Her Own Twitter Searches, Claims Corbyn Supporters Are Anti-Semitic As a Result
- Louise Mensch blames Jeremy Corbyn supporters for anti-Semitism – turns out it’s her own offensive Twitter search history
- Louise Mensch blames her own offensive Twitter searches on Jeremy Corbyn supporters
- Louise Mensch tried to throw shade at Jeremy Corbyn on Twitter and it went seriously wrong
- Louise Mensch adds yet another Twitter gaffe to her list
Louise Mensch blames Corbyn supporters for anti-Semitism – turns out it’s her own offensive search history
Former Conservative MP Louise Mensch has faced widespread ridicule after accusing Jeremy Corbyn supporters of anti-Semitism – over Twitter searches that turned out be her own.
Ms Mensch posted a series of screenshots showing what she said were autocompleted twitter searches alongside the name of Mr Corbyn’s fellow Labour leadership contender, Liz Kendall.
Louise Mensch’s attempt to slur Jeremy Corbyn fans on Twitter backfires in the worst way possible
Former Tory MP Louise Mensch has come under fire after an embarrassing Twitter gaffe saw her appearing to accuse Jeremy Corbyn supporters of being anti-Semitic.
- JPMorgan enlists retired four-star general to advise CEO
Allegations over Maltese group’s links to the CIA
In the early 1980s suspicions that the Maltese group Front Freedom Fighters was being funded by anti-Communist entities close to the CIA were covertly communicated to the British Foreign Office, recently declassified documents reveal.
- ISIS Threatens Turkey. Turks Respond With Half-Hearted ‘Meh’
- Kurdish rebels attack police, military in Turkey, one policeman killed
Report: Turkey erects concrete wall along border with Syria
Turkish media reports say Turkey has started to construct a 45 kilometer- (28 mile-) long concrete wall along a key stretch of its border with Syria.
Turkey Pays Former CIA Director and Lobbyists to Misrepresent Attacks on Kurds and ISIS
Thousands of articles have been published worldwide in recent weeks exposing Turkey’s strategic trickery — using the pretext of fighting ISIS to carry out a genocidal bombing campaign against the Kurds who have courageously countered ISIS in Syria and Iraq.
The Wall Street Journal reported on August 12 that a senior US military official accused Turkey of deceiving the American government by allowing its use of Incirlik airbase to attack ISIS, as a cover for President Erdogan’s war on Kurdish fighters (PKK) in northern Iraq. So far, Turkey has carried out 300 air strikes against the PKK, and only three against ISIS! Erdogan’s intent in punishing the Kurds is to gain the sympathy of Turkish voters in the next parliamentary elections, enabling his party to win an outright majority and establish an autocratic presidential theocracy.
The Mighty Wurlitzer: How the CIA Played America
The history of the American Central Intelligence Agency (CIA)—its coups, assassinations, “extraordinary rendition” kidnappings, use of torture, “black sites,” drone executions, dirty wars and sponsorship of dictatorial regimes —not only underscores the bloody and reactionary role of American imperialism, but most especially the ruling elite’s mortal fear of the working class internationally.
We deserve a better media
Here is another clue: ‘We’ll know our disinformation programme is complete when everything the American public believes is false,” CIA Director, 1981. It seems he got his wish.
Two weeks before the outbreak of WWII, a solemn British Prime Minister Neville Chamberlain remarked, “History will judge the Press to have been the principle cause of war.”
Nevile Henderson, the British Ambassador to Berlin echoed the premier’s words. France’s President Lebrun and Foreign Minister warned the Press ‘not to abuse their so-called Press freedom.’ In September 1941, U.S Senator Clark: ‘Half a dozen men controlling the film industry clamour for war.’
Psychological warfare and Jeremy Corbyn
Earlier this month I briefly wrote about how the incessant stream of attacks on Jeremy Corbyn from all parts of the media, represented more than meets the eye. That it is a continuation of an undemocratic and sinister policy of subversion and undermining of any popular left wing movement or leader, that poses a threat to the capitalist system and military-industrial-complex.
Fox & Friends Rewrites Background Of Alleged Terrorists To Make Them The Face Of Birthright Citizenship
Fox & Friends joined The Daily Caller in an effort to make alleged terrorists Anwar al-Awlaki and Yaser Hamdi the face of birthright citizenship, falsely claiming the men were born in the U.S. to “illegal parents” and able to pursue terrorist activities without retaliation because their citizenship protected them.
