EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

09.20.18

Criticism of Unitary Patent (UPC) Agreement Doomed the UPC and Patent Trolls’ Plan — Along With the Litigation Lobby — for Unified ‘Extortion Vector’

Posted in Europe, Patents at 11:46 am by Dr. Roy Schestowitz

But dark clouds remain due to European Patents (EPs) that are leveraged by patent trolls

The natural wonders

Summary: The Unitary Patent or Unified Patent Court (UPC) was the trolls’ weapon against potentially millions of European businesses; but those businesses have woken up to the fact that it was against their interests and European member states such as Spain and Poland now oppose it while Germany halts ratification

TODAY’S EPO works for the litigation 'industry', not for science and technology. Examiners, who are themselves scientists and technologists, are rightly concerned. Will their job merely help trolls blackmail other scientists and technologists? What would happen to Germany if it became all about litigation? As the German Florian Müller told me yesterday: “Trolling with junk patents works best in Germany. With respect to injunctions, worse than the Eastern District of Texas.”

The threat of trolls in Europe is a growing threat; even predating anything similar to the UPC, litigation by trolls is soaring, especially in Germany. Some are using EPs, granted by the EPO. As American right groups such as the EFF can tell, patent trolls that only make a living by threatening lawsuits (and sometimes suing) also threaten and sometimes sue their exposers, their critics. I’ve received some threats (even death threats/death wishes) and the EFF was sued several times. Here is what it wrote a couple of days ago:

EFF to Court: The First Amendment Protects Criticism of Patent Trolls

EFF has submitted an amicus brief [PDF] to the New Hampshire Supreme Court asking it to affirm a lower court ruling that found criticism of a patent owner was not defamatory. The trial judge hearing the case ruled that “patent troll” and other rhetorical characterizations are not the type of factual statements that can be the basis of a defamation claim. Our brief explains that both the First Amendment and the common law of defamation support this ruling.

This case began when patent assertion entity Automated Transactions, LLC (“ATL”) and inventor David Barcelou filed a defamation complaint [PDF] in New Hampshire Superior Court. Barcelou claims to have come up with the idea of connecting automated teller machines to the Internet. As the complaint explains, he tried to commercialize this idea but failed. Later, ATL acquired an interest in Barcelou’s patents and began suing banks and credit unions.

Things aren’t yet this bad in Europe, but they can only get a lot worse if the EPO continues moving in the same trajectory.

Darts-ip has been mentioned this week in relation to a new partnership. Like similar firms in the US that claim to mitigate/reduce the risk from trolls, Darts-ip gathers information to that effect; they help track patent trolls and earlier this year they produced publications for IP2Innovate (speaking out against UPC on behalf of technology firms). This is their latest move:

Minesoft will partner with Darts-ip to include Darts-ip’s collection of patent and intellectual property litigation data on the PatBase database.

PatBase offers a searchable global database of patents, utility models, and designs. As part of the agreement, direct links from PatBase will lead to detailed disclosures in the Darts-ip Case Law database.

[...]

Eric Sergheraert, legal patent manager at Darts-ip, added: “The combination of PatBase’s exhaustive patent database and Darts-ip’s litigation data provides a unique opportunity for patent professionals to streamline and target their searches.”

“We look forward to providing this double insight for our clients and working with PatBase.”

Assuming litigation will grow, Darts-ip expects more ‘business’.

The UPC has all along been the promise of a boon for patent trolls in Europe. It’s pretty obvious and it’s not hard to understand why that might be.

Kluwer Patent Blog was cited by SUEPO today as well as by Team UPC (about Thorsten Bausch), which said (not collectively): “As I have pointed out before, for all practical purposes Art. 87(3) UPCA may be key to the UPC-Brexit conundrum.”

FFII’s Benjamin Henrion said: “UPC: UK might wish to take up any other topic of reforming patent law (e.g. computer-implemented inventions) to the extent that it is not bound by the EPC…”

Thorsten Bausch basically weighed in on a new paper from Germany, introducing it as follows:

A recent study by two eminent scholars from the Max Planck Institute for Innovation and Competition (MPI) on „The Impact of Brexit on Unitary Patent Protection and its Court“, which is available here, casts significant doubts whether it will be possible for the United Kingdom to stay in the UPC Agreement after the UK has left the European Union.

I know that this is to some extent a “hot potato”, and at least a very political topic in patent circles, where different stakeholders hold quite different views, also on this blog. I will try my best to focus on the arguments raised by Professor Dr. Hanns Ullrich and Dr. Matthias Lamping without fury or favour. Before doing so, a note of caution may be appropriate. This „Research Paper“ actually consists of two studies which, as the authors write in their joint General Introduction, have been undertaken spontaneously and independently to reflect such concerns in the authors’ particular field of expertise. Each of them and even more so the paper as a whole is weighty and voluminous: 182 pages in total. Trying to summarize the work that went into this research paper on a blog like this one will inevitably fail to do justice to the authors and their work. Hence, I apologize in advance for all omissions and simplifications and would encourage the readers to read the original source rather than just relying on this „super-executive summary“.

What is the authors’ core thesis and what are their arguments? The authors state that it would neither be in conformity with the EU Treaties, nor politically desirable from a point of view of retaining the EU’s ability to control the conditions of innovation and its legal protection within the Internal Market, if the UPCA were opened to accession by third countries.

[...]

Whether the UPC will ever come into force or not, and whether or not the UK will then be part of it, remains to be seen. The MPI authors certainly have a point in arguing that uncertainty is not good for the UPC system, and that it would be better to clarify the compatibility of the UPCA with EU Law through the CJEU sooner rather than later. But whatever the outcome of such deliberations, it is good that the patent judges of Europe work together and develop a consistent methodology how to approach their respective cases.

From comments (first comment, there aren’t many), noting the difference between litigation (Gordon & Pascoe) and MPI:

It is nice to (finally!) see a report covering the MPI articles reach an IP blog. I believe that it will be very interesting indeed to see what happens next.

Predictably, there have already been attempts by those firmly in the “pro-UPC” camp to dismiss / minimise the significance of the articles. However, to date, this has been done solely by attempting to infer that the MPI authors are somehow lacking in EU law expertise, at least compared to Gordon & Pascoe. In my view, that amounts to nothing more than an unprofessional (and ad hominem) attack upon the credentials of the authors. Frankly, I expected better. Indeed, the whole of the patent profession across Europe DESERVES better. This means addressing the SUBSTANCE of the concerns raised by the authors.

I have to say that I am not going to hold my breath waiting for credible answers to the substantive points raised in the articles. This is not least because one of the main concerns raised relates to Article 267 TFEU. That is precisely the concern that I have repeatedly raised (in this forum and others) over recent years, and to which I have NEVER received a credible answer. No matter how much I would like to be surprised on this point, I do not see a credible answer emerging any time soon … though there will no doubt be a plentiful supply of smoke and mirrors to help the politicians to continue to cling to the belief that there is nothing to worry about.

Blogs like IP Kat have not said a word about it; considering the ties to CIPA, perhaps they just hope nobody will notice what MPI said.

It Wasn’t Judges With Weapons in Their Office, It Was Benoît Battistelli Who Brought Firearms to the European Patent Office (EPO)

Posted in Europe, Patents at 10:18 am by Dr. Roy Schestowitz

Armed and dangerous

Battistelli with Scud

Summary: The EPO scandals deepen in light of a very major scandal which has occupied the French media for a couple of months

THE delusional, painting-himself-as-the-victim Benoît Battistelli is in some headlines again. He probably would rather not be seen right now, especially in light what he’s in headlines for. Some French media (very large networks) approached us for information; Battistelli’s obsession with violence (like terror attacks) is well documented, even if there’s no history of violence at the EPO. Battistelli is a chronic paranoid, having developed an obsession with bodyguards predating his time at the EPO. The hiring of Alexandre Benalla as his 'hitman' was a mere symptom of it. SUEPO has just taken note of it (at long last), having just linked to this new article in French; there’s hopefully an English translation on its way (SUEPO often produces these for articles after linking to them).

“Battistelli is a chronic paranoid, having developed an obsession with bodyguards predating his time at the EPO.”Much of the discussion about it is in French as well, e.g. “[] ah. Benalla trouve que batistelli est un saint ! [] #benalla conseillé du président de l’OEB sur la sécurité… En fait c’est lui qui a passé entre 7 et 9 mois (il sait plus trop #LOL) a harceler les gens et les syndicats… #woké (cc @zoobab ) [] bon, #benalla a fait la securité a l’ #OEB avant d’etre ches @enmarchefr…”

From the article itself (opening paragraphs):

Les sénateurs auditionnant Alexandre Benalla ce mercredi 19 l’ont notamment interrogé sur son parcours professionnel, et son poste de garde du corps de Benoît Battistelli, président de l’Office européen des brevets de 2010 à 2018.

Alexandre Benalla a dit ainsi n’avoir “jamais parlé à Emmanuel Macron” ou à son directeur de cabinet Alexis Kohler de celui qu’il considère comme un “grand serviteur de l’Etat” qui a “eu d’excellents résultats”. Benoît Battistelli traîne cependant une réputation sulfureuse qu’ont soulignée à demi-mot plusieurs sénateurs.

One EPO observer said: “Benalla war auch Leibwächter von Benoît Battistelli, ex-Präsident beim Europäischen Patentamt mit Hauptsitz in München. Pikantes Detail, Benalla hat dem Senatsausschuss mitgeteilt dass er bei der Ausführung seiner Tätigkeit im Patentamt immer eine Waffe trug! Was geht denn da ab?”

An automatic translation of it: “Benalla was also a bodyguard of Benoît Battistelli, former president of the European Patent Office, headquartered in Munich. Spicy detail, Benalla has told the Senate committee that he always wore a gun in the execution of his work in the Patent office! What’s going on?”

“Judge Corcoran was accused by Battistelli of possessing a ‘weapon’ because at his office he actually kept just ordinary sports equipment (club we’ve presumed) he used for exercise purposes.”So it was Battistelli who brought firearms to the EPO while falsely accusing judges of having weapons in their office. We could never quite confirm that Judge Corcoran was accused by Battistelli of possessing a ‘weapon’ because at his office he actually kept just ordinary sports equipment (club we’ve presumed) he used for exercise purposes. The details about this were always quite vague.

It might be interesting to know if António Campinos kept those bodyguards and, if so, how many of them and whether Bergot also gets a pair. If anyone out there has details regarding this matter, please get in touch…

From the point of view of patent quality (our main focus all these years), Campinos has been an utter disaster. They’re organising pro-software patents events and keep promoting this agenda dozens of times per week. It was done about 4 times yesterday (it’s increasing in frequency over time) and such devaluation of European Patents (‘diluting’ whatever value they once had) will deepen the cuts. There are already layoffs in effect, but the media refuses to write about these because the EPO does not publicly acknowledge that.

“There are already layoffs in effect, but the media refuses to write about these because the EPO does not publicly acknowledge that.”Ellie Mertens, writing from New York for a publication that helped Battistell promote the UPC, speaks of “Managing IP’s Life Sciences Forum,” i.e. another think tank (yet another one!) of the litigation ‘industry’, i.e. firms whose contribution is ruinous at best. Notice how sites like these (IAM, Managing IP, IP Kat) totally and very much by intention ceased covering EPO scandals. It’s not because these scandals ended; it’s all about their agenda and the changing roles at these sites.

In the next post we’ll deal with UPC. Moments ago the thought-provoking image below was published.

EPOgate
“Battistelli is only the tip of the iceberg (EPOgate)” (Source)

Links 20/9/2018: 2018 Linux Audio Miniconference and Blackboard’s Openwashing

Posted in News Roundup at 8:10 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

  • Kernel Space

    • Moving Compiler Dependency Checks to Kconfig

      One reason became clear recently when Linus Torvalds asked developers to add an entirely new system of dependency checks to the Kconfig language, specifically testing the capabilities of the GCC compiler.

      It’s actually an important issue. The Linux kernel wants to support as many versions of GCC as possible—so long as doing so would not require too much insanity in the kernel code itself—but different versions of GCC support different features. The GCC developers always are tweaking and adjusting, and GCC releases also sometimes have bugs that need to be worked around. Some Linux kernel features can only be built using one version of the compiler or another. And, some features build better or faster if they can take advantage of various GCC features that exist only in certain versions.

      Up until this year, the kernel build system has had to check all those compiler features by hand, using many hacky methods. The art of probing a tool to find out if it supports a given feature dates back decades and is filled with insanity. Imagine giving a command that you know will fail, but giving it anyway because the specific manner of failure will tell you what you need to know for a future command to work. Now imagine hundreds of hacks like that in the Linux kernel build system.

    • Virtme: The kernel developers’ best friend

      When working on the Linux Kernel, testing via QEMU is pretty common. Many virtual drivers have been recently merged, useful either to test the kernel core code, or your application. These virtual drivers make QEMU even more attractive.

    • After Torvalds’ apology, the Linux community is adopting a new code of conduct
    • Linux programmer developing tools for new open source Code of Conduct
    • Chaos follows Linux dev community’s new code of conduct
    • Linux developers adopt proper Code of Conduct

      Linux leader Linus Torvalds’ admission of anti-social behavior, and his public promise not to do it any more, now has a sequel: a Code of Conduct for the Linux kernel development community.

      The new behavioural document is intended to replace the “Code of Conflict” that Torvalds created in 2015 .

      That 220-word Code did not describe unacceptable behavior and offered no guidance other than “Try to keep in mind the immortal words of Bill and Ted, ‘Be excellent to each other’.”

      The post announcing the new rules says “The Code of Conflict is not achieving its implicit goal of fostering civility” and adds that “Explicit guidelines have demonstrated success in other projects and other areas of the [Linux] kernel.”

    • Linux 4.18.9
    • Linux 4.14.71
    • Linux 4.9.128
    • Linux 4.4.157
    • After Years of Abusive E-mails, the Creator of Linux Steps Aside

      The e-mails of the celebrated programmer Linus Torvalds land like thunderbolts from on high onto public lists, full of invective, insults, and demeaning language. “Please just kill yourself now. The world will be a better place,” he wrote in one. “Guys, this is not a dick-sucking contest,” he observed in another. “SHUT THE FUCK UP!” he began in a third.

      Torvalds has publicly posted thousands of scathing messages targeting programmers who submit what he deems flawed code to the Linux computer-operating-system kernel, which he brought to life more than twenty-five years ago and now administers as a collaborative, open-source project. Today, the Linux kernel is famous, running the enormous computers of Google, PayPal, Amazon, and eBay, and the two billion mobile phones using the Android operating system. Torvalds, though, retains final say over each precious line of code, just as he did when he first started working on the system as a graduate student at the University of Helsinki. For years, he has been known as Linux’s “benevolent dictator for life.”

      On Sunday, the benevolent dictator announced that he would be stepping down temporarily, to “get some assistance on how to understand people’s emotions and respond appropriately.” Torvalds, who is forty-eight and lives with his family outside Portland, Oregon, made clear that he wasn’t burned out. “I very much do want to continue to do this project that I’ve been working on for almost three decades,” he wrote in a post to the Linux-kernel mailing list. “I need to take a break to get help on how to behave differently and fix some issues in my tooling and workflow.” Torvalds named a deputy, Gregory Kroah-Hartman, to run the project while he was away.

    • WireGuard Picks Up A Simpler Kconfig, Zinc Crypto Performance Fix

      WireGuard lead developer Jason Donenfeld sent out the fifth revision of the WireGuard and Zinc crypto library patches this week. They’ve been coming in frequently with a lot of changes with it looking like this “secure VPN tunnel” could reach the Linux 4.20~5.0 kernel.

      With the WireGuard v5 patches there are various low-level code improvements, a “saner” and simpler Kconfig build-time configuration options, a performance regression for tcrypt within the Zinc crypto code has been fixed and is now even faster than before, and there is also now a nosimd module parameter to disable the use of SIMD instructions.

    • Toward better handling of hardware vulnerabilities

      From the kernel development community’s point of view, hardware vulnerabilities are not much different from the software variety: either way, there is a bug that must be fixed in software. But hardware vendors tend to take a different view of things. This divergence has been reflected in the response to vulnerabilities like Meltdown and Spectre which was seen by many as being severely mismanaged. A recent discussion on the Kernel Summit discussion list has shed some more light on how things went wrong, and what the development community would like to see happen when the next hardware vulnerability comes around.

      The definitive story of the response to Meltdown and Spectre has not yet been written, but a fair amount of information has shown up in bits and pieces. Intel was first notified of the problem in July 2017, but didn’t get around to telling anybody in the the Linux community about it until the end of October. When that disclosure happened, Intel did not allow the community to work together to fix it; instead each distributor (or other vendor) was mostly left on its own and not allowed to talk to the others. Only at the end of December, right before the disclosure (and the year-end holidays), were members of the community allowed to talk to each other.

      The results of this approach were many, and few were good. The developers charged with responding to these problems were isolated and under heavy stress for two months; they still have not been adequately thanked for the effort they put in. Many important stakeholders, including distributions like Debian and the “tier-two” cloud providers, were not informed at all prior to the general disclosure and found themselves scrambling. Different distributors shipped different fixes, many of which had to be massively revised before entry into the mainline kernel. When the dust settled, there was a lot of anger left simmering in its wake.

    • Writing network flow dissectors in BPF

      Network packet headers contain a great deal of information, but the kernel often only needs a subset of that information to be able to perform filtering or associate any given packet with a flow. The piece of code that follows the different layers of packet encapsulation to find the important data is called a flow dissector. In current Linux kernels, the flow dissector is written in C. A patch set has been proposed recently to implement it in BPF with the clear goal of improving security, flexibility, and maybe even performance.

    • Coscheduling: simultaneous scheduling in control groups

      The kernel’s CPU scheduler must, as its primary task, determine which process should be executing in each of a system’s processors at any given time. Making an optimal decision involves juggling a number of factors, including the priority (and scheduling classes) of the runnable processes, NUMA locality, cache locality, latency minimization, control-group policies, power management, overall fairness, and more. One might think that throwing another variable into the mix — and a complex one at that — would not be something anybody would want to attempt. The recent coscheduling patch set from Jan Schönherr does exactly that, though, by introducing the concept of processes that should be run simultaneously.

      The core idea behind coscheduling is the marking of one or more control groups as containing processes that should be run together. If one process in a coscheduled group is running on a specific set of CPUs (more on that below), only processes from that group will be allowed to run on those CPUs. This rule holds even to the point of forcing some of the CPUs to go idle if the given control group lacks runnable processes, regardless of whether processes outside the group are runnable.

      Why might one want to do such a thing? Schönherr lists four motivations for this work, the first of which is virtualization. That may indeed be the primary motivation, given that Schönherr is posting from an Amazon address, and Amazon is rumored to be running a virtualized workload or two. A virtual machine usually contains multiple processes that interact with each other; these machines will run more efficiently (and with lower latencies) if those processes can run simultaneously. Coscheduling would ensure that all of a virtual machine’s processes are run together, maximizing locality and minimizing the latencies of the interactions between them.

    • Machine learning and stable kernels

      There are ways to get fixes into the stable kernel trees, but they require humans to identify which patches should go there. Sasha Levin and Julia Lawall have taken a different approach: use machine learning to distinguish patches that fix bugs from others. That way, all bug-fix patches could potentially make their way into the stable kernels. Levin and Lawall gave a talk describing their work at the 2018 Open Source Summit North America in Vancouver, Canada.

      Levin began with a quick introduction to the stable tree and how patches get into it. When a developer fixes a bug in a patch they can add a “stable tag” to the commit or send a mail to the stable mailing list; Greg Kroah-Hartman will then pick up the fix, evaluate it, and add it to the stable tree. But that means that the stable tree is only getting the fixes that are pointed out to the stable maintainers. No one has time to check all of the commits to the kernel for bug fixes but, in an ideal world, all of the bug fixes would go into the stable kernels. Missing out on some fixes means that the stable trees will have more security vulnerabilities because the fixes often close those holes—even if the fixer doesn’t realize it.

    • Trying to get STACKLEAK into the kernel

      The STACKLEAK kernel security feature has been in the works for quite some time now, but has not, as yet, made its way into the mainline. That is not for lack of trying, as Alexander Popov has posted 15 separate versions of the patch set since May 2017. He described STACKLEAK and its tortuous path toward the mainline in a talk [YouTube video] at the 2018 Linux Security Summit.

      STACKLEAK is “an awesome security feature” that was originally developed by The PaX Team as part of the PaX/grsecurity patches. The last public version of the patch set was released in April 2017 for the 4.9 kernel. Popov set himself on the goal of getting STACKLEAK into the kernel shortly after that; he thanked both his employer (Positive Technologies) and his family for giving him working and free time to push STACKLEAK.

      The first step was to extract STACKLEAK from the more than 200K lines of code in the grsecurity/PaX patch set. He then “carefully learned” about the patch and what it does “bit by bit”. He followed the usual path: post the patch, get feedback, update the patch based on the feedback, and then post it again. He has posted 15 versions and “it is still in progress”, he said.

    • Linux Foundation

      • 2018 Linux Audio Miniconference

        As in previous years we’re trying to organize an audio miniconference so we can get together and talk through issues, especially design decisons, face to face. This year’s event will be held on Sunday October 21st in Edinburgh, the day before ELC Europe starts there.

      • How Writing Can Expand Your Skills and Grow Your Career [Ed: Linux Foundation article]

        At the recent Open Source Summit in Vancouver, I participated in a panel discussion called How Writing can Change Your Career for the Better (Even if You don’t Identify as a Writer. The panel was moderated by Rikki Endsley, Community Manager and Editor for Opensource.com, and it included VM (Vicky) Brasseur, Open Source Strategy Consultant; Alex Williams, Founder, Editor in Chief, The New Stack; and Dawn Foster, Consultant, The Scale Factory.

      • At the Crossroads of Open Source and Open Standards [Ed: Another Linux Foundation article]

        A new crop of high-value open source software projects stands ready to make a big impact in enterprise production, but structural issues like governance, IPR, and long-term maintenance plague OSS communities at every turn. Meanwhile, facing significant pressures from open source software and the industry groups that support them, standards development organizations are fighting harder than ever to retain members and publish innovative standards. What can these two vastly different philosophies learn from each other, and can they do it in time to ensure they remain relevant for the next 10 years?

    • Graphics Stack

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Multiboot Pinebook KDE neon

        Here’s a picture of my Pinebook running KDE neon — watching Panic! At the Disco’s High Hopes — sitting in front of my monitor that’s hooked up to one of my openSUSE systems. There are still some errata, and watching video sucks up battery, but for hacking on documentation from my hammock in the garden, or doing IRC meetings it’s a really nice machine.

        But one of the neat things about running KDE neon off of an SD card on the Pinebook is that it’s portable — that SD card can move around. So let’s talk about multiboot in the sense of “booting the same OS storage medium in different hardware units” rather than “booting different OS from a medium in a single hardware unit”. On these little ARM boards, u-boot does all the heavy lifting early in the boot process. So to re-use the KDE neon Pinebook image on another ARM board, the u-boot blocks need to be replaced.

    • GNOME Desktop/GTK

      • Glade in Libre Application Summit

        As usual, it was a great opportunity to catch up with old friends and make new ones specially outside the GNOME community.

        This opportunity I talked about the plans I have to integrate Glade with Gnome Builder and other IDEs

  • Distributions

  • Devices/Embedded

Free Software/Open Source

  • Solving the storage dilemma with open source storage

    Business IT is facing storage growth that’s exceeding even the highest estimates, and there’s no sign of it slowing down anytime soon. Unstructured data in the form of audio, video, digital images and sensor data now makes up an increasingly large majority of business data and presents a new set of challenges that calls for a different approach to storage.

    For CIOs, storage systems that are able to provide greater flexibility and choice, as well as the capability to better identify unstructured data in order to categorise, utilise and automate the management of it throughout its lifecycle are seen as the ideal solution.

    One answer to solving the storage issue is software defined storage (SDS) which separates the physical storage hardware (data plane) from the data storage management logic or ‘intelligence’ (control plane). Needing no proprietary hardware components, SDS is the perfect cost-effective solution for enterprises as IT can use off-the-shelf, low-cost commodity hardware which is robust and flexible.

  • New Open Source Library Nyoka Aids AI, Data Science

    Software AG launches Nyoka, an open source library that eases transforming machine learning and AI models into standard Predictive Model Markup Language.

    Data scientists may breathe a little easier with Software AG’s launch of a new open source library that eases the transformation of machine learning and artificial intelligence (AI) models into an industry-standard language.

    The Frankfurt-based company released its Nyoka library that enables data scientists to transform models for predictive analytics, AI and machine learning into the industry standard Predictive Model Markup Language (PMML). It unveiled Nyoka at the Big Data Conference in Santa Clara, CA, this week.

  • Deutsche Telekom and Aricent Create Open Source Edge Software Framework

    Deutsche Telekom and Aricent today announced the creation of an Open Source, Low Latency Edge Compute Platform available to operators, to enable them to develop and launch 5G mobile applications and services faster. The cost-effective Edge platform is built for software-defined data centers (SDDC) and is decentralized, to accelerate the deployment of ultra-low latency applications. The joint solution will include a software framework with key capabilities for developers, delivered as a platform-as-a-service (PaaS) and will incorporate cloud-native Multi-access edge computing (MEC) technologies.

  • A Deeper Look at Sigma Prime’s Lighthouse: An Open-Source Ethereum 2.0 Client
  • Web Browsers

    • Mozilla

      • Notable moments in Firefox for Android UA string history
      • Dweb: Creating Decentralized Organizations with Aragon

        With Aragon, developers can create new apps, such as voting mechanisms, that use smart contracts to leverage decentralized governance and allow peers to control resources like funds, membership, and code repos.

        Aragon is built on Ethereum, which is a blockchain for smart contracts. Smart contracts are software that is executed in a trust-less and transparent way, without having to rely on a third-party server or any single point of failure.

        Aragon is at the intersection of social, app platform, and blockchain.

  • Databases

    • PostgreSQL 11: something for everyone

      PostgreSQL 11 had its third beta release on August 9; a fourth beta (or possibly a release candidate) is scheduled for mid-September. While the final release of the relational database-management system (currently slated for late September) will have something new for many users, its development cycle was notable for being a period when the community hit its stride in two strategic areas: partitioning and parallelism.

      Partitioning and parallelism are touchstones for major relational database systems. Proprietary database vendors manage to extract a premium from a minority of users by upselling features in these areas. While PostgreSQL has had some of these “high-tier” items for many years (e.g., CREATE INDEX CONCURRENTLY, advanced replication functionality), the upcoming release expands the number considerably. I may be biased as a PostgreSQL major contributor and committer, but it seems to me that the belief that community-run database system projects are not competitive with their proprietary cousins when it comes to scaling enterprise workloads has become just about untenable.

  • Pseudo-Open Source (Openwashing)

  • BSD

    • LLVM 7 improves performance analysis, linking

      The developers behind LLVM, the open-source framework for building cross-platform compilers, have unveiled LLVM 7. The new release arrives right on schedule as part of the project’s cadence of major releases every six months.

      LLVM underpins several modern language compilers including Apple’s Swift, the Rust language, and the Clang C/C++ compiler. LLVM 7 introduces revisions to both its native features and to companion tools that make it easier to build, debug, and analyze LLVM-generated software.

    • LLVM 7.0.0 released
  • FSF/FSFE/GNU/SFLC

  • Openness/Sharing/Collaboration

    • Open Hardware/Modding

      • Visual Schematic Diffs in KiCAD Help Find Changes

        In the high(er)-end world of EDA tools like OrCAD and Altium there is a tight integration between the version control system and the design tools, with the VCS is sold as a product to improve the design workflow. But KiCAD doesn’t try to force a version control system on the user so it doesn’t really make sense to bake VCS related tools in directly. You can manage changes in KiCAD projects with git but as [jean-noël] notes reading Git’s textual description of changed X/Y coordinates and paths to library files is much more useful for a computer than for a human. It basically sucks to use. What you really need is a diff tool that can show the user what changed between two versions instead of describe it. And that’s what plotgitsch provides.

  • Programming/Development

    • The best editor for PHP developers who work in Linux OS

      Every programmer knows that coding is fun! Don’t you agree with me? However, to be an absolutely professional PHP developer, we have to know a lot about all the specific details of coding.

      Selecting the editor you are going to use to happily code is not an easy decision and must be taken unhurriedly.

      If you are a beginner, you may try a great code editor with a rich functionality and very flexible customization which is known as Atom Editor, the editor of the XXI century. You may say that we have many pretty alternatives available. Read the explanation below, and the introduced information will knock you off!

Leftovers

  • eSports Milestone: Pro Gamer Ninja To Be The First Pro Gamer Featured On ESPN Magazine Cover

    We have been tracking milestones in the maturity of eSports as a real cultural pastime for several years now, given how eSports almost perfectly intersects two main topics here at Techdirt: technology and digital economies. While those that claimed eSports would become a real thing have long been the recipients of skeptical narrow eyes, pro gaming has already zoomed past a number of important checkpoints on its way to legitimacy. Tournaments were heavily viewed overseas at first, but pro gaming then became recognized by universities for athletic scholarships. Next came coverage of tournaments on ESPN, followed eSports leagues being created by some of the major professional sports leagues in America and abroad. Even the IOC kicked around the idea of including eSports in future Olympic Games.

    While the latest milestone perhaps isn’t as grand as the opening of leagues and new broadcast channels, it is still a notable development that the very first pro gamer will be featured on the cover of ESPN The Magazine this week. That honor will go to Tyler “Ninja” Blevins, who has amassed an enormous following on Twitch and elsewhere.

  • Hardware

    • The New iPhone XR Has A Critical Flaw And Why You Should Skip It

      This year Apple actually launched three phones, like last year. But we got two different lineups, the XS and XR. iPhones still have the best chips, the A12 Bionic, but they still lag behind in displays, specially when they are compared to the likes of Samsung.

      It was only last year that they moved to OLED displays with the iPhone X. Whereas Android flagships have them for quite sometime now. The new iPhone XS models actually have a OLED display with a resolution of 2436×1125 and a ppi of 458. These are fairly decent display specs for a flagship phone.

  • Health/Nutrition

    • UN Declaration On Noncommunicable Diseases Upholds Intellectual Property Flexibilities

      After weeks of uncertainty among civil society organisations as to whether or not the United Nations political declaration on noncommunicable diseases (NCDs) would uphold language on intellectual property flexibilities for affordable access to medicines, the document was finalised today with even stronger language affirming the use of these flexibilities.

  • Security

    • Security updates for Wednesday
    • State Department Still Sucks At Basic Cybersecurity And Senators Want To Know Why

      The senators are hoping the State Department will have answers to a handful of cybersecurity-related questions by October 12th, but given the agency’s progress to compliance with a law that’s been on the book for two years at this point, I wouldn’t expect responses to be delivered in a timelier fashion.

      The agency’s track record on security isn’t great and these recent developments only further cement its reputation as a government ripe for exploitation. The agency’s asset-tracking program only tracks Windows devices, its employees are routinely careless with their handling of classified info, and, lest we forget, its former boss ran her own email server, rather than use the agency’s. Of course, given this long list of security failures, there’s a good possibility an off-site server had more baked-in security than the agency’s homebrew.

    • EternalBlue Vulnerability Puts Pirated Windows Systems at Malware Risk [Ed: Microsoft's collusion with the NSA (for US-controlled back doors) continues to cost billions... paid by people who foolishly chose or accepted PCs with Windows.]

      A particular vulnerability that has been codenamed EternalBlue is to be blamed for this misfortune. The malware risk especially affects computers which use pirated Windows versions. This gap in security has its traces back in the legacies of US secret service NSA. Even after several years, many systems continue to be vulnerable. For more than three years, US intelligence was using it for performing hidden attacks on all kinds of targets. The agency finally had to leak the vulnerability to Microsoft due to the danger of hacking by a famous hacker group, Shadow Brokers. Microsoft then consequently had to abandon a patch day for the very first time in the company’s history for filling in the gap as quickly as possible.

    • Debian Outs Updated Intel Microcode to Mitigate Spectre V4 and V3a on More CPUs

      The Debian Project released an updated Intel microcode firmware for users of the Debian GNU/Linux 9 “Stretch” operating system series to mitigate two of the latest Spectre vulnerabilities on more Intel CPUs.

      Last month, on August 16, Debian’s Moritz Muehlenhoff announced the availability of an Intel microcode update that provided Speculative Store Bypass Disable (SSBD) support needed to address both the Spectre Variant 4 and Spectre Variant 3a security vulnerabilities.

      However, the Intel microcode update released last month was available only for some types of Intel CPUs, so now the Debian Project released an updated version that implements SSBD support for additional Intel CPU models to mitigate both Spectre V4 and V3a on Debian GNU/Linux 9 “Stretch” systems.

    • Announcing Extended Security Maintenance for Ubuntu 14.04 LTS – “Trusty Tahr” [Ed: Canonical looking to profit from security flaws in Ubuntu like Microsoft does in Windows.]

      Ubuntu is the basis for the majority of cloud-based workloads today. With over 450 million public cloud instances launched since the release of Ubuntu 16.04 LTS, a number that keeps accelerating on a day-per-day basis since, many of the largest web-scale deployments are using Ubuntu. This includes financial, big data, media, and many other workloads and use cases, which rely on the stability and continuity of the underlying operating system to provide the mission-critical service their customers rely on.

      Extended Security Maintenance (ESM) was introduced for Ubuntu 12.04 LTS as a way to extend the availability of critical and important security patches beyond the nominal End of Life date of Ubuntu 12.04. Organisations use ESM to address security compliance concerns while they manage the upgrade process to newer versions of Ubuntu under full support. The ability to plan application upgrades in a failsafe environment continues to be cited as the main value for adoption of ESM. With the End of Life of Ubuntu 14.04 LTS in April 2019, and to support the planning efforts of developers worldwide, Canonical is announcing the availability of ESM for Ubuntu 14.04.

    • Canonical Announces Ubuntu 14.04 LTS (Trusty Tahr) Extended Security Maintenance

      Canonical announced today that it would extend its commercial Extended Security Maintenance (ESM) offering to the Ubuntu 14.04 LTS (Trusty Tahr) operating system series starting May 2019.

      Last year on April 28, 2017, when the Ubuntu 12.04 LTS (Precise Pangolin) operating system series reached end of life, Canonical announced a new way for corporate users and enterprises to receive security updates if they wanted to keep their current Ubuntu 12.04 LTS installations and had no plans to upgrade to a newer LTS (Long Term Support) release. The offering was called Extended Security Maintenance (ESM) and had a great success among businesses.

    • Canonical reveals Ubuntu Linux 14.04 LTS ‘Trusty Tahr’ Extended Security Maintenance (ESM) plans
    • BlackArch Linux Ethical Hacking OS Now Has More Than 2000 Hacking Tools

      The BlackArch Linux penetration testing and ethical hacking computer operating system now has more than 2000 tools in its repositories, announced the project’s developers recently.

      Used by thousands of hundreds of hackers and security researchers all over the world, BlackArch Linux is one of the most acclaimed Linux-based operating systems for hacking and other security-related tasks. It has its own software repositories that contain thousands of tools.

      The OS is based on the famous Arch Linux operating system and follows a rolling release model, where users install once and receive updates forever, or at least until they do something that can’t be repaired and need to reinstall.

    • Video: Hackers To The Rescue – Defining Good Hacking

      Noci, the fictional city attacked by malevolent hackers during ICON2018, was saved and the challenge was won by a Swiss team. What is a hacker, how do they define themselves? Two members of ICON, a young non-governmental organisation in Geneva, answered that question for Intellectual Property Watch, with the same affirmation: a hacker is first and foremost a curious mind. View the IP-Watch video interviews below.

      ICON 2018, “The journey to digital trust” co-organised by ICON, the Geneva Centre for Security Policy (GCSP,) and the MCI group, took place on 13-14 September. The event held what the organisers qualified as the “World premiere cyber-attack simulation.”

      Participants came from France, Italy, Norway and Switzerland, selected after a qualifying competition at the global level, according to an ICON press release. In the end, the challenge was won by Swiss participants Team Sw1ss, it said.

  • Defence/Aggression

    • Trump is unshackling America’s drones thanks to Obama’s weakness

      For more than a decade, the worst-kept secret in the world has been the fact that the Central Intelligence Agency owns and operates lethal drones outside of recognized battlefields abroad. Newspapers blare it from their headlines. Legislators discuss it on television. Foreign governments protest it through press releases. And, of course, human beings witness it through the death and destruction foisted upon their communities.

      Still, according to the US government and the federal courts, the CIA’s operation of drones to hunt and kill terrorism suspects – a campaign that has killed thousands of people, including hundreds of children, in places like Pakistan, Yemen, and Somalia – remains an official secret.

      Toward the end of the Obama administration, the president moderately circumscribed the agency’s role in executing lethal strikes abroad, in part to increase public transparency. Compared to the US military (which also uses lethal force abroad), the CIA is relatively less accountable to policy makers, members of Congress, and the American public. With a diminished role in targeted killings, it appeared then that the CIA’s official secrecy was becoming less important to the overall drone program. But as critics warned could happen, President Trump quickly lifted many of the late-Obama-era limits while ramping up the government’s use of lethal drones abroad and reportedly putting the CIA back in the drone business.

    • Death Of Jon Burge: Commander Set Standard For Police Terror In Chicago

      Former Chicago police commander Jon Burge was involved with several officers in the torture of more than 110 black men. He was never held fully accountable for the trauma inflicted on black communities and died on September 19.

      At the trial for former Officer Jason Van Dyke, who is accused of murdering Laquan McDonald, former Fraternal Order of Police president Dean Angelo spoke about Burge.

      “Jon Burge put a lot of bad guys in prison,” Angelo stated. “You know, people picked a career apart that was considered for a long time to be an honorable career and a very effective career.”

      Angelo added, “And I don’t know that Jon Burge got a fair shake based on the years and years and years of service that he gave the city. But we’ll have to wait and see how that eventually plays out in history, I guess.”

      The FOP argued the “full story” of the Burge cases has never been told. They clearly plan to keep spreading propaganda about Burge’s actions, even after death, because the reality of his conduct left such a stain on the reputation of the Chicago Police Department.

      Burge and his “Midnight Crew” engaged in the torture of dozens of black men from 1972 to 1981. This came directly after the civil rights movement and rise of groups organizing for black power. In fact, Fred Hampton, chairman of the Illinois Black Panther Party, was assassinated by Chicago police in 1969 (along with fellow Black Panther Mark Clark).

  • Transparency/Investigative Reporting

    • WikiLeaks denies Julian Assange sought Russian visa

      WikiLeaks has denied publisher Julian Assange sought a visa from Russia, disputing a recently leaked letter written to Moscow’s consulate in London shortly after the website first started releasing classified U.S. diplomatic documents.

      The anti-secrecy organization pushed back on social media Monday after The Associated Press released a “letter of authority to the Russian consulate” from Mr. Assange dated Nov. 30, 2010, two days after WikiLeaks began releasing hundreds of thousands of sensitive U.S. Department of State cables.

      “I, Julian Assange, hereby grant full authority to my friend, Israel Shamir, to both drop off and collect my passport, in order to get a visa,” said the letter.

      WikiLeaks declined to comment for the AP’s reporting on the letter, instead taking to Twitter to dispute its authenticity in dozens of tweets.

      “Mr. Assange did not apply for such a visa at any time or author the document,” WikiLeaks said in a statement posted at least 35 times by its official Twitter account following publication of the AP’s report.

    • Tanzania Plans To Outlaw Fact-Checking Of Government Statistics

      As the iAfrikan article points out, the amendments will mean that statistics published by the Tanzanian government must be regarded as correct, however absurd or obviously erroneous they might be. Moreover, it will be illegal for independent researchers to publish any other figures that contradict, or even simply call into question, official statistics.

      This is presumably born of a thin-skinned government that wants to avoid even the mildest criticism of its policies or plans. But it seems certain to backfire badly. If statistics are wrong, but no one can correct them, there is the risk that Tanzanian businesses, organizations and citizens will make bad decisions based on this dodgy data. That could lead to harmful consequences for the economy and society, which the Tanzanian government might well be tempted to cover up by issuing yet more incorrect statistics. Without open and honest feedback to correct this behavior, there could be an ever-worsening cascade of misinformation and lies until public trust in the government collapses completely. Does President Magufuli really want that?

  • Privacy/Surveillance

    • Android Phones Now Share Precise Location Data With More 911 Call Centers

      More Android phones will share your precise location when you call 911 in the United States, thanks to a couple of new partnerships worked out by Google. The change will save lives.

      Most 911 calls come from cell phones, but until recently mobile devices didn’t share your precise location with emergency dispatchers. Phone companies can provide a rough location, but your phone’s GPS capabilities are a lot more accurate.

    • Google Home Hub Images Leaked; To Be Launched On October 9 With Pixel 3
    • [Exclusive] Google Home Hub To Be Launched On October 9; A Smart Speaker with 7-inch Display
    • Congress Fails To Include A Single Consumer Advocate In Upcoming Privacy Hearing

      As the U.S. ponders what meaningful privacy protections should look like in the Comcast & Cambridge Analytica era, it should probably go without saying that consumers should be part of that conversation. Unsurprisingly, that hasn’t really been the case so far. That was exemplified, in part, by the GOP’s decision to neuter FCC broadband privacy rules much the same way they dismantled net neutrality: by ignoring any consumer-oriented input that didn’t gel with their pre-existing beliefs: namely that all regulation is always bad and a nuanced conversation on the merits of each instance of regulation simply isn’t necessary.

      When a “conversation” does occur, it tends to be superficial at best, and consumers pretty consistently aren’t invited to the table. Case in point: on September 26, the Senate Commerce Committee will be holding a hearing entitled “Examining Safeguards for Consumer Data Privacy.” One of the motivating reasons for this hearing, at least according to Senator John Thune,

  • Civil Rights/Policing

    • I Came to the U.S. Fleeing Horrific Abuse in My Home Country. Jeff Sessions Wants to Send People Like Me Back.

      People like me come from countries where the justice system does not protect women and girls. To deny us refuge says our lives mean nothing.

      I don’t have a lot of memories of my childhood that don’t involve violence. My father beat my mother up all the time in our hometown a few hours outside of Mexico City. He hit her with his hands and with any object he could find. Several times he used a knife to cut her. I think my father’s sexual abuse of me started when I was 4 or 5.

      I lived in terror of this man who claimed my body as his and thought of me as disposable. He could hit me or touch my most private parts. He could threaten to hurt my mother to get me to do what he wanted. I often wanted to die — and several times I tried to. The authorities in Mexico did nothing to help me, and even when I was hospitalized after a suicide attempt, there were no questions and no follow-up.

      In June, Attorney General Jeff Sessions announced that immigrants fleeing domestic abuse and gang violence generally would no longer be eligible for asylum in the United States. Since then, asylum officers have been rejecting applicants who fear domestic and sexual violence in their home countries. It’s so hard for me to understand this new policy because the reason I am alive today is because I was granted asylum in the United States.