Are Democrats Really Socialists?
Socialism has had a rough few decades, but it’s enjoying a rare success. Bernie Sanders, who calls himself a socialist, is running for president, drawing big crowds and leading Hillary Clinton in one poll in New Hampshire. All this leads some people to a damning conclusion: Democrats love Sanders because Democrats are socialists.
Who shapes our image of the world?
…Charlotte Wiedemann considers how press freedom and the media are tethered to Western geopolitics
France’s far-right National Front party ousts founder, Jean-Marie Le Pen
Jean-Marie Le Pen, who founded the party in 1972, was serving as honorary president when he was suspended in May for saying he saw the Holocaust as a “detail of history.” He challenged the suspension in court, and in July a judge overturned it, saying proper procedure had not been followed.
- Allegations over Maltese group’s links to the CIA
Brit lights up Berlin with spies, lies and censorship art
British artist and anti-surveillance activist James Bridle is illuminating Germany with artwork exploring the darkest state secrets, cover-ups and information blackouts.
- Brit lights up Berlin with spies, lies and censorship art
EFF calls out Obama administration over CISA bill
Amongst tech circles in the US Obama and his administration are generally viewed positively. His image amongst this group got a huge boost a few years ago when his administration came out against the Cybersecurity Information Sharing and Protection Act (CISPA) because, amongst other things, it lacked sufficient limitations on the sharing of personally identifiable information between private entities.
The Ashley Madison hackers claim to have thousands of nude pics, but won’t release them
Impact Team, the now-infamous group of anonymous hackers behind the alleged theft of data from infidelity dating site Ashley Madison, explained in an interview with Motherboard that it staged this attack because it didn’t like how Avid Life Media, the site’s parent company, treated users.
“Avid Life Media is like a drug dealer abusing addicts,” says Impact Team.
So far, this week has seen Impact Team release three major data dumps of Ashley Madison data, on Tuesday, Thursday, and Friday. In the interview, Impact Team says that it started collecting the data “a long time ago,” and Motherboard points out that it once claimed to have been at this for years.
- There’s an easy way to see whether you’ve been affected by the Ashley Madison leak and previous massive hacks
- US Investigations Services to pay $30mln for letting Snowden into CIA
Why the workplace of 2016 could echo Orwell’s 1984
Last week’s revelations of the lengths Amazon goes to monitor staff come amid growing evidence that thousands of other companies are using technology to check on workers
More fun eavesdropping on Henry Kissinger telephone conversations
CIA director William Colby’s openness about more odious U.S. intelligence practices did not go over well with Henry Kissinger.
Speaking on the phone with McGeorge Bundy, the National Security Advisor to Presidents John F. Kennedy and Lyndon B. Johnson, Kissinger referred to Colby as a “psychopath.”
Caspar Bowden made a career out of warning against government encroachment on individuals’ online privacy. His work, however, was not fully recognised until 2013 — the year that his contemporary, the former Central Intelligence Agency (CIA) employee Edward Snowden, leaked thousands of documents originating from the US National Security Agency (NSA).
Inside the Spyware Campaign Against Argentine Troublemakers
Alberto Nisman, the Argentine prosecutor known for doggedly investigating a 1994 Buenos Aires bombing, was targeted by invasive spy software downloaded onto his cellular phone shortly before his mysterious death. The software masqueraded as a confidential document and was intended to infect a Windows computer.
- The Government is Watching the Ashley Madison Hack
The Ashley Madison Hack Is Not OPM (But the Government May Be Watching It Anyway)
In the database, there were 6,788 accounts connected to emails at army.mil; at navy.mil, 1,665; usmc.mil, 809; af.mil, 657; and mail.mil, 206. And there were a few other domains with national security implications: dhs.gov, 45; whitehouse.gov, 44; and fbi.gov, 5. (Here’s a list of all the individual .mil domains, and here are lists of the navy.mil and af.mil domains.)
- Photos of the Day: Developing the U-2 Aircraft at Area 51
Ashley Madison hack: A savage wake-up call which is only the beginning
Opinion: Cheaters ousted, hearts broken, and a lesson learnt about individual privacy.
- Treason charge for suspected German double agent
- Germany charges suspected U.S and Russian spy with treason
- German spy charged with treason for aiding CIA and Russia
- Germany Charges Own Spy with Treason for Passing Secrets to U.S., Russia
- Germany charges alleged spy with treason
- Germany: Treason Charges for Spy
- Germany: intelligence employee charged with treason
- Germany Charges Intelligence Agency Worker With Treason
- Germany charges suspected triple agent with treason
- Treason Charges For German Spy Who Helped CIA, KGB
- German CIA Spy Charged with Treason
- Germany is charging a spy with treason under the suspicion that he was a triple agent for the US and Russia
- Germany charges suspected U.S and Russian spy with treason
- German spy charged with treason for aiding CIA and Russian intelligence
- Prosecutors launch case against CIA double agent
- German spy charged with treason for passing secret documents to CIA and Russian intelligence
- Germany Charges Own Spy With Treason for Sharing Secrets with CIA and Russia
Germany charges agent who spied for US with treason
Germany is charging one of its own intelligence agents with treason for covertly passing secret information to both the CIA and Russian agents.
Charges against the 32-year-old former agent with the BND intelligence service — who is being identified only as Markus R., due to German privacy law — come more than a year after his arrest last July, which at the time marked a new low in U.S.-German relations.
- Germany Charges Own Spy With Treason for Sharing Intelligence with CIA
German spy charged with treason for passing secrets to CIA and Russia
Germany has charged a spy who allegedly acted as a double agent for the US and Russia with treason, breach of official secrecy and taking bribes.
The 32-year-old, identified only as Markus R due to privacy rules, is accused of offering his services to the CIA in early 2008 while working for Germany’s foreign intelligence agency, the BND. Documents he gave the US spy agency would have revealed details of the BND’s work and personnel abroad, officials said.
- EFF calls out Obama administration over CISA bill
Who Was the CIA Official Who Found Torture Revolting? And Other Questions the ACLU Still Has About CIA Torture
In early December 2014, Senate Intelligence Committee Chair Dianne Feinstein, D-Calif., released a summary of her staff’s five-year investigation of the CIA’s interrogation programs following 9/11.
Best known as the “Torture Report,” the document revealed searing details of ghastly abuses ranging from “rectal feedings” to “near drowning” on the waterboard.
- CIA ‘torture’: Inside the ‘blackout box’
Key conclusions of the Hoffman report
Below are some of the key findings of the Hoffman report, an independent review of the American Psychological Association’s ethics guidelines and allegations made against APA. The report concludes that APA failed to challenge and legitimized the “enhanced interrogation” techniques authorized used against terror suspects during the Bush administration. Gerald Koocher, DePaul’s current Dean of the College of Science and Health, served as president-elect of APA in 2005 and president in 2006, the time of these allegations.
Roy Eidelson and Jean Maria Arrigo: An unhealthy nexus of interests
The APA got into this mess by holding tightly to a deeply flawed assumption: that psychology should embrace every opportunity to expand its sphere of influence.
Consorting With the Devil
Throughout the Cold War, and doubtless right down to the present, professional people with skills relevant to “national security” have been secretly recruited to work for the Central Intelligence Agency and the Department of Defense. Universities are among those particularly targeted. Scholars and campus research centers have received CIA and DoD funding for conferences and publications, for collecting intelligence while abroad, and even for spying, all under cloak of secrecy.
The latest revelation concerning those who “consort with the devil” concerns psychologists in the American Psychological Association. In utter disregard for professional ethics, a number of prominent psychologists worked closely with the CIA’s and the Pentagon’s torture programs in Afghanistan. They not only condoned but personally profited from torture, all in the name of supporting the US war effort. It was a case of first-class collusion, abuse of authority, and conflict of interest—and it went largely unnoticed until recently.
US Torturers Lose Psychologists’ Corrupt Cooperation
The resolution proper begins by adopting the international law definition of torture in the UN Convention Against Torture, which is at variance with US law. The resolution also acknowledges that some 3,400 psychologists work for the Department of Defense (mostly at VA hospitals) and commits the APA to supporting the ethical behavior of these psychologists in these and similar “organizational settings.” And the resolution commits the APA to notifying the President, Congress, and other officials of the core of its mandate:
Editorial: When psychologists cross the line
Koocher, in a statement on his website, said he and former APA President Ronald Levant insisted that they “never have supported the use of cruel, degrading or inhumane treatment of prisoners or detainees.”
But the report, which was drafted at the APA’s request by former City of Chicago Inspector General David Hoffman and his colleagues at the firm Sidley Austin, saw the APA’s actions differently. The report concluded that the APA tried to curry favor with the U.S. Department of Defense, with which it had strong ties and is one of the largest employers of psychologists, by issuing loose ethical guidelines for psychologists involved in interrogations. These guidelines did not constrain the interrogations beyond the rules the government had already set for itself and allowed psychologists to remain involved.