      People like me come from countries where the police and justice system do not protect women and girls. For the United States to deny us refuge says our lives mean nothing.

      The abuse I suffered is very difficult for me to recount. Even now, when I do, it gives me nightmares. My father would touch me inside my pants when my mother was in the kitchen cooking or when my two younger brothers were playing in the same room. He threatened to hurt me and my mom if I said no.

      It was a promise he kept.

    • ‘When Governments Fail to Take Action, They Step In’

      John Bolton, currently Trump’s national security advisor, savors violent imagery. The International Criminal Court, Bolton wrote last year—referring to the international body founded in 1998 to prosecute war crimes—should be “strangle[d]… in its cradle.” This week, in a speech to the Federalist Society, broadcast by C-SPAN, Bolton declared the ICC “the founders’ worst nightmare come to life” and “dead to us,” an “outright dangerous” entity from whom the US “will use any means necessary to protect its citizens.”

      Yes, this is bombast—typical “the US makes its own rules,” “if you aren’t for us you’re agin’ us,” “diplomacy is for suckers” chest-thumping. Reuters called it taking a “tough stance.” The New York Times chose “unyielding.” But what should those interested in peace and justice think? And what do others around the world think, when the US declares itself officially unaccountable when it comes to the worst kinds of crimes?

    • Private Trash Haulers Resist New Safety Measures

      On its face, the agenda for the Business Integrity Commission’s public hearing on Monday seemed uncontroversial enough: The agency that oversees New York City’s private garbage industry wanted to adopt new safety measures requiring trash companies to regularly report accidents, traffic violations and license suspensions involving their truck drivers.

      Turns out, the measures struck the private trash haulers as too much. Testifying before the BIC, industry members called the measures “onerous.” They said they were suspicious about what the oversight body would do with the information, although they did not spell out what they feared. They even sought to question what, exactly, constituted a “crash” worth reporting.

      “I start with the definition of crash in the proposed regulations,” Thomas Toscano, chief executive officer of Mr. T Carting, said. “In a highly populated area with millions of parked cars and over 100,000 customers picked up nightly, small property damage incidents are bound to happen. Cars suffer minor damages and carters pay to resolve these issues many times without going through insurance.”

    • Amid Accusations of Age Bias, IBM Winds Down a Push for Millennial Workers

      Faced with a mounting pile of lawsuits accusing it of age discrimination — the latest, a class action, was filed this week in federal district court in New York — tech giant IBM appears to be winding down its Millennial Corps, an internal network of young employees that’s been cited in several legal complaints as evidence of the company’s bias toward younger workers.

      ProPublica reported in March that IBM, which had annual revenue of $79 billion in 2017, had ousted an estimated 20,000 U.S. employees ages 40 or older in the past five years, in some instances using money saved from the departures to hire young replacements to, in the words of an internal company document, “correct seniority mix.”

      IBM deployed several strategies to attract younger workers, establishing a digital platform catering to millennials, a blog called “The Millennial Experience,” a Twitter account, @IBMillennial, as well as creating the Millennial Corps, whose members company executives pledged to consult about major business moves. The Corps was featured in a 2016 FastCompany piece titled “These Millennials Have Become the Top Decision Makers at IBM.”

    • Justice Department Inspector General to Investigate DEA Program Linked to Massacres in Mexico

      The Justice Department’s inspector general announced on Tuesday that his office would investigate a Drug Enforcement Administration program linked to violent drug cartel attacks in Mexico that have left dozens, possibly hundreds, of people dead or missing.

      In a letter to senior congressional Democrats, Inspector General Michael E. Horowitz said that an internal review had flagged the DEA’s Sensitive Investigative Units program as “an area of high risk.” His office, he wrote, would examine the drug agency’s management of the program and whether internal controls are in place to ensure that “DEA operations, information and personnel are protected from compromise.”

      Under the program, the DEA vets and trains teams of Mexican federal police officers, known as SIUs, that conduct DEA-led operations in Mexico. Last year, ProPublica and National Geographic reported that at least two such operations were compromised and triggered deadly spasms of violence, including one that occurred less than an hour’s drive away from the Mexican border with Texas. A June 2017 story revealed that an attack on the small ranching town of Allende in the Mexican state of Coahuila in 2011 was unleashed after sensitive information obtained during a DEA operation wound up in the hands of cartel leaders, who ordered a wave of retaliation against suspected traitors.

    • At Trial, Officers Undermine Notion Jason Van Dyke Feared For His Life When Killed Laquan McDonald

      Brandon Smith, who sued the city of Chicago to force the release of video of the shooting that killed Laquan McDonald, is covering CPD Officer Jason Van Dyke’s murder trial for Shadowproof.

      Please help us reach our $1400 to fund our reporting (learn more here).

      Often in cases where a police officer is charged with murder, the predictions of the most cynical observers turn out to be correct—the officer escapes the “justice system” into which they have processed so many others.

      But in this case, the murder trial of Jason Van Dyke, the former Chicago police officer who shot 17-year-old Laquan McDonald 16 times, the outcome truly seems up for grabs.

      It is the first time an on-duty Chicago police officer has been charged with murder since anyone in the city can remember. And it represents a small part of a system trying to attack its cancer. Someone from inside the department tipped off a journalist to bring the case to light. Plenty of officers have also fought against accountability, beginning with those who “shooed away” witnesses to the homicide, and according to a civil suit, took at least one witness into custody overnight to tell her something akin to “you didn’t see what you think you saw.”

      So far, in Van Dyke’s trial, two police officers have testified that they didn’t use lethal force (or indeed any force) because at the scene they decided it wasn’t necessary. Another officer, Joe Walsh, who was shift partner of the accused that night, stood by Van Dyke seemingly at every turn in his testimony—at one point standing in the middle of the courtroom to demonstrate how he remembered Laquan moving before the shooting.

    • New Bill Would Ensure No Woman Is Forced to Give Birth in Chains

      The practice of shackling pregnant women who are incarcerated is as shocking as it is widespread.

      When a woman becomes pregnant, the nature of her health care by necessity becomes tailored to her being pregnant. This is no less true when a pregnant woman is incarcerated. But corrections officials across the nation would often rather ignore the fact and needs of incarcerated pregnant women than address their health care needs or even their basic rights. For example, pregnant prisoners are often shackled during childbirth in this country as well as put in solitary confinement, practices that are as shocking as they are pervasive.

      When a woman goes to prison or jail, the criminal justice system is very likely to treat her not as a woman with needs particular to women, but as a smaller, more docile man. And they are treated that way even when they are in a hospital setting. This is flawed, and its consequences are great.

      Male prisoners are routinely shackled when taken to a hospital when they are considered a flight risk. The reason this rubric has extended to women is not because anyone has thought about the needs and realities of incarcerated women, but because male prisoners are the baseline for all criminal justice and corrections policies. This one-size-fits-all approach puts women at severe and unnecessary risk.

      Fortunately, there is now a bipartisan effort in Congress to begin eliminating dangerous and degrading practices for pregnant women. The Pregnant Women in Custody Act (PWCA) places strict limits on the use of shackles and solitary confinement on pregnant women in federal prison and in the custody of the United States Marshals Service. It also sets forth basic standards for pregnancy care.

    • State Cops Accidentally Out Their Surveillance Of Anti-Police Groups With Browser Screenshot

      A little opsec goes a long way. The Massachusetts State Police — one of the most secretive law enforcement agencies in the nation — gave readers of its Twitter feed a free look at the First Amendment-protected activities it keeps tabs on… by uploading a screenshot showing its browser bookmarks.

      Alex Press of Jacobin Magazine was one of the Twitter users to catch the inadvertent exposure of MSP operations.

    • The Disappeared

      Every few minutes, Miguel’s phone pinged with messages, distracting him. Carlota asked who kept texting him and he answered, with teenage vagueness, “Just a boy from school.”

      Carlota was just over 5 feet, with thick black hair that fell midway down her back. At 5-foot-10, Miguel towered over her. As he tried on clothes in the dressing room, he teased her, “Why did you make me so handsome?”

      The messages kept coming. They were from Alexander, a classmate of Miguel’s at Brentwood High on Long Island, and promised a taste of cool on a dull and frigid February afternoon. “Hey, let’s smoke up today,” Alexander wrote on Facebook Messenger.

      “No way. You’re so bad — what did you do?” Miguel responded.

      Miguel eventually agreed to join him, but not until later, and he wanted to bring a friend. “No, only us,” came the response. “We’ll get the blunts. That man Jairo is going to treat you. But just you, dog. I can pick you up and bring you here with us. But just us.”

      After lunch, Carlota dropped Miguel at a neighbor’s to play video games, calling out to be careful as he jumped out of the car and ran across the quiet street. A man had recently been found dead in the woods, and she was worried.

      Miguel and Alexander switched to Facebook voice messages. “Should I wait for you in the woods?” said Alexander, whose Facebook handle was Alexander Lokote, Spanish slang for “Homeboy.”

      “No, better at my house — I don’t like to go out there in the trees,” Miguel said, pressing the phone close to his mouth to be heard over the video game music.

  • Intellectual Monopolies

    • Trademarks

      • Hollywood Chamber Of Commerce Trademark Bullies Kevin Smith’s Podcast Over Hollywood Sign

        The Hollywood Chamber of Commerce is somewhat infamous for its constant trademark bullying over the famed Hollywood sign (you know the one). Its latest target is apparently the Hollywood Babble-On podcast that is done as a live show each week by radio/podcast guy Ralph Garman and filmmaker/entertainer Kevin Smith. Before the show this past weekend, Garman had tweeted out that it might be the last Hollywood Babble-On ever. In the opening minutes of their latest episode, Garman explains that they’ve received a cease and desist letter from the Hollywood Chamber of Commerce “re: unauthorized use of Hollywood stylized mark and Hollywood Walk of Fame mark.”

        While I haven’t seen the full cease-and-desist letter, from what Garman said on the podcast, the issue is so ridiculous that the Hollywood Chamber of Commerce should be called out for blatant trademark bullying.

    • Copyrights

      • No Fair Use for Mu(sic)

        It’s an open secret that musicians will sometimes borrow portions of music or lyrics from prior works. But how much borrowing is too much? One would think that this is the province of fair use, but it turns out not to be the case – at least not in those cases that reach a decision. Edward Lee (Chicago-Kent) has gathered up the music infringement cases and shown that fair use (other than parody) is almost never a defense – not just that defendants lose, but that they don’t even raise it most of the time. His article Fair Use Avoidance in Music Cases is forthcoming in the Boston College Law Review, and a draft is available on SSRN.

        [...]

        This is an interesting article, and I certainly learned something I didn’t know before. Every “yeah but probably…” skeptical thought I had was answered, and that’s pretty rare. That said, my one critique is that the background section, which is supposed to be discussing why fair use is the type of thing that we should often see in music (see history of borrowing, above), often conflates a variety of other defenses to copying in the same discussion. For example, the article points to the ubiquitous YouTube video that shows how many songs are based on the same four chords. The use of those chords, though, isn’t really a fair use; it’s more of scenes a faire or other defense to copying. Those four chords, after all, lead to very different sounding songs, and where they do sound the same, they can be traced to a common source, not to each other. An empirical study that I would like to see is how many songs that fit the four chord mold have been accused of and/or held liable for infringement. Perhaps Professor Lee’s data has that, for reported decisions at least.

        The reason this conflation is problematic leads back to the study results. Perhaps it should not be surprising that so many defendants win outright on non-copying defenses because there are so many ways to win on non-copying defenses without having to resort to an admission of copying and reliance on fair use. It may be that despite a history of borrowing, musicians can tell the difference between illicit copying and either copying from the same source/methods or real fair use. After all, only an average about four cases per year went to decision.

      • The New Music Modernization Act Has a Major Fix: Older Recordings Will Belong to the Public, Orphan Recordings Will Be Heard Again

        The Senate passed a new version of the Music Modernization Act (MMA) as an amendment to another bill this week, a marked improvement over the version passed by the House of Representatives earlier in the year. This version contains a new compromise amendment that could preserve early sound recordings and increase public access to them.

        Until recently, the MMA (formerly known as the CLASSICS Act) was looking like the major record labels’ latest grab for perpetual control over twentieth-century culture. The House of Representatives passed a bill that would have given the major labels—the copyright holders for most recorded music before 1972—broad new rights in those recordings, ones lasting all the way until 2067. Copyright in these pre-1972 recordings, already set to last far longer than even the grossly extended copyright terms that apply to other creative works, would a) grow to include a new right to control public performances like digital streaming; b) be backed by copyright’s draconian penalty regime; and c) be without many of the user protections and limitations that apply to other works.

        Fundamentally, Congress should not be adding new rights in works created decades ago.

        The drafting process was also troubling. It seemed a return to the pattern of decades past, where copyright law was written behind closed doors by representatives from a few industries and then passed by Congress without considering the views of a broader public. Star power, in the form of famous musicians flown to Washington to shake hands with representatives, eased things along.

        Two things changed the narrative. First, a broad swath of affected groups spoke up and demanded to be heard. Tireless efforts by library groups, music libraries, archives, copyright scholars, entrepreneurs, and music fans made sure that the problems with MMA were made known, even after it sailed to near-unanimous passage in the House. You contacted your Senators to let them know the House bill was unacceptable to you, and that made a big difference.

09.19.18

Links 19/9/2018: Chromebooks Get More DEBs, LLVM 7.0.0 Released

Posted in News Roundup at 12:53 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • It’s time to pay the maintainers

    Earlier this year, Tidelift conducted a survey of over 1,200 professional software developers and open source maintainers. We found that 83% of professional software development teams would be willing to pay for better maintenance, security, and licensing assurances around the open source projects they use. Meanwhile, the same survey found that the majority of open source maintainers receive no external funding for their work, and thus struggle to find the time to maintain their open source projects.

  • Desktop

    • Chrome OS 69 Finally Brings Linux Apps to Some Chromebooks, Night Light Feature

      Chrome OS 69 is the first release of the Linux-based operating system that enables support for running Linux apps on Chromebooks. However, the Linux app support is still in development and it’s presented to users in a beta form, available only on select devices due to hardware restrains. A complete list with the Chromebooks supporting Linux apps is available here.

      “While we would like to be able to bring this work to all Chromebooks, the required kernel and hardware features limit where we can deploy this,” says Google in the blog announcement. “A lot of features we use had to be backported, and the further back we go, the more difficult & risky it is to do so. We don’t want to compromise system stability and security here.”

    • Chromebooks Are Getting Better Parental Controls

      Better parental controls are coming to Chromebooks, with the ability to set screen time limits and manage apps.

      We’ve shown you how manage your child’s Android phone with Google Family Link. The feature allowed parents to set up an account for a child under 13, giving parents control over how their kids can use the phone.

    • Linux Apps Are Now Available in Chrome OS Stable, But What Does That Mean?

      Chrome OS 69 just hit the stable channel and is currently rolling out to devices. This brings a handful of new features and changes, including Google’s Material theme, Night Light, an improved file manager, and most importantly: support for Linux apps.

      Linux Apps for Chromebooks?

      At Google I/O earlier this year, Google announced that it was going to bring support for Linux applications to Chrome OS, starting first with the Pixelbook. While Linux support has been available on the developer and beta channels for a while now, users who choose to stick with the stable channel (a wise choice for the most part) may now get their chance to check this out.

  • Kernel Space

    • ​Linus Torvalds is doing a good and brave thing

      Linus Torvalds is known for his “salty” language and take-no-prisoners approach to Linux developers. If you get things wrong, he’s not afraid to let you know — in no uncertain terms — that you’re an idiot. It gets results, but it also drives away many talented developers and leads to a development culture where harsh attacks are tolerated and even approved of by some.

      But Torvalds realized he was hurting both the development process and his fellow programmers. So, he announced he’s stepping away from the Linux developer community to change his personal behavior. Torvalds also approved a new “Code of Conduct” for Linux kernel developers. No one would have expected to see either of these changes.

    • Linux Patches Surface For Supporting The Creative Sound BlasterX AE-5

      Last year Creative Labs introduced the Sound BlasterX AE-5 PCI Express gaming sound card while finally there are some patches pending for supporting this high-end sound card in Linux.

      Connor McAdams who most recently got the Creative Recon3D support into good shape on Linux has now been working on getting the Sound BlasterX AE-5 working well on Linux.

    • Linux Has a Code of Conduct and Not Everyone is Happy With it

      The code of conduct was signed off by Linus Torvalds and Greg Kroah-Hartman (kind of second-in-command after Torvalds). Dan Williams of Intel and Chris Mason from Facebook were some of the other signees.

      If I have read through the timeline correctly, half an hour after signing this code of conduct, Torvalds sent a mail apologizing for his past behavior. He also announced taking a temporary break to improve upon his behavior.

    • Linux Foundation

      • Blockchain Training Takes Off

        Meanwhile, job postings related to blockchain and Hyperledger are taking off, and knowledge in these areas is translating into opportunity. Careers website Glassdoor lists thousands of job posts related to blockchain.

    • Graphics Stack

      • AMD Picasso Support Comes To The RadeonSI OpenGL Driver

        Last week AMD sent out initial support for yet-to-be-released “Picasso” APUs with the Linux AMDGPU kernel graphics driver. Today on the user-space side the support was merged for the OpenGL RadeonSI Gallium3D driver.

        Picasso details are still fairly light but they are expected to be similar to Raven Ridge and for the AM4 processor socket as well as an edition for notebooks. On the same day as publishing the Picasso AMDGPU kernel patches, AMD also went ahead and published the Linux patches for the “Raven 2″ APUs too.

      • The GeForce RTX 2080 Ti Arrives For Linux Benchmarking

        It looks like NVIDIA has their launch-day Linux support in order for the GeForce RTX 2080 “Turing” graphics cards slated to ship later this week as arriving today at Phoronix was the RTX 2080 Ti.

        The GeForce RTX 2080 Ti is NVIDIA’s new flagship desktop GPU with the Turing GPU architecture, 4352 CUDA cores, a 1635MHz boost clock speed rating for this Founder’s Edition model, 11GB of GDDR6 video memory yielding a 616 GB/s memory bandwidth rating, and designed to suit real-time ray-tracing workloads with their RTX technology. Pricing on the RTX 2080 Ti Founder’s Edition is $1,199 USD. Last week NVIDIA published more details on the Turing architecture for those interested as well as on the new mesh shader capability.

      • NVIDIA Vulkan Beta Adds New KHR_driver_properties & KHR_shader_atomic_int64

        Not to be confused with the new NVIDIA Linux/Windows drivers that should be out today for RTX 2070/2080 “Turing” support and also initial RTX ray-tracing support, there is also out a new Vulkan beta driver this morning.

        The NVIDIA 396.54.06 driver is this new Vulkan beta and as implied by the version number is still on the current stable branch and not in the Turing era. But this driver release is quite exciting as it does bring support for two new extensions… These extensions are very fresh and not yet in the official Vulkan specification: VK_KHR_driver_properties and VK_KHR_shader_atomic_int64.

      • GeForce RTX 2080 Ti Linux Benchmarks Coming Today, NVIDIA Driver Bringing Vulkan RTX

        NVIDIA’s review/performance embargo has now lifted on the GeForce RTX 2080 series ahead of the cards shipping tomorrow. I should have out initial Linux benchmarks later today, assuming Linux driver availability.

        As wrote about yesterday, just yesterday I ended up receiving the GeForce RTX 2080 Ti for Linux benchmarking. But, unfortunately, no Linux driver yet… But I am told it will be posted publicly soon with the Windows driver. Assuming that happens within the hours ahead, I’ll still have initial RTX 2080 Ti benchmarks on Ubuntu Linux out by today’s end — thanks to the Phoronix Test Suite and recently wrapping up other NVIDIA/AMD GPU comparison tests on the current drivers.

      • Intel’s New Iris Gallium3D Driver Picks Up Experimental Icelake Bits, GL Features

        One of the talks we are most interested in at XDC2018 is on the Intel “Iris” Gallium3D driver we discovered last month was in development.

        We stumbled across the Iris Gallium3D driver that’s been in development for months as a potential replacement to their “i965″ classic Mesa driver. But they haven’t really detailed their intentions in full, but we should learn more next week. This is particularly exciting the prospects of an official Intel Gallium3D driver as the company is also expected to introduce their discrete GPUs beginning in 2020 and this new driver could be part of that plan.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • New KDE.ru website

        Today, on September 18th, 2018, the Russian-speaking KDE community launches its updated website on KDE.ru.

        The new website serves as the main page for the Russian-speaking community. It provides localized information about the community, product download links and the list of social network pages we maintain. It is also meant to help new members get involved in KDE’s projects, particularly in our translation and promotion efforts.

        The website was created by me and Alexander Potashev on top of Jonah Brüchert‘s work for plasma-mobile.org. It uses Jekyll and is now hosted on official KDE servers. It replaces the old forum that has significantly lost its users in the past years.

      • Everything old is new again

        Just because KDE4-era software has been deprecated by the KDE-FreeBSD team in the official ports-repository, doesn’t mean we don’t care for it while we still need to. KDE4 was released on January 11th, 2008 — I still have the T-shirt — which was a very different C++ world than what we now live in. Much of the code pre-dates the availability of C++11 — certainly the availability of compilers with C++11 support. The language has changed a great deal in those ten years since the original release.

        The platforms we run KDE code on have, too — FreeBSD 12 is a long way from the FreeBSD 6 or 7 that were current at release (although at the time, I was more into OpenSolaris). In particular, since then the FreeBSD world has switched over to Clang, and FreeBSD current is experimenting with Clang 7. So we’re seeing KDE4-era code being built, and running, on FreeBSD 12 with Clang 7. That’s a platform with a very different idea of what constitutes correct code, than what the code was originally written for. (Not quite as big a difference as Helio’s KDE1 efforts, though)

      • Let’s take this bug, for example…

        Krita’s 2018 fund raiser is all about fixing bugs! And we’re fixing bugs already. So, let’s take a non-technical look at a bug Dmitry fixed yesterday. This is the bug: “key sequence ctrl+w ambiguous with photoshop compatible bindings set” And this is the fix.

      • Andrew Crouthamel: How I Got Involved in KDE

        Since this blog is starting after the beginning of my contributions to KDE, the first few regular posts will be explaining my prior contributions, before moving into the present.

      • Akademy 2018

        I had the awesome opportunity to attend Akademy in Vienna this year. First off, a big thank you to the organising team for pulling off this years Akademy without a hitch.

        This Akademy was a bit more special, since it was decided to switch up the format, which in my opinion worked quite well. There were training’s that ran alongside the talk’s and BoF’s, which I think was a great idea. I signed up to the Public Speaking Training and the Non Violent Communication training, which I think were run exceptionally. I hope that these training sessions are run again next Akademy because I found them exceptionally valuable.

    • GNOME Desktop/GTK

      • GNOME.Asia 2018

        GNOME.Asia 2018 was co-hosted with COSCUP and openSUSE Asia this year in Taipei, Taiwan. It was a good success and I enjoyed it a lot. Besides, meeting old friends and making new ones are always great.

      • NetworkManager Merges An Initrd Generator For Early Boot Handling

        Days following the NetworkManager 1.14 release, feature activity on the next release is progressing and the newest addition is nm-initrd-generator.

        The NetworkManager Initrd Generator is used to generate an early-boot NetworkManager configuration. This new utility scans the command line for supported options and from there generates a network configuration and the necessary configuration files to handle an early instance of NetworkManager that runs from the initial ramdisk during the system’s early boot stage.

  • Distributions

    • The History of Various Linux Distros

      Linux has been around for almost 30 years. Yes, it’s that old, and it did make history. If you are interested in the history of some of the major Linux distros, here it is in a nutshell – the history of various Linux distros, like Ubuntu, Fedora, REHL, Linux Mint, Slackware, etc. The reasons for their creation and their philosophy will be briefly discussed.

    • PCLinuxOS/Mageia/Mandriva Family

      • Mageia at fête de l’humanité 2018

        The booths were in a different place from previous years, and we had a lot more visitors. We gave out all the flyers we brought by Saturday evening – there was only one left for Sunday – so we gave out Mageia stickers instead. We did not sell any T-shirts, but we sold two USB sticks.

        Many people asked for general information; I spoke so much that I lost my voice! We had strong interest, coming from people already using a Linux distribution as well as from people wishing to turn to free software.

    • Red Hat Family

      • BU Spark! teams up with Red Hat, hosts software design workshop

        Students traveled across Boston to its Fort Point neighborhood to attend a BU Spark! workshop about interaction design Friday. There they delved into interaction design and explored how to develop user-friendly software.

        BU Spark! and Red Hat Inc. hosted the Interaction Design Bootcamp jointly at Red Hat’s Boston office. BU students and Spark! Interaction design fellows attended.

        Red Hat is a software company that specializes in information technology and has a research relationship with Boston University that includes educational elements. The programs taught by Red Hat focus on user experience design, one of Red Hat’s specializations, according to their website.

      • Open source can spark innovative business transformation in government, Red Hat leaders say

        The federal government, largely hamstrung by legacy systems, is in need of a major digital transformation. Open source technology can be the spark that sets off that revolution, leaders from open-source software company Red Hat said Tuesday.

        “The types of technologies that you choose matter,” said Mike Walker, global director of Open Innovation Labs at Red Hat. “It will influence the way your business operates and open new doors to new business process, and ultimately allow you to become a software company that can achieve some of those innovations and reductions in cost and time.”

      • Kubernetes Ingress vs OpenShift Route

        Although pods and services have their own IP addresses on Kubernetes, these IP addresses are only reachable within the Kubernetes cluster and not accessible to the outside clients. The Ingress object in Kubernetes, although still in beta, is designed to signal the Kubernetes platform that a certain service needs to be accessible to the outside world and it contains the configuration needed such as an externally-reachable URL, SSL, and more.

        Creating an ingress object should not have any effects on its own and requires an ingress controller on the Kubernetes platform in order to fulfill the configurations defined by the ingress object.

        Here at Red Hat, we saw the need for enabling external access to services before the introduction of ingress objects in Kubernetes, and created a concept called Route for the same purpose (with additional capabilities such as splitting traffic between multiple backends, sticky sessions, etc). Red Hat is one of the top contributors to the Kubernetes community and contributed the design principles behind Routes to the community which heavily influenced the Ingress design.

      • VirtualBox DRM/KMS Driver Proceeding With Atomic Mode-Setting Support

        The “vboxvideo” DRM/KMS driver for use by VirtualBox guest virtual machines that has been part of the mainline Linux kernel the past several cycles will soon see atomic mode-setting support.

        Hans de Goede of Red Hat, who has been stewarding this driver into the Linux kernel after Oracle has failed to do so, is tackling the atomic mode-setting as his latest advancement to this driver important for a VirtualBox desktop VM experience. Published today were initial patches preparing the move to atomic mode-setting but not yet the full migration to this modern display API that offers numerous benefits.

      • Troubleshooting FDB table wrapping in Open vSwitch

        When most people deploy an Open vSwitch configuration for virtual networking using the NORMAL rule, that is, using L2 learning, they do not think about configuring the size of the Forwarding DataBase (FDB).

      • Finance

      • Fedora

        • Test Day: Fedora Silverblue

          Fedora Silverblue is a new variant of Fedora Workstation with rpm-ostree at its core to provide fully atomic upgrades. Furthermore, Fedora Silverblue is immutable and upgrades as a whole, providing easy rollbacks from updates if something goes wrong. Fedora Silverblue is great for developers using Fedora with good support for container-focused workflows.

          Additionally, Fedora Silverblue delivers desktop applications as Flatpaks. This provides better isolation/sandboxing of applications, and streamlines updating applications — Flatpaks can be safely updated without reboot.

        • Understand Fedora memory usage with top

          Have you used the top utility in a terminal to see memory usage on your Fedora system? If so, you might be surprised to see some of the numbers there. It might look like a lot more memory is consumed than your system has available. This article will explain a little more about memory usage, and how to read these numbers.

          [...]

          Your system has another facility it uses to store information, which is swap. Typically this is an area of slower storage (like a hard disk). If the physical memory on the system fills up as needs increase, the OS looks for portions of memory that haven’t been needed in a while. It writes them out to the swap area, where they sit until needed later.

          Therefore, prolonged, high swap usage usually means a system is suffering from too little memory for its demands. Sometimes an errant application may be at fault. Or, if you see this often on your system, consider upgrading your machine’s memory, or restricting what you run.

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Flavours and Variants

            • What’s New in Ubuntu Budgie 18.04 LTS

              Ubuntu Budgie 18.04 LTS is the latest release of Ubuntu budgie. As part of Ubuntu 18.04 flavor this release ships with latest Budgie desktop 10.4 as default desktop environment. Powered by Linux 4.15 kernel and shipping with the same internals as Ubuntu 18.04 LTS (Bionic Beaver), the Ubuntu Budgie 18.04 LTS official flavor will be supported for 3 years, until April 2021.

              Prominent new features include support for adding OpenVNC connections through the NetworkManager applet, better font handling for Chinese and Korean languages, improved keyboard shortcuts, color emoji support for GNOME Characters and other GNOME apps, as well as window-shuffler capability.

              Ubuntu Budgie 18.04 LTS also ships with a new exciting GTK+ theme by default called Pocillo, support for dynamic workspaces, as well as a “minimal installation” option in the graphical installer that lets users install Ubuntu Budgie with only the Chromium web browser and a handful of basic system utilities.

            • Endless OS May Be the Best Linux Version for New Computer Users

              Linux appeals to a certain kind of computer user: if you like computers enough to read about or tinker with them in your free time, then there’s a good chance you’ll find something to like about Linux. Otherwise, you will probably consider it too much work to bother.

              Endless Computer’s Endless OS aims to provide a complete desktop experience that’s versatile enough to serve families. Is this the ideal way to introduce newcomers to Linux?

  • Devices/Embedded

Free Software/Open Source

  • Google AI Tool Can Distinguish Between Different Types of Lung Cancer
  • Artificial intelligence can determine lung cancer type
  • Scientists dig up cancer’s secrets buried in ‘gene deserts’
  • CloudBees Announces Availability of Support for Jenkins Open Source

    This marks the first-ever, support-only offering for Jenkins users.

  • New CloudBees Suite Addresses DevOps Gaps in Software Delivery

    CloudBees is bringing a set of products into a new CloudBees Suite that it said will help companies of all sizes streamline the software development process. The new software is set to be announced Sept. 18 at the company’s DevOps World / Jenkins World conference in San Francisco. Jenkins is the open-source version of CloudBees, which is a commercial offering.

    A central piece of the CloudBees Suite is the CloudBees Core for unified governance of continuous delivery operations and processes used in DevOps. Software pipelines can also use Core to run software pipelines more efficiently in a self-managed way in the cloud or on-premises.

  • First results of the ROSIN project: Robotics Open-Source Software for Industry

    Open-Source Software for robots is a de-facto standard in academia, and its advantages can benefit industrial applications as well. The worldwide ROS-Industrial initiative has been using ROS, the Robot Operating System, to this end.

    In order to consolidate Europe’s expertise in advanced manufacturing, the H2020 project ROSIN supports EU’s strong role within ROS-Industrial. It will achieve this goal through three main actions on ROS: ensuring industrial-grade software quality; promoting new business-relevant applications through so-called Focused Technical Projects (FTPs); supporting educational activities for students and industry professionals on the one side conducting ROS-I trainings as well as and MOOCs and on the other hand by supporting education at third parties via Education Projects (EPs).

  • Baidu To Launch World’s First Intelligent Vehicle Infrastructure Cooperative Systems Open Source Solution By End Of 2018

    Baidu Inc. has announced it will launch the Apollo Intelligent Vehicle Infrastructure Cooperative Systems (IVICS) open-source solution by the end of 2018, leveraging its capabilities in autonomous driving to bring together intelligent vehicles and infrastructure to form a “human-vehicle-roadway” interplay – an important step toward developing future intelligent transportation.

  • Versity Open Sources Next Generation Archiving Filesystem

    The ScoutFS project was started in 2016 to address the rapidly growing demand for larger POSIX namespaces and faster metadata processing. The design goal for ScoutFS includes the ability to store up to one trillion files in a single namespace by efficiently distributing metadata handling across a scale out cluster of commodity compute nodes.

  • IBM launches tool aimed at detecting AI bias

    The Fairness 360 Kit will also scan for signs of bias and recommend adjustments.

    There is increasing concern that algorithms used by both tech giants and other firms are not always fair in their decision-making.

  • IBM launches tools to detect AI fairness, bias and open sources some code

    IBM said it will launch cloud software designed to manage artificial intelligence deployments, detect bias in models and mitigate its impact and monitor decision across multiple frameworks.

    The move by IBM highlights how AI management is becoming more of an issue as companies deploy machine learning and various models to make decisions. Executives are likely to have trouble understanding models and the data science under the hood.

  • IBM Debuts Tools to Help Prevent Bias In Artificial Intelligence
  • IBM launches software to detect racist and sexist AI
  • IBM launches cloud tool to detect AI bias and explain automated decisions
  • IBM announces cloud service to help businesses detect and mitigate AI bias
  • Top 5 Open Source Data Integration Tools

    Businesses seeking to improve their data integration know that today’s data integration software perform complex tasks. They enable applications to access data associated with other applications, and also to migrate data from one platform to another, transforming it as necessary. Given this sophistication, selecting the best data integration tool is far from easy.

    Adding to the complexity of the selection process: early data integration tools focused on ETL – extract, transform, and load processes. However, most of today’s data integration products have much more advanced capabilities and can generally connect both on-premises and cloud-based data. Many also integrate with other data management products, such as business intelligence (BI), analytics, master data management (MDM), data governance and data quality solutions.

    To help sort through the complex options, the list below highlights five of the best open source data integration tools, based on vendor profile and completeness of their data integration tool set.

  • The Future of Open Source

    Linux and the open source business model are far different today than many of the early developers might have hoped. Neither can claim a rags-to-riches story. Rather, their growth cycles have been a series of hit-or-miss milestones.

    The Linux desktop has yet to find a home on the majority of consumer and enterprise computers. However, Linux-powered technology has long ruled the Internet and conquered the cloud and Internet of Things deployments. Both Linux and free open source licensing have dominated in other ways.

    Microsoft Windows 10 has experienced similar deployment struggles as proprietary developers have searched for better solutions to support consumers and enterprise users.

  • Web Browsers

    • Microsoft Windows U-turn removes warning about installing Chrome, Firefox [Ed: Microsoft showed us its true colours though]

      The feature raised some hackles and brought back memories of Microsoft’s strong-arm tactics promoting its old Internet Explorer browser in the first browser wars two decades ago. But Microsoft isn’t alone in such tactics: Google promotes its Chrome browser as faster and safer to people who visit its own websites with other browsers.

      Microsoft didn’t immediately respond to a request for comment about the change of direction.

    • Chrome

    • Mozilla

      • AutoFill your passwords with Firefox Lockbox in iOS

        Today Firefox Lockbox 1.3 gives you the ability to automatically fill your username and password into apps and websites. This is available to anyone running the latest iOS 12 operating system.

      • Streaming RNNs in TensorFlow

        The Machine Learning team at Mozilla Research continues to work on an automatic speech recognition engine as part of Project DeepSpeech, which aims to make speech technologies and trained models openly available to developers. We’re hard at work improving performance and ease-of-use for our open source speech-to-text engine. The upcoming 0.2 release will include a much-requested feature: the ability to do speech recognition live, as the audio is being recorded. This blog post describes how we changed the STT engine’s architecture to allow for this, achieving real-time transcription performance. Soon, you’ll be able to transcribe audio at least as fast as it’s coming in.

      • Mozilla Launches Firefox Reality Web Browser For Virtual Reality Headsets

        Mozilla is ready to take web browsing experience to the next level with its virtual reality web browser called Firefox Reality. It has been built exclusively to work with standalone VR and AR headsets.

        You can actually use Firefox Reality inside a virtual reality headset to search and browse websites just with your VR hand controller. This web browser makes use of voice search for searching while you step into an immersive computer-generated world.

      • Explore the immersive web with Firefox Reality. Now available for Viveport, Oculus, and Daydream

        Earlier this year, we shared that we are building a completely new browser called Firefox Reality. The mixed reality team at Mozilla set out to build a web browser that has been designed from the ground up to work on stand-alone virtual and augmented reality (or mixed reality) headsets. Today, we are pleased to announce that the first release of Firefox Reality is available in the Viveport, Oculus, and Daydream app stores.

        At a time when people are questioning the impact of technology on their lives and looking for leadership from independent organizations like Mozilla, Firefox Reality brings to the 3D web and immersive content experiences the level of ease of use, choice, control and privacy they’ve come to expect from Firefox.

        But for us, the ability to enjoy the 2D web is just table stakes for a VR browser. We built Firefox Reality to move seamlessly between the 2D web and the immersive web.

      • These Months In Servo 113

        In the past 1.5 months, we merged 439 PRs in the Servo organization’s repositories.

      • Things Gateway – Rules Rule

        A smart home is a lot more than just lights, switches and thermostats that you can control remotely from your phone. To truly make a Smart Home, the devices must be reactive and work together. This is generally done with a Rule System: a set of maxims that automate actions based on conditions. It is automation that makes a home smart.

        There are a couple options for a rule system with the Things Gateway from Mozilla. First, there is a rule system built into the Web GUI, accessed via the Rules option in the drop down menu. Second, there is the Web Things API that allows programs external to the Things Gateway to automate the devices that make up a smart home. Most people will gravitate to the former built-in system, as it is the most accessible to those without predilection to writing software. This blog post is going to focus on the this rules system native to the Things Gateway.

      • Lessons from Carpenter – Mozilla panel discussion at ICDPPC

        The US Supreme Court recently released a landmark ruling in Carpenter vs. United States, which held that law enforcement authorities must secure a warrant in order to access citizens’ cell-site location data. At the upcoming 40th Conference of Data Protection and Privacy Commissioners, we’re hosting a panel discussion to unpack what Carpenter means in a globalised world.

      • The future of online advertising – Mozilla panel discussion at ICDPPC

        At the upcoming 40th International Conference of Data Protection and Privacy Commissioners, we’re convening a timely high-level panel discussion on the future of advertising in an open and sustainable internet ecosystem.

  • CMS

  • Pseudo-Open Source (Openwashing)

  • BSD

    • LLVM 7.0.0 released

      The release contains the work on trunk up to SVN revision 338536 plus work on the release branch. It is the result of the community’s work over the past six months, including: function multiversioning in Clang with the ‘target’ attribute for ELF-based x86/x86_64 targets, improved PCH support in clang-cl, preliminary DWARF v5 support, basic support for OpenMP 4.5 offloading to NVPTX, OpenCL C++ support, MSan, X-Ray and libFuzzer support for FreeBSD, early UBSan, X-Ray and libFuzzer support for OpenBSD, UBSan checks for implicit conversions, many long-tail compatibility issues fixed in lld which is now production ready for ELF, COFF and MinGW, new tools llvm-exegesis, llvm-mca and diagtool. And as usual, many optimizations, improved diagnostics, and bug fixes.

    • LLVM 7.0 Released: Better CPU Support, AMDGPU Vega 20; Clang 7.0 Gets FMV & OpenCL C++

      As anticipated, LLVM release manager Hans Wennborg announced the official availability today of LLVM 7.0 compiler stack as well as associated sub-projects including the Clang 7.0 C/C++ compiler front-end, Compiler-RT, libc++, libunwind, LLDB, and others.

      There is a lot of LLVM improvements ranging from CPU improvements for many different architectures, Vega 20 support among many other AMDGPU back-end improvements, the new machine code analyzer utility, and more. The notable Clang C/C++ compiler has picked up support for function multi-versioning (FMV), initial OpenCL C++ support, and many other additions. See my LLVM 7.0 / Clang 7.0 feature overview for more details on the changes with this six-month open-source compiler stack update.

  • FSF/FSFE/GNU/SFLC

    • What’s happening this International Day Against DRM?

      We couldn’t be more excited about what’s happening today on the Web and around the world. Organizations, nonprofits, and companies have stepped up to take action, sharing their work to make the world DRM-free.

    • Digital Handcuffs

      This report examines issues arising from Digital Rights Management (DRM) technologies and the legislation protecting these technologies. The report looks at how the use of DRM can impact on users’ security, privacy and right of access, while also exploring how DRM stifles innovation and competition. Furthermore, the report looks into the phenomena of obsolescence and vendor lock-in facilitated by DRM.

    • Hill-Climbing Our Way to Defeating DRM

      Computer science has long grappled with the problem of unknowable terrain: how do you route a packet from A to E when B, C, and D are nodes that keep coming up and going down as they get flooded by traffic from other sources? How do you shard a database when uncontrollable third parties are shoving records into it all the time? What’s the best way to sort some data when spammers are always coming up with new tactics for re-sorting it in ways that suit them, but not you or your users?

      One way to address the problem is the very useful notion of “hill-climbing.” Hill-climbing is modeled on a metaphor of a many-legged insect, like an ant. The ant has forward-facing eyes and can’t look up to scout the terrain and spot the high ground, but it can still ascend towards a peak by checking to see which foot is highest and taking a step in that direction. Once it’s situated in that new place, it can repeat the process, climbing stepwise toward the highest peak that is available to it (of course, that might not be the highest peak on the terrain, so sometimes we ask our metaphorical ant to descend and try a different direction, to see if it gets somewhere higher).

    • No Netflix on my Smart TV

      When I went to the Conrad store in Altona, I saw that new Sony Smart TVs come with a Netflix button on the remote.
      Since I oppose DRM, I would never buy such a thing. I would only buy a Smart TV that Respects My Freedom, but such a thing does not exist.

    • W3C sells out the Web with EME – 1 year later

      Digital Restrictions Management exists all over the world in all sorts of technologies. In addition to media files, like music and film, we can find DRM on the Web and enshrined in Web standards. As a Web standard, its use is recommended by the World Wide Web Consortium (W3C), making it not only easier, but expected for all media files on the Web to be locked down with DRM.

      It’s been a year since the the W3C voted to bring Encrypted Media Extensions (EME) into Web standards. They claimed to want to “lead the Web to its full potential,” but in a secret vote, members of the W3C, with the blessing of Web creator Tim Berners-Lee, agreed to put “the copyright industry in control” of media access. The enshrinement of EME as an official recommendation is not how we envision the “full potential” of the Web at the Free Software Foundation (FSF).

      EME is an approach to DRM specifically for the Web. EME encrypts media files, requiring a license/key exchange managed by (almost always) proprietary software controlled by rights holders. While EME proponents claimed they were doing away with proprietary plugins like Adobe Flash, all they did was drive the proprietary software down even deeper. Instead of plugins, users now have to install proprietary Content Decryption Modules specific to various companies — including Adobe.

    • What is the relationship between FSF and FSFE?

      Ever since I started blogging about my role in FSFE as Fellowship representative, I’ve been receiving communications and queries from various people, both in public and in private, about the relationship between FSF and FSFE. I’ve written this post to try and document my own experiences of the issue, maybe some people will find this helpful. These comments have also been shared on the LibrePlanet mailing list for discussion (subscribe here)

      Being the elected Fellowship representative means I am both a member of FSFE e.V. and also possess a mandate to look out for the interests of the community of volunteers and donors (they are not members of FSFE e.V). In both capacities, I feel uncomfortable about the current situation due to the confusion it creates in the community and the risk that volunteers or donors may be confused.