- Why ethical psychologists play an important role in interrogations [Ed: apologist]
When the American Psychological Association was in bed with the CIA
David Hoffman, former assistant US attorney, conducted a review of the APA’s extensive involvement and wrote in his subsequent report, ‘The evidence supports the conclusion that APA officials colluded the DoD officials to, at the least, adopt and maintain APA ethics policies that were not more restrictive than the guidelines that key DoD officials wanted’.
Hoffman also stated that the ‘APA chose its ethics policy based on its goals of helping the DoD, managing PR, and maximising the growth of the profession’.
Prior to Hoffman’s investigation, the APA dismissed and denied allegations of their complicity. The report, however, brought the credibility of the association into question, and earlier this month a ban was approved. In an effort to salvage their reputation, they prohibited any involvement by psychologists in national security interrogations – including noncoercive interrogations under the Obama administration.
Good People Doing Bad Things
Some years ago, the psychologist Albert Bandura listed eight mental tricks people play to disengage their consciences so they can perform the acts of violence they would normally abhor.
Moral Justification, Euphemistic Labeling, Advantageous Comparison, Displacement of Responsibility, Diffusion of Responsibility, Disregard or Distortion of Consequences, Dehumanization, Attribution of Blame
COLUMN: American Psychological Association removes psychologists from CIA interrogations
A number of other psychologists have been, and continue to be, used in CIA black sites and Guantanamo Bay, despite petitions to remove said psychologists.
CIA blocked full release of report criticising torture techniques
Not only did those who combed through six million pages of internal CIA documents expose the brutal tactics used by operatives, which included locking detainees in coffin-shaped box for hours or hanging them on a pole for days, they found the practices – which were eventually deemed by the US Supreme Court as outside the Geneva Convention for human rights – didn’t actually lead to the vital information they claimed.
“I walked out of Zero Dark Thirty, candidly,” Dianne Feinstein, the former chairperson of the State Intelligence Committee told the Frontline program. “We were having a showing and I got into it 15 to 20 minutes and I left, I couldn’t handle it because it’s so false.”
Next Cazenovia Forum: A Look Inside the CIA and its Controversies
Over a 34 year career with the CIA, Rizzo made sweeping legal calls on virtually every major issue facing the spy agency, from rules governing waterboarding, “enhanced interrogation” and drones to answering for the Iran Contra scandal.
FORMER CIA LEADERS WRITE BOOK TO WHITEWASH TORTURE HISTORY
The CIA’s torture-era leadership won’t repent. Even after the Senate Select Committee on Intelligence released its report saying in no uncertain terms that the CIA had tortured its prisoners, that torture was official U.S. government policy, and that torture never elicited any actionable intelligence that saved American lives, Bush-era CIA Directors George Tenet, Porter Goss, Michael Hayden, and several of their underlings announced plans to release a book justifying torture.
They intend to repeat a lie over and over again in this book: that torture worked. They hope that the American people are either so gullible or so stupid that they’ll believe it. It’s up to the rest of us to ensure that our government swears off committing this crime against humanity.
I know that these former intelligence leaders are lying because I worked with them at the CIA. When I blew the whistle on the CIA’s torture program in 2007, they came down on me like a ton of bricks.
It’s not necessarily news that these former CIA heavyweights believe in torture, even if they refuse to call it what it is. Many television news outlets still run clips of George Tenet’s 2007 appearance on CBS’s “60 Minutes” in which he repeats “We do not torture! We do not torture!” as though he were unhinged and living in a dream world.
Leadership: Change Not Welcome Here
Since the 1990s there have been increasingly open (public) complaints from users about poor quality work from the U.S. Department of Defense intelligence agencies. This all began in the late 1940s when the CIA was established to coordinate all of the U.S.’s intelligence gathering activities. At that point there began a low level war between the CIA and the Department of Defense.
- What do Don Rumsfeld and others identified with the Pollard Affair fear from his release?
ProPublica and John Kiriakou to receive freedom of speech awards
PEN Center USA, one of two American branches of the international human rights organization, will honor the investigative journalism non-profit ProPublica and the former CIA officer John Kiriakou, who became an inadvertent whistleblower, on November 16 in a ceremony hosted by Aisha Tyler. Though more award winners are yet to be named, these two choices illustrate the wide range of pressures that news organizations currently face.