      The FSF has a well known name associated with a distinctive philosophy. Whether people agree with that philosophy or not, they usually know what FSF believes in. That is the power of a brand.

      When people see the name FSFE, they often believe it is a subsidiary or group working within the FSF. The way that brands work, people associate the philosophy with the name, just as somebody buying a Ferrari in Berlin expects it to do the same things that a Ferrari does in Boston.

      To give an example, when I refer to “our president” in any conversation, people not knowledgeable about the politics believe I am referring to RMS. More specifically, if I say to somebody “would you like me to see if our president can speak at your event?”, some people think it is a reference to RMS. In fact, FSFE was set up as a completely independent organization with distinct membership and management and therefore a different president. When I try to explain this to people, they sometimes lose interest and the conversation can go cold very quickly.

  • Licensing/Legal

  • Openness/Sharing/Collaboration

    • Open Hardware/Modding

      • Epic Clock Clocks The Unix Epoch

        Admit it: when you first heard of the concept of the Unix Epoch, you sat down with a calculator to see when exactly 2³¹-1 seconds would be from midnight UTC on January 1, 1970. Personally, I did that math right around the time my company hired contractors to put “Y2K Suspect” stickers on every piece of equipment that looked like it might have a computer in it, so the fact that the big day would come sometime in 2038 was both comforting and terrifying.

        [Forklift] is similarly entranced by the idea of the Unix Epoch and built a clock to display it, at least for the next 20 years or so. Accommodating the eventual maximum value of 2,147,483,647, plus the more practical ISO-8601 format, required a few more digits than the usual clock – sixteen to be exact. The blue seven-segment displays make an impression in the sleek wooden case, about which there is sadly no detail in the build log. But the internals are well documented, and include a GPS module and an RTC. The clock parses the NMEA time string from the satellites and syncs the RTC. There’s a brief video below of the clock in action.

  • Programming/Development

    • 3 top Python libraries for data science

      Python’s many attractions—such as efficiency, code readability, and speed—have made it the go-to programming language for data science enthusiasts. Python is usually the preferred choice for data scientists and machine learning experts who want to escalate the functionalities of their applications. (For example, Andrey Bulezyuk used the Python programming language to create an amazing machine learning application.)

      Because of its extensive usage, Python has a huge number of libraries that make it easier for data scientists to complete complicated tasks without many coding hassles. Here are the top 3 Python libraries for data science; check them out if you want to kickstart your career in the field.

    • This Week in Rust 252

      Hello and welcome to another issue of This Week in Rust! Rust is a systems language pursuing the trifecta: safety, concurrency, and speed. This is a weekly summary of its progress and community. Want something mentioned?

  • Standards/Consortia

    • PortableCL 1.2 Still Coming While POCL 1.3 Will Further Improve Open-Source OpenCL

      It’s been a number of months since last having any major news to report on POCL, the “PortableCL” project providing a portable OpenCL/compute implementation that can run on CPUs, select GPUs, and other accelerators.

      POCL 1.1 from March remains the current stable release while POCL 1.2 has been in the release candidate stage. The POCL 1.2 release candidates began last month with a few highlights like LLVM 7.0 support, device-side printf support, and HWLOC 2.0 library support.

Leftovers

  • Hardware

    • Ampere eMAG for Hyperscale Cloud Computing Now Available, LLVM 7.0.0 Released, AsparaDB RDS for MariaDB TX Announced, New Xbash Malware Discovered and Kong 1.0 Launched

      Ampere, in partnership with Lenovo, announced availability of the Ampere eMAG for hyperscale cloud computing. The first-generation Armv8-A 64-bit processors provide “high-performance compute, high memory capacity, and rich I/O to address cloud workloads including big data, web tier and in-memory databases”. Pricing is 32 cores at up to 3.3GHz Turbo for $850 or 16 cores at up to 3.3GHz Turbo for $550.

    • Ampere eMAG Processors Delivering 32 ARMv8-A Cores At Up To 3.3GHz
    • Why the Future of Data Storage is (Still) Magnetic Tape

      It should come as no surprise that recent advances in big-data analytics and artificial intelligence have created strong incentives for enterprises to amass information about every measurable aspect of their businesses. And financial regulations now require organizations to keep records for much longer periods than they had to in the past. So companies and institutions of all stripes are holding onto more and more.

      Studies show [PDF] that the amount of data being recorded is increasing at 30 to 40 percent per year. At the same time, the capacity of modern hard drives, which are used to store most of this, is increasing at less than half that rate. Fortunately, much of this information doesn’t need to be accessed instantly. And for such things, magnetic tape is the perfect solution.

  • Health/Nutrition

    • How We Compared Clinical Trial and Cancer Incidence Data

      An in-depth look at newly approved cancer drugs, who participates in their clinical trials and who is affected by those cancers.

      [...]

      In 2012, as part of the FDA Safety and Innovation Act, Congress asked the FDA to report clinical trial participation by demographic subgroup. In 2013, the agency found minorities were often underrepresented, noting that, for many of the drugs under consideration, “there were too few African American or Black patients in the trials to enable meaningful subset analysis.”

      For every new drug approved starting in 2015, the FDA published a “Drug Trials Snapshot,” which includes the demographic breakdown for the clinical trial participants by sex, race, and age subgroups. ProPublica has compiled this data for all FDA-approved drugs from January 2015 to mid-August 2018 into a single dataset. Download this dataset at ProPublica’s Data Store.

      Snapshots included clinical trials run in the United States and internationally, but did not begin until 2017 to report what percentage of trials were conducted in the U.S. Though Asians appear to be well-represented in most trials, many of these trials were likely based outside of the United States. Analysis of 2017 data shows that, for drugs with at least 70 percent of trials conducted within the U.S., Asians make up only 1.7 percent of participants. Furthermore, the “Asian” category does not say if participants are of East Asian, South Asian, Southeast Asian, or Pacific Islander descent.

      Reports did not include a Hispanic ethnicity category until 2017, and do not distinguish between white and non-white Hispanics, or between Hispanics of European or Latin American descent.

    • A Cancer Patient’s Guide to Clinical Trials

      Clinical trials are a crucial step in getting new treatments to market. Before a drug can be approved by the U.S. Food and Drug Administration and released widely, manufacturers are required to carry out studies in humans to document that it is effective and to discover any side effects.

      Fewer than 5 percent of adult cancer patients enroll in clinical trials. ProPublica has found that the vast majority of participants in these studies are white, even when minorities have a similar or higher risk of getting the cancer that the drug treats.

      Most trials are run at academic medical centers and conducted by researchers there. Patients outside those centers often aren’t aware that clinical trials are an option, or they may wonder what joining a study entails. For patients who might consider a clinical trial, here are answers to some common questions.

    • Denied ‘life-extending opportunities’: Black patients are being left out of clinical trials amid wave of new cancer therapies

      It’s a promising new drug for multiple myeloma, one of the most savage blood cancers. Called Ninlaro, it can be taken as a pill, sparing patients painful injections or cumbersome IV treatments. In a video sponsored by the manufacturer, Takeda Pharmaceutical Co., one patient even hailed Ninlaro as “my savior.”

      The Food and Drug Administration approved it in 2015 after patients in a clinical trial gained an average of six months without their cancer spreading. That trial, though, had a major shortcoming: its racial composition. One out of five people diagnosed with multiple myeloma in the U.S. is black, and African-Americans are more than twice as likely as white Americans to be diagnosed with the cancer.

      Yet of the 722 participants in the trial, only 13 — or 1.8 percent — were black.

      The scarcity of black patients in Ninlaro’s testing left unanswered the vital question of whether the drug would work equally well for them. “Meaningful differences may exist” in how multiple myeloma affects black patients, what symptoms they experience, and how they respond to medications, FDA scientists wrote in a 2017 journal article.

  • Security

    • Linux and Open Source FAQs: Common Myths and Misconceptions Addressed

      LinuxSecurity debunks some common myths and misconceptions regarding open source and Linux by answering a few Linux-related frequently asked questions.

      Open source and Linux are becoming increasingly well-known and well-respected because of the myriad benefits they offer. Seventy-eight percent of businesses of all sizes across all industries are now choosing open source software over alternative proprietary solutions according to ZDNet (https://zd.net/2GCrTrk). Facebook, Twitter and Google are are among the many companies currently using, sponsoring and contributing to open source projects. Although Linux and open source are widely recognized for the advantages they provide, there are still many myths and misconceptions that surround these terms. Here are some answers to frequently asked questions about Linux and open source:

      Question: What are the advantages of the open source development model? How can using and contributing to open source software benefit my business?

      Answer: Open source offers an array of inherent advantages which include increased security, superior product quality, lower costs and greater freedom and flexibility compared to other models. It also is accompanied by strong community values and high standards, which encourage the highest levels of creativity and innovation in engineering.

    • Security updates for Tuesday
    • Reproducible Builds: Weekly report #177
    • Microsoft: Like the Borg, we want to absorb all the world’s biz computers [Ed: Microsoft wants to spy on and control every single thing. It (kick)started PRISM, so it was never serious about real security.]

      The technology allows Redmond to scan and monitor enrolled devices, and push out security patches, operating system upgrades, and software updates to the kit as necessary. It will also use machine-learning code and analytics to, in its own words, “manage the global MMD device population.”

    • Unit 42 Researchers Discover Xbash – Malware Which Destroys Linux and Windows Based Databases [Ed: See below; so basically it targets already-screwed systems...]

      Xbash mainly spreads by targeting any unpatched vulnerabilities and weak password

    • Windows, Linux Servers Beware: New Malware Encrypts Files Even After Ransom Is Paid

      Ransomware skyrocketed from obscurity to infamy in no time flat. Headline-grabbing campaigns like WannaCry, Petya and NotPetya preceded a substantial increase in the number of small attacks using similar techniques to extort unwary internet users. Now, researchers at Palo Alto Networks have revealed new malware that carries on NotPetya’s legacy while combining various types of threats into a single package.

      The researchers, dubbed Unit 42, named this new malware Xbash. It’s said to combines a bot net, ransomware and cryptocurrency mining software in a single worm and targets servers running Linux or Windows. The researchers blame an entity called the Iron Group for Xbash’s creation, which has been linked to other ransomware attacks. The malware is thought to have first seen use in May 2018.

    • Xbash Malware Deletes Databases on Linux, Mines for Coins on Windows
    • CCTV Cameras Are Susceptible To Hacks; Hackers Can Modify Video Footage

      A vulnerability has been discovered in video surveillance camera software that could allow hackers to view, delete or modify video footage.

      A research paper published by Tenable, a security firm, has revealed a vulnerability named Peekaboo in the video surveillance systems of NUUO. By exploiting the software flaw, hackers can acquire the admin privileges and can monitor, tamper and disable the footage.

    • Tenable Research Discovers “Peekaboo” Zero-Day Vulnerability in Global Video Surveillance Software

      Tenable®, Inc., the Cyber Exposure company, today announced that its research team has discovered a zero-day vulnerability which would allow cybercriminals to view and tamper with video surveillance recordings via a remote code execution vulnerability in NUUO software — one of the leading global video surveillance solution providers. The vulnerability, dubbed Peekaboo by Tenable Research, would allow cybercriminals to remotely view video surveillance feeds and tamper with recordings using administrator privileges. For example, they could replace the live feed with a static image of the surveilled area, allowing criminals to enter the premises undetected by the cameras.

    • 5 ways DevSecOps changes security

      There’s been an ongoing kerfuffle over whether we need to expand DevOps to explicitly bring in security. After all, the thinking goes, DevOps has always been something of a shorthand for a broad set of new practices, using new tools (often open source) and built on more collaborative cultures. Why not DevBizOps for better aligning with business needs? Or DevChatOps to emphasize better and faster communications?

      However, as John Willis wrote earlier this year on his coming around to the DevSecOps terminology, “Hopefully, someday we will have a world where we no longer have to use the word DevSecOps and security will be an inherent part of all service delivery discussions. Until that day, and at this point, my general conclusion is that it’s just three new characters. More importantly, the name really differentiates the problem statement in a world where we as an industry are not doing a great job on information security.”

    • Freexian’s report about Debian Long Term Support, August 2018
    • Linux 3.16~4.18.8 Affected By Another Potential Local Privilege Escalation Bug
    • Encryption bill endorsed by govt party room

      Barely one week of parliamentary sitting days after the date for comment ended, the Federal Government’s party room has endorsed the contentious encryption bill and it could be introduced into the House of Representatives as early as Thursday.

    • The IT Security Mistakes that Led to the Equifax Breach

      The Equifax data breach that exposed the sensitive personal information of more than 145 million consumers was one of the worst data breaches of recent years, both for the amount of information exposed and the ease with which hackers moved about the company’s systems.

      The breach was publicly disclosed on Sept. 7, 2017, and details on the breach slowly trickled out for months afterwards. Now a year later, the U.S. Government Accountability Office (GAO) has released a 40-page report outlining what happened. The retrospective look at the breach provides insights into how the breach occurred and what types of controls and technologies might have helped prevent it.

  • Transparency/Investigative Reporting

    • Congressional Research Service Reports Now Officially Publicly Available

      For many, many years we’ve been writing about the ridiculousness of the Congressional Research Service’s reports being kept secret. If you don’t know, CRS is a sort of in-house think tank for Congress, that does, careful, thoughtful, non-partisan research on a variety of topics (sometimes tasked by members of Congress, sometimes of its own volition). The reports are usually quite thorough and free of political nonsense. Since the reports are created by the federal government, they are technically in the public domain, but many in Congress (including many who work at CRS itself) have long resisted requests to make those works public. Instead, we were left with relying on members of Congress themselves to occasionally (and selectively) share reports with the public, rather than giving everyone access to the reports.

      Every year or so, there were efforts made to make all of that research available to the public, and it kept getting rejected. Two years ago, two members of Congress agreed to share all of the reports they had access to with a private site put together by some activists and think tanks, creating EveryCRSReport.com, which was a useful step forward. At the very least, we’ve now had two years to show that, when these reports are made public, the world does not collapse (many people within CRS feared that making the reports public would lead to more political pressure).

  • Environment/Energy/Wildlife/Nature

    • Congress Passes Measure to Protect Board that Monitors Nuclear Safety

      The Energy Department had taken steps to curtail the reach and authority of the Defense Nuclear Facilities Safety Board. New Mexico’s senators are fighting back.

      [...]

      The Energy Department has said the May order is simply intended to clarify roles and responsibilities and to decrease costs, and is a necessary update to a manual relied on to guide the relationship between the department and the safety board since 2001. Officials said these actions were taken as part as President Donald Trump’s 2017 executive order to trim regulations.

      But while the for-profit contractors that run the Energy Department’s nuclear sites were consulted on the changes, the board said they were given no formal input on them. Board members also have said the order would inhibit their ability to do key parts of their job, potentially violating the statute under which the board was created.

      The board said it had no comment on the move by Congress to stall the changes.

      In a joint statement, Heinrich and Udall said the provisions they had added to the appropriations bill demonstrated “that Congress shares the widespread concerns about DOE’s information sharing order,” adding that, in their view, the order should be halted.

      “We will continue to work to make sure that the DNFSB has the resources, support, and independence necessary to carry out the complex and extremely serious work that the board does,” they said.

  • Finance

    • US business groups lay out priorities to ensure their support for NAFTA

      Leaders of three of the nation’s most powerful business groups detailed six priorities they say need to be fulfilled to earn their support for an update of the North American Free Trade Agreement (NAFTA) to get through Congress.

    • Apple repays €14B in “illegal aid” to Ireland, so EU drops court case

      European Commissioner for Competition Margrethe Vestager said Tuesday that the European Commission will finally close its legal investigation into Apple’s failure to pay back taxes to Ireland after the company paid €14 billion.

    • Apple pays over the €14.3bn due to Ireland – but the minister again denies that it’s owed

      APPLE HAS NOW paid the €14.3 billion in back taxes and interest that was due to Ireland following the landmark EU ruling in 2016.

      The EU Commission ruled in 2016 that Ireland gave multinational tech giant Apple illegal state aid worth up to €13 billion over a decade.

      The Department of Finance is appealing the decision because it denies that there was any sweetheart deal in place.

      Despite the appeal, Ireland is obliged to collect the funds and hold them in escrow until the appeal process is concluded.

    • Why Brexit is both exciting and not exciting at all

      Brexit is exciting to a follower of politics: every day it seems there is something new, and one can often swing from thinking there will be a deal or no deal, or even from thinking there will be Brexit or no Brexit.

      Brexit is a news event well suited to social media and rolling news.

      But from a “law and policy” perspective, following the ball rather than the political players, there is less excitement, more a sense of inevitability.

  • AstroTurf/Lobbying/Politics

    • ‘The Rule Is Designed to Deter People From Reporting’

      Headlines can do a lot of work. Take the August 29 New York Times news story, for example, headed “New US Sexual Misconduct Rules Bolster Rights of Accused and Protect Colleges.” Readers are tipped, you might say, that previous to proposed rules by Education Secretary Betsy DeVos, those accused of rape, sexual assault or harassment on college campuses had weak or inadequate rights, and that colleges faced some sort of danger or vulnerability, presumably to being unfairly portrayed as places where such acts occur.

      What’s missing between the prevalent presentation of new rules on sexual assault in schools as a common-sense move towards fairness, and the fact that no sexual assault survivors’ representatives were on the guestlist when Betsy DeVos announced the new rules? Maybe what’s in between is real life?

      We’re joined now by Alyssa Peterson; she’s policy and advocacy coordinator with the group Know Your IX, a survivor- and youth-led project that aims to empower students to end sexual and dating violence in their schools. She joins us now by phone from Connecticut.

    • Donald Trump Is Actively Obstructing Justice

      Nixon faced impeachment for “interfering or endeavoring to interfere with the conduct of investigations.” That is what Trump is now doing.

    • Michael Moore: ‘We may not get to 2020′

      Michael Moore warns that the country might not survive as a democracy by 2020 if Democrats don’t make big gains in the midterm elections.

  • Censorship/Free Speech

    • How Regulating Platforms’ Content Moderation Means Regulating Speech – Even Yours.

      You have a Facebook page, on which you’ve posted some sort of status update. Maybe an update from your vacation. Maybe a political idea. Maybe a picture of your kids. And someone comes along and adds a really awful comment on your post. Maybe they insult you. Maybe they insult your politics. Maybe they insult your kids.

      Would you want to be legally obligated to keep their ugly comments on your post? Of course not. You’d probably be keen to delete them, and why shouldn’t you be able to?

      Meanwhile, what if it was the other way around: what if someone had actually posted a great comment, maybe with travel tips, support for your political views, or compliments on how cute your kids are. Would you ever want to be legally obligated to delete these comments? Of course not. If you like these comments, why shouldn’t you be able to keep sharing them with readers?

    • Some Schools Need a Lesson on Students’ Free Speech Rights

      An alarming number of schools improperly discipline students for their speech — especially students of color.

      School is back in session, and that means school administrators may be back to surveilling students on social media and unjustly disciplining them for what they say on it.

      We’ve seen both of these troubling trends before. And in today’s era of inspiring student activism, they may become all the more prevalent. Moreover, experience shows that discipline for student expression is not always applied evenhandedly, and can be invoked to silence youth of color and other marginalized students.

      Fortunately, the First Amendment protects student speech. While public schools can regulate student speech that substantially disrupts the functioning of the school, as the Supreme Court held in the landmark 1969 case Tinker v. Des Moines, students do not lose their First Amendment rights simply by virtue of walking into school. Nor do they give up their right to speak out outside of school simply by virtue of being a student. To the contrary, outside of school, students enjoy essentially the same rights to protest and speak out as anyone else.

      In the last five years, more than 100 public school districts and universities have hired companies to monitor the social media of their students. At least one district asked a surveillance company for alerts on any post mentioning “protest” or “walkout.” Another surveillance company offered to help public schools monitor “behavioral information” about specific individuals, including keeping tabs on their conversations with others.

  • Privacy/Surveillance

  • Civil Rights/Policing

    • State Legislator Says 11-Year-Old Tased By Cop Deserved It And Her Parents Probably Suck

      This is even worse than the police union’s take on the incident, which referred to the completely expected backlash as “kneejerk.” But, hey, I guess deciding to tase an 11-year-old in the back — one who reportedly was all of 4’11” and 90 pounds — couldn’t possibly be portrayed as a kneejerk reaction by a law enforcement officer. When force isn’t truly needed, we can be sure some cops will deploy it anyway.

      But Rep. John Becker’s take is the hottest take of all. Anyone tased by a cop — even an 11-year-old — is a person who brought that crackling, barbed punishment down on themselves. There’s no reason to question the wisdom or necessity of the Taser deployment. Rather, we should question ourselves. And perhaps society. But mostly ourselves.

      [...]

      “If I were to do the research…” Would this be research beyond the television watching that’s given Becker such keen insight into officer-involved shootings? Who knows? Becker’s certainly not going to do the research. He’s just going to stick by his electro-guns and blame victims of cop violence for being raised badly or otherwise being harmed by the disintegration of the nuclear family unit — the 2.5 children born to married heterosexuals who have managed to weather an escalating divorce rate, porn, video games, movies, television, the internet, social media, Satanism, multiple pagan-based holidays, postal rate hikes, alternate sexual orientations, public school indoctrination, Daylight Savings Time, mandatory vaccinations, HAARP projects (known and unknown), President Obama, Brown v. Board of Education, morning-after pills, weird Twitter, the removal of prayer from schools, the Simpsons, artistic expression in general, and whatever else has reduced the American way of life to a hideous nightmare where punk kids manage to live their whole lives without being deservedly tased by blameless, saintly police officers.