Dodging Torture (Again)
Last Thursday, Jeb Bush declared to an Iowa audience that he wouldn’t rule out resuming torture practices by the United States government. “I don’t know,” he hedged. “I’m just saying if I’m going to be president of the United States, you take this threat [Islamic State group] seriously.”
Two Thursdays ago, during Fox’s highly watched GOP debate, Megyn Kelly asked presidential candidate Ben Carson whether he would bring back waterboarding. A retired neurosurgeon, Carson replied in the subjunctive, coyly saying that if he were to reinstate torture methods, he wouldn’t broadcast this and “tell everybody what we’re going to do.” As a doctor (think: first do no harm), Carson must have seen countless patients in pain over his career. Even for him to say he might torture is alarming. More appalling is that his polls have since surged, and as of this week, Carson has been statistically named the winner of the Fox debate.
A few days before this debate, Donald Trump told ABC that he thinks “waterboarding doesn’t sound very severe.” This statement would shock us had Trump not already demonstrated his poor understanding of what torture entails, as evidenced by his disparaging remarks about John McCain’s status as a war hero.
- ‘Each one of us can make a difference,’ Ban declares as UN marks World Humanitarian Day
Louis Stokes, first black U.S. congressman from Ohio, dies at 90
In 1967, in a campaign that helped change racial politics in the United States, Carl Stokes was elected to the first of two terms as Cleveland mayor. The next year, Louis Stokes, a lawyer who had brought several cases to the U.S. Supreme Court, won the congressional seat that he would hold until his retirement in 1998.
Bruce Elfant says U.S. about 100th in voter turnout, Texas near bottom too
A Travis County official declared the United States and Texas lag far behind other countries and states in voting.
On Aug. 5, 2015, Democrat Bruce Elfant, the Travis County tax assessor-collector, was interviewed by Dick Ellis of the KOKE-FM Austin Radio Network about the 50th anniversary of President Lyndon B. Johnson signing the Voting Rights Act.
Johnson, Elfant said, “would be very disappointed by the number of Americans who choose to use that right. The United States is about 100th in voter turnout among the industrialized nations and Texas is near the bottom in terms of voter registration and voter turnout,” he said.
‘Guantanamo Diary’ details appalling injustice
I am reading “Guantanamo Diary,” the appalling story of Mohamedou Ould Slahi, who has been unjustly imprisoned at the Guantanamo Bay Naval Base for 12 years.
How was Slahi ever arrested in the first place? Likely because he was an early member of Al-Qaida during the days we conveniently forget, when the CIA channeled funds to the Afghan mujahideen to fight the Soviet occupation of Afghanistan. In other words, Mr. Slahi effectively fought as an ally of the U.S. in 1991-92, after which he left Afghanistan and broke off all relations with Al Qaida.
Justice Department: Appeals Court Wrong To Revive Lawsuit Brought By Immigrants Abused After 9/11
The Justice Department has requested a federal appeals court revisit and reverse its decision to revive a lawsuit against former Justice Department officials, who allegedly violated the rights of Arab or Muslim immigrants when they were detained in the immediate months after the terrorist attacks.
Attorneys for the Justice Department argue, regardless of whether immigrants had their rights violated, former Attorney General John Ashcroft, former FBI Director Robert Mueller, and former Commissioner of the Immigration and Naturalization Service (INS) James W. Ziglar adopted reasonable policies “in an effort to protect the nation during a turbulent time.” The former officials should not be liable for rights violations.
Jimmy Carter’s Legacy. Human Rights in the Abstract versus “Shameful and Indefensible Foreign Policy Positions”
“Carter was the least violent of American presidents but he did things which I think would certainly fall under Nuremberg provisions,” said Noam Chomsky. Much like Nobel Peace-prize winner Barack Obama 30 years later, Carter was an advocate of human rights in the abstract, but of repression and imposition of power through violence in practice.
Like the current occupant of the White House, Jimmy Carter entered office with a promise to respect human rights, but failed miserably when given the opportunity to do so.
DOJ Highlights Media Subpoenas From 2014
…Department of Justice highlighted its attempts at forcing testimony from New York Times reporter James Risen.
Thumbs-down to another Bush in the White House
Recently Jeb Bush said he had a solution to defeat ISIS. He blamed troubles in the Middle East on presidents Bill Clinton and Barack Obama.
He didn’t say anything about his father or brother. These men were presidents and took us to war in the Middle East.