      Becker is an idiot, but let’s pretend the research he didn’t do actually says what he thinks it will say. Even if a majority of kids tased/killed by cops are raised by single and/or inattentive parents, that doesn’t justify force deployments that far exceed the danger presented by the developing situation. This 11-year-old was tased in the back by an officer who was taller, weighed more, and had the ability to summon any number of additional officers if it appeared this preteen was going to, I don’t know, grow a foot, add 100 pounds of weight, and produce an arsenal of weapons before the officer got the mild shoplifting situation under control.

    • ACLU accuses Facebook of allowing employers to exclude women from seeing jobs ads

      “Sex segregated job advertising has historically been used to shut women out of well-paying jobs and economic opportunities,” Galen Sherwin, an attorney with the ACLU Women’s Rights Project, said in a statement. “We can’t let gender-based ad targeting online give new life to a form of discrimination that should have been eradicated long ago.”

    • Facebook Accused Of Allowing Gender Discriminating Job Ads

      A group of female Facebook users has filed a gender discrimination complaint against Facebook and nine other companies for allowing gender biased job ads on the platform.

      The ACLU along with law firm Outten & Golden LLP and the Communications Workers of America have filed a class action suit filed on behalf of three female workers with the US Equal Employment Opportunity Commission.

    • Facebook Is Letting Job Advertisers Target Only Men

      Hundreds of thousands of Americans drive for Uber. And the company is looking for many more. It runs ads on Facebook that say, for example: “Driving toward something? Make extra money when it works for you and get there faster.” Another touts: “Earn $1,100 in Nashville for your first 200 Trips. Limited time guarantee! Terms apply.”

      There’s just one catch: Many of those ads are not visible to women.

      A ProPublica review of Facebook ads found that many purchased by Drive with Uber, the company’s recruiting arm, targeted only men in more than a dozen cities across the U.S. Our survey of 91 Uber ads found just one targeting only women; three did not target a specific sex.

      They were all gathered as a part of our Facebook Political Ad Collector project, in which readers sign up to send us the ads they see in their News Feeds.

      [...]

      Targeting by sex is just one way Facebook and other tech companies let advertisers focus on certain users — and exclude others. Based on rich data provided by users and deduced from their web activity, that powerful targeting is key to Facebook’s massive popularity with advertisers and it accounts for much of its revenue. It lets advertisers spend only on those they want to reach.

    • In Guatemala, a Tireless Search for Parents Separated From Their Children

      Working with the ACLU, human rights defenders look for missing parents in villages and remote regions of the country.

      When Lesly Tayes, a Guatemala City-based tax lawyer, first saw images of children locked in cages inside immigration detention facilities near the southern U.S. border, she was stunned. “It made me very upset and sad,” she said. “Later I learned that Guatemala had the highest number of separated families and I felt even worse. I wanted to help.” Within weeks, she’d have her chance.

      Earlier this summer, the ACLU sued the Trump administration over its policy of separating parents from their children if they crossed the border between points of entry. A federal court issued a preliminary injunction in late June against this policy, ordering that the separated families be reunified within 30 days. But it quickly became clear that the administration didn’t have a plan to meet that deadline, particularly for the more than 400 cases in which the parent had already been deported back to their country of origin. In one court filing, lawyers for the Justice Department suggested that the ACLU should take on the responsibility of finding those missing parents.

      Because the government wasn’t willing to carry out the search itself, the ACLU, along with a small group of other organizations, has set out to do just that.

      One of those organizations is Justice in Motion, a Brooklyn-based non-profit founded to provide legal support for migrant workers. Tayes is a member of Justice in Motion’s “defender network,” a loosely affiliated group of lawyers and activists in Guatemala and Honduras formed in 2008 to gather evidence of migrant worker abuses. After the court ruling in June, the ACLU and Justice in Motion asked Tayes and her colleagues to take on the daunting task of tracking down a large number of the missing parents in the two countries.

  • Internet Policy/Net Neutrality

    • Google Fiber’s ‘Failure’ Succeeded In Shining A Light On Pathetic Broadband Competition

      We’ve mentioned several times how Google Fiber’s promise to revolutionize the broadband sector never really materialized. There’s a long list of reasons for that, from incumbent ISPs suing to stop Google’s access to utility poles, to Alphabet executives suddenly getting bored with the high cost and slow pace of deploying fiber and battling entrenched monopolies.

      As it stands, Google Fiber’s expansions are largely on pause as company executives figure out how much money they’re willing to spend, what the wireless future looks like, and whether Alphabet really wants to participate. That said, while Google Fiber’s actual footprint pales in comparison to the hype, the service was a success in that it generated a quality, nationwide conversation about the sorry state of U.S. broadband competition, and spurred some otherwise apathetic incumbent ISPs to actually up their game, as countless cities nationwide decried the terrible state of existing service.

  • Intellectual Monopolies

    • Gilead’s Truvada SPC revoked by English High Court

      The English High Court has ruled that Gilead’s SPC for an antiretroviral product does not comply with Article 3(a)

      Gilead’s supplementary protection (SPC) certificate for antiretroviral product Truvada has been revoked by the English High Court today.

    • Analysis: Move To Contain Global Challenge By Ascending China At Play In Escalating Trade War Between Washington And Beijing

      In the last three decades, political leaders in both Beijing and Washington have periodically miscalculated over the trade portfolio but eventually, tensions were ironed-out and two-way trade flows advanced. Many nervous executives and political leaders around the world hope that cooler heads prevail, again.

      When the Chinese leadership cracked down demonstrators on Tiananmen Square in June 1989, Washington put Beijing’s bid to re-join the General Agreement on Tariffs and Trade (GATT) – succeeded by the World Trade Organization (WTO) in 1995 – on ice until early 1991 before they picked up again.

      Similarly, when the administration of President Bill Clinton in May 1994 de-linked the renewal of China’s Most-Favoured-Nation (MFN) status from its human rights record Beijing misread the move and tried to bluff its way into joining the WTO by putting an end of 1994 ultimatum. However, China’s chief trade negotiator, Long Yongtu, was sent back to his capital empty-handed. But during the heated exchanges in Geneva, top western diplomats recall, he put them on notice that when China one day became number one in world trade it would write the rules “in this house.”

    • Trademarks

      • BMW Opposes Marvel’s Trademark of Ghost-Spider

        Ghost-Spider is the new name for Spider-Gwen, the parallel dimension version of Gwen Stacy who, in that world, goes by the name of Spider-Woman. Lots of names for one person. The latest may raise the eyebrows of a certain car manufacturer. But why?

      • For Some Reason, BMW Is Asking For More Time To Oppose The Latest Gwen Stacey Character Trademark

        If you feel like you’re about to get a silly trademark story, your spidey-sense is working. We’ll keep this short and sweet, but this whole thing centers around Gwen Stacy, otherwise known as Spider-Woman. But because this is Marvel we’re talking about, there is also something of an alternate universe version of Gwen Stacy, in which she went by the name Spider-Gwen, but has more recently had that character rebooted as Ghost-Spider.

        [...]

        Two different brands under two different makes of car does not customer confusion make. If that really is the story here, it would be much better if the folks at BMW didn’t waste everyone’s time, because that’s the kind of opposition that will get tossed immediately.

        Meanwhile, maybe the folks at Marvel can dream up a few more alternate realities, including one where trademark law wasn’t so completely busted.

    • Copyrights

      • Compromise Music Modernization Act Will Bring Old Sound Recordings into The Public Domain, Tiptoe Towards Orphan Works Solution

        Earlier this year we wrote about the significant concerns we had with the CLASSICS Act, that sought to create a brand new performance right for pre-1972 sound recordings, requiring various internet platforms to pay for that additional right to stream such music. As we’ve discussed for years, pre-1972 sound recordings are kind of a mess in the copyright world. That’s because they weren’t covered by federal copyright law — but rather a mess of state laws (some statutes, some common law). Historically, none of that included a performance right, but some courts have recently interpreted one to exist (while others have said it doesn’t). On top of that, some of those state laws mean that certain works will remain covered by copyright for many decades after they would have gone into the public domain under federal copyright law.

        Many people have advocated for “full federalization” of those pre-1972 works, taking them away from those state copyright laws, and putting them on an even playing field with all other copyright-covered works. There is an argument against this, which is that doing so also creates brand new rights for works that are decades old, which clearly goes against the purpose and intent of copyright law (incentivizing the creation of new works for the public), but given what a mess having two (very different) systems entailed, it seemed like full federalization was the most sensible way forward.

      • Evolving concepts of work and sustainability of copyright: the curious case of curated fireworks displays
      • Music Group Celebrates Millions of ‘Pointless’ Piracy Takedown Notices

        The Association of Independent Music has teamed up with anti-piracy outfit MUSO to help its members remove infringing links from the Internet. The early results are promising, with five million takedown requests in a few months. However, on close inspection, it appears that they’re all excited about nothing.

        [...]

        Not only are most of the reported links missing from Google’s search results, they don’t always link to anything infringing on the pirate sites either.

09.18.18

Links 18/9/2018: Qt 5.12 Alpha , MAAS 2.5.0 Beta, PostgreSQL CoC

Posted in News Roundup at 1:33 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • NYU applies open source Google AI to diagnose lung cancer

    If recent research is any indication, artificial intelligence (AI) has a bright future in medicine. Nvidia developed an AI system that can generate synthetic scans of brain cancer. Google subsidiary DeepMind has demonstrated a machine learning algorithm that can recommend treatment for more than 50 eye diseases with 94 percent accuracy. And in newly published research, New York University (NYU) showed how AI might aid in lung cancer diagnosis.

    A paper today published in the journal Nature Medicine (“Classification and mutation prediction from non-small cell lung cancer histopathology images using deep learning”) describes how a team of NYU researchers retrained Google’s Inception v3, an open source convolutional neural network architected for object identification, to detect certain forms of lung cancers with 97 percent accuracy.

  • Google AI Tool Identifies a Tumor’s Mutations From an Image
  • Announcing Heritage: An Open Source, Public Blockchain Project

    Heritage is a project of A​3​ by Airbus, the advanced projects outpost of Airbus in Silicon Valley. Airbus Foundation is the first strategic partner within Airbus to utilize blockchain technology developed by Heritage.

    Heritage is a decentralized application for the Airbus Foundation to hold charity fundraising campaigns internal to Airbus. Through open sourcing Heritage, Airbus Foundation will help charities onboard cryptocurrency and smart contracts, opening them to a new class of donor. Heritage hopes to set a standard non-profits can replicate to continue to grow the ecosystem while aiding an underserved market.

  • Versity announces next generation open source archiving filesystem

    Versity Software has announced that it has released ScoutFS under GPLv2. “ScoutFS is the first GPL archiving file system ever released, creating an inherently safer and more user friendly option for storing archival data where accessibility over very large time scales, and the removal of vendor specific risk is a key consideration.”

  • Web Browsers

    • Chrome

    • Mozilla

      • Fedora Firefox – GCC/CLANG dilemma

        After reading Mike’s blog post about official Mozilla Firefox switch to LLVM Clang, I was wondering if we should also use that setup for official Fedora Firefox binaries.

        The numbers look strong but as Honza Hubicka mentioned, Mozilla uses pretty ancient GCC6 to create binaries and it’s not very fair to compare it with up-to date LLVM Clang 6.

        Also if I’m reading the mozilla bug correctly the PGO/LTO is not yet enabled for Linux, only plain optimized builds are used for now…which means the transition at Mozilla is not so far than I expected.

      • September 2018 CA Communication

        Mozilla has sent a CA Communication to inform Certification Authorities (CAs) who have root certificates included in Mozilla’s program about current events relevant to their membership in our program and to remind them of upcoming deadlines. This CA Communication has been emailed to the Primary Point of Contact (POC) and an email alias for each CA in Mozilla’s program, and they have been asked to respond to the following 7 action items:

      • Emily Dunham: CFP tricks 1

        Some strategies I’ve recommended in the past for dealing with this include looking at the conference’s marketing materials to imagine who they would interest, and examining the abstracts of past years’ talks.

      • Thunderbird 60 with title bar hidden

        Many users like hidden system titlebar as Firefox feature although it’s not finished yet. But we’re very close and I hope to have Firefox 64 in shape that the title bar can be disabled by default at least on Gnome and matches Firefox outfit at Windows and Mac.

        Thunderbird 60 was finally released for Fedora and comes with a basic version of the feature as it was introduced at Firefox 60 ESR. There’s a simple checkbox at “Customize” page at Firefox but Thunderbird is missing an easy switch.

  • Databases

  • Pseudo-Open Source (Openwashing)

  • Funding

  • BSD

    • OpenBSD/NetBSD on FreeBSD using grub2-bhyve

      When I was writing a blog post about the process title, I needed a couple of virtual machines with OpenBSD, NetBSD, and Ubuntu. Before that day I mainly used FreeBSD and Windows with bhyve. I spent some time trying to set up an OpenBSD using bhyve and UEFI as described here. I had numerous problems trying to use it, and this was the day I discovered the grub2-bhyve tool, and I love it!

      The grub2-bhyve allows you to load a kernel using GRUB bootloader. GRUB supports most of the operating systems with a standard configuration, so exactly the same method can be used to install NetBSD or Ubuntu. [...]

    • OpenZFS Developer Summit 2018

      The sixth annual OpenZFS Developer Summit took place September 10th and 11th in San Francisco, California with an expanded focus on non-technical topics like community development and cross-project coordination. It also marked the “light at the end of the tunnel” status of several long-term OpenZFS features, notably dRAID, the distributed spare technology originally developed by Intel. [...]

  • FSF/FSFE/GNU/SFLC

    • Washington State Electronic Notary Public endorsements

      [...] This all seemed to me to be something that GnuPG is designed to do and does
      quite well. So I sent an email on Friday night to the sender of the letter
      requesting specific issues that my provider did not comply with. This
      morning I received a call from the DoL, and was able to successfully argue
      for GnuPG’s qualification as an electronic records notary public technology
      provider for the State of Washington.

      In short, GnuPG can now be used to perform notarial acts
      <http://app.leg.wa.gov/RCW/default.aspx?cite=42.45.140> in the State of
      Washington!

  • Openness/Sharing/Collaboration

    • Hindawi Limited Launches Open-Source Peer Review System Built on the PubSweet Framework

      Hindawi Limited is pleased to announce the launch of a new peer review platform built using the Collaborative Knowledge Foundation’s (Coko) open source PubSweet framework.

      This is the first complete open-source peer review system to come out of the Coko community, a group of like-minded organizations, including eLife, the European Bioinformatics Institute, and the University of California Press, keen on working collaboratively towards the advancement of openness in scholarly communications software.

    • Open Access/Content

      • Surprise: Bill Introduced To Finally Make PACER Free To All

        This would be… amazing. We’ve spent years highlighting the massive problems with PACER, the federal court system that charges insane amounts for basically everything you do, just to access public records, and which functions very much like it was designed around 1995. There are a few court cases arguing that PACER fees are illegal and a recent ruling in one of those cases agreed. As we noted at the time, that was hardly the final word on the matter. A bill like the ones Collins introduced would be an amazing leap forward in giving public access to court documents.

      • Collins introduces bill to increase transparency and access to federal court documents

        Rep. Doug Collins (R-Ga.) today introduced a bill to reform both parts of the federal courts’ electronic records system.

        “Americans deserve a justice system that is transparent and accessible. I introduced the Electronic Court Records Reform Act to modernize the judicial records systems and remove fee-for-access barriers that technology has rendered unnecessary,” said Collins.

        “As an attorney and the son of a law enforcement officer, I understand how crucial it is that this legislation ensures access to a freer, fairer and more accountable judiciary.”

    • Open Hardware/Modding

      • Learn To Code Games With The DevBoy Modular Open Source System

        Developer Nicolai Shlapunov has created a new modular open source system specifically created for learning how to program and develop games. The DevBoy has this week launched via Kickstarter with the aim of raising $100,000 over the next 30 days to make the jump into production. Watch the demonstration video below to learn more about the modular hardware kit can help you learn to dove games and allows you to configure different gaming systems depending on your needs. “Ever wanted to build your own game console? Robot remote control? May be an oscilloscope? DevBoy is what you need!”

      • RISC-V microconference accepted for Linux Plumbers Conference

        The open nature of the RISC-V ecosystem has allowed contributions from both academia and industry to lead to an unprecedented number of new hardware design proposals in a very short time span. Linux support is the key to enabling these new hardware options.

      • A $1, Linux-Capable, Hand-Solderable Processor

        Over on the EEVblog, someone noticed an interesting chip that’s been apparently flying under our radar for a while. This is an ARM processor capable of running Linux. It’s hand-solderable in a TQFP package, has a built-in Mali GPU, support for a touch panel, and has support for 512MB of DDR3. If you do it right, this will get you into the territory of a BeagleBone or a Raspberry Pi Zero, on a board that’s whatever form factor you can imagine. Here’s the best part: you can get this part for $1 USD in large-ish quantities. A cursory glance at the usual online retailers tells me you can get this part in quantity one for under $3. This is interesting, to say the least.

      • Open Source Paramotor Using Quadcopter Tech

        But not always. The OpenPPG project aims to create a low-cost paramotor with electronics and motors intended for heavyweight multicopters. It provides thrust comparable to gas paramotors for 20 to 40 minutes of flight time, all while being cheaper and easier to maintain. The whole project is open source, so if you don’t want to buy one of their kits or assembled versions, you’re free to use and remix the design into a personal aircraft of your own creation.

        It’s still going to cost for a few thousand USD to get a complete paraglider going, but at least you won’t need to pay hangar fees. Thanks to the design which utilizes carbon fiber plates and some clever hinges, the whole thing folds up into a easier to transport and store shape than traditional paramotors with one large propeller. Plus it doesn’t hurt that it looks a lot cooler.

  • Programming/Development

    • TNS Context: The CNCF Open Source Survey and the Ballerina Programming Language

      Today on The New Stack Context podcast, we talk with Chris Aniszczyk, co-founder of the TODO Group and Chief Technology Officer of the Cloud Native Computing Foundation (CNCF) about the results of our recent open source program management survey. We also talk about WS02‘s new cloud native programming language, Ballerina.

      Joining Context host TNS editorial director Libby Clark for this episode is TNS founder Alex Williams and TNS managing editor Joab Jackson.

    • The D Language Front-End Is Trying Now To Get Into GCC 9

      Going on for a while now have been D language front-end patches for GCC to allow this programming language to be supported by the GNU Compiler Collection. It’s been a long battle getting to this state but it looks like it soon might be mainlined.

      Last June was the approval by the GCC Steering Committee to allow D support in GCC. While the committee approved of its addition, the D language front-end didn’t end up getting merged in time for the GCC 8 stable release that took place earlier this year.

Leftovers

  • Science

    • Being nice to your employees pays off: Research

      Researchers surveyed nearly 1,000 members of the Taiwanese military and almost 200 adults working full-time in the US, and looked at the subordinate performance that resulted from three different leadership styles.

      They found that authoritarianism-dominant leaders — who assert absolute authority and control, focused mostly on completing tasks at all costs with little consideration of the well-being of subordinates — almost always had negative results on job performance.

      On the other hand, benevolence-dominant leadership — where primary concern is the personal or familial well-being of subordinates — almost always had a positive impact on job performance.

  • Health/Nutrition

    • What The U.S. Could Do If So Much Money Wasn’t Wasted On Health Care

      The United States spends 7.2 percent points more of our gross domestic product (GDP) on health care than several industrialized countries. That is $1.3 trillion the country effectively wastes on health care without getting better health outcomes.

      This is such a large amount of money it is almost impossible to wrap one’s head around. But it’s important to highlight just what could be done with that much money.

    • Negotiated Deal Stands For UN Tuberculosis Declaration

      The final text of the declaration can be found here [pdf], and the letter from the President of the UN General Assembly marking the end of the “silence period,” during which member states have an opportunity to break consensus, can be found here [pdf].

      “In accordance with paragraph 6 of General Assembly resolution 72/268, the political declaration shall be approved by the high-level meeting on the fight against tuberculosis on 26 September 2018 and subsequently adopted by the General Assembly,” the letter states.

      The final version of the text could be stronger on intellectual property flexibilities that promote access to medicines, but it is important that a deal has been reached, and there is room for improvement, according to civil society groups.

  • Security

    • Quantum Computing and Cryptography

      Quantum computing is a new way of computing — one that could allow humankind to perform computations that are simply impossible using today’s computing technologies. It allows for very fast searching, something that would break some of the encryption algorithms we use today. And it allows us to easily factor large numbers, something that would break the RSA cryptosystem for any key length.

      This is why cryptographers are hard at work designing and analyzing “quantum-resistant” public-key algorithms. Currently, quantum computing is too nascent for cryptographers to be sure of what is secure and what isn’t. But even assuming aliens have developed the technology to its full potential, quantum computing doesn’t spell the end of the world for cryptography. Symmetric cryptography is easy to make quantum-resistant, and we’re working on quantum-resistant public-key algorithms. If public-key cryptography ends up being a temporary anomaly based on our mathematical knowledge and computational ability, we’ll still survive. And if some inconceivable alien technology can break all of cryptography, we still can have secrecy based on information theory — albeit with significant loss of capability.

      At its core, cryptography relies on the mathematical quirk that some things are easier to do than to undo. Just as it’s easier to smash a plate than to glue all the pieces back together, it’s much easier to multiply two prime numbers together to obtain one large number than it is to factor that large number back into two prime numbers. Asymmetries of this kind — one-way functions and trap-door one-way functions — underlie all of cryptography.

    • This New CSS Attack Restarts iPhones & Freezes Macs
    • Time to Rebuild Alpine Linux Docker Containers After Package Manager Patch
    • GrrCon 2018 Augusta15 Automation and Open Source Turning the Tide on Attackers John Grigg
    • Software Patch Claimed To Allow Aadhaar’s Security To Be Bypassed, Calling Into Question Biometric Database’s Integrity

      As the Huffington Post article explains, creating a patch that is able to circumvent the main security features in this way was possible thanks to design choices made early on in the project. The unprecedented scale of the Aadhaar enrollment process — so far around 1.2 billion people have been given an Aadhaar number and added to the database — meant that a large number of private agencies and village-level computer kiosks were used for registration. Since connectivity was often poor, the main software was installed on local computers, rather than being run in the cloud. The patch can be used by anyone with local access to the computer system, and simply involves replacing a folder of Java libraries with versions lacking the security checks.

      The Unique Identification Authority of India (UIDAI), the government body responsible for the Aadhaar project, has responded to the Huffington Post article, but in a rather odd way: as a Donald Trump-like stream of tweets. The Huffington Post points out: “[the UIDAI] has simply stated that its systems are completely secure without any supporting evidence.”

    • New CAS BACnet Wireshark Report Tool Helps User to Quickly Locate Intermittent Issues
    • Hackers For Good, Working To Gather Stakeholders To Find Answers To Cyberspace Challenges

      For a number of people, the word hacker means bad news. However, if some hackers have malevolent intentions, there are also hackers for good, and their skills were put to the challenge last week as they tried to save a fictitious city fallen into the hands of a group of cyber terrorists. The challenge was part of a two-day event organised by a young Geneva-based non-governmental organisation seeking to raise awareness about digital trust and bring accountability to cyberspace.

  • Transparency/Investigative Reporting

  • Environment/Energy/Wildlife/Nature

  • Finance

    • I worked in an Amazon warehouse. Bernie Sanders is right to target them

      Sanders has also been highlighting some of the 19th-century working practices used by Amazon to control and discipline its workforce inside of its fulfilment centres. Sanders’ bill – the Stop Bad Employers by Zeroing Out Subsidies Act, or the ‘Stop Bezos Act’ – would tax employers like Amazon when their employees require federal benefits.

      [...]

      Yet what I found while working for Amazon shocked me. I had done warehouse work previously when I was younger, along with a range of other poorly paid, manual jobs. In other words, my shock at the way workers were treated by Amazon was not a product of some wet-behind-the-ears naivety: I fully expected warehouse work to be tough. Yet what I witnessed at Amazon went far beyond that. This was a workplace environment in which decency, respect and dignity were absent.

  • AstroTurf/Lobbying/Politics

    • US power couple purchase Time Magazine for $190 million

      Time Magazine is being sold by Meredith Corp to Marc Benioff, a co-founder of Salesforce, and his wife.

      The Wall Street Journal reported that the iconic news magazine is being sold for USD 190 million to Benioff, one of four co-founders of Salesforce, a cloud computing pioneer.

    • Morning Edition’s Think Tank Sources Lean to the Right

      When it comes to seeking “expert” opinions on events for its reports, NPR often looks to a trusted roster of think-tank sources. In a study of NPR’s Morning Edition from February to July 2018, FAIR found that sources from left-of-center think tanks were underrepresented, with right-leaning think tank sources appearing almost twice as often.

      Out of 129 episodes aired Monday through Friday over the course of six months, researchers and fellows representing think tanks were quoted 144 times. Centrist think tanks were most commonly heard on Morning Edition, with 63 interview (44 percent of citations). Fifty-one (35 percent) of the show’s interviews were with conservative or center-right groups, while 28 (19 percent) involved progressive or center-left groups.

      Representatives from two think tanks—the pro-seafood Lobster Institute and the Rich Earth Institute, which promotes turning urine into fertilizer—could not be placed on the political spectrum.

    • The Election DataBot: Now Even Easier

      We launched the Election DataBot in 2016 with the idea that it would help reporters, researchers and concerned citizens more easily find and tell some of the thousand stories in every political campaign. Now we’re making it even easier.

      Just as before, the DataBot is a continuously updating feed of campaign data, including campaign finance filings, changes in race ratings and deleted tweets. You can watch the data come in in real time or sign up to be notified by email when there’s new data about races you care about.

      DataBot’s new homepage dashboard of campaign activity now includes easy-to-understand summaries so that users can quickly see where races are heating up. We’ve added a nationwide map that shows you where a variety of campaign activity is occurring every week.

      For example, the map shows that both leading candidates in Iowa’s 1st District saw spikes in Google searches in the week ending on Sept. 16 (we track data from Monday to Sunday). The Cook Political Report, which rates House and Senate races, changed its rating of that race from “Tossup” to “Lean Democratic” on Sept. 6.

  • Censorship/Free Speech

    • Google’s Chinese Search Engine Will Censor Results, Provide Gov’t-Approved Pollution Data

      Google’s Chinese search engine also contains a blacklist of terms like “human rights,” “student protest,” and “Nobel Prize,” showing the government has a deep interest in using the custom-built search engine to deter and punish dissent. None of this is surprising, other than Google’s willingness to participate in government censorship. Google does pretty much the same thing with Android phones here in the US, where everything in the ecosystem is tied to the originating phone. There are ways to prevent that, but most phone users won’t take those steps. In China, however, the phones are also registered with the government, removing the third-party hop needed to tie internet activity to a person.

      Even Google’s seeming embrace of censorship and dissent deterrence may not be as surprising as it should be, as any number of social media platforms have made considerable concessions to authoritarian governments in recent years, rather than face losing market share in these countries.

      [...]

      Companies make bad decisions when faced with doing the right thing or doing the most profitable thing. Google premised its existence on not being evil. Pulling out of China lived up to that ideal. This does not. Concessions will always be made, but if these leaked documents are accurate, what Google is doing in China is far more than making small compromises to provide Chinese citizens with platforms not entirely controlled by their government. For all intents and purposes, Dragonfly is the government’s toy, built on tech underpinnings and expertise Google has apparently offered willingly.

    • Google’s search engine for China censors results for ‘democracy,’ ‘human rights,’ or ‘free speech’

      Early in August, a report from The Intercept claimed that Google was working to make a China-friendly version of its search engine that would censor results to make the government happy. A number of Google engineers quit the company after learning about this particularly egregious breach of Google’s “don’t be evil” policy, and now yet another report from The Intercept reveals exactly what Google was willing to censor.

      [...]

      More than anything, the report — which is well worth reading in full — shows the extent that even the biggest tech companies will go to in order to capture a share in a major emerging market. It’s easy to argue that if Google doesn’t acquiesce, a local firm will just do so anyway, but clearly Google’s own employees think it’s worth keeping the moral high ground.

  • Privacy/Surveillance

    • Revealed: The Justice Dept’s secret rules for targeting journalists with FISA court orders

      Today, we are revealing—for the first time—the Justice Department’s rules for targeting journalists with secret FISA court orders. The documents were obtained as part of a Freedom of Information Act lawsuit brought by Freedom of the Press Foundation and Knight First Amendment Institute at Columbia University.

      While civil liberties advocates have long suspected secret FISA court orders may be used (and abused) to conduct surveillance on journalists, the government—to our knowledge—has never acknowledged they have ever even contemplated doing so before the release of these documents today.

      The FISA court rules below are entirely separate from—and much less stringent—than the rules for obtaining subpoenas, court orders, and warrants against journalists as laid out in the Justice Department’s “media guidelines,” which former Attorney General Eric Holder strengthened in 2015 after several scandals involving surveillance of journalists during the Obama era.

      When using the legal authorities named in the “media guidelines,” the Justice Department (DOJ) must go through a fairly stringent multi-part test (e.g. certifying that the information is critical to an investigation, that it can’t be obtained by other means, and that the DOJ exhausted all other avenues before doing so) before targeting a journalist with surveillance. They must also get approval from the Attorney General.

    • Federal Court Says NSA PRISM Surveillance Good And Legal Because The Gov’t Said It Was Good And Legal

      Three years after its inception, a prosecution involving possibly unlawful FISA-authorized surveillance, hints of parallel construction, and a very rare DOJ notification of Section 702 evidence has reached a (temporary) dead end. The defendants challenged the evidence on multiple grounds — many of which weren’t possible before the Snowden leaks exposed the breadth and depth of the NSA’s domestic surveillance.

      The federal judge presiding over the case — which involved material support for terrorism charges — has declared there’s nothing wrong with anything the NSA or FISA Court did, so long as the surveillance was authorized and possibly had something to do with national security. (via FourthAmendment.com)

      First, the defendants — all accused of providing material support to Al Qaeda (remember them?) — asserted the constitutionality of the NSA’s upstream collections should be revisited in light of the Snowden leaks. The court [PDF] says these more-recent exposures are no reason to upset the precedential apple cart.

    • Congress Is Poised to Give Trump Administration Powerful New Spying Powers

      Congress is once again using “national security” as magic words to increase the government’s surveillance powers in dangerous and unaccountable ways.

      The Trump administration wants more spying power — and Congress appears poised to give it to them.

      Touting national security to justify spying powers that jeopardize our constitutional rights is a strategy that we have seen before. It happened with the Patriot Act after 9/11, and members of Congress and government officials are now employing similar arguments again. This time it involves a drone bill that some in Congress are pressing to be sneakily inserted into a larger piece of legislation that could be considered this month.

      According to news reports, members of Congress are lobbying to add the Preventing Emerging Threats Act of 2018 to the Federal Aviation Agency Reauthorization Act. Proponents of the bill claim that it will make our country safer. But, in reality, the drone legislation will give new surveillance powers to the Trump administration to spy on journalists, activists, and other Americans without a warrant.

      According to bill sponsors, the bill’s intent is to arm the “Department of Homeland Security and the Justice Department with the ability to act quickly and effectively when a drone poses a risk to large-scale events and government facilities.” This goal may be admirable, but the bill does not achieve it.

      Instead, the bill empowers these agencies to warrantlessly spy on Americans without complying with existing US laws — including the Wiretap Act, Stored Communications Act, and the Computer Fraud and Abuse Act. Generally, these laws require the government to get a warrant if they want to wiretap or access other types of stored communications.

      The drone bill, however, exempts DHS and DOJ from these restrictions anytime it deems a drone a “threat” to certain covered areas. The bill defined covered areas so broadly — including areas where there may be emergency responses or federal investigations— that it will inevitably sweep in areas where media organizations have a legitimate interest in reporting.

  • Civil Rights/Policing

    • ‘This Is an Unprecedented Level of Secrecy and Non-Transparency’

      Media are certainly reporting the confirmation hearings of Supreme Court nominee Brett Kavanaugh. But there’s a case to be made that stories that just get views from various folks about what it would be like with Kavanaugh on the court, but sidestep serious questions about the process that would put him there, are doing less covering than covering up.

      Media get things wrong all the time, but among the deepest damage they do is invisibilizing possibilities, making it seem that things they don’t consider can’t happen. It’s a sort of implicit passivity that permeates corporate reporting, of which the air of “oh well, what’s next” fatalism wafting off of much coverage of Kavanaugh is just one example.

    • California Law Could be a Big Step Forward for Police Transparency
    • A Full Investigation Is Needed Into the Sexual Assault Allegations Against Brett Kavanaugh

      Both Kavanaugh and his accuser, Christine Blasey Ford, should testify under oath before the Senate Judiciary Committee.

      Over the weekend, details of serious charges of sexual assault alleged to have been committed by Judge Brett Kavanaugh became public, as did the name of the woman raising these allegations. In a letter to Sen. Diane Feinstein and in an interview with The Washington Post, Dr. Christine Blasey Ford described an incident in high school when she says Kavanaugh sexually assaulted her at a party.

      Judge Kavanaugh has denied the allegations. “I have never done anything like what the accuser describes — to her or to anyone,” he said in a statement on Monday.

      These allegations, like all allegations of sexual misconduct, deserve to be taken seriously.

      Initially, Dr. Ford did not want her story to become public. She was afraid that doing so would “upend her life.” This is the reality women face, within a culture that too often vilifies people who come forward. Already, she has reportedly received threatening emails and is the subject of vicious online trolls, cruel tweets, and mocking Instagram posts, including one by Donald Trump Jr. But according to her lawyer, Debra Katz, “She’s willing to do whatever it takes to get her story forth.”

      It is critical that the confirmation hearings be delayed so that a thorough and transparent investigation can be conducted, including a hearing at which both Ford and Kavanaugh have an opportunity to testify under oath. The Senate cannot move forward with this lifetime appointment to the highest court in the land without considering the results of a fair, non-partisan, and complete process. If Judge Kavanaugh is confirmed, he could sit on the Supreme Court for the next 40 years. This confirmation process is the only process he will ever go through. Now is the time for the allegations to be investigated and testimony to be heard.

    • Blood-Spatter Expert in Joe Bryan Case Says “My Conclusions Were Wrong”

      A hearing to determine whether Joe Bryan should be granted a new trial came to a dramatic conclusion on Monday with a surprise, eleventh-hour admission from the expert witness whose testimony had proved critical in convicting the former high school principal of the 1985 murder of his wife, Mickey.

      “My conclusions were wrong,” retired police Detective Robert Thorman wrote in an affidavit introduced by the defense of the bloodstain-pattern analysis he performed. “Some of the techniques and methodology were incorrect. Therefore, some of my testimony was not correct.”

      Bloodstain-pattern analysis is a forensic discipline whose practitioners regard the drops, spatters and trails of blood at a crime scene as clues, which can sometimes be used to reverse-engineer the crime itself. Thorman had only 40 hours of training in the discipline when he was called in to work on the Bryan case. His testimony about a blood-speckled flashlight that Mickey’s brother found in the trunk of Bryan’s car four days after the murder made the state’s tenuous theory of the crime seem plausible.

      At Bryan’s trial in 1986 and then again at his 1989 retrial, Thorman testified that tiny flecks of blood on the flashlight could only be “back spatter” — a pattern that indicated a close-range shooting. What connection the flashlight had to the crime, if any, was never clear; in 1985, a crime lab chemist found that the blood on it was type O, which corresponded not only to Mickey but to nearly half the population. But Thorman effectively tied the flashlight to the crime scene, going so far as to say that the killer had likely held the flashlight in one hand while firing a pistol with the other.

      Bryan had been attending a principals’ convention in Austin, 120 miles from where the murder occurred in Clifton, Texas, in the days surrounding the murder. He has always maintained that he was in Austin, asleep in his hotel room, at the time of the crime.

    • How Facebook Is Giving Sex Discrimination in Employment Ads a New Life

      We’re taking on Facebook and 10 companies for using the social platform to direct job ads toward men, excluding others.

      In 1967, the newly formed National Organization for Women staged a weeklong protest of The New York Times and other newspapers. Their demonstration targeted the long-standing practice of printing classified listings in two separate columns: “Help wanted: Male” and “Help wanted: Female,” which of course resulted in the exclusion of women from high-paying jobs and industries. As a result of NOW’s advocacy campaign, the Equal Employment Opportunity Commission, the federal agency charged with enforcing Title VII of the 1964 Civil Rights Act prohibiting race and sex discrimination in employment, finally made clear — over the strong objection of newspapers — that limiting job postings to one sex was unlawful. Sex-segregated classified ads subsequently became a thing of the past.

      Or so we thought.

      Today, five decades later, sex-segregated job listings are roaring back to life. Enabled by social media platforms like Facebook, advertisers are increasingly using users’ personal data to direct their ads — including for jobs — to individual users based on characteristics such as sex, race, and age, thus excluding users outside of the selected groups from learning about these opportunities.

      We can’t let this archaic form of discrimination continue to take hold. That’s why on Tuesday, the ACLU, along with the Communications Workers of America and the employment law firm Outten & Golden LLP, filed charges with the Equal Employment Opportunity Commission against Facebook and 10 companies that targeted ads for jobs in male-dominated fields to younger male Facebook users only, excluding all women and non-binary individuals, as well as older male users. The case is brought on behalf of three job seekers and the Communications Workers of America on behalf of a proposed class of millions of job applicants. It alleges that these job advertising practices violate federal civil rights laws prohibiting sex and age discrimination in employment.

    • Court: Trump’s ‘Get ‘Em Out’ Order Directed At Campaign Rally Protesters Is Protected Speech

      The Sixth Circuit Appeals Court has taken a look at some of President Trump’s campaign trail trash talk and decided urging fans to remove protesters wasn’t incitement, even if the phrasing was a bit graceless. (h/t Elizabeth Joh)

      The plaintiffs — Kashiya Nwanguma, Molly Shah, and Henry Brosseau — attended a Trump campaign rally for the express purpose of protesting it. There’s nothing wrong with that. It’s the sort of thing that happens all the time, even if Trump tends to draw more detractors than most. During his speech, Trump had his critics ejected, telling attendees to “get ‘em out of here.”

      The plaintiffs, having been unceremoniously ejected (with some extra jostling from Trump supporters), sued, claiming Trump’s “get ‘em out of here” directly caused them harm and violated the state of Kentucky’s riot incitement law.

      The Appeals Court disagrees [PDF] with this assessment, using the plaintiffs’ own statements to undo their assertions. But it’s not happy with the lower court’s decision to apply a less strict standard to Trump’s wording to give the plaintiffs a better shot at hitting the mark with their state claims (“incitement to riot”). Applying the plausibility standard — that Trump’s “get ‘em out of here” could have conceivably incited a riot — makes no sense if the lower court wasn’t willing to apply that same standard to words Trump said directly after that.

    • Beyond Prisons — Episode 28: Prison Strike 2018

      Recorded in the midst of the strike on August 30, co-hosts Brian Sonenstein and Kim Wilson have a conversation with Ware about the strike’s progress, as well as the challenges of organizing and why the press is woefully unprepared to report on the action.

  • Internet Policy/Net Neutrality

    • Ajit Pai Whines About California’s Net Neutrality Effort, Calls It ‘Radical,’ ‘Illegal’

      Much like the giant ISPs he’s clearly beholden to, Ajit Pai isn’t particularly happy about California’s efforts to pass meaningful net neutrality rules. The state’s shiny new law recently passed the state assembly and senate, and is awaiting the signature of California Governor Jerry Brown. ISPs recently met with Brown in a last-minute bid to get him to veto the bill (a very real possibility) despite widespread, majority public support.

      Pai last week took some time to whine about California’s bill at the Maine Heritage Policy Center, a “free market” think tank supported by (shockingly) major ISPs.

    • Ajit Pai: California net neutrality law is “illegal”

      During the Obama years, when Pai was a mere FCC commissioner, he argued that states had the right to overrule federal telcoms rules. But he was arguing in favor of states’ rights to overrule federal regulations that said states couldn’t stop cities from building municipal internet services that competed with the telcos that Pai formerly served in an executive capacity.

    • Ajit Pai calls California’s net neutrality rules “illegal”

      California’s attempt to enforce net neutrality rules is “illegal” and “poses a risk to the rest of the country,” Federal Communications Commission Chairman Ajit Pai said in a speech on Friday.

      Pai’s remarks drew an immediate rebuke from California Senator Scott Wiener (D-San Francisco), who authored the net neutrality bill that passed California’s legislature and now awaits the signature of Governor Jerry Brown.

  • Intellectual Monopolies

    • Economic Analysis of Intellectual Property Notice and Disclosure

      Notice of intellectual property content, ownership, boundaries, scope of rights (and limitations), enforcement institutions, and remedial consequences plays a central role in resource planning and other economic and social functions. This chapter examines the function, design, and economic effects of intellectual property notice and disclosure rules and institutions. Based on this analysis, the chapter offers a comprehensive set of policy, institutional, and litigation reforms.

    • India: Patents Excluded

      Later, in 2012, Mr. Patel (Bharat Bhogilal Patel) filed a complaint against LG Electronics and multiple other importers for infringement. A circular was released by the govt. in 2009, which helped in the implementation of the IPR Rules, 2007. This circular addressed the issue of a Customs Officer not having the pre-requisite knowledge on Patents, Geographical Indication Infringements and design compared to Trademark and Copyrights. In order to deal with the infringements of the former kind, they should have been pronounced as offences by the court of law making the application by the Customs Officer simpler.

      In order to deal with this, vide notification no. 56/2018, the Central Government introduced amendments to the IPR Enforcement Rules, 2007 and introduced the Intellectual Property Rights (Imported Goods) Amendment Rules, 2018.

    • Germany: Abdichtsystem, Federal Court of Justice of Germany, X ZR 120/15, 16 May 2017

      This case concerns the question of whether, and under what conditions, a supplier of infringing products who is located abroad can be held liable for infringement of the German patent for acts committed abroad. The FCJ held that the supplier may be liable if he was aware or should have been aware of the fact that the products he was supplying would eventually also reach the German market through his customers. Where the supplier does not market the products directly to Germany, there is no general obligation to monitor the activities of his customers.

    • Trademarks

      • Cai v. Diamond Hong, Inc. (Fed. Cir. 2018)

        Zheng Cai DBA Tai Chi Green Tea Inc. appealed an opinion of the U.S. Patent and Trademark Office Trademark Trial and Appeal Board (TTAB) cancelling registration of his mark “WU DANG TAI CHI GREEN TEA” due to a likelihood of confusion with Diamond Hong, Inc.’s registered mark, “TAI CHI,” pursuant to 15 U.S.C. § 1052(d) (2012).

        The Federal Circuit affirmed the decision, and despite the two marks (shown below) looking substantially different in appearance at first glance, other factors weighed in favor of the cancellation.