Letter to Jeb Bush: Torture is Never Justifiable
Mr. Bush — or Jeb if you don’t mind — I was greatly disturbed to hear that if you became president you won’t rule out the resumption of the use of torture arguing that brutal questioning methods might be justifiable and necessary in some circumstances. Torture is never justifiable.
President Obama banned CIA torture by executive order in January 2009. I urge you to reconsider your statement concerning torture and agree to leave President Obama’s executive order in place. I don’t want a president who would use tortur
Free Chelsea Manning!
Army Pvt. Chelsea Manning, the heroic WikiLeaks whistleblower and transgender activist currently jailed in the U.S. Penitentiary at Leavenworth, is now being threatened with “indefinite solitary confinement.”
While on active duty in Iraq as an intelligence analyst, Manning released 700,000 classified and sensitive military and diplomatic documents. They revealed details about modern imperialist wars never before made public. This included the infamous “Collateral Murder” tape of a U.S. “Apache” attack helicopter firing on civilians in Baghdad in 2007, killing 11 adults, including two Reuters journalists. Two children were seriously hurt. Manning also exposed previously hidden facts about the torture of U.S. detainees at the U.S. Guantánamo Bay Detention Camp.
A U.S. military judge sentenced Manning to 35 years on charges of “aiding the enemy” — a treasonable offense under the 1917 U.S. Espionage Act. Awaiting trial, she suffered torturous conditions, first held in a cage inside a tent in the Kuwaiti desert, threatened by guards with being “disappeared” to Guantánamo. Then Manning was held in solitary confinement in the Marine Corps Brig at Quantico, Va., where she was under 24-hour guard and subjected to cruel and inhumane treatment.
John M. Crisp: The conversation of torture should be prominent in the 2016 campaign
Two interesting stories appeared in the same edition of my local newspaper last week.
The first involves an awkward problem that Republican presidential candidate Jeb Bush faces: His brother, former president George W. Bush.
Many Republicans have managed to hold their noses when they consider George W. Bush’s administration, especially his unprovoked and ill-advised invasion of Iraq. Jeb Bush has stumbled over this issue several times, looking for ways to put the best face on a huge foreign policy error.
He has admitted that “mistakes were made” and relied on the dubious proposition that “taking out Saddam Hussein turned out to be a pretty good deal.” But this simplistic notion – Saddam Hussein is easy to demonize – depends on the electorate’s failure to notice the chaos that the Iraq War unleashed.
Clerics gather in Egypt to counter extremist fatwas
Top Muslim clerics gathered in Egypt on Monday to address extremist religious edicts in the face of an unprecedented threat from Islamic State group jihadists who have declared a “caliphate”.
The Quiet Demise of the Army’s Plan to Understand Afghanistan and Iraq
The Army created the Human Terrain System — at the height of the counterinsurgency craze that dominated American strategic thinking in Iraq and Afghanistan late in the last decade, with much fanfare — to solve this problem. Cultural training and deep, nuanced understanding of Afghan politics and history were in short supply in the Army; without them, good intelligence was hard to come by, and effective policy making was nearly impossible. Human Terrain Teams, as Human Terrain System units were known, were supposed to include people with social-science backgrounds, language skills and an understanding of Afghan or Iraqi culture, as well as veterans and reservists who would help bind the civilians to their assigned military units.
Ship Transfers Over 1,300 Migrants From Greek Island to Mainland City Port
A ship with 1,308 refugees has left the Greek island of Kos bound for the port city of Thessaloniki, to process the asylum-seekers, the press office of the Greek Ministry of Shipping and the Aegean told Sputnik.
Drones, police violence protest comes through Baraboo
A 90-mile walk to protest drones and racial profiling is scheduled to begin from the Dane County Jail on Tuesday and go through Baraboo on its way to Volk Field, organizers say.
The “Let It Shine!” walk will take place over the course of a week, ending Aug. 25 in the village of Camp Douglas. Volk Field is home to a shadow drone training program and has been the site of numerous protests, including one in 2014 in which a Diocese of Madison priest was arrested for distributing fliers critical of the military’s use of drones.
Black Lives Matter videos, Clinton campaign reveal details of meeting
Throughout the 15-minute conversation, Clinton disagreed with the three activists from Black Lives Matter who had planned to publicly press the 2016 candidate on issues on mass incarceration at an event earlier this month in Keene, New Hampshire.
- Who Was the CIA Official Who Found Torture Revolting? And Other Questions the ACLU Still Has About CIA Torture