    • Copyrights

      • Traditional Knowledge and the Commons: The Open Movement, Listening, and Learning

        CC licenses and public domain tools help individuals, organisations, and public institutions better disseminate digital resources and data, breaking down the typical barriers associated with traditional “all rights reserved” copyright. At the same time, CC licenses can’t do everything for everyone. First, the licenses operate in the sphere of copyright and similar rights. They do not attempt to license, say, personality rights, trademark, or patent rights. Also, the CC community recognizes that voluntary licensing schemes will never be a comprehensive solution for access to and reuse of knowledge and creativity around the world. This is one reason why CC works on international copyright reform issues, including the protection and expansion of user rights.

        Another dimension of openness that could be better understood from the perspective of the “open” community is the sharing of cultural works related to indigenous communities. This has been talked about with terms such as “traditional knowledge”. Traditional knowledge consists of a wide range of skills, cultural works, and practices that have been sustained and developed over generations by indigenous communities around the world. These communities hold entitlement over this knowledge as well as responsibility for the preservation of their knowledge, but haven’t always had the autonomy to decide what can be done with their knowledge. International and national instruments have attempted to codify the value of traditional knowledge and rights of indigenous peoples, but the place of such knowledge within conventional intellectual property structures remains deeply contested and uncertain.

        These issues and more were brought up at the 2018 Creative Commons Global Summit as well, and has since started an important conversation within the CC community. I’m an attorney and doctoral candidate at UC-Berkeley Law, and over the summer I worked as a research fellow for Creative Commons to conduct an investigation into the current issues regarding traditional knowledge and its intersection with the open movement. A draft of the paper is complete, and we welcome your thoughts and suggestions to it.

      • Thanks To ISP Bahnhof, We Know Just How Crazy Copyright Trolling In Sweeden Is Getting

        For some time, Swedish ISP Bahnhof has been sounding the alarm over copyright trolling practices in its home country. While cynics will note that Bahnhof has absolutely made its refusal to hand over customer data a central part of its marketing messaging, the ISP has also made a point to publicly track copyright trolling court cases, threat letters, and pretty much everything else related to copyright trolling in Sweden. And, frankly, it’s due pretty much solely to Bahnhof’s tracking efforts that we now know just how insanely worse copyright trolling in Sweden has gotten in just the last year or so.

      • Apple Didn’t Delete That Guys iTunes Movies, But What Happened Still Shows The Insanity Of Copyright

        Last week we, like many others, wrote about the story of Anders G da Silva, who had complained on Twitter about how Apple had disappeared three movies he had purchased, and its customer service seemed to do little more than offer him some rental credits. There was lots of discussion about the ridiculousness — and potential deceptive practices — of offering a “buy” button if you couldn’t actually back up the “purchase” promise.

        Some more details are coming out about the situation with da Silva, and some are arguing that everyone got the original story wrong and it was incorrect to blame Apple here. However, looking over the details, what actually happened may be slightly different, but it’s still totally messed up. Apple didn’t just stop offering the films. What happened was that da Silva moved from Australia to Canada, and apparently then wished to redownload the movies he had purchased. It was that region change that evidently caused the problem. Because copyright holders get ridiculously overprotective of regional licenses, Apple can only offer some content in some regions — and it warns you that if you move you may not be able to re-download films that you “purchased” in another region (even though it promises you can hang onto anything you’ve already downloaded).

        [...]

        But, alas, we’re left with yet another example of the insanity driven by excessive copyright, in which copyright holders get so overly focused on the notion of “control” that they feel the need to control absolutely everything — including making sure that no wayward Canadians might (GASP!) purchase and download a movie meant for Australians. It’s this overwhelming, obsessive desire to “control” each and every use that messes with so many people’s lives — including da Silva’s — and makes sure that the public has almost no respect at all for copyright. Give up a little control, and let the edge cases go, and maybe people wouldn’t be so quick to condemn copyright for removing their own rights so frequently.

Today’s European Patent Office (EPO) Works for Large, Foreign Pharmaceutical Companies in Pursuit of Patents on Nature, Life, and Essential/Basic Drugs

Posted in America, Europe, Patents at 5:58 am by Dr. Roy Schestowitz

A butterfly

Summary: The never-ending insanity which is patents on DNA/genome/genetics and all sorts of basic things that are put together like a recipe in a restaurant; patents are no longer covering actual machinery that accomplishes unique tasks in complicated ways, typically assembled from scratch by humans; some supposed ‘inventions’ are merely born into existence by the natural splitting of organisms or conception (e.g. pregnancy)

THE EPO used to be so much better than the USPTO. I personally used to like the EPO and was proud to say we had the best patent office in the world. It was strict, it was pedantic, and it assured limits on patent scope. That is no longer the case, however, as many EPO insiders can attest to as well. They too complain about the collapse in patent quality that we've just revisited.

“…billionaire drug lords are using patents to profit from the very disease which they themselves created (drug addiction).”Looking across the Atlantic, it’s not hard to see patent scope going (or already gone) insane. Some of the things being patented are outright laughable (we’ll deal with these in a separate post later on) and they would be funny/amusing if they didn’t cause so much agony/pain for legitimate, practicing companies. In the area of patents on natural things, how about this new “settlement”? Bausch Health blackmailed a rival until the rival gave up. They try to drive competitors out of business using patents alone. Is this good for the so-called ‘free market’? What would be the impact on people in need of medicine?

In other news that gained traction lately, billionaire drug lords are using patents to profit from the very disease which they themselves created (drug addiction). It is not even remotely ethical. These people should be in prison, but they are billionaires who are well connected. We mentioned this yesterday and it’s good to see that the public now scrutinises the USPTO over it.

Speaking of evil patents, how about the EPO’s decision to uphold a notorious patent last week? For those who haven’t been keeping abreast of it, read “António Campinos Needs to Listen to Doctors Without Borders (MSF) et al to Salvage What’s Left of Public Consent for the EPO” (published a few days ago).

Life Sciences Intellectual Property Review (LSIPR), a propaganda site of the patents-on-life lobby, wrote about the subject yesterday. It started as follows:

The European Patent Office (EPO) has upheld a patent covering Gilead’s hepatitis C medicine sofosbuvir, despite opposition from humanitarian organisation Médecins Sans Frontières (MSF).

Speaking to LSIPR, the EPO confirmed that it has “maintained in an amended form” European patent number 2,604,620 on Thursday, September 13.

The decision was announced following oral proceedings in Munich, Germany. The EPO advised that it will publish the full decision here once the Opposition Division has written its ruling.

We certainly hope that these people at the Opposition Division understand their impact on many lives, especially poor people. It’s a dark day for the EPO. It’s even darker for a lot of people with darker skin.

“Putting aside DuPont’s historic role in genocide, we’re rather concerned to see the trend of patenting organisms, genetics and so on.”Now, looking at the US, the Federal Circuit dealt with a Patent Trial and Appeal Board (PTAB) inter partes review (IPR) and patent maximalists responded as follows yesterday: “The new DuPont v. Synvina decision is important for its specific application obviousness of claim ranges. It also creates some amount of tension with prior cases — particularly Dynamic Drinkware and Magnum Oil – regarding burden shifting within Inter Partes Review proceedings. [...] On appeal, the Federal Circuit holds here that the traditional obviousness burden-shifting associated with ranges applies to IPR proceedings. To be clear, the patentee never has the burden of proving non-obviousness. But, once a prima facie case of obviousness is established, the claims will be cancelled unless the patentee provides evidence to support its position.”

Putting aside DuPont’s historic role in genocide, we’re rather concerned to see the trend of patenting organisms, genetics and so on. This should not be happening. Earlier this month Wired published this article titled “Crispr’s Epic Patent Fight Changed the Course of Biology” and as we noted earlier this year the EPO’s Opposition Division fought back against it. Making life “owned” using patents sure “Changed the Course of Biology”… for the worse. From the article, which names the role of the Federal Circuit:

After three bitter years and tens of millions of dollars in legal fees, the epic battle over who owns one of the most common methods for editing the DNA in any living thing is finally drawing to a close. On Monday, the US Court of Appeals for the Federal Circuit issued a decisive ruling on the rights to Crispr-Cas9 gene editing—awarding crucial intellectual property spoils to scientists at the Broad Institute of Cambridge, Massachusetts.

The fight for Crispr-Cas9—which divided the research community and triggered an uncomfortable discussion about science for personal profit versus public good—has dramatically shaped how biology research turns into real-world products. But its long-term legacy is not what happened in the courtroom, but what took place in the labs: A wealth of innovation that is now threatening to make Cas9 obsolete.

So they’ll be evergreening their patent portfolio if they get their way. The concept that all of life should be patented isn’t so controversial among patent law firms. Kevin Noonan, for example, constantly promotes this agenda and yesterday he wrote about another case of the Federal Circuit with an important outcome:

The varying appellate fortunes of patentees regarding the question of obviousness is illustrated nicely in the Federal Circuit decision in Orexo AB v. Actavis Elizabeth LLC handed down earlier this month. The statute, 35 U.S.C. § 103, was intended to tether the question of obviousness to the prior art (and untether it from judicial whim regarding “inventiveness” or “invention” as found in several Supreme Court decisions stating with Hotchkiss (and, to patent law’s detriment, resurrected under § 101 by Justice Breyer and in other recent decisions from the Court). Nevertheless, there cannot help to be a subjective aspect to the issue of obviousness, which is illustrated by this decision when placed in contrast, for example, with other recent obviousness determinations by the Federal Circuit (see, for example, “Acorda Therapeutics, Inc. v. Roxane Laboratories, Inc.”).

[...]

The opinion illustrates the District Court’s error in accepting as evidence supporting obviousness testimony that, if selected, citric acid as a carrier particle would have been expected to work, citing In re Gordon, 733 F.2d 900, 902 (Fed. Cir. 1984) (“The mere fact that the prior art could be so modified would not have made the modification obvious unless the prior art suggested the desirability of the modification.”). A similar error arose regarding the District Court’s dismissal of Orexo’s argument regarding preserving the 4:1 ratio of buprenorphine to naloxone, the panel stating the error to be the District Court’s finding that “there is nothing in the prior art which would have discouraged a person of ordinary skill from following the path set out in the various references” instead of recognizing that “no reference or combination of references proposes the path of the ’330 Patent.” Put more succinctly the opinion states “[t]he question is not whether the various references separately taught components of the ’330 Patent formulation, but whether the prior art suggested the selection and combination achieved by the ’330 inventors.”

Finally, the opinion turns to the objective indicia, which “guide the analysis of obviousness,” citing Leo Pharm. Prods., Ltd. v. Rea, 726 F.3d 1346, 1357–58 (Fed. Cir. 2013). Without expressly stating it, the Court here finds clear error in the District Court’s discounting these factors, for example, stating that a 66% increase in buprenorphine bioavailability was “more than a trivial ‘degree.’”

Well, it is our view that any patent on life should be regarded as obvious and fail the obviousness test, as well as prior art test. Life is, after all, not an invention but something that always existed or evolved on its own (an act of nature). When laws are drawn up by lobbyists of law firms and pushed by politicians bribed by big pharmaceutical firms, however, laws make no sense. It’s like companies are basically buying laws. Those laws are designed for nothing except boosting their profits and eliminating competition, including competition in the form of disruptive (to their cash cows) research.

The EPO Has Quit Pretending That It Cares About Patent Quality, All It Cares About is Quantity of Lawsuits

Posted in Europe, Patents at 4:50 am by Dr. Roy Schestowitz

Dark clouds over every legitimate (practicing) company in Europe

Dark clouds

Summary: A new interview with Roberta Romano-Götsch, as well as the EPO’s promotion of software patents alongside CIPA (Team UPC), is an indication that the EPO has ceased caring about quality and hardly even pretends to care anymore

TODAY’S EPO is nothing like your father’s and grandfather’s EPO. It has become a lot more like the USPTO (one decade ago, predating much-needed reforms in the US).

“They conflate application pendency with patent quality and staff (as in patent examiners) isn’t happy about this lie.”The EPO’s Roberta Romano-Götsch, who will attend an event in Chicago in which the EPO (per its own words) will promote software patents under the guise of “automobiles” innovation, has done an interview with Gene Quinn (Watchtroll). The second part was published yesterday. It’s an event they organise with IPO, the pressure group of the litigation ‘industry’ (which also lobbies quite ferociously for software patents). EPO promoted this and “stay classy, EPO” was my response to them. “Associating with patent zealots who attack judges just like Battistelli did…”

Regular readers of ours are probably familiar with the tone and the agenda of Watchtroll. From the interview:

We then move on to discuss what the term “quality” means to the EPO, and then pivot into discussing the EPO’s upcoming Automotive and Mobility Seminar, which will take place in Chicago from September 26-27, 2018.

As usual, we prefer not to quote much — or anything at all — from Watchtroll because the site uses misleading terms like “efficient infringers” and insults those who stand for science. The interview reinforces the perception that what EPO means by “quality” is how fast it grants a patent! That’s it. Even if wrongly. They conflate application pendency with patent quality and staff (as in patent examiners) isn’t happy about this lie. Not even stakeholders are happy because what good are patents that would be rendered invalid if brought into a courtroom? The patent microcosm doesn’t care so much because it profits by the number of applications and any visit to the court is very “big money”, irrespective of the outcome of cases (frivolous or not).

We are very concerned that António Campinos is nothing but an extension of Team UPC because his first step as President, on his second day in Office, was UPC boosting. Campinos competed for the job with an actual judge (one who values justice and sports decades of experience, including at the ICC), but Battistelli intervened and stacked the deck as he always does. So now we have another ‘flavour’ of Battistelli — a quieter and more subtle one. “President @EPOorg António Campinos gives a master class to the new civil servant graduates of the #SPTO on IP future challenges,” the EPO quoted another account as saying yesterday. At least we now know how Campinos uses his time. So I asked them: “Did he teach them how to illegally sack workers like he does at the EPO?”

“Campinos competed for the job with an actual judge (one who values justice and sports decades of experience, including at the ICC), but Battistelli intervened and stacked the deck as he always does.”I cited this recent example of what he did at the EU-IPO although there are more recent examples from the EPO.

In another EPO tweet there was yet more of the usual advocacy of software patents — something that the EPO does 2-4 times per day (weekdays). This one explicitly names “computer-implemented inventions” (CII means exactly the same as software patents) and speaks of some “free-of-charge” brainwash from CIPA. To quote: “What’s the EPO’s approach to computer-implemented inventions? Daniel Closa, one of our senior experts, will explain at this free-of-charge seminar in London” (where such patents aren’t allowed “as such”).

The EPO’s liaison with CIPA is a subject we recently covered. The EPO typically associates with IPO, CIPA and Watchtroll these days. In other words, it’s all about the litigation ‘industry’.

“The EPO typically associates with IPO, CIPA and Watchtroll these days. In other words, it’s all about the litigation ‘industry’.”Speaking of this litigation ‘industry’, Managing IP is a site which targets it. It is a pro-UPC publisher (that organised lobbying events for UPC, sometimes directly connected to the EPO). Some media companies are lobbyists and think tanks disguised as “news” and Managing IP is a living reminder of this. Yesterday it published “CIPA urges UK government to stay in EUIPO after Brexit” and then tweeted “CIPA has sent a letter to the UK prime minister asking the government to negotiate continued participation in the EU trade marks and designs system after #Brexit” (Managing IP is being a megaphone of CIPA, as usual).

Even though this has nothing to do with the UPC (which is dead anyway) Team UPC tried to interject things. Thomas Adam wrote on Twitter: “CIPA trying to set an example for continued UPC participation of UK after Brexit?!”

“It’s like the main aim is to ‘generate’ more business for litigators rather than serve the public or acknowledge real innovation.”No, the article doesn’t even mention the UPC. Also published yesterday was this article from Rachel Havard (AA Thornton & Co) titled “Brexit: Considerations for European Union Trade Marks and Registered Community Designs” (UPC not mentioned here either).

The bottom line is that today’s EPO, more so with António Campinos in charge, is little more than an extension in cahoots with the litigation pipeline. It’s like the main aim is to ‘generate’ more business for litigators rather than serve the public or acknowledge real innovation. In our previous post we showed how a European Patent had been used by a notorious bully in Germany (the bully is from the US). No wonder examiners, who are basically scientists, are royally pissed off.

Qualcomm’s Escalating Patent Wars Have Already Caused Massive Buybacks (Loss of Reserves) and Loss of Massive Clients

Posted in Apple, Courtroom, Patents at 3:57 am by Dr. Roy Schestowitz

Yesterday: Qualcomm’s Patent Aggression Threatens Rationality of Patent Scope in Europe and Elsewhere

Qualcomm loses Apple’s business and drops NXP deal. What’s next?
Reference: Qualcomm loses Apple’s business and drops NXP deal. What’s next?

Summary: Qualcomm’s multi-continental patent battles are an effort to ‘shock and awe’ everyone into its protection racket; but the unintended effect seems to be a move further and further away from ‘Qualcomm territories’

ARMED with patents, including software patents from the EPO and USPTO, Qualcomm embarked on a misguided crusade which was bound to drive away clients and reduce interest in its patent pool. A few hours ago it was noted that “Apple Moves Away From Qualcomm” (even further than before) and according to Florian Müller, who followed the respective cases closely, there’s a new lawsuit in Germany, based on a European Patent:

With a view to a Qualcomm v. Apple patent infringement trial in Munich on Thursday I contacted the Munich I Regional Court to check on the time. As for the biggest issue in that case, may I refer you to my recent post on how thin air can “practice” claim limitations unless the name of the game is the claim.

On the same occasion, I inquired about any Qualcomm v. Apple first hearings that might come up in the near term. Unlike other German courts, the Munich court holds a first hearing, not as formally focused on claim construction as a U.S. Markman hearing, prior to patent trials. A spokeswoman for the court kindly informed me that a first hearing in two parallel cases, targeting different Apple entities, has been scheduled for March 28, 2019.

The patent-in-suit in both cases is EP1988602 on a “mobile terminal with a monopole[-]like antenna.”

Knowing the usual Munich timelines, it appears that the new complaints have only been filed recently. I guess just before the main summer vacation season here, or at least not long before.

“These sorts of multi-continental patent battles aren’t particularly new, but they serve to highlight the sort of thing that the EPO in Germany probably looks to facilitate, even if that would mean a lot more patent trolls, attacks on generics and so on.”In a later post Müller wrote that ITC “staff raises public-interest concerns over ban of Intel-powered iPhones sought by Qualcomm” and “staff says none of the 3 remaining patents-in-suit (from Qualcomm’s 2nd ITC complaint against Apple) is infringed. Apple [is] on [a] winning track.”

“CCIA raised these concerns in our public interest filings,” Josh from the CCIA said, so “I’m glad the ITC staff sees the same issues with exclusion in this case. (Not to mention infringement.)”

Quoting Müller, who was busy writing more than usual yesterday:

This morning, opening statements were delivered at the start of the evidentiary hearing in the investigation of Qualcomm’s second ITC complaint (request for U.S. import ban). The complaint was filed last December. An earlier complaint by Qualcomm against Apple is at a more advanced procedural stage: a final initial determination (a preliminary ruling by an Administrative Law Judge, which is however subject to Commission review) was originally due last Friday, but after the ALJ originally in charge retired, Chief ALJ Bullock took over and extended the deadline by two weeks. In that earlier case, the Office of Unfair Import Investigations (OUII, commonly referred to as “the ITC staff”) recommended an infringement finding with respect to one patent. Staff recommendations are not binding on ALJs, and even ALJs don’t make the final decision: the Commission itself does. But what the staff says is often adopted.

We have been critical of ALJs who ignored rulings from the Patent Trial and Appeal Board (PTAB). The Federal Circuit later dealt with the inter partes review (IPR) in question. The matter of fact is, Qualcomm is trying to increase pressure and improve its chances of “winning” by filing actions in several courts and in several continents — not so unusual a trick. Apple did that the Samsung and Huawei too is trying it against Samsung right now. But as Müller pointed out, the judge in the US is well aware that Chinese patent law is different and in some sense harsher than American law. Müller compares this to the case of Microsoft v Motorola — one which we covered at the time. To quote:

With respect to China, let’s face one thing: every U.S. judge knows that the rule of law, just like democracy, works differently in China. Huawei’s lawyers portray the Chinese proceedings at 100% fair and comprehensive. Samsung’s counsel obviously didn’t suggest that the proceedings were unfair, nor did Judge Orrick say so in his order. The Federal Circuit will be diplomatic, too. But that doesn’t mean that the appellate judges won’t have their private and unspoken opinion anyway.

The strategic issue here is the one I mentioned in the headline: coerced FRAND rate-setting arbitration. In order to distinguish Huawei v. Samsung from Microsoft v. Motorola (with Samsung being the new Microsoft and Huawei being the new Motorola), Huawei points out that Microsoft said it would accept a court-determined FRAND rate without insisting on adjucation of all the defenses that Samsung is pursuing (though Judge Robart actually did hold some Motorola patents invalid anyway). But beyond differences between Huawei and Microsoft regarding the preconditions for rate-settings (which I simply attribute to the fact that the standards at issue in Microsoft v. Motorola were not nearly as critical to Microsoft’s business as the ones in Huawei v. Samsung are to Samsung’s core business, thus Microsoft was prepared to pay for invalid and non-infringed patents and exclusively concerned about injunctive relief), Huawei must deny that it is an unwilling licensor (not in the sense of unwillingness to extend a license, but to do so on FRAND terms) engaging in hold-up and instead argue that Samsung is an unwilling licensee engaging in hold-out.

These sorts of multi-continental (or cross-continental) patent battles aren’t particularly new, but they serve to highlight the sort of thing that the EPO in Germany probably looks to facilitate, even if that would mean a lot more patent trolls, attacks on generics and so on.

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts