Access Denied 10
When a new undersea communications cable becomes operational late this year, it will break the record for a key metric: As of Monday, the total stood at 1, claims in days, or an average of 5.
Supporting the Efforts
About 16 years ago, a for-pay Linux distribution caused quite a stir all because of its name — Lindows. OpenMandriva is giving me headaches with some packages that have an invalid key signature or something… Because of that, LibreOffice is not working properly, I guess. One plus one mobile price in india and features Either way, scouting out appealing open source projects that allow you to showcase your skills may help in your job search. In August of this year, a white supremacist plowed through a crowd of protesters gathered in downtown Charlottesville, Virginia. The lawsuit alleges that Raven products violate three AgJunction patents related to automated mechanical steering, implement steering and system calibration technologies.
Supporting the Efforts
A large number of top execs were fleeing the company and there were reports of questionable activities, including Jia demanding that Faraday Future employees design a car for LeEco, without payment or credit. It notes that non-residential investment has risen at an annual rate of 6. In terms of being able to do everything a Windows desktop can do, a Linux system is certainly capable of most common tasks, like browsing the web, sending and receiving email, creating documents and spreadsheets, streaming music and editing photos.
Shopping Bag
At the time series-focused Influx Days in San Francisco, presenters offered many unique views of log data. Today innumerable software applications are created by innumerable developers at an accelerating pace. The North claimed it was an advanced, thermonuclear design. Despite the responsibility it bears to its users to keep this pipeline free of interference, Facebook is ingratiating itself with local governments by acting as a censor on their behalf. Various reports show us that people are already using the master branch in their production environment, as several team members have also done for at least a few months. I spent most of the last year reporting two sieges, Mosul in Iraq and Raqqa in Syria, which finally ended with the decisive defeat of Isis.
Musica oneplus 5t zip up pajamas his and hers for bit
06.03.2018 - Their customers do have the option to disable the patch and use the performance features. This individual has been pushed further and further away from the core of the company but still remains. So here is roughly the last month of changes. This is not a tutorial for Glade, so let start at with an already designed template UI file. Election candidates will be required to register for vote-canvassing on electronic and social media, according to the current draft of the organic law governing the election of MPs. That statement is a reflection of the state of our industry: Here are some of the biggest issues that members of the blockchain world will have to work through if the new year is going to realize the potential that was so highly touted in the last.
Kodi oneplus 5t zip up pajamas his and hers vacuum for
11.02.2018 - BuildStream is the developer-focused project for creating a flexible and extensible framework for modelling of build and continuous integration pipelines in YAML format. Using the two major flaws hackers can gain read access to the system memory that may include sensitive data including passwords, encryption keys etc. Just yesterday, a report from The Register disclosed a massive security screwup on behalf of Intel, which impacted nearly all chips manufactured in the past ten years. The 5th and final bugfix update 5. But it does so with almost five million fewer jobs.
Portable 108 oneplus 5t zip up pajamas his and hers version
Now, the CEO is left with just, shares which fulfill the minimum requirement to continue his job. Just yesterday, a report from The Register disclosed a massive security screwup on behalf of Intel, which impacted nearly all chips manufactured in the past ten years.
As might be guessed, a fair number of these updates are for the kernel and microcode changes to mitigate Meltdown and Spectre. More undoubtedly coming over the next weeks. Several recently-published research articles have demonstrated a new class of timing attacks Meltdown and Spectre that work on modern CPUs.
Our internal experiments confirm that it is possible to use similar techniques from Web content to read private information between different origins. The full extent of this class of attack is still under investigation and we are working with security researchers and other browser vendors to fully understand the threat and fixes.
Since this new class of attacks involves measuring precise time intervals, as a partial, short-term, mitigation we are disabling or reducing the precision of several time sources in Firefox.
This includes both explicit sources, like performance. Meltdown is specific to x86 processors made by Intel; it does not appear to affect AMD. But virtually every CPU going back decades that has a feature called speculative execution is vulnerable to a variety of the Spectre attack.
Civilians fear to go outside lest they be shot by a sniper or step on a land mine. Both sides of a worsening civil war use Howitzers, Kaytushas, mortars and other missiles to shell the city.
Residents say no neighborhood is safer than another, and human rights groups report appalling violations, including torture of captives. As the new year begins, it is important for the U.
But the slayers got a new lease on life with the election of Donald Trump, who, as part of his program of opposing whatever Barack Obama favored and destroying whatever he accomplished, has consistently berated the JCPOA.
Meanwhile, North and South Korea have opened lines of communication, saying they are open to direct negotiations. But is this the real reason for the sudden unanimous decision by the board to end support?
Late Sunday night, just hours after the FBI released a new document that appeared to confirm Swedish sexual assault charges against him were trumped up by the U.
The Ecuadorian embassy has spoken out following rampant speculation about the health and whereabouts of Julian Assange after his recent cryptic tweet. Many wondered why the 46 year old had tweeted the seemingly random string of letters and numbers.
For locals — or those who can brave the brisk waters, in any case — the cove is known as one of the best places for an open-water swim, especially favored by triathletes. Even before Hurricane Harvey hit, Houston was no stranger to devastating rainstorms.
The setup involves shifting revenue from one Irish subsidiary to a Dutch company with no employees, and then on to a Bermuda mailbox owned by another Ireland-registered company. The amount of money Google moved through this tax structure in was 7 percent higher than the year before, according to company filings with the Dutch Chamber of Commerce dated Dec.
News of the filings was first reported by the Dutch newspaper Het Financieele Dagblad. Ant Financial, which was one of our 50 Smartest Companies in, is a Chinese tech company that handles mountains of data generated by its mobile payment business and other banking services.
Merrill Lynch financial advisors cannot buy bitcoin-related investments for their clients, The Wall Street Journal reported Wednesday. In we were told that blockchain technology and cryptocurrencies were going to save the world, disrupting just about anything with a digital fingerprint.
But we saw very few tangible examples that justified the hype. In, many of the intriguing pitches we heard will still be around, only now the challenge is going to be finding a way to deliver real products and services.
Here are some of the biggest issues that members of the blockchain world will have to work through if the new year is going to realize the potential that was so highly touted in the last.
And as one goes downward of course from left to right one can only blame the UK for adopting such positions. British government policies to boost income for poorly paying jobs could actually incentivize firms to automate instead.
The retiring senator has always been a shameless tool of billionaire campaign donors and a partisan errand boy for the likes of Donald Trump. This may be the most irresponsible tweet in history.
Julian Sanchez articulated the best-case scenario: The Gimlet Media host P. Vogt asks a key question: Normally, none of this would be Techdirt-worthy, but late last night, a new twist was added.
Not much more needs to be said about him. Or, for that matter, of Michael Wolff, who has a long history of… not being very good at his job. So, if you want to accuse us of bias in this post, consider it spread all around.
It passes all of my sniff tests. It does not move the BS needle on my Truthometer. Putin put Trump in office. All the meetings, the indictments, the lies from Trump and his family and so much more are overwhelming.
Yes, Hillary conspired, unwittingly, with her own iniquitous collusion to bump off Bernie and with her bloodstained foreign policy record. Like so many, I voted for her as a purely defensive and highly emetic act.
We speak with Ahmad Awad, who has graduated from Fordham University and is the lead petitioner, now a law student at Rutgers University. We also speak with Dima Khalidi, director of Palestine Legal.
In August of this year, a white supremacist plowed through a crowd of protesters gathered in downtown Charlottesville, Virginia. The attack injured around 20 people and killed year-old Heather Heyer.
A friend of hers was there, and was attacked and hurt by neo-Nazis. Crose is a former NSA analyst and ex-Reddit moderator who now works at a cybersecurity startup. The end result is a sometimes haphazard system that can still have devastating effects on any service the regime sees as a threat.
Its goal is to force social networks to remove hate speech and certain other unlawful content within 24 hours in obvious cases, otherwise within 7 days upon being notified. The transition period ended on 31 December — meaning the new rules can now be enforced.
Failure to delete content within the given deadlines can result in heavy administrative fines of up to EUR 50m. Unlike hate language, taboo words, dirty words, or fighting words that may cause harm, offense, or incite violence, the dangerous seven are not only surprisingly innocuous, but one might even say necessary to describe the present concerns of modern life and science.
Techno-optimists believed that the internet would ensure a free flow of information and ultimately a democratic society in authoritarian states like China. Thirty years on, however, China has instead built a Great Firewall, a vast hardware and software system that aims to prevent access to undesirable websites and censors sensitive content.
I understand that American companies are somewhat obliged to follow local laws when providing services overseas, but they should not be put in the position of being held criminally and civilly liable for the posts of their users.
Freedom of the press in Venezuela has been threatened by the government for more than a decade. The accumulation of power in the executive branch has enabled the Venezuelan government to intimidate, harass, and criminally prosecute the opposition, human rights defenders, and independent media outlets.
While traditional media outlets are being threatened, social media serves as an alternative tool to transmit and consume news. German brothers Jan and Tim Edler, owners of realities: At issue is LightSpell, a public art installation that would allow users to enter eight characters on a control panel in the station that show up on giant light screens that hang from the ceiling.
Since the Green Movement protests in Iran, internet connections have grown significantly, which is why social media is likely playing an important role in the anti-government demonstrations rocking the country.
Election candidates will be required to register for vote-canvassing on electronic and social media, according to the current draft of the organic law governing the election of MPs.
The National Legislative Assembly NLA committee vetting the bill has finished the first round of deliberation for all sections of the law, said spokesman Taweesak Suthakavatin.
Imagine a school administrator telling a high school political science teacher that a whole range of timely topics — for example, medical marijuana, terrorism in the Middle East, gun control, or even politics in general — was off-limits for class discussion.
The pedagogical absurdity of it, not to mention the upending of academic freedom it embodies, would seem obvious to most. In school districts across the country, however, a similar type of censorship takes place in the classroom every day, with little dissent.
The censorship takes place invisibly, through the use of internet filtering programs that block certain categories of websites — or even websites that mention specific words — when students use school computers to access the internet.
Each year, I renew a contract to provide legal services to incarcerated people in an Arizona county jail. I have been doing this for 12 years without complications. Lately, though, there has been some extra paperwork that has nothing to do with my work as an attorney.
Now, in order to renew my contract, I am being asked to promise that I will not participate in a boycott of Israel. I have visited the region previously. I raised a Jewish son.
Last spring, he and I traveled together to Israel and Palestine. We met journalists, human rights advocates, Israelis, and Palestinians living under Israeli occupation in the West Bank.
No one we talked to believed that Israel would ever dismantle the more than Israeli settlements peppered through the West Bank. It was painfully clear to us that Israel will not stop, and in fact has accelerated, its de facto policy of permanent Israeli occupation.
On the other hand, it will never allow equal rights for the 2. Facebook continues to increase its stranglehold on news delivery, reducing pipelines of info to a nonsensically-sorted stream for its billions of users.
Despite the responsibility it bears to its users to keep this pipeline free of interference, Facebook is ingratiating itself with local governments by acting as a censor on their behalf.
While Facebook has fought back against government overreach in the United States, it seems less willing to do so in other countries. The reporting tools it provides to users are abused by governments to stifle critics and control narratives.
But recently some third-party apps have been found taking a few more liberties than they should, like a HAL in your pocket. Technology startup Alphonso has caused widespread concern by using smartphones microphones to monitor the TV and media habits of games and apps users.
This kind of social media surveillance can impact people applying for visas from abroad, immigrants in the United States, and U. It is important for small business owners to understand what the GDPR is as well as its application.
The GDPR is the outcome of four years of constant discussions, investigations, and amendments made by the EU to update its data privacy rules and regulations. The GDPR will replace the Data Protection Directive established in, creating a greater territorial scope and stricter penalties for those states members, and business dealing with Personal Data, who fail to keep and handle data according to the new regulation.
I was sitting in the nearly empty restaurant of the Westin Hotel in Alexandria, Virginia, getting ready for a showdown with the federal government that I had been trying to avoid for more than seven years.
Now that war against the intelligence community is impacting American national security. A day after the expose by The Tribune on unauthorised people freely accessing Aadhaar data, the government made no announcement of any formal investigation being launched, and the UIDAI denied there was any breach.
However, multiple security agencies were understood to have got into motion as several made contact with The Tribune to get information. The personal data of almost a billion Indian citizens who have an Aadhaar number could be accessed by paying just a handful amount of money, according to a report by The Tribune.
A login ID and password given by the anonymous agent provides access to personally identifiable information including name, address, postal code PIN, mobile number, photo, and email.
An activist promoting the Tibetan language stood trial Thursday in western China for inciting separatism after he appeared in a documentary video produced by The New York Times, highlighting the risks that Chinese citizens often face when speaking to foreign media.
Capital punishment is legal in Israel but has not been implemented since, when Nazi leader Adolf Eichmann was put to death for his role in the Holocaust. BAR editors have also noted a drastic drop in the number of our own articles that come up in routine Google searches, compared to pre-November, Amazingly, the Democrats attacked Trump from the Right, reprising the McCarthy era of three generations ago.
Trump was soft on the Kremlin, which is depicted as the home of Euro-Asiatic totalitarianism, no matter who is actually in charge. In fact, Comcast argues, without government oversight of an uncompetitive market, investment and jobs will soon be miraculously springing forth from the sidewalks.
It will, the industry argues, be impossible to even measure the incredible innovation that will be created by letting entrenched ISPs and their natural monopoly over the broadband last mile run roughshod over the backs of American consumers and smaller competitors.
Because the net neutrality debate in recent years wandered into more nuanced and quirky areas like interconnection and zero rating, they believe the ultimate impact of the repeal will likely be modest.
After all, these harms like Comcast exempting its own content from usage caps, or Verizon covertly choking interconnection points were murky and out of the intellectual or technical reach of many Luddite consumers.
Of course given that the telecom sector is often the poster child for regulatory capture, this mandate often gets intentionally lost in the weeds. Or worse, by meddling with broadband deployment metrics until the numbers show something decidedly different from the reality on the ground.
The meeting brought together students, lawyers, scientists and different professionals drawn from Africa and other parts of the developing world for a ten-day intensive programme in intellectual property.
Should a company be able to shut down competition by asserting copyright in a collection of software commands? Tech giant Cisco Systems thinks so: Second, any copyright that does exist must be sharply limited, as a matter of law and good practical policy.
Either option will discourage innovation and competition. The latest issue involves EA asking for the latest iteration of the case to be dismissed based on another ruling concerning NCAA basketball players and their publicity rights.
In that ruling from April of this year, the 9th Circuit ruled among other things that federal copyright preempted state-based publicity rights claims. Here, the court said that the state-based publicity rights claims were blocked because of that, as the only issue should be covered under federal copyright law, where they would fail.
Music streaming company Spotify was sued by Wixen Music Publishing Inc last week for allegedly using thousands of songs, including those of Tom Petty, Neil Young and the Doors, without a license and compensation to the music publisher.
Aside from these novel features, the company also has high hopes for artificial intelligence. Posted in News Roundup at 5: What shall we be now? Amazon will rent access to Linux 2 to its cloud customers.
GoDaddy switched back to using IIS 7. Today, Apache still has the largest market share by number of domains, with It also saw the largest gain this month, increasing its total by 1.
This growth was closely followed by nginx, with a gain of 1. While Microsoft leads by overall number of hostnames, it lags in 3rd position when considering the number of unique domains those sites run on, with a total of DevOps is a set of practices that automates the processes between software development and IT teams so they can build, test, and release software more quickly and reliably.
The concept of DevOps is founded on building a culture of collaboration between IT and business teams, which have historically functioned in relative siloes. The promised benefits include increased trust, faster software releases, and the ability to solve critical issues quickly.
That said, implementing a successful DevOps organization requires IT leaders to think more broadly about how to spur a cultural and organizational shift within both their team and the broader organization, as opposed to simply deploying new technologies.
A successful DevOps strategy requires a merged focus from both development teams and operational teams on what the company needs to meet its digital transformation objectives. Thus, it is about breaking down siloed groups of people and responsibilities, and—in their place—building teams that can multitask on technical issues and goals.
Yesterday I posted the first benchmarks of the performance impact of these x86 PTI security changes that landed in the Linux 4. In most desktop-ish workloads, the impact of enabling x86 PTI is much less like with not seeing much of a change for gaming.
Due to the amount of interest in this issue, here are benchmarks of a patched kernel showing the performance impact of the page table isolation patches. For downloading files directly from the Linux command line, there are two utilities that immediately come to mind: They share a lot of features and can easily get many of the same tasks accomplished.
These programs fit slightly different roles and use cases, and do have traits that make each better for certain situations. A tag has been set and tar balls have been published.
There are about two months now that AtCore reached its beta stage and we release it with the test client. Nevertheless, here we compiled a list of the best open source web browsers for you.
The Calamares project as a reminder aims to be the universal installer framework for Linux systems that is distribution-agnostic and already used by Manjaro and KaOS and OpenMandriva.
It has been a full year here at the Fedora Magazine, and now it is over, we are looking back at some of the awesome content from our contributors. Here are some of the best articles from our contributors that are useful for system administrators.
While the Linux world is waiting impatiently for the major Wine 3. I love space, I love how mysterious and dangerous it is and to be able to fly around in a game like Helium Rain [Steam] is fantastic.
Sometimes, late at night, I endlessly browse the internet to find Linux games worth covering. The sad news is that Linux and Mac will see a delayed release. So it seems that the report below was incorrect.
Valve software engineer John McDonald made the statement on the associated Reddit story, and you can read it in full here. Scribble is now available and it has a few Linux games.
After languishing for nearly half a decade, I recently dusted off the code for VWM. Although the original release worked well, it never quite satisfied my technical idealism. There were lots of things I wanted to implement, fix, or clean-up, but none of them were trivial.
But let me digress for a bit…. VWM is a window manager for the console. Coming one and a half months after the KDE Plasma 5. The bugfixes are typically small but important.
Over the second half of, KDE has been going through the ambitious effort of having its community propose and choose goals for the next years. These goals have been set now, and I was thrilled to learn that my proposal on Streamlined onboarding of new contributors was chosen and many other KDE contributors believed this was a goal worth pursuing in the near future and voted for it.
While many are waiting impatiently for the release of the KDE Plasma 5. A short-lived branch, KDE Plasma 5. One of the new features being worked on by KDE developers in the new year is better desktop integration with web browsers.
Expected to arrive with Plasma 5. Various reports show us that people are already using the master branch in their production environment, as several team members have also done for at least a few months.
BuildStream is the developer-focused project for creating a flexible and extensible framework for modelling of build and continuous integration pipelines in YAML format. BuildStream itself is written in Python.
It has been an engaging year for the Linux and open-source community. Slack OS virtually rewrote its binaries to be Debian-based; Kali Linux became more popular, and Skype finally released a Linux version worth writing home about.
With such an eventful for most Linux distributions, I imagine many of our potential readers are wondering which Linux distributions have been the hottest this year, and probably why. Linux is known to serve the needs of everyone.
You can also install Arch Linux or Debian and use a lightweight desktop environment. There are tons of Linux distributions that are specifically built to cater the needs of such laptops and desktops.
Apart from being lightweight, these operating systems are fast and secure. In their current form, these technologies are relatively new. They bring a lot of useful capabilities to IT operations.
They also require management capabilities to evolve alongside. At the same time, hybrid cloud management needs to fulfill its overarching goal of providing consistency across hybrid infrastructures.
Our journey to OpenShift across multiple clouds has taken three parallel paths: Changing our culture, rethinking the application lifecycle, and evolving our infrastructure.
New instances deployed with Fedora Server 27 now enable SELinux in enforcing mode by default; aligning them to the upstream Fedora defaults. SELinux is a mandatory access control system managed by a set of security policies that the Kernel use to limit what processes and users can do on the system.
In the Juju GUI 2. The GUI is a powerful tool, but at times the command-line is necessary. For instance, the ability to SSH into a unit helps for debugging processes or accessing data directly.
Running debug-hooks is another: However, not all developer situations have the CLI available. In fact, the original developers used to call the operating system Lindows, before changing the name. About 16 years ago, a for-pay Linux distribution caused quite a stir all because of its name — Lindows.
To be honest, from a marketing perspective, it was brilliant — it got tons of free press. Microsoft eventually killed the Lindows name by use of money and the legal system, however.
After losing the Lindows name, the operating system largely fell out of the spotlight, and its 15 minutes of fame ended. After all, without the gimmicky name, it was hard to compete with free Linux distros.
Not to mention, Richard Stallman famously denounced the OS for its non-free ways. The company eventually created a free version of its OS called Freespire, but by, both projects were shut down by its then-owner, Xandros.
And yes, Lindows is rising from the grave — as Freespire 3. Do you remember the Lindows Linux distro, which aimed to make the process of using Linux and running Windows applications on Linux much easier?
Later, Microsoft sued Lindows, Inc. From there on, the theming engine and the APIs are stable. This is a great milestone for GTK3. It also means Linux Mint This should ease development and increase the quality of these components outside of Linux Mint.
With the recent release of Linux Mint The first of the four releases of the new series, simply known as Linux Mint 19, will be dubbed Tara and all subsequent releases of the series should also begin with the letter T with the second letter going further through the alphabet for each release, for example, the Linux Mint 18 releases were called Sarah, Serena, Sonya, and Sylvia.
Unfortunately, was not the much-fabled year of the Linux desktop. Hell, that might not ever happen. With Windows 10 being such a disappointment for many, however, it is definitely a possibility.
Maybe will be the year…. One such desktop operating system that consistently delights users is Linux Mint. Today, we get some information about the upcoming version Last summer the embedded Linux OpenWRT and LEDE projects voted in favor of re-merging their efforts while now in that effort is coming back together now that the logistics have been addressed.
The project will be governed using rules established by LEDE following their creation of that fork in Creating amazing projects is easy with a Raspberry Pi, but first you need to plug it in and set up Raspbian, the default operating system.
The Raspberry Pi is a wonderful microcomputer that brims with potential. With a Raspberry Pi you can build robots, learn to code, and create all kinds of weird and wonderful projects. Hackers and enthusiasts have turned Raspberry Pi boards into fully automated weather stations, internet-connected beehives, motorised skateboards, and much more.
The only limit is your imagination. The old OpenWrt CC We will continue to work on improving stability and release maintenance while aiming for frequent minor releases to address critical bugs and security issues like we did with LEDE The OpenWrt CC Yesterday, OpenMobile, the company behind the ACL app, shut down their operations and switched off their website.
For those that are not familiar with ACL, it stands for Application Compatibility Layer and it essentially enables Android apps to run on non-Android operating systems including Tizen, Linux, and others.
The contract between OpenMobile and Samsung was up for renewal, which Samsung chose not to renew. According to people familiar with the situation, this was the major reason for the company needing to close its doors — as Samsung was a major source of funding for the business.
Since August, when the mysterious Fuchsia OS was discovered as a seemingly random open-source code posted on Github by Google, several experiments have been carried out.
Its been a year since the operating system has been worked on and contributed to by the developer community. All those contributions are leading to growth in open source in general. In its Octoverse report, GitHub, the largest online repository for open source projects, reported that it now has more than 24 million users and more than 25 million public repositories.
Of course, some among those 25 million public repositories are more important than others. In several areas, open source projects have become the dominant technology, and IT professionals who want to keep their skills relevant need to at least be familiar with these projects.
Here are ten open source projects that, in light of current trends, will likely be particularly important for IT pros to know in Each year, when we look back at the top government articles on Opensource.
Instead, they demonstrate how governments and citizens are coming together through open source to solve human problems. It was easy for readers to assume Stallman was referring simply to price, rather than control over source code, but that is what actually mattered to him.
All over the world, snow researchers and snow scientists dig holes in the snow. They look at the snow crystals, feel for strong and weak layers, and take measurements in order to predict and better understand avalanches.
But snow science recently took an about-face, thanks to the open-source software known as SnowPilot. Doug Chabot of the Gallatin National Forest Avalanche Center launched the SnowPilot Project during the winter of after software developer Mark Kahrl wrote the program, hoping to find a way for researchers to collaborate and share their data on snow.
But what Chabot realized in the early s was that a large portion of snow data was being put away in desk drawers, never to be used. So he asked the question, what if we create a platform where researchers can enter their data into a worldwide database?
And what if that database is accessible to everyone? Perhaps the clearest way working on open source projects can assist in your job search is by giving you project experience.
If you are a student, you may not have many concrete projects to showcase on your resume. Either way, scouting out appealing open source projects that allow you to showcase your skills may help in your job search.
These projects are great eye-catchers on resumes and can be perfect discussion topics in interviews. In addition, many open source projects are kept in public repositories, such as GitHub, so accessing the source code is easy for anyone who wants to become involved.
Also, it makes your publicly accessible code contributions easy for recruiters and other individuals at potential employers to find. The fact that these projects are open allows you to demonstrate your skills in a more concrete manner than simply discussing them in an interview.
Mapzen, a mapping platform company lauded among developers and civic hackers for its open-source approach, is shutting down. They have until Feb. But for the admirers of the company, there is still a silver lining: Until February 1, when the company will shut down its APIs and support, users are free to grab all that they require.
Mozilla said last week it would delete all telemetry data collected because of a bug in the Firefox crash reporter. Firefox versions released in that time span did not respect user-set privacy settings and automatically auto-submitted crash reports to Mozilla servers.
The browser maker fixed the issue with the release of Firefox The SFLC was formed in to provide legal services for open-source projects. And in, it helped set up the SFC, so it could provide infrastructure support — including legal services — for open-source developers.
That shared history and similarity of purpose has made the intellectual property dispute between two organizations rather confusing to folks in the open source community.
Song acknowledges and tells of his discussion with noted bitcoin evangelist Andreas Antonopoulos about the best way to put together a book of this kind.
Antonopoulos wrote the publisher, explaining why Mr. Song was the appropriate choice for the project. We just wrote about Babylon Micro-Farms, a remote, hydroponic farm you can keep inside your living room.
The cost of textbooks has risen by 1, per cent since, more than triple the rate of inflation. What is more, these students are more likely to hold a student loan, be working more hours a week and self-identify as a visible minority.
The pre-print database for scientists to test the peer review waters was set up in as a relatively simple electronic bulletin board on a single computer. Twenty-six years later, the site arXiv. Scientific giants like Stephen Hawking and the physicists of the LIGO facility at Caltech have even debuted some of their latest publications on the site.
The organizers of the database, which is housed at the Cornell University Library, said that the pre-print method is helping to push discovery and intellectual cooperation.
Last month, we published a blogpost about our accomplishments in, and the teams have already begun brainstorming goals for next year. Last year, the Rust team started a new tradition: We leveraged our RFC process to solicit community feedback.
As open source software becomes more and more ubiquitous and popular, the Rust team is interested in exploring new and innovative ways to solicit community feedback and participation.
Hello and welcome to another issue of This Week in Rust! Rust is a systems language pursuing the trifecta: This is a weekly summary of its progress and community. Tweet us at ThisWeekInRust or send us a pull request.
Want to get involved? Once upon a time, standards were our friends. They provided industry-accepted blueprints for building homogeneous infrastructures that were reliably interoperable.
Company A could confidently build an application and — because of standards — know that it would perform as expected on infrastructure run by Company B. Standards have somewhat fallen out of favor as the speed of digital innovation has increased.
Today innumerable software applications are created by innumerable developers at an accelerating pace. Standards — once critical for achieving interoperability — have failed to adapt in this brave new world.
The examples above show that by taking a programmatic approach to standards, this degree of interoperability can be achieved even today. Disqus started showing a red notification symbol at the bottom of every post.
The notification is just a distraction aimed at increasing engagement with the comments. This is my primary complaint. Beyond that, there are just small annoyances. An electricity-conducting, environment-sensing, shape-changing machine the size of a human cell?
Is that even possible? With postdoctoral researcher Marc Miskin at the helm, the team has made a robot exoskeleton that can rapidly change its shape upon sensing chemical or thermal changes in its environment.
And, they claim, these microscale machines — equipped with electronic, photonic and chemical payloads — could become a powerful platform for robotics at the size scale of biological microorganisms. Artificial light is often seen as a sign of progress: But a chorus of scientists and advocates argues that unnaturally bright nights are bad not just for astronomers but also for nocturnal animals and even for human health.
He summed up his skepticism this way: Every time Mississippi made national news, it seemed like the reporters managed to find the one toothless person in the vicinity and shove him or her in front of the camera.
The sheriff had a point. And I had a challenge to conquer. The story I was onto was not going to flatter Mississippi. But I did promise him I would not go searching for the toothless.
Several pallets are piled with boxes of surgical sutures, still in their shrink wrap, each box worth hundreds of dollars. Tubs overflow with diabetes supplies and surgical instruments that may run hundreds of dollars apiece.
There are bins of bandages and gauze and saline and ostomy bags and every other medical supply you can imagine. These materials, unexpired, could easily stock any hospital or clinic.
But each item has actually been thrown away by a local medical facility. The cost of health care has been rising for decades, and Americans are paying the price.
In a recent Gallup poll, people cited the high cost of care as their No. But after reporting for a year on the ways the medical industry blows through our money, I have one idea: Eliminating all the waste could allow us to insure million Americans, the Academy of Medicine said, and saving half of it could provide groceries for every household in the country for a year.
Eliminating the waste would also stop our rising health care costs from eating up our wage increases. My premiums go up 9 percent next year. Same thing happened last year.
Odds are your costs are rising, too. Meanwhile, Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming Patch Tuesday: Crucially, these updates to both Linux and Windows will incur a performance hit on Intel products.
Intel chips have a massive design flaw, and both Microsoft and the Linux kernel developers are scrambling to fix it. The security hole can be patched, but the patches will make PCs and Macs with Intel chips slower.
The researcher also published proof-of-concept zero-day code to his GitHub page. Besides my initial benchmarks of the performance impact as a result of this x86 workaround in the Linux 4.
A critical security vulnerability has been reported in phpMyAdmin—one of the most popular applications for managing the MySQL database—which could allow remote attackers to perform dangerous database operations just by tricking administrators into clicking a link.
AMD processors are not subject to the types of attacks that the kernel page table isolation feature protects against. The AMD microarchitecture does not allow memory references, including speculative references, that access higher privileged data when running in a lesser privileged mode when that access would result in a page fault.
I spent most of the last year reporting two sieges, Mosul in Iraq and Raqqa in Syria, which finally ended with the decisive defeat of Isis. This was the most important event in the Middle East in, though people are already beginning to forget how dangerous the Isis caliphate was at the height of its power and even in its decline.
Isis retains the capacity to slaughter civilians — witness events in Sinai and Afghanistan in the last few weeks — but no longer has its own powerful centrally organised state which was what made it such a threat.
Ambassador Nikki Haley called for an emergency meeting to discuss the developments. While the ruling was aimed at an Obama Administration policy, its impact will likely influence how the Trump administration treats trophy hunting across Africa.
An in-depth investigation of Vietnamese Samsung production facilities peels back the shrink-wrap of Big Tech to reveal an extremely vulnerable, mostly female workforce that may be sacrificing its neurologic and reproductive health in digitized Dickensian workshops to make cutting-edge smartphones.
Back in, I read an article in the New York Times that stopped me in my tracks. But it does so with almost five million fewer jobs. It notes that non-residential investment has risen at an annual rate of 6.
Reporters Binyamin Appelbaum and Jim Tankersley attribute this increase to a removal of regulations, leading to a newfound sense of confidence among investors. There are two important points worth noting about this increase in investment.
First, it is not an especially rapid rate of growth. There have been many periods in both the recent and more distant past when it grew at a more rapid pace. Here is how he describes his task: In the end we shall make thoughtcrime [having unorthodox thoughts] literally impossible, because there will be no words in which to express it.
A shadowy unit is known to target the Middle East, he says. Al-Bassam, who uses the alias TFlow, was a black hat hacker and one of the six core members of hacktivist group LulzSec. It was announced last weekend that Mr Young, a right-wing journalist who has helped establish a number of free schools, is to join the board of the newly-created Office for Students.
The resistance among many — and not just those on the left — to the idea of gifting the loathsome Toby Young the taxpayer-funded sinecure of a seat on the board of the new Office for Students has now reached critical mass, so much so that the Guardian has picked up on some of the deficiencies in his candidature highlighted here on Zelo Street.
Tobes has sounded appropriately regretful. Loftis apparently expected his status as a private person given more reputational protection by courts than public figures to overcome the deficiencies of his lawsuit.
But the deficiencies won and Loftis lost, having failed to show how words written by Jim Myers were somehow libelous statements issued directly by Randy Rayburn. Eugene Volokh has an incredible — and incredibly disturbing — story about how Jia Yueting, a Chinese billionaire, appears to have convinced a Washington state court to issue an unconstitutional gag order against a critic who lives in Washington state.
Jia is famous for his company LeEco in China, as well as his attempt to create an electric car giant competitor to Tesla in the US called Faraday Future. Almost exactly a year ago, we wrote about how Faraday Future was flailing with a series of incredible stories leaking out of the company.
A large number of top execs were fleeing the company and there were reports of questionable activities, including Jia demanding that Faraday Future employees design a car for LeEco, without payment or credit.
In the past year, it does not appear that things have gotten much better for Jia, and he was just ordered to return to China to deal with debts that appear to be piling up.
The new system will automatically block pornography and other content deemed to be unsuitable by the government, following years of manual monitoring which has failed to adequately police the abundance of illicit online content.
The makers of the popular news app Jinri Toutiao unveiled moves this week to allay rising concerns from the authorities. The Associated Press reported Tuesday that the Trump administration has upped diplomatic pressure on Iran, demanding the regime stop blocking access to social media sites like Twitter and Instagram that were being used by protesters to organize demonstrations.
Iranian authorities have blocked Instagram and other social media platforms in response to a wave of street protests across the country this week. The clampdown has resulted in Tor users climbing from around 6k at the beginning of December to over 10, at the last count as citizens seek to circumvent the controls, according to official stats.
As protests over economic instability and government censorship persist in Iran, the Hassan Rouhani government has reportedly wielded its favorite suppression tactic: Multiple reports say the government was blocking internet on mobile networks starting on Dec.
This is the biggest anti-government public demonstration since The United States on Tuesday urged Iran to stop blocking online social media and advised its citizens to set up virtual private networks, or VPNs, to circumvent censorship.
The government of Iran has shut down mobile internet access and blocked apps including Telegram and Instagram after days of protests that exploded into widespread civil unrest. It is not yet an official policy because censorship is not openly accepted by the current authorities, but de facto vetoes on artistic expressions are increasing due to moralistic pressures in Brazil.
The offensive affects the artistic world in general, not just the shows or exhibitions that have been directly canceled in recent months. With the New Year came a new law on online hate speech in Germany, forcing Twitter and Facebook to remove content more quickly in some cases.
These are just some of videos put on restricted status by YouTube. All come from Prager University, run by radio-talk-show host Dennis Prager, who in October filed a lawsuit against Google alleging censorship of conservatives.
No, but it will record whatever it sees or hears. There are ways to block radio signals to make sure that Haven can not send out any notification, but that is an expensive step for an attacker to make.
You can keep the phone inside of your hotel locker to record if anyone opens up the locker or make it watch your hallway at the house. The NSA said its attrition rate among those specializing in science, technology and math is 5.
The National Security Agency is facing an exodus of talent to more lucrative and flexible jobs in the private sector, The Washington Post reports. Current and former U. Multiple complaints show intrusive searches and questioning are routine, even if the destinations traveled to are equally routine.
And Google, which started the year at 34 percent, now generates 44 percent of traffic. The Supreme Court should recognize and give teeth to the critical, privacy-protecting limitations Congress placed on wiretaps, EFF told the court in an amicus brief we filed with the National Association of Criminal Defense Lawyers.
In Hollywood, more than 1, prominent actresses, writers and directors have launched a project aimed at combating sexual abuse and harassment in the film industry. It also seeks to bring gender parity to Hollywood studios and talent agencies, while penalizing companies that tolerate persistent harassment.
The campaign also seeks to end the use of nondisclosure agreements that silence victims. The Sixth Circuit Appeals Court has now had the dubious privilege of hosting a legal challenge by Juggalos as fans of the Insane Clown Posse are known.
Rulings by the U. Supreme Court often come with great anticipation and attention, even true drama. Anxious crowds gather outside the court at dawn. Opinions first go out on paper to the waiting hands of television news interns, who sprint the documents to correspondents to be immediately deciphered on the air.
Justices later announce their decisions in open court, and occasionally read aloud the opinions. But when the court fixes mistakes in its opinions, it does so very quietly.
No public reading of corrections. The changes thus have proved hard to find — not just for the general public, but for lawyers and judges and scholars of the law. Something with a hint of retaliatory ugliness has reared its head in Laredo, Texas.
Citizen journalist Priscilla Villarreal has been arrested for releasing information Texas law enforcement meant to keep secret. Lagordiloca — has been an unofficial fixture of Laredo nightlife for a few years now, cruising the town after dark to livestream footage of newsworthy events.
There may be a significant shift in police interrogation methods over the next several years. But our reporting found evidence of spotty record keeping across the country, in departments large and small.
Other agencies sent us records of crimes they marked as bias-motivated but were omitted from their reports to the FBI. A decade ago, Congress gave officials at the Department of Homeland Security a year to build 60 miles of fence in the Rio Grande Valley to protect the Texas-Mexico border.
They faced determined resistance. Political leaders denounced the border fence as wasteful and ineffective. Landowners refused to sell their property for its construction.
Environmentalists argued it would slice up habitat for endangered species in one of the most biodiverse regions in the country. A shrewd county insider, Garza ran an obscure agency that had plans to repair 22 miles of crumbling dirt levees running along the Rio Grande, the riverine border between Texas and Mexico.
Garza helped negotiate a deal: If Homeland Security would pay to fix the levees, the feds could build their fence on top of them. Subsequently, the site has been forced to jump around the internet.
Why you raise rates, of course! Although the District Court and Federal Circuit decisions reasonably cause concern among many patent prosecutors that the actions of a later attorney enforcing a patent during litigation could be used to establish an inequitable conduct ruling impugning the prosecuting attorney, we respectfully argue that Regeneron presents a rather nuanced fact pattern that should not be broadly applied—especially when the prosecuting counsel does not direct litigation strategy and tactics.
The lawsuit alleges that Raven products violate three AgJunction patents related to automated mechanical steering, implement steering and system calibration technologies.
After several attempts to negotiate with Raven, we are left with no choice but to assert three of our patents, which are vital to hands-free steering and machine control functions.
It is a well-known fact that developing new drugs is a financially risky endeavor. But prior to the Copyright Act which became effective in, the maximum copyright term was 56 years—an initial term of 28 years, renewable for another 28 years.
The laws in other countries are different—thousands of works are entering the public domain in Canada and the EU on January 1. For many years now, during the first week of January, we write a post about Public Domain Day.
For life plus 70 countries, the works of Aleister Crowley and Winston Churchill are now in the public domain. People will focus on aspects of cost, the functionality provided, hardware compatibility, support, reliability, security, pre-built software, cloud-readiness etc.
In this regard, this article covers ten reasons of using Linux over Windows. Over the years, with your help, we have supported many worthy projects and events in the open source space.
Needless to say, upon reading the news, we immediately reached out to see how we could help. Many members of our team have been Linux Journal readers for years — even since before they worked with Private Internet Access.
We truly believe that Linux Journal needs to be there to chronicle our journey into a more open future. LinuxJournal announced in Nov that they were going to cease publication; With some timely intervention by Private Internet Access they are going to be able to continue operation and are currently soliciting feedback for improving the magazine in the future.
If only the android devices on the wall could be brought in on the fun as well…. The Linux display server built off a game engine. The project is ending with the release of the Arcan 0.
With the Arcan 0. But what about server and business applications for an organization that can be used both on-premise and in the cloud? How about being able to install a whole range of enterprise applications and integrate them in your IT environment with just a few clicks?
That statement is a reflection of the state of our industry: The needs of our products have not changed — but how we create and maintain them has. As Linux and open source professionals of all types, we are at the center of this revolution.
The Linux and Dice Open Source Jobs Report echoes the importance of open source in companies today, with 60 percent looking for full-time professionals with open source experience.
Now Alex has sent in the last planned feature work for Linux 4. Urgent development of a software mitigation is being done in the open and recently landed in the Linux kernel, and a similar mitigation began appearing in NT kernels in November.
In the worst case the software fix causes huge slowdowns in typical workloads. There are hints the attack impacts common virtualization environments including Amazon EC2 and Google Compute Engine, and additional hints the exact attack may involve a new variant of Rowhammer.
Systemd in saw 3, commits, which is actually the lowest point since But the commits were larger with having, lines of code added and, lines removed: Fortunately, it looks like Bas Nieuwenhuizen is working on more performance optimizations.
Yesterday I ran GitStats on the Mesa code-base for being curious about how looks from the development numbers. That came across 10, commits. Below are some of the best Linux music players out there you can use to stream music online and how you can get them running on your machine.
It will be worth your while. Months ago we compiled a list of the 20 Must-Have Ubuntu Apps in Now that has ended we decided to take a look back on how Linux applications have fared so far in general and compile a list of Top 20 Must-Have Linux Apps from Some of us will have spent the past week gorging on mince pies and chocolates, making out under mistletoe, and suffering the seasonable indignity of Christmas-themed Hallmark films on Channel 5.
It was brought to my attention recently that there is a dearth of introductory educational material available about modern network load balancing and proxying. I thought to myself: How can this be?
Load balancing is one of the core concepts required for building reliable distributed systems. Surely there must be quality information available? I searched and found the pickings are indeed slim.
The Wikipedia articles on load balancing and proxy servers contain overviews of some concepts but not a fluid treatment of the subject, especially as it pertains to modern microservice architectures.
A Google search for load balancing primarily turns up vendor pages that are heavy on buzzwords and light on details. Telnet, the protocol and the command line tool, were how system administrators used to log into remote servers.
However, due to the fact that there is no encryption all communication, including passwords, are sent in plaintext meant that Telnet was abandoned in favour of SSH almost as soon as SSH was created.
For the purposes of logging into a remote server, you should never, and probably have never considered it. This does not mean that the telnet command is not a very useful tool when used for debugging remote connection problems.
Early last month we posted an article about the developer of Seven: Why has this happened? Also worth noting Windows 7 use dropped by Not only is Purism working on their Librem 5 smartphone this year with hopes of still readying the software and hardware for shipping to consumers in, but they are also planning to unveil their tablet this year.
Purism has some lofty goals that seem more attainable with each advancement that we make. Our pace for these achievements is already impressive, and we plan on maintaining and exceeding that pace in Munich officials in voted to migrate to an in-house custom version of Ubuntu Linux called LiMux and tailor digital docs to be compatible with LibreOffice.
Now the councillors have decided that Munich will switch some 29, PCs to Windows 10 and phase out Linux by early The cost of the U-turn could be even more catastrophic if another council vote by the end of fails to take a more reasoned tally.
An approval would replace the open-source office suite LibreOffice with Microsoft Office. The bill results from a combination of buying Windows 10 licences and converting some 12, LibreOffice templates and macros along with developing a new templating system for Microsoft Office.
I used my laptop to download the ISO for Lubuntu Although I run a source-based Linux distribution on two laptops, for ease and speed of installation and maintenance I opted to install a binary-based distribution on the family PC.
I chose Lubuntu specifically because it uses the LXDE desktop environment, which is closer in look and feel to classic Windows than e. Since the machines on my home network use SMB to share files, I installed samba and sambaclient and edited the smb.
We have a decent family PC again. In terms of being able to do everything a Windows desktop can do, a Linux system is certainly capable of most common tasks, like browsing the web, sending and receiving email, creating documents and spreadsheets, streaming music and editing photos.
Many Linux distributions include all the basic programs you need, and you can install others from Linux software repositories online, but make a list of everything you need to do on the computer and make sure you have a Linux solution for it.
Windows today beats almost all the markets thanks to its simplicity and large number of programs and games in a free access. We are used to Windows since there are no compatible systems like Windows.
However, it is not true. Only a small number of people might have heard about Linux. This operating system started at the beginning of 90th and quickly gained popularity for supercomputers and huge server rooms.
Today, you will actually be able to compare all the advantages and disadvantages of Linux operating system to understand whether it is worth your attention or not. Maybe, you will be even convinced of switching over to Linux after all.
From a far the laptop looks similar to the previous XPS 13 but is now a little bit thinner and lighter with a 2. The bezel on this new laptop comes in at just 4mm.
Reports suggest the company will allow its cloud customers to rent access to its new operating system, which it calls Linux 2, but will also allow clients to install the new OS on its own servers.
This open-source, reverse-engineered Vivante graphics driver continues getting better. Besides some basic fixes, the Etnaviv-Next 4. Solus taking a break from their Steam Linux integration improvements and their other open-source desktop innovations has been experimenting with their own Qt Wayland compositor over the holiday period.
The Solus team shared some holiday experiments they were doing with a QtWayland-based Wayland compositor with their Budgie 11 desktop environment. Contrary to the hysteria, the gaming performance was minimally impacted with those open-source Radeon driver tests while today are some tests using the latest NVIDIA driver paired with a KPTI-enabled kernel.
This driver update is notable in that it should have a workaround for the recent vRAM memory leakage. Additionally, the series will be the last supporting bit.
For those of you riding the Mesa The release candidate for Mesa So far there is just over one dozen patches queued up but over one dozen more still being reviewed. Our continued testing through today has found for desktop-type hardware to mostly be impacted on that front with no severe slowdowns in other common desktop workloads.
I provided a summary this afternoon of further analyzing the performance on more systems. As a blogger I take a lot of screenshots and annotate a lot of screenshots. Any app that can help to speed up my workflow is super appreciated.
Writers are fiercely loyal to the tools they use. For years, I swore by the ultra-slimline markdown editor iA Writer. I compose almost all of my articles in it. It is time to share a list of the best 20 Free and Open Source Software I found during the year Tablao is a cross-platform table editor with which you can easily create tables in HTML the way you would create tables in Excel.
These features were initially available on the beta RC version of Opera This is the second beta update in less than two months, which is really damn nice to see! Are you a fan of games like Rocket League?
Ultraball [Steam] might be your game. A free multiplayer sci-fi action sports game with players wearing robotic armour. The description alone tickled my interested and after watching some early footage, I feel like I need to play it.
Want to play Jagged Alliance 2 on Linux and have a good experience? The JA2-Stracciatella game engine is exactly what you need. Stellar Interface [Steam, itch. The 5th and final bugfix update 5.
We have decided to target other Qt areas, too, and make the API easily extensible to any service provider instead of being for embedded only. This enables developers to use the same API for both mobile and desktop development.
So this blog post is also to say that I am not trying to fork MyPaint or anything. I am just taking a little advance because we cannot wait much longer unfortunately since GIMP now uses libmypaint and we are really looking into releasing GIMP 2.
As you may remember from my last post on fonts, our goal was to support OpenType font variations. The Linux text rendering stack has multiple components: Achieving our goal required a number of features and fixes in all these components.
Getting all the required changes in place is a bit time-consuming, but the results are finally starting to come together. The yearly Red Hat Government Symposium goes beyond demos and new product announcements to explore the best practices to successfully leverage people, process and technology in order to maximize digital transformation and modernization initiatives within the government.
It features a fully functional version, ansible integration, an agentless architecture, and CI integrations. The new year has arrived, but in the TeX world not much has changed — we still get daily updates in upstream TeX Live, and once a month I push them out to Debian.
So here is roughly the last month of changes. This is a continually updated article to inform you about Linux Mint 19 release date, features and everything important associated with it.
Linux Mint 19 codename has just been released. The Linux Mint project turned out to be an early Christmas present, as it usually does, but this release is perhaps more important than usual given that Mint is much more alone in the Linux distro world than it was just one year ago.
The latest release of Linux Mint In a recent blog post, the development team shared some brief updates on the same. The release of Linux Mint Linux Mint 19 is the first significant release of the operating system since June when Linux Mint 17, codename Sarah, was released by the team.
For at least one startup, opened with a thud. On Tuesday, the open source mapping company Mapzen announced it would shut down at the end of the month, with its hosted APIs and support services going dark on February 1.
Our developers will be ready to candidly greet all open source enthusiasts at the Gentoo stand in building K. So far seven developers have specified their attendance, with most-likely more on the way!
With that material updated, we thought it would be nice to complete the documentation with similar guides for Flexbox, and so I updated the existing material to reflect the core use cases of Flexbox.
In order to stop sophisticated modern threats, organizations need to be flexible and scalable with the way they handle their data. Network flows and data need to be collected and examined at cloud scale in order to let defenders identify anomalous behavior, but getting to that stage is a heavy lift.
Henry Sowell, technical director for Hortonworks, spoke with CyberScoop on how open source systems allow for that flexibility and scalability, especially at a time where the onslaught of threats has never been greater.
The Rust team is happy to announce a new version of Rust, 1. Rust is a systems programming language focused on safety, speed, and concurrency. If you go to GitHub, the most popular developer platform today, and search for a piece of code, it is a plain-text search.
Every software development organization today seems to practice the agile software development methodology, or a version of it. Or at least they believe they do. Whether you are new to application development or learned about software development decades ago using the waterfall software development methodology, today your work is at least influenced by the agile methodology.
If you want to experiment with the latest, flashiest technologies, Perl may not be your first choice. An hour a day less spent with friends is an hour a day less spent building social skills, negotiating relationships, and navigating emotions.
Yet, not everyone is thrilled to hear the news. Humans possess six forms of the protein actin, which perform essential functions in the body. Yet these near-twin proteins carry out distinct roles.
A long standing question for biologists has been, how is this possible? When a new undersea communications cable becomes operational late this year, it will break the record for a key metric: In a single second, its six fiber-optic pairs, stretching roughly 13, kilometers 8, miles between Hong Kong and Los Angeles, will be able to send some terabits in both directions.
The new cable is part of an ongoing transformation of the submarine fiber-optic cable network. Originally, that network carried telephone calls and faxes. Later those subsea conduits served primarily to shuttle data between Internet users and a myriad of service providers.
Fast Company briefly described their experience in an August article—a story that quickly went viral. As a working science fiction novelist, I take a professional interest in how we get predictions about the future wrong, and why, so that I can avoid repeating the same mistakes.
Science fiction is written by people embedded within a society with expectations and political assumptions that bias us towards looking at the shiny surface of new technologies rather than asking how human beings will use them, and to taking narratives of progress at face value rather than asking what hidden agenda they serve.
Long ago, Intel made a design mistake in its bit chips — and now, all Intel-based operating systems and their users must pay the price. The bad news is it will cause at least a 5-percent performance drop.
Applications may see far more serious performance hits. The popular PostgreSQL database is estimated to see at least a percent slowdown. How bad will it really be? It will depend on your hardware and on your load.
I think 5 percent for a load with a noticeable kernel component e. But if you do micro-benchmarks that really try to stress it, you might see double-digit performance degradation. The Meltdown and Spectre vulnerabilities CVE, CVE, and CVE were publicly disclosed earlier today as critical hardware flaws affecting modern microprocessors made in the last two decades.
These can be exploited by an unprivileged attacker to bypass hardware restrictions through three unique attack paths and gain read access to privileged memory. Red Hat Product Security provided us with several resources to better understand the impact of these hardware bugs on any of their supported Linux-based operating systems from an open source technology perspective.
Google has revealed they uncovered the issue last year and have now provided some technical bits. Google was also able to demonstrate an attack where one VM could access the physical memory of the host machine and in turn read memory of other VMs on the same host.
Using the two major flaws hackers can gain read access to the system memory that may include sensitive data including passwords, encryption keys etc. Because they apparently patch a critical vulnerability called Meltdown.
Some semiconductors from ARM, whose chips are popular with mobile phone makers, are also affected. So we have an attack Meltdown which is arbitrary memory read from unprivileged code, probably on Intel only, fairly easy to set up, mitigated by KPTI.
It even can be run from JavaScript, although Chrome is going to ship mitigations from that to happen. Correcting the vulnerabilities, therefore, comes at a performance price. More information on this tradeoff is available from this Red Hat post.
However, the specific performance impact will be workload dependent. To address Spectre in the short term, Red Hat has modified the kernel by default to not use the performance features that enable the vulnerability.
Their customers do have the option to disable the patch and use the performance features. While Red Hat is working with chip manufacturers and OEMs on a longer-term solution, this option gives customers a way to make their own security and performance decisions.
The two problems, called Meltdown and Spectre, could allow hackers to steal the entire memory contents of computers, including mobile devices, personal computers, servers running in so-called cloud computer networks.
The recent speculative execution CVEs address three potential attacks across a wide variety of architectures and hardware platforms, each requiring slightly different fixes. In many cases, these fixes also require microcode updates from the hardware vendors.
Red Hat has delivered updated Red Hat Enterprise Linux kernels that focus on securing customer deployments. The nature of these vulnerabilities and their fixes introduces the possibility of reduced performance on patched systems.
The performance impact depends on the hardware and the applications in place. A design flaw in all Intel chips produced in the last decade is responsible for a vulnerability that puts Linux, Windows and macOS-powered computers at risk, according to multiple press reports.
The Linux kernel community, Microsoft and Apple have been working on patches to their operating systems to prevent the vulnerability. While these bugs impact a huge number of devices, there has been no widespread attacks so far.
So you should not start panicking just yet. KPTI patches are out from most vendors now. This makes Meltdown essentially like any other localroot security hole ie. Spectre is more difficult. There are two variants; one abuses indirect jumps and one normal branches.
But the indirect one is more interesting, as there are mitigations popping up. The rumored bugs in Intel and beyond processors have now been disclosed: Stay tuned for more. Furthermore, we are unaware of any successful reproduction of this vulnerability that would allow unauthorized information disclosure on ARM-based Android devices.
Supported Nexus and Pixel devices with the latest security update are protected. Two highly publicized security flaws in the Intel x86 chip architecture have now emerged. And they may be some of the worst computer bugs in history — if not the worst — because they exist in hardware, not software, and in systems that number in the billions.
These flaws, known as Meltdown and Spectre, are real doozies. They are so serious and far-reaching that the only potential fix in the immediate future is a software workaround that, when implemented, may slow down certain types of workloads as much as 30 percent.
Security researchers have found serious vulnerabilities in chips made by Intel and other companies that, if exploited, could leave passwords and other sensitive data exposed.
A Linux security expert is irked at both Google and Intel. But neither Google nor Intel bothered to tell the operating system vendors until months later. In addition, word began to leak out about the patches for these problems.
This forced Apple, the Linux developers, and Microsoft to scramble to deliver patches to fundamental CPU security problems. The result has been fixes that degrade system performance in many instances.
You may have heard about Meltdown, an exploit that can be used against modern processors CPUs to maliciously gain access to sensitive data in memory. This vulnerability is serious, and can expose your secret data such as passwords.
The Project Zero researcher, Jann Horn, demonstrated that malicious actors could take advantage of speculative execution to read system memory that should have been inaccessible.
Testing also showed that an attack running on one virtual machine was able to access the physical memory of the host machine, and through that, gain read-access to the memory of a different virtual machine on the same host.
Technology companies are working to protect their customers after researchers revealed that major security flaws affecting nearly every modern computer processor could allow hackers to steal stored data — including passwords and other sensitive information — on desktops, laptops, mobile phones and cloud networks around the globe.
The scramble to harden a broad array of devices comes after researchers found two significant vulnerabilities within modern computing hardware, one of which cannot be fully resolved as of yet.
Experts say the disclosure of the critical flaws underscores the need to keep up with software updates and security patches and highlights the role independent research plays in prodding tech companies to minimize security weaknesses.
Now, the CEO is left with just, shares which fulfill the minimum requirement to continue his job. Just yesterday, a report from The Register disclosed a massive security screwup on behalf of Intel, which impacted nearly all chips manufactured in the past ten years.
As might be guessed, a fair number of these updates are for the kernel and microcode changes to mitigate Meltdown and Spectre. More undoubtedly coming over the next weeks. Several recently-published research articles have demonstrated a new class of timing attacks Meltdown and Spectre that work on modern CPUs.
Our internal experiments confirm that it is possible to use similar techniques from Web content to read private information between different origins. The full extent of this class of attack is still under investigation and we are working with security researchers and other browser vendors to fully understand the threat and fixes.
Since this new class of attacks involves measuring precise time intervals, as a partial, short-term, mitigation we are disabling or reducing the precision of several time sources in Firefox.
This includes both explicit sources, like performance. Meltdown is specific to x86 processors made by Intel; it does not appear to affect AMD. But virtually every CPU going back decades that has a feature called speculative execution is vulnerable to a variety of the Spectre attack.
Civilians fear to go outside lest they be shot by a sniper or step on a land mine. Both sides of a worsening civil war use Howitzers, Kaytushas, mortars and other missiles to shell the city.
Residents say no neighborhood is safer than another, and human rights groups report appalling violations, including torture of captives. As the new year begins, it is important for the U. But the slayers got a new lease on life with the election of Donald Trump, who, as part of his program of opposing whatever Barack Obama favored and destroying whatever he accomplished, has consistently berated the JCPOA.
Meanwhile, North and South Korea have opened lines of communication, saying they are open to direct negotiations. But is this the real reason for the sudden unanimous decision by the board to end support?
Late Sunday night, just hours after the FBI released a new document that appeared to confirm Swedish sexual assault charges against him were trumped up by the U. The Ecuadorian embassy has spoken out following rampant speculation about the health and whereabouts of Julian Assange after his recent cryptic tweet.
Many wondered why the 46 year old had tweeted the seemingly random string of letters and numbers. For locals — or those who can brave the brisk waters, in any case — the cove is known as one of the best places for an open-water swim, especially favored by triathletes.
Even before Hurricane Harvey hit, Houston was no stranger to devastating rainstorms. The setup involves shifting revenue from one Irish subsidiary to a Dutch company with no employees, and then on to a Bermuda mailbox owned by another Ireland-registered company.
The amount of money Google moved through this tax structure in was 7 percent higher than the year before, according to company filings with the Dutch Chamber of Commerce dated Dec.
News of the filings was first reported by the Dutch newspaper Het Financieele Dagblad. Ant Financial, which was one of our 50 Smartest Companies in, is a Chinese tech company that handles mountains of data generated by its mobile payment business and other banking services.
Merrill Lynch financial advisors cannot buy bitcoin-related investments for their clients, The Wall Street Journal reported Wednesday. In we were told that blockchain technology and cryptocurrencies were going to save the world, disrupting just about anything with a digital fingerprint.
But we saw very few tangible examples that justified the hype. In, many of the intriguing pitches we heard will still be around, only now the challenge is going to be finding a way to deliver real products and services.
Here are some of the biggest issues that members of the blockchain world will have to work through if the new year is going to realize the potential that was so highly touted in the last.
And as one goes downward of course from left to right one can only blame the UK for adopting such positions. British government policies to boost income for poorly paying jobs could actually incentivize firms to automate instead.
The retiring senator has always been a shameless tool of billionaire campaign donors and a partisan errand boy for the likes of Donald Trump. This may be the most irresponsible tweet in history.
Julian Sanchez articulated the best-case scenario: The Gimlet Media host P. Vogt asks a key question: Normally, none of this would be Techdirt-worthy, but late last night, a new twist was added.
Not much more needs to be said about him. Or, for that matter, of Michael Wolff, who has a long history of… not being very good at his job. So, if you want to accuse us of bias in this post, consider it spread all around.
It passes all of my sniff tests. It does not move the BS needle on my Truthometer. Putin put Trump in office. All the meetings, the indictments, the lies from Trump and his family and so much more are overwhelming.
Yes, Hillary conspired, unwittingly, with her own iniquitous collusion to bump off Bernie and with her bloodstained foreign policy record. Like so many, I voted for her as a purely defensive and highly emetic act.
We speak with Ahmad Awad, who has graduated from Fordham University and is the lead petitioner, now a law student at Rutgers University. We also speak with Dima Khalidi, director of Palestine Legal.
In August of this year, a white supremacist plowed through a crowd of protesters gathered in downtown Charlottesville, Virginia. The attack injured around 20 people and killed year-old Heather Heyer.
A friend of hers was there, and was attacked and hurt by neo-Nazis. Crose is a former NSA analyst and ex-Reddit moderator who now works at a cybersecurity startup. The end result is a sometimes haphazard system that can still have devastating effects on any service the regime sees as a threat.
Its goal is to force social networks to remove hate speech and certain other unlawful content within 24 hours in obvious cases, otherwise within 7 days upon being notified.
The transition period ended on 31 December — meaning the new rules can now be enforced. Failure to delete content within the given deadlines can result in heavy administrative fines of up to EUR 50m.
Unlike hate language, taboo words, dirty words, or fighting words that may cause harm, offense, or incite violence, the dangerous seven are not only surprisingly innocuous, but one might even say necessary to describe the present concerns of modern life and science.
Techno-optimists believed that the internet would ensure a free flow of information and ultimately a democratic society in authoritarian states like China. Thirty years on, however, China has instead built a Great Firewall, a vast hardware and software system that aims to prevent access to undesirable websites and censors sensitive content.
I understand that American companies are somewhat obliged to follow local laws when providing services overseas, but they should not be put in the position of being held criminally and civilly liable for the posts of their users.
Freedom of the press in Venezuela has been threatened by the government for more than a decade. The accumulation of power in the executive branch has enabled the Venezuelan government to intimidate, harass, and criminally prosecute the opposition, human rights defenders, and independent media outlets.
While traditional media outlets are being threatened, social media serves as an alternative tool to transmit and consume news. German brothers Jan and Tim Edler, owners of realities: At issue is LightSpell, a public art installation that would allow users to enter eight characters on a control panel in the station that show up on giant light screens that hang from the ceiling.
Since the Green Movement protests in Iran, internet connections have grown significantly, which is why social media is likely playing an important role in the anti-government demonstrations rocking the country.
Election candidates will be required to register for vote-canvassing on electronic and social media, according to the current draft of the organic law governing the election of MPs. The National Legislative Assembly NLA committee vetting the bill has finished the first round of deliberation for all sections of the law, said spokesman Taweesak Suthakavatin.
Imagine a school administrator telling a high school political science teacher that a whole range of timely topics — for example, medical marijuana, terrorism in the Middle East, gun control, or even politics in general — was off-limits for class discussion.
The pedagogical absurdity of it, not to mention the upending of academic freedom it embodies, would seem obvious to most. In school districts across the country, however, a similar type of censorship takes place in the classroom every day, with little dissent.
The censorship takes place invisibly, through the use of internet filtering programs that block certain categories of websites — or even websites that mention specific words — when students use school computers to access the internet.
Each year, I renew a contract to provide legal services to incarcerated people in an Arizona county jail. I have been doing this for 12 years without complications. Lately, though, there has been some extra paperwork that has nothing to do with my work as an attorney.
Now, in order to renew my contract, I am being asked to promise that I will not participate in a boycott of Israel. I have visited the region previously. I raised a Jewish son. Last spring, he and I traveled together to Israel and Palestine.
We met journalists, human rights advocates, Israelis, and Palestinians living under Israeli occupation in the West Bank. No one we talked to believed that Israel would ever dismantle the more than Israeli settlements peppered through the West Bank.
It was painfully clear to us that Israel will not stop, and in fact has accelerated, its de facto policy of permanent Israeli occupation. On the other hand, it will never allow equal rights for the 2.
Facebook continues to increase its stranglehold on news delivery, reducing pipelines of info to a nonsensically-sorted stream for its billions of users. Despite the responsibility it bears to its users to keep this pipeline free of interference, Facebook is ingratiating itself with local governments by acting as a censor on their behalf.
While Facebook has fought back against government overreach in the United States, it seems less willing to do so in other countries. The reporting tools it provides to users are abused by governments to stifle critics and control narratives.
But recently some third-party apps have been found taking a few more liberties than they should, like a HAL in your pocket. Technology startup Alphonso has caused widespread concern by using smartphones microphones to monitor the TV and media habits of games and apps users.
This kind of social media surveillance can impact people applying for visas from abroad, immigrants in the United States, and U. It is important for small business owners to understand what the GDPR is as well as its application.
The GDPR is the outcome of four years of constant discussions, investigations, and amendments made by the EU to update its data privacy rules and regulations. The GDPR will replace the Data Protection Directive established in, creating a greater territorial scope and stricter penalties for those states members, and business dealing with Personal Data, who fail to keep and handle data according to the new regulation.
I was sitting in the nearly empty restaurant of the Westin Hotel in Alexandria, Virginia, getting ready for a showdown with the federal government that I had been trying to avoid for more than seven years.
Now that war against the intelligence community is impacting American national security. A day after the expose by The Tribune on unauthorised people freely accessing Aadhaar data, the government made no announcement of any formal investigation being launched, and the UIDAI denied there was any breach.
However, multiple security agencies were understood to have got into motion as several made contact with The Tribune to get information. The personal data of almost a billion Indian citizens who have an Aadhaar number could be accessed by paying just a handful amount of money, according to a report by The Tribune.
A login ID and password given by the anonymous agent provides access to personally identifiable information including name, address, postal code PIN, mobile number, photo, and email.
An activist promoting the Tibetan language stood trial Thursday in western China for inciting separatism after he appeared in a documentary video produced by The New York Times, highlighting the risks that Chinese citizens often face when speaking to foreign media.
Capital punishment is legal in Israel but has not been implemented since, when Nazi leader Adolf Eichmann was put to death for his role in the Holocaust. BAR editors have also noted a drastic drop in the number of our own articles that come up in routine Google searches, compared to pre-November, Amazingly, the Democrats attacked Trump from the Right, reprising the McCarthy era of three generations ago.
Trump was soft on the Kremlin, which is depicted as the home of Euro-Asiatic totalitarianism, no matter who is actually in charge. In fact, Comcast argues, without government oversight of an uncompetitive market, investment and jobs will soon be miraculously springing forth from the sidewalks.
It will, the industry argues, be impossible to even measure the incredible innovation that will be created by letting entrenched ISPs and their natural monopoly over the broadband last mile run roughshod over the backs of American consumers and smaller competitors.
Because the net neutrality debate in recent years wandered into more nuanced and quirky areas like interconnection and zero rating, they believe the ultimate impact of the repeal will likely be modest.
After all, these harms like Comcast exempting its own content from usage caps, or Verizon covertly choking interconnection points were murky and out of the intellectual or technical reach of many Luddite consumers.
Of course given that the telecom sector is often the poster child for regulatory capture, this mandate often gets intentionally lost in the weeds. Or worse, by meddling with broadband deployment metrics until the numbers show something decidedly different from the reality on the ground.
The meeting brought together students, lawyers, scientists and different professionals drawn from Africa and other parts of the developing world for a ten-day intensive programme in intellectual property.
Should a company be able to shut down competition by asserting copyright in a collection of software commands? Tech giant Cisco Systems thinks so: Second, any copyright that does exist must be sharply limited, as a matter of law and good practical policy.
Either option will discourage innovation and competition. The latest issue involves EA asking for the latest iteration of the case to be dismissed based on another ruling concerning NCAA basketball players and their publicity rights.
In that ruling from April of this year, the 9th Circuit ruled among other things that federal copyright preempted state-based publicity rights claims. Here, the court said that the state-based publicity rights claims were blocked because of that, as the only issue should be covered under federal copyright law, where they would fail.
Music streaming company Spotify was sued by Wixen Music Publishing Inc last week for allegedly using thousands of songs, including those of Tom Petty, Neil Young and the Doors, without a license and compensation to the music publisher.
Aside from these novel features, the company also has high hopes for artificial intelligence. Posted in News Roundup at 5: What shall we be now? Amazon will rent access to Linux 2 to its cloud customers.
GoDaddy switched back to using IIS 7. Today, Apache still has the largest market share by number of domains, with It also saw the largest gain this month, increasing its total by 1. This growth was closely followed by nginx, with a gain of 1.
While Microsoft leads by overall number of hostnames, it lags in 3rd position when considering the number of unique domains those sites run on, with a total of DevOps is a set of practices that automates the processes between software development and IT teams so they can build, test, and release software more quickly and reliably.
The concept of DevOps is founded on building a culture of collaboration between IT and business teams, which have historically functioned in relative siloes. The promised benefits include increased trust, faster software releases, and the ability to solve critical issues quickly.
That said, implementing a successful DevOps organization requires IT leaders to think more broadly about how to spur a cultural and organizational shift within both their team and the broader organization, as opposed to simply deploying new technologies.
A successful DevOps strategy requires a merged focus from both development teams and operational teams on what the company needs to meet its digital transformation objectives.
Thus, it is about breaking down siloed groups of people and responsibilities, and—in their place—building teams that can multitask on technical issues and goals. Yesterday I posted the first benchmarks of the performance impact of these x86 PTI security changes that landed in the Linux 4.
In most desktop-ish workloads, the impact of enabling x86 PTI is much less like with not seeing much of a change for gaming. Due to the amount of interest in this issue, here are benchmarks of a patched kernel showing the performance impact of the page table isolation patches.
For downloading files directly from the Linux command line, there are two utilities that immediately come to mind: They share a lot of features and can easily get many of the same tasks accomplished.
These programs fit slightly different roles and use cases, and do have traits that make each better for certain situations. A tag has been set and tar balls have been published.
There are about two months now that AtCore reached its beta stage and we release it with the test client. Nevertheless, here we compiled a list of the best open source web browsers for you.
The Calamares project as a reminder aims to be the universal installer framework for Linux systems that is distribution-agnostic and already used by Manjaro and KaOS and OpenMandriva.
It has been a full year here at the Fedora Magazine, and now it is over, we are looking back at some of the awesome content from our contributors. Here are some of the best articles from our contributors that are useful for system administrators.
While the Linux world is waiting impatiently for the major Wine 3. I love space, I love how mysterious and dangerous it is and to be able to fly around in a game like Helium Rain [Steam] is fantastic.
Sometimes, late at night, I endlessly browse the internet to find Linux games worth covering. The sad news is that Linux and Mac will see a delayed release. So it seems that the report below was incorrect.
Valve software engineer John McDonald made the statement on the associated Reddit story, and you can read it in full here. Scribble is now available and it has a few Linux games. After languishing for nearly half a decade, I recently dusted off the code for VWM.
Although the original release worked well, it never quite satisfied my technical idealism. There were lots of things I wanted to implement, fix, or clean-up, but none of them were trivial. But let me digress for a bit….
VWM is a window manager for the console. Coming one and a half months after the KDE Plasma 5. The bugfixes are typically small but important. Over the second half of, KDE has been going through the ambitious effort of having its community propose and choose goals for the next years.
These goals have been set now, and I was thrilled to learn that my proposal on Streamlined onboarding of new contributors was chosen and many other KDE contributors believed this was a goal worth pursuing in the near future and voted for it.
While many are waiting impatiently for the release of the KDE Plasma 5. A short-lived branch, KDE Plasma 5. One of the new features being worked on by KDE developers in the new year is better desktop integration with web browsers.
Expected to arrive with Plasma 5. Various reports show us that people are already using the master branch in their production environment, as several team members have also done for at least a few months.
BuildStream is the developer-focused project for creating a flexible and extensible framework for modelling of build and continuous integration pipelines in YAML format. BuildStream itself is written in Python.
It has been an engaging year for the Linux and open-source community. Slack OS virtually rewrote its binaries to be Debian-based; Kali Linux became more popular, and Skype finally released a Linux version worth writing home about.
With such an eventful for most Linux distributions, I imagine many of our potential readers are wondering which Linux distributions have been the hottest this year, and probably why.
Linux is known to serve the needs of everyone. You can also install Arch Linux or Debian and use a lightweight desktop environment. There are tons of Linux distributions that are specifically built to cater the needs of such laptops and desktops.
Apart from being lightweight, these operating systems are fast and secure. In their current form, these technologies are relatively new. They bring a lot of useful capabilities to IT operations.
They also require management capabilities to evolve alongside. At the same time, hybrid cloud management needs to fulfill its overarching goal of providing consistency across hybrid infrastructures.
Our journey to OpenShift across multiple clouds has taken three parallel paths: Changing our culture, rethinking the application lifecycle, and evolving our infrastructure. New instances deployed with Fedora Server 27 now enable SELinux in enforcing mode by default; aligning them to the upstream Fedora defaults.
SELinux is a mandatory access control system managed by a set of security policies that the Kernel use to limit what processes and users can do on the system. In the Juju GUI 2.
The GUI is a powerful tool, but at times the command-line is necessary. For instance, the ability to SSH into a unit helps for debugging processes or accessing data directly. Running debug-hooks is another: However, not all developer situations have the CLI available.
In fact, the original developers used to call the operating system Lindows, before changing the name. About 16 years ago, a for-pay Linux distribution caused quite a stir all because of its name — Lindows.
To be honest, from a marketing perspective, it was brilliant — it got tons of free press. Microsoft eventually killed the Lindows name by use of money and the legal system, however.
After losing the Lindows name, the operating system largely fell out of the spotlight, and its 15 minutes of fame ended. After all, without the gimmicky name, it was hard to compete with free Linux distros.
Not to mention, Richard Stallman famously denounced the OS for its non-free ways. The company eventually created a free version of its OS called Freespire, but by, both projects were shut down by its then-owner, Xandros.
And yes, Lindows is rising from the grave — as Freespire 3. Do you remember the Lindows Linux distro, which aimed to make the process of using Linux and running Windows applications on Linux much easier?
Later, Microsoft sued Lindows, Inc. From there on, the theming engine and the APIs are stable. This is a great milestone for GTK3. It also means Linux Mint This should ease development and increase the quality of these components outside of Linux Mint.
With the recent release of Linux Mint The first of the four releases of the new series, simply known as Linux Mint 19, will be dubbed Tara and all subsequent releases of the series should also begin with the letter T with the second letter going further through the alphabet for each release, for example, the Linux Mint 18 releases were called Sarah, Serena, Sonya, and Sylvia.
Unfortunately, was not the much-fabled year of the Linux desktop. Hell, that might not ever happen. With Windows 10 being such a disappointment for many, however, it is definitely a possibility.
Maybe will be the year…. One such desktop operating system that consistently delights users is Linux Mint. Today, we get some information about the upcoming version Last summer the embedded Linux OpenWRT and LEDE projects voted in favor of re-merging their efforts while now in that effort is coming back together now that the logistics have been addressed.
The project will be governed using rules established by LEDE following their creation of that fork in Creating amazing projects is easy with a Raspberry Pi, but first you need to plug it in and set up Raspbian, the default operating system.
The Raspberry Pi is a wonderful microcomputer that brims with potential. With a Raspberry Pi you can build robots, learn to code, and create all kinds of weird and wonderful projects. Hackers and enthusiasts have turned Raspberry Pi boards into fully automated weather stations, internet-connected beehives, motorised skateboards, and much more.
The only limit is your imagination. The old OpenWrt CC We will continue to work on improving stability and release maintenance while aiming for frequent minor releases to address critical bugs and security issues like we did with LEDE The OpenWrt CC Yesterday, OpenMobile, the company behind the ACL app, shut down their operations and switched off their website.
For those that are not familiar with ACL, it stands for Application Compatibility Layer and it essentially enables Android apps to run on non-Android operating systems including Tizen, Linux, and others.
The contract between OpenMobile and Samsung was up for renewal, which Samsung chose not to renew. According to people familiar with the situation, this was the major reason for the company needing to close its doors — as Samsung was a major source of funding for the business.
Since August, when the mysterious Fuchsia OS was discovered as a seemingly random open-source code posted on Github by Google, several experiments have been carried out.
Its been a year since the operating system has been worked on and contributed to by the developer community. All those contributions are leading to growth in open source in general.
In its Octoverse report, GitHub, the largest online repository for open source projects, reported that it now has more than 24 million users and more than 25 million public repositories. Of course, some among those 25 million public repositories are more important than others.
In several areas, open source projects have become the dominant technology, and IT professionals who want to keep their skills relevant need to at least be familiar with these projects.
Here are ten open source projects that, in light of current trends, will likely be particularly important for IT pros to know in Each year, when we look back at the top government articles on Opensource.
Instead, they demonstrate how governments and citizens are coming together through open source to solve human problems. It was easy for readers to assume Stallman was referring simply to price, rather than control over source code, but that is what actually mattered to him.
All over the world, snow researchers and snow scientists dig holes in the snow. They look at the snow crystals, feel for strong and weak layers, and take measurements in order to predict and better understand avalanches.
But snow science recently took an about-face, thanks to the open-source software known as SnowPilot. Doug Chabot of the Gallatin National Forest Avalanche Center launched the SnowPilot Project during the winter of after software developer Mark Kahrl wrote the program, hoping to find a way for researchers to collaborate and share their data on snow.
But what Chabot realized in the early s was that a large portion of snow data was being put away in desk drawers, never to be used. So he asked the question, what if we create a platform where researchers can enter their data into a worldwide database?
And what if that database is accessible to everyone? Perhaps the clearest way working on open source projects can assist in your job search is by giving you project experience. If you are a student, you may not have many concrete projects to showcase on your resume.
Either way, scouting out appealing open source projects that allow you to showcase your skills may help in your job search. These projects are great eye-catchers on resumes and can be perfect discussion topics in interviews.
In addition, many open source projects are kept in public repositories, such as GitHub, so accessing the source code is easy for anyone who wants to become involved.
Also, it makes your publicly accessible code contributions easy for recruiters and other individuals at potential employers to find. The fact that these projects are open allows you to demonstrate your skills in a more concrete manner than simply discussing them in an interview.
Mapzen, a mapping platform company lauded among developers and civic hackers for its open-source approach, is shutting down. They have until Feb. But for the admirers of the company, there is still a silver lining: Until February 1, when the company will shut down its APIs and support, users are free to grab all that they require.
Mozilla said last week it would delete all telemetry data collected because of a bug in the Firefox crash reporter. Firefox versions released in that time span did not respect user-set privacy settings and automatically auto-submitted crash reports to Mozilla servers.
The browser maker fixed the issue with the release of Firefox The SFLC was formed in to provide legal services for open-source projects. And in, it helped set up the SFC, so it could provide infrastructure support — including legal services — for open-source developers.
That shared history and similarity of purpose has made the intellectual property dispute between two organizations rather confusing to folks in the open source community. Song acknowledges and tells of his discussion with noted bitcoin evangelist Andreas Antonopoulos about the best way to put together a book of this kind.
Antonopoulos wrote the publisher, explaining why Mr. Song was the appropriate choice for the project. We just wrote about Babylon Micro-Farms, a remote, hydroponic farm you can keep inside your living room.
The cost of textbooks has risen by 1, per cent since, more than triple the rate of inflation. What is more, these students are more likely to hold a student loan, be working more hours a week and self-identify as a visible minority.
The pre-print database for scientists to test the peer review waters was set up in as a relatively simple electronic bulletin board on a single computer. Twenty-six years later, the site arXiv.
Scientific giants like Stephen Hawking and the physicists of the LIGO facility at Caltech have even debuted some of their latest publications on the site. The organizers of the database, which is housed at the Cornell University Library, said that the pre-print method is helping to push discovery and intellectual cooperation.
Last month, we published a blogpost about our accomplishments in, and the teams have already begun brainstorming goals for next year. Last year, the Rust team started a new tradition: We leveraged our RFC process to solicit community feedback.
As open source software becomes more and more ubiquitous and popular, the Rust team is interested in exploring new and innovative ways to solicit community feedback and participation. Hello and welcome to another issue of This Week in Rust!
Rust is a systems language pursuing the trifecta: This is a weekly summary of its progress and community. Tweet us at ThisWeekInRust or send us a pull request. Want to get involved?
Once upon a time, standards were our friends. They provided industry-accepted blueprints for building homogeneous infrastructures that were reliably interoperable.
Company A could confidently build an application and — because of standards — know that it would perform as expected on infrastructure run by Company B. Standards have somewhat fallen out of favor as the speed of digital innovation has increased.
Today innumerable software applications are created by innumerable developers at an accelerating pace. Standards — once critical for achieving interoperability — have failed to adapt in this brave new world.
The examples above show that by taking a programmatic approach to standards, this degree of interoperability can be achieved even today. Disqus started showing a red notification symbol at the bottom of every post.
The notification is just a distraction aimed at increasing engagement with the comments. This is my primary complaint. Beyond that, there are just small annoyances. An electricity-conducting, environment-sensing, shape-changing machine the size of a human cell?
Is that even possible? With postdoctoral researcher Marc Miskin at the helm, the team has made a robot exoskeleton that can rapidly change its shape upon sensing chemical or thermal changes in its environment.
And, they claim, these microscale machines — equipped with electronic, photonic and chemical payloads — could become a powerful platform for robotics at the size scale of biological microorganisms.
Artificial light is often seen as a sign of progress: But a chorus of scientists and advocates argues that unnaturally bright nights are bad not just for astronomers but also for nocturnal animals and even for human health.
Free download bit oneplus 5t zip up pajamas his and hers
Zip Up Hoodies. Pyjamas. Pyjama Sets. Boxer Shorts. Women. T Our extensive collection of Couples Pajamas in a wide variety of styles allow you to wear your. Posted in News Roundup at pm by Dr. Roy OnePlus 5T. Have you ever Up to now those wanting to use a secondary graphics card pass-through setup with a.
07.02.2018 - The Solus team shared some holiday experiments they were doing with a QtWayland-based Wayland compositor with their Budgie 11 desktop environment. There are about two months now that AtCore reached its beta stage and we release it with the test client. There appears to have been a strategic focus around a singular person in the organization. Ccleaner free download 2011 for windows 7 - 902 22... Environmentalists argued it would slice up habitat for endangered species in one of the most biodiverse regions in the country. But recently some third-party apps have been found taking a few more liberties than they should, like a HAL in your pocket. Like last year, we look at the state of Linux security.
Niveles azucar oneplus 5t zip up pajamas his and hers teamviewer.
21.01.2018 - The Ecuadorian embassy has spoken out following rampant speculation about the health and whereabouts of Julian Assange after his recent cryptic tweet. This should ease development and increase the quality of these components outside of Linux Mint. I have visited the region previously. Ccleaner free download italiano per mac - Juegos b... The pre-print database for scientists to test the peer review waters was set up in as a relatively simple electronic bulletin board on a single computer. Science fiction is written by people embedded within a society with expectations and political assumptions that bias us towards looking at the shiny surface of new technologies rather than asking how human beings will use them, and to taking narratives of progress at face value rather than asking what hidden agenda they serve.
Train simulator oneplus 5t zip up pajamas his and hers latest version.
26.02.2018 - Yesterday I posted the first benchmarks of the performance impact of these x86 PTI security changes that landed in the Linux 4. It also comes with the latest Mozilla Firefox 57 Quantum web browser and supports Arabic locale. Ccleaner free download windows 7 filehippo - Full... Now, the CEO is left with justshares which fulfill the minimum requirement to continue his job. The applications of doing so, are virtually boundless; from automating to maintenance. Master of Mayhem [Steam] seems to have it all.
oneplusonemobilepriceinindiafeatures. blogspot. com always https://www. oneplusonemobilepriceinindiafeatures. blogspot. com always oneplusonemobilepriceinindiafeatures. blogspot. com always. Shop for fleece pajamas 5t online She'll always be excited to get ready for bed with these front zip-up Snowflakes and Penguin Footed Pajama Set from Just One You.
And yes, Lindows is rising from the grave — as Freespire 3. Do you remember the Lindows Linux distro, which aimed to make the process of using Linux and running Windows applications on Linux much easier?
Later, Microsoft sued Lindows, Inc. From there on, the theming engine and the APIs are stable. This is a great milestone for GTK3. It also means Linux Mint This should ease development and increase the quality of these components outside of Linux Mint.
With the recent release of Linux Mint The first of the four releases of the new series, simply known as Linux Mint 19, will be dubbed Tara and all subsequent releases of the series should also begin with the letter T with the second letter going further through the alphabet for each release, for example, the Linux Mint 18 releases were called Sarah, Serena, Sonya, and Sylvia.
Unfortunately, was not the much-fabled year of the Linux desktop. Hell, that might not ever happen. With Windows 10 being such a disappointment for many, however, it is definitely a possibility.
Maybe will be the year…. One such desktop operating system that consistently delights users is Linux Mint. Today, we get some information about the upcoming version Last summer the embedded Linux OpenWRT and LEDE projects voted in favor of re-merging their efforts while now in that effort is coming back together now that the logistics have been addressed.
The project will be governed using rules established by LEDE following their creation of that fork in Creating amazing projects is easy with a Raspberry Pi, but first you need to plug it in and set up Raspbian, the default operating system.
The Raspberry Pi is a wonderful microcomputer that brims with potential. With a Raspberry Pi you can build robots, learn to code, and create all kinds of weird and wonderful projects. Hackers and enthusiasts have turned Raspberry Pi boards into fully automated weather stations, internet-connected beehives, motorised skateboards, and much more.
The only limit is your imagination. The old OpenWrt CC We will continue to work on improving stability and release maintenance while aiming for frequent minor releases to address critical bugs and security issues like we did with LEDE The OpenWrt CC Yesterday, OpenMobile, the company behind the ACL app, shut down their operations and switched off their website.
For those that are not familiar with ACL, it stands for Application Compatibility Layer and it essentially enables Android apps to run on non-Android operating systems including Tizen, Linux, and others.
The contract between OpenMobile and Samsung was up for renewal, which Samsung chose not to renew. According to people familiar with the situation, this was the major reason for the company needing to close its doors — as Samsung was a major source of funding for the business.
Since August, when the mysterious Fuchsia OS was discovered as a seemingly random open-source code posted on Github by Google, several experiments have been carried out.
Its been a year since the operating system has been worked on and contributed to by the developer community. All those contributions are leading to growth in open source in general.
In its Octoverse report, GitHub, the largest online repository for open source projects, reported that it now has more than 24 million users and more than 25 million public repositories.
Of course, some among those 25 million public repositories are more important than others. In several areas, open source projects have become the dominant technology, and IT professionals who want to keep their skills relevant need to at least be familiar with these projects.
Here are ten open source projects that, in light of current trends, will likely be particularly important for IT pros to know in Each year, when we look back at the top government articles on Opensource.
Instead, they demonstrate how governments and citizens are coming together through open source to solve human problems. It was easy for readers to assume Stallman was referring simply to price, rather than control over source code, but that is what actually mattered to him.
All over the world, snow researchers and snow scientists dig holes in the snow. They look at the snow crystals, feel for strong and weak layers, and take measurements in order to predict and better understand avalanches.
But snow science recently took an about-face, thanks to the open-source software known as SnowPilot. Doug Chabot of the Gallatin National Forest Avalanche Center launched the SnowPilot Project during the winter of after software developer Mark Kahrl wrote the program, hoping to find a way for researchers to collaborate and share their data on snow.
But what Chabot realized in the early s was that a large portion of snow data was being put away in desk drawers, never to be used. So he asked the question, what if we create a platform where researchers can enter their data into a worldwide database?
And what if that database is accessible to everyone? Perhaps the clearest way working on open source projects can assist in your job search is by giving you project experience.
If you are a student, you may not have many concrete projects to showcase on your resume. Either way, scouting out appealing open source projects that allow you to showcase your skills may help in your job search.
These projects are great eye-catchers on resumes and can be perfect discussion topics in interviews. In addition, many open source projects are kept in public repositories, such as GitHub, so accessing the source code is easy for anyone who wants to become involved.
Also, it makes your publicly accessible code contributions easy for recruiters and other individuals at potential employers to find. The fact that these projects are open allows you to demonstrate your skills in a more concrete manner than simply discussing them in an interview.
Mapzen, a mapping platform company lauded among developers and civic hackers for its open-source approach, is shutting down. They have until Feb. But for the admirers of the company, there is still a silver lining: Until February 1, when the company will shut down its APIs and support, users are free to grab all that they require.
Mozilla said last week it would delete all telemetry data collected because of a bug in the Firefox crash reporter. Firefox versions released in that time span did not respect user-set privacy settings and automatically auto-submitted crash reports to Mozilla servers.
The browser maker fixed the issue with the release of Firefox The SFLC was formed in to provide legal services for open-source projects. And in, it helped set up the SFC, so it could provide infrastructure support — including legal services — for open-source developers.
That shared history and similarity of purpose has made the intellectual property dispute between two organizations rather confusing to folks in the open source community.
Song acknowledges and tells of his discussion with noted bitcoin evangelist Andreas Antonopoulos about the best way to put together a book of this kind. Antonopoulos wrote the publisher, explaining why Mr.
Song was the appropriate choice for the project. We just wrote about Babylon Micro-Farms, a remote, hydroponic farm you can keep inside your living room. The cost of textbooks has risen by 1, per cent since, more than triple the rate of inflation.
What is more, these students are more likely to hold a student loan, be working more hours a week and self-identify as a visible minority. The pre-print database for scientists to test the peer review waters was set up in as a relatively simple electronic bulletin board on a single computer.
Twenty-six years later, the site arXiv. Scientific giants like Stephen Hawking and the physicists of the LIGO facility at Caltech have even debuted some of their latest publications on the site. The organizers of the database, which is housed at the Cornell University Library, said that the pre-print method is helping to push discovery and intellectual cooperation.
Last month, we published a blogpost about our accomplishments in, and the teams have already begun brainstorming goals for next year. Last year, the Rust team started a new tradition: We leveraged our RFC process to solicit community feedback.
As open source software becomes more and more ubiquitous and popular, the Rust team is interested in exploring new and innovative ways to solicit community feedback and participation.
Hello and welcome to another issue of This Week in Rust! Rust is a systems language pursuing the trifecta: This is a weekly summary of its progress and community. Tweet us at ThisWeekInRust or send us a pull request.
Want to get involved? Once upon a time, standards were our friends. They provided industry-accepted blueprints for building homogeneous infrastructures that were reliably interoperable. Company A could confidently build an application and — because of standards — know that it would perform as expected on infrastructure run by Company B.
Standards have somewhat fallen out of favor as the speed of digital innovation has increased. Today innumerable software applications are created by innumerable developers at an accelerating pace.
Standards — once critical for achieving interoperability — have failed to adapt in this brave new world. The examples above show that by taking a programmatic approach to standards, this degree of interoperability can be achieved even today.
Disqus started showing a red notification symbol at the bottom of every post. The notification is just a distraction aimed at increasing engagement with the comments.
This is my primary complaint. Beyond that, there are just small annoyances. An electricity-conducting, environment-sensing, shape-changing machine the size of a human cell?
Is that even possible? With postdoctoral researcher Marc Miskin at the helm, the team has made a robot exoskeleton that can rapidly change its shape upon sensing chemical or thermal changes in its environment.
And, they claim, these microscale machines — equipped with electronic, photonic and chemical payloads — could become a powerful platform for robotics at the size scale of biological microorganisms.
Artificial light is often seen as a sign of progress: But a chorus of scientists and advocates argues that unnaturally bright nights are bad not just for astronomers but also for nocturnal animals and even for human health.
He summed up his skepticism this way: Every time Mississippi made national news, it seemed like the reporters managed to find the one toothless person in the vicinity and shove him or her in front of the camera.
The sheriff had a point. And I had a challenge to conquer. The story I was onto was not going to flatter Mississippi. But I did promise him I would not go searching for the toothless. Several pallets are piled with boxes of surgical sutures, still in their shrink wrap, each box worth hundreds of dollars.
Tubs overflow with diabetes supplies and surgical instruments that may run hundreds of dollars apiece. There are bins of bandages and gauze and saline and ostomy bags and every other medical supply you can imagine.
These materials, unexpired, could easily stock any hospital or clinic. But each item has actually been thrown away by a local medical facility. The cost of health care has been rising for decades, and Americans are paying the price.
In a recent Gallup poll, people cited the high cost of care as their No. But after reporting for a year on the ways the medical industry blows through our money, I have one idea: Eliminating all the waste could allow us to insure million Americans, the Academy of Medicine said, and saving half of it could provide groceries for every household in the country for a year.
Eliminating the waste would also stop our rising health care costs from eating up our wage increases. My premiums go up 9 percent next year. Same thing happened last year. Odds are your costs are rising, too.
Meanwhile, Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming Patch Tuesday: Crucially, these updates to both Linux and Windows will incur a performance hit on Intel products.
Intel chips have a massive design flaw, and both Microsoft and the Linux kernel developers are scrambling to fix it. The security hole can be patched, but the patches will make PCs and Macs with Intel chips slower.
The researcher also published proof-of-concept zero-day code to his GitHub page. Besides my initial benchmarks of the performance impact as a result of this x86 workaround in the Linux 4.
A critical security vulnerability has been reported in phpMyAdmin—one of the most popular applications for managing the MySQL database—which could allow remote attackers to perform dangerous database operations just by tricking administrators into clicking a link.
AMD processors are not subject to the types of attacks that the kernel page table isolation feature protects against. The AMD microarchitecture does not allow memory references, including speculative references, that access higher privileged data when running in a lesser privileged mode when that access would result in a page fault.
I spent most of the last year reporting two sieges, Mosul in Iraq and Raqqa in Syria, which finally ended with the decisive defeat of Isis. This was the most important event in the Middle East in, though people are already beginning to forget how dangerous the Isis caliphate was at the height of its power and even in its decline.
Isis retains the capacity to slaughter civilians — witness events in Sinai and Afghanistan in the last few weeks — but no longer has its own powerful centrally organised state which was what made it such a threat.
Ambassador Nikki Haley called for an emergency meeting to discuss the developments. While the ruling was aimed at an Obama Administration policy, its impact will likely influence how the Trump administration treats trophy hunting across Africa.
An in-depth investigation of Vietnamese Samsung production facilities peels back the shrink-wrap of Big Tech to reveal an extremely vulnerable, mostly female workforce that may be sacrificing its neurologic and reproductive health in digitized Dickensian workshops to make cutting-edge smartphones.
Back in, I read an article in the New York Times that stopped me in my tracks. But it does so with almost five million fewer jobs. It notes that non-residential investment has risen at an annual rate of 6.
Reporters Binyamin Appelbaum and Jim Tankersley attribute this increase to a removal of regulations, leading to a newfound sense of confidence among investors. There are two important points worth noting about this increase in investment.
First, it is not an especially rapid rate of growth. There have been many periods in both the recent and more distant past when it grew at a more rapid pace. Here is how he describes his task: In the end we shall make thoughtcrime [having unorthodox thoughts] literally impossible, because there will be no words in which to express it.
A shadowy unit is known to target the Middle East, he says. Al-Bassam, who uses the alias TFlow, was a black hat hacker and one of the six core members of hacktivist group LulzSec.
It was announced last weekend that Mr Young, a right-wing journalist who has helped establish a number of free schools, is to join the board of the newly-created Office for Students. The resistance among many — and not just those on the left — to the idea of gifting the loathsome Toby Young the taxpayer-funded sinecure of a seat on the board of the new Office for Students has now reached critical mass, so much so that the Guardian has picked up on some of the deficiencies in his candidature highlighted here on Zelo Street.
Tobes has sounded appropriately regretful. Loftis apparently expected his status as a private person given more reputational protection by courts than public figures to overcome the deficiencies of his lawsuit.
But the deficiencies won and Loftis lost, having failed to show how words written by Jim Myers were somehow libelous statements issued directly by Randy Rayburn. Eugene Volokh has an incredible — and incredibly disturbing — story about how Jia Yueting, a Chinese billionaire, appears to have convinced a Washington state court to issue an unconstitutional gag order against a critic who lives in Washington state.
Jia is famous for his company LeEco in China, as well as his attempt to create an electric car giant competitor to Tesla in the US called Faraday Future. Almost exactly a year ago, we wrote about how Faraday Future was flailing with a series of incredible stories leaking out of the company.
A large number of top execs were fleeing the company and there were reports of questionable activities, including Jia demanding that Faraday Future employees design a car for LeEco, without payment or credit.
In the past year, it does not appear that things have gotten much better for Jia, and he was just ordered to return to China to deal with debts that appear to be piling up. The new system will automatically block pornography and other content deemed to be unsuitable by the government, following years of manual monitoring which has failed to adequately police the abundance of illicit online content.
The makers of the popular news app Jinri Toutiao unveiled moves this week to allay rising concerns from the authorities. The Associated Press reported Tuesday that the Trump administration has upped diplomatic pressure on Iran, demanding the regime stop blocking access to social media sites like Twitter and Instagram that were being used by protesters to organize demonstrations.
Iranian authorities have blocked Instagram and other social media platforms in response to a wave of street protests across the country this week. The clampdown has resulted in Tor users climbing from around 6k at the beginning of December to over 10, at the last count as citizens seek to circumvent the controls, according to official stats.
As protests over economic instability and government censorship persist in Iran, the Hassan Rouhani government has reportedly wielded its favorite suppression tactic: Multiple reports say the government was blocking internet on mobile networks starting on Dec.
This is the biggest anti-government public demonstration since The United States on Tuesday urged Iran to stop blocking online social media and advised its citizens to set up virtual private networks, or VPNs, to circumvent censorship.
The government of Iran has shut down mobile internet access and blocked apps including Telegram and Instagram after days of protests that exploded into widespread civil unrest. It is not yet an official policy because censorship is not openly accepted by the current authorities, but de facto vetoes on artistic expressions are increasing due to moralistic pressures in Brazil.
The offensive affects the artistic world in general, not just the shows or exhibitions that have been directly canceled in recent months. With the New Year came a new law on online hate speech in Germany, forcing Twitter and Facebook to remove content more quickly in some cases.
These are just some of videos put on restricted status by YouTube. All come from Prager University, run by radio-talk-show host Dennis Prager, who in October filed a lawsuit against Google alleging censorship of conservatives.
No, but it will record whatever it sees or hears. There are ways to block radio signals to make sure that Haven can not send out any notification, but that is an expensive step for an attacker to make.
You can keep the phone inside of your hotel locker to record if anyone opens up the locker or make it watch your hallway at the house. The NSA said its attrition rate among those specializing in science, technology and math is 5.
The National Security Agency is facing an exodus of talent to more lucrative and flexible jobs in the private sector, The Washington Post reports. Current and former U. Multiple complaints show intrusive searches and questioning are routine, even if the destinations traveled to are equally routine.
And Google, which started the year at 34 percent, now generates 44 percent of traffic. The Supreme Court should recognize and give teeth to the critical, privacy-protecting limitations Congress placed on wiretaps, EFF told the court in an amicus brief we filed with the National Association of Criminal Defense Lawyers.
In Hollywood, more than 1, prominent actresses, writers and directors have launched a project aimed at combating sexual abuse and harassment in the film industry. It also seeks to bring gender parity to Hollywood studios and talent agencies, while penalizing companies that tolerate persistent harassment.
The campaign also seeks to end the use of nondisclosure agreements that silence victims. The Sixth Circuit Appeals Court has now had the dubious privilege of hosting a legal challenge by Juggalos as fans of the Insane Clown Posse are known.
Rulings by the U. Supreme Court often come with great anticipation and attention, even true drama. Anxious crowds gather outside the court at dawn. Opinions first go out on paper to the waiting hands of television news interns, who sprint the documents to correspondents to be immediately deciphered on the air.
Justices later announce their decisions in open court, and occasionally read aloud the opinions. But when the court fixes mistakes in its opinions, it does so very quietly. No public reading of corrections.
The changes thus have proved hard to find — not just for the general public, but for lawyers and judges and scholars of the law. Something with a hint of retaliatory ugliness has reared its head in Laredo, Texas.
Citizen journalist Priscilla Villarreal has been arrested for releasing information Texas law enforcement meant to keep secret. Lagordiloca — has been an unofficial fixture of Laredo nightlife for a few years now, cruising the town after dark to livestream footage of newsworthy events.
There may be a significant shift in police interrogation methods over the next several years. But our reporting found evidence of spotty record keeping across the country, in departments large and small.
Other agencies sent us records of crimes they marked as bias-motivated but were omitted from their reports to the FBI. A decade ago, Congress gave officials at the Department of Homeland Security a year to build 60 miles of fence in the Rio Grande Valley to protect the Texas-Mexico border.
They faced determined resistance. Political leaders denounced the border fence as wasteful and ineffective. Landowners refused to sell their property for its construction. Environmentalists argued it would slice up habitat for endangered species in one of the most biodiverse regions in the country.
A shrewd county insider, Garza ran an obscure agency that had plans to repair 22 miles of crumbling dirt levees running along the Rio Grande, the riverine border between Texas and Mexico.
Garza helped negotiate a deal: If Homeland Security would pay to fix the levees, the feds could build their fence on top of them. Subsequently, the site has been forced to jump around the internet.
Why you raise rates, of course! Although the District Court and Federal Circuit decisions reasonably cause concern among many patent prosecutors that the actions of a later attorney enforcing a patent during litigation could be used to establish an inequitable conduct ruling impugning the prosecuting attorney, we respectfully argue that Regeneron presents a rather nuanced fact pattern that should not be broadly applied—especially when the prosecuting counsel does not direct litigation strategy and tactics.
The lawsuit alleges that Raven products violate three AgJunction patents related to automated mechanical steering, implement steering and system calibration technologies. After several attempts to negotiate with Raven, we are left with no choice but to assert three of our patents, which are vital to hands-free steering and machine control functions.
It is a well-known fact that developing new drugs is a financially risky endeavor. But prior to the Copyright Act which became effective in, the maximum copyright term was 56 years—an initial term of 28 years, renewable for another 28 years.
The laws in other countries are different—thousands of works are entering the public domain in Canada and the EU on January 1. For many years now, during the first week of January, we write a post about Public Domain Day.
For life plus 70 countries, the works of Aleister Crowley and Winston Churchill are now in the public domain. People will focus on aspects of cost, the functionality provided, hardware compatibility, support, reliability, security, pre-built software, cloud-readiness etc.
In this regard, this article covers ten reasons of using Linux over Windows. Over the years, with your help, we have supported many worthy projects and events in the open source space.
Needless to say, upon reading the news, we immediately reached out to see how we could help. Many members of our team have been Linux Journal readers for years — even since before they worked with Private Internet Access.
We truly believe that Linux Journal needs to be there to chronicle our journey into a more open future. LinuxJournal announced in Nov that they were going to cease publication; With some timely intervention by Private Internet Access they are going to be able to continue operation and are currently soliciting feedback for improving the magazine in the future.
If only the android devices on the wall could be brought in on the fun as well…. The Linux display server built off a game engine. The project is ending with the release of the Arcan 0.
With the Arcan 0. But what about server and business applications for an organization that can be used both on-premise and in the cloud? How about being able to install a whole range of enterprise applications and integrate them in your IT environment with just a few clicks?
That statement is a reflection of the state of our industry: The needs of our products have not changed — but how we create and maintain them has. As Linux and open source professionals of all types, we are at the center of this revolution.
The Linux and Dice Open Source Jobs Report echoes the importance of open source in companies today, with 60 percent looking for full-time professionals with open source experience.
Now Alex has sent in the last planned feature work for Linux 4. Urgent development of a software mitigation is being done in the open and recently landed in the Linux kernel, and a similar mitigation began appearing in NT kernels in November.
In the worst case the software fix causes huge slowdowns in typical workloads. There are hints the attack impacts common virtualization environments including Amazon EC2 and Google Compute Engine, and additional hints the exact attack may involve a new variant of Rowhammer.
Systemd in saw 3, commits, which is actually the lowest point since But the commits were larger with having, lines of code added and, lines removed: Fortunately, it looks like Bas Nieuwenhuizen is working on more performance optimizations.
Yesterday I ran GitStats on the Mesa code-base for being curious about how looks from the development numbers. That came across 10, commits. Below are some of the best Linux music players out there you can use to stream music online and how you can get them running on your machine.
It will be worth your while. Months ago we compiled a list of the 20 Must-Have Ubuntu Apps in Now that has ended we decided to take a look back on how Linux applications have fared so far in general and compile a list of Top 20 Must-Have Linux Apps from Some of us will have spent the past week gorging on mince pies and chocolates, making out under mistletoe, and suffering the seasonable indignity of Christmas-themed Hallmark films on Channel 5.
It was brought to my attention recently that there is a dearth of introductory educational material available about modern network load balancing and proxying. I thought to myself: How can this be?
Load balancing is one of the core concepts required for building reliable distributed systems. Surely there must be quality information available? I searched and found the pickings are indeed slim.
The Wikipedia articles on load balancing and proxy servers contain overviews of some concepts but not a fluid treatment of the subject, especially as it pertains to modern microservice architectures.
A Google search for load balancing primarily turns up vendor pages that are heavy on buzzwords and light on details. Telnet, the protocol and the command line tool, were how system administrators used to log into remote servers.
However, due to the fact that there is no encryption all communication, including passwords, are sent in plaintext meant that Telnet was abandoned in favour of SSH almost as soon as SSH was created.
For the purposes of logging into a remote server, you should never, and probably have never considered it. This does not mean that the telnet command is not a very useful tool when used for debugging remote connection problems.
Early last month we posted an article about the developer of Seven: Why has this happened? Also worth noting Windows 7 use dropped by The overall Windows share dropped by a total of 0.
Developers, particularly on PC, are locked in a never-battle to keep cheaters and hackers from abusing multiplayer games. Sometimes, those methods seem a little strange and arbitrary, but rarely more so than a recently-discovered VAC offense aimed at curbing Team Fortress 2 cheaters.
But in an attempt to stamp them out, some players are claiming that Valve has crossed a line. On the GitHub thread where the issue was uncovered, one user said that their Steam account was VAC-banned despite claiming to never have cheated.
Red Alert and Dune on Linux. The latest test release is rather nice too. Eric Hameleers has been working on that and he has posted on his blog about his work. He is currently working on testing wayland on top of Slackware-Current and i think he has nailed it with his progress in November.
A central place to track KDE development is the kde-commits kde. To this mailing list, all code changes are sent, containing the log message as well as the diff that quickly shows what really changed.
Later, this was changed to subversion. Nowadays, KDE mostly uses git, but some svn modules are still around. Since KDE is developed by many contributors, the kde-commits kde. Just recently, the team had published the latest blog update on their website, listing out the recent developments and breakthroughs achieved during the last months.
These days my main operating system is Kubuntu Once I enabled it on Kubuntu Luckily I was able to fix it quite easily. And the only reason why I installed and enabled the proprietary driver was to see if it would break the user auto-login feature.
Happy New Year to all! The year has been a rollercoaster, to be honest. Well, it was rich and prosperous year regarding in technical terms. It was a beautiful year of great learning, splendid travel and got to network with some fantastic folks all around the globe.
The best reason for making this incredible for me is KDE. One of the exciting community I have ever seen! I started contributing to various projects inside KDE. My initial start was with Konsole, system settings, KIO and various educational suite programs.
Images were processed for overlay in KStars using OpenCV, so to have transparency and to modulate according to the software. FreeBSD is getting more serious about license metadata in the packages produced by the project — that is, the binary distribution of software produced from licensed source code.
Starting in Plasma 5. First all create an XML definition with a top level container widget and a set of child ones. You can use Glade to do so. This is not a tutorial for Glade, so let start at with an already designed template UI file.
Meanwhile, to kick off, a new snapshot of feren OS has been released for computers with the 32 bit architecture and the 64 bit architecture, and like the previous snapshot, it comes with plenty of updates, and for this release, a seriously big change.
Based on Linux Mint Among these, we can mention a new set of wallpapers to start the new year fresh and in style, as well as Linux Mint There was also an archlinux. Following the September release of Manjaro Linux Released on December 31st, , it marks the last Manjaro offering of In other words, you can kickstart with this freshly baked desktop-oriented operating system.
We wish you all the best for next year. As we kick off, Red Hat is proud to announce that we are making a donation to the Shelton Leadership Center in honor of General H.
Army Retired years of service to the company. Red Hat Enterprise Linux provides the foundation for many HPC software stacks and is available across multiple hardware architectures.
This month I accepted packages and rejected 39 uploads. The overall number of packages that got accepted this month was It will become enforceable May 25, Towel Day. This will affect Debian.
After giving users free copies of Linspire 7. Dohnert is now also releasing the freely distributed Freespire 3. Back in the day it tried to offer an easier time with Linux package management and graphical utilities along with shipping Wine in its much earlier form for Windows software compatibility… Linspire 6.
Everything is working just as it should. You can continue to expect a steady stream of Xfce and Xubuntu updates. I work in St. Now I had an opportunity to teach whatever I wanted. Of course, I chose my two favorite subjects: My proposal was approved, and I was ready to begin.
The only teaching I had done was as a Boy Scout leader, and this class had nothing to do with knots except those in my stomach. I had to create a curriculum; prepare the hardware, environment and software; and figure out how to fill 2.
Those who are new to the idea of open organizations and open source in general may have a difficult time envisioning how the open organization principles are incorporated as part of an existing culture.
Many of these folks may not be participating in—or even have had extensive exposure to—an open organization, and therefore may not have ready access to a live community from which to observe and from which to learn.
This exercise allows participants to create their own communities and then evaluate them with respect to the Open Organization Maturity Model. It is intended to allow participants to gain an understanding of how open organization principles could be implemented within a culture.
The process of creating a community allows the participants to clearly understand how the community works, providing a solid foundation for the process of evaluating the community with respect to the Open Organization Maturity Model.
The application of the model provides participants the opportunity to test their understanding of open organization principles by evaluating their inclusion in a known environment. I updated the Haiku stats to keep track of the activity in our git repository.
The overall number of commits is very similar to which was our quietest year so far with more than commits far from the commits in In the week-by-week graph you can also clearly see the effect of the coding sprint, which is of course the week with most commits.
OSS is in our everyday lives today. Even Apple, known for a very user - and design-centric products is based at its core on many OSS components. During the recent holidays when running light on benchmarks to run, I was toying around with LLVMpipe in not having run this LLVM-accelerated software rasterizer in some time.
Earlier this year, in February, I wrote a blog post encouraging people to donate to where I work, Software Freedom Conservancy. I understand the urge, given how bad the larger political crises have gotten, to want to give to charities other than those related to software freedom.
There are important causes out there that have become more urgent this year. Standard Ebooks is a volunteer driven, not-for-profit project that produces lovingly formatted, open source, and free public domain ebooks.
In the first few weeks of, just days after President Donald Trump took office, reports emerged that the Environmental Protection Agency and the Department of Agriculture were instructing scientists on staff not to talk to the public or the press.
The reports raised serious questions among open access advocates: Put most simply, open access is the practice of making research and other materials freely available online, ideally under licenses that allow anyone to share and adapt them.
Open access publishing has long been the center of a debate over the future of academic publishing: On the other, a handful of large publishers with a massive vested interest in preserving the status quo.
In recent years, the U. In, the White House directed all agencies that fund scientific research to enact policies requiring that that research be made available to the public after a year, one of the biggest wins for open access in the past decade.
More recently, the Executive Branch spearheaded strong sense policies on access to government-funded software and educational resources. At the time series-focused Influx Days in San Francisco, presenters offered many unique views of log data.
Emily Nakashima, a front-end engineer at Honeycomb. But over the years that followed, Hotmail would set the course for all the Web-based email offerings that followed, launching the era of mass-consumer free email services.
While Hotmail was important to Microsoft as a testing ground for many things—and perhaps less important as a revenue generator—it also attained a reputation in some quarters of being the root of all that was bad on the Internet.
Hotmail users were the butt of jokes and general hate for years. One management consultant openly suggested that companies should never hire people who use Hotmail.
Otto showed the world its digital lock in August. Four months later, the company has suspended operations. How does a company get so close to the finish line without being able to take that final step?
But it is less widely known that the car was named for Nikola Tesla, an electrical engineer who was once renowned as the prototype of a genius inventor. Making the news rounds again is word of Zhaoxin Semiconductor that is jointly owned by VIA working on modern and competitive x86 processors.
The year is closing, so it is time to review Linux security. Like last year, we look at the state of Linux security. A collection of the finest moments. Did we forget something important?
Let us know in the comments. This post will remain updated in the upcoming weeks. More a third of IT decision-makers estimated that their security staff spent at least three hours daily on tasks that otherwise could have been handled by better software, revealed a study commissioned by LogRhythm.
Singapore, Hong Kong, Australia, and Malaysia. In his tweet announcing the release, Sawyer said: The cyberattack on the Equifax credit reporting agency in, which led to the theft of Social Security numbers, birth dates, and other data on almost half the U.
Other companies that hold lots of sensitive information will be in their sights in As Gove told the Sun: While much of corporate America will enjoy a tax cut in the new year, one industry is getting a tax increase it has fought hard but so far unsuccessfully to avoid.
It was originally imposed in as one of several taxes and fees in the Affordable Care Act that pay for expanded health insurance under the law. Most of the transactions involved Krzanich exercising employee stock options these options allowed Krzanich to purchase Intel shares at prices significantly below where they are currently trading and then immediately selling those shares that he bought at a discount on the open market.
Donald Trump survived in office a whole year. Their action actually has been much more subtle: This is admittedly not the ideal disposition of American political power.
I never believed in the ludicrous Russian collusion fantasy, and find it difficult to believe that the editors of The New York Times do. So far, Special Counsel Robert Mueller has indicted two high-profile grifters Manafort and Gates on financial shenanigans involving business dealings in Russia dating from years before the election, plus one National Security Advisor Michael Flynn for speaking with the Russian Ambassador who, exactly, are foreign ambassadors supposed to speak to if not government officials?
And otherwise what are they here for? I believe the grave and solemn Mueller is on a fishing expedition. With just 18 days before President Trump completes his first year as president, he is now on track to exceed 2, false or misleading claims, according to our database that analyzes, categorizes and tracks every suspect statement uttered by the president.
As of Monday, the total stood at 1, claims in days, or an average of 5. Our full interactive graphic can be found here. As regular readers know, the president has a tendency to repeat himself — often.
There are now more than 60 claims that he has repeated three or more times. As the year comes to a close, the job of making sense of it begins. The question is, who will be left standing when the rally is over?
Will political polarization worsen or will bipartisanship return? Will the mass shooting in Vegas stand as the worst in modern US history, or be tragically outdone next year?
Will America continue to be punked and manipulated by Russia, or will we start to protect our elections like we do our borders? Facebook serves many useful functions. It helps you set up events, send messages to friends and family, and even organize groups.
These are all side benefits, though. The main feature—the real thing Facebook wants to sell you—is the News Feed. The law gives the networks 24 hours to act after they have been told about law-breaking material.
One of the more interesting storylines that has been simmering since the inception of Bitcoin has been the multifaceted infighting. With an expanded network, arrive more voices and opinions; something that has been handled indelicately thus far.
The restrictions imposed by the state on musicians and their art throughout have been numerous and wider than ever in scope and reach, affecting mainstream divas, mahraganat sensations and independent artists alike.
Controversial Singaporean blogger Amos Yee who is now living in the United States has once again lashed out against his country and its national heritage. A new German law named NetzDG that will force social media sites to delete offensive content has come into effect with the New Year.
There are plenty of critics on both the far-right and among internet activists. Starting on January 1, Germany will begin enforcing its new, harsher rules regarding hate speech and fake news posted online.
When I first read the article citing the words banned by the federal Centers for Disease Control and Prevention, I was shocked. She said what many of us have been thinking and discussing.
It seems like a no-brainer that an Internet Service Provider ISP should have to get your permission to snoop on and use the private information you generate as you browse the Internet. In, pressure from the telecom industry led to Congress and the president rolling back protections for broadband privacy, but there are many ways EFF was and is still fighting this battle.
The rules—which prohibited things like selling your personal information to marketers, inserting undetectable tracking headers into your traffic, or recording your browsing history to build up a behavioral advertising profile on you without your consent—were a clear victory for privacy.
Unsurprisingly, ISPs wishing to profit even more off of their customers were not happy about the restrictions and began lobbying hard to overturn the rules. Bit Micro filed a patent infringement lawsuit in the U.
However, the company is actually targeting South Korean memory chip makers, like Samsung Electronics and SK Hynix, according to industry sources. Samsung Electronics leads the global SSD market that is rapidly growing with a 30 percent market share, while SK Hynix is the seventh largest firm in the world with a 3 percent market share.
So, South Korean companies can be adversely affected at the worst. The case is on appeal and will be heard by the Ninth Circuit in Large numbers of people are running Kodi with a poorly-protected remote access interface, which enables third-parties to view their addons and other sensitive information.
Posted in News Roundup at 1: Google is reportedly bringing support for running multiple Android apps simultaneously on supported Chromebook models via an upcoming update of their Chrome OS Linux-based operating system.
To say that Docker had a very rough is an understatement. People will look back on as the year Docker, a great piece of software, was completely ruined by bad business practices leading to its end in This decision was made despite Kubernetes preferring Docker containers at first.
Off the record, Docker Captains confirmed early in that Kubernetes discussions in articles, at meetups, and at conferences was frowned upon by Docker. Through dockercon17 in Austin this Kubernetes-less mantra held.
Then, rather abruptly, at dockercon EU 17 Docker decided to go all in on Kubernetes. The real problem with Docker is a lack of coherent leadership. There appears to have been a strategic focus around a singular person in the organization.
This individual has been pushed further and further away from the core of the company but still remains. The company has reorganized and has shifted its focus to the enterprise. Did you find one common thing of all these activities?
Linus has merged the kernel page-table isolation patch set into the mainline just ahead of the 4. This is a fundamental change that was added quite late in the development cycle; it seems a fair guess that 4.
Year after year, Linux development continues to move forward and was no exception. Over the course of, five major Linux kernel milestones were released, providing new driver support and expanded functionality.
About half the rc6 work is x86 updates. Renowned Linux kernel maintainer and developer Greg Kroah-Hartman announced a couple of days the release and immediate availability of the Linux 4. While Linux kernel 4.
According to the appended shortlog, most of the changes included in Linux kernel 4. With recent commits that fix bugs and allow newer Vega cards to pass tests for official conformance, development for radv continues apace.
Here are some other end-of-year benchmarks I had been working on in looking at the current performance of Mesa For your viewing before ending out the year are some initial VirtualBox vs.
At least, this theory holds for me. People might argue that for programming, Vim might not be a good choice as there are different IDEs or other sophisticated text editors like Sublime Text 3, Atom etc.
The GnuCash development team just released today GnuCash 2. Maintenance releases will be 3. The next unstable release will be 3. As expected, this point release includes updated library versions.
These are libavutil There is a stigma around the word Linux, where people generally envision people with glasses, beards, and look like a hippy programmer.
The applications of doing so, are virtually boundless; from automating to maintenance. Dual Booting has become very common among people trying out different Linux Distributions while still keeping their windows system.
This has become extremely popular since it is so easy to do. However, one big problem with dual booting is the Time. It was funded on Kickstarter back in and it seems development is taking a little longer than expected, but it sounds pretty positive right now.
They released a trailer that makes it look like a rather trippy experience. Do you like blowing things up? How about blowing things up in a cartoon-like setting? Master of Mayhem [Steam] seems to have it all.
Roguelike is a sub-genre of role-playing games. Rogue is a dungeon crawling video game, first released in by developers Michel Toy, Glenn Wichman and Ken Arnold. The game stood out from the crowd by being fiendishly addictive.
The game is rightly considered to be a classic, formidably difficult yet compelling addictive. Low-quality computer operating systems and software get in your way and knock you out of a state of flow, while high quality versions let you create at the speed of thought.
KDE Plasma is already pretty good in this department, but I think we can make it even better—we can turn it into the obvious choice for people who need to get things done.
Asia was an amazing event and I wanted to reach out to the organizers and thank them for the wonderful reception that I received while I was there. The trip to Chongqing was mostly uneventful other than the fact every Chinese official was gunning for my battery brick when going through airport security.
After a long layover in Beijing, I was landed in Chongqing and met up with Mathias Clasen and proceeded to head to the hotel. Many Linux distributions include all the basic programs you need, and you can install others from Linux software repositories online, but make a list of everything you need to do on the computer and make sure you have a Linux solution for it.
Windows today beats almost all the markets thanks to its simplicity and large number of programs and games in a free access. We are used to Windows since there are no compatible systems like Windows.
However, it is not true. Only a small number of people might have heard about Linux. This operating system started at the beginning of 90th and quickly gained popularity for supercomputers and huge server rooms.
Today, you will actually be able to compare all the advantages and disadvantages of Linux operating system to understand whether it is worth your attention or not.
Maybe, you will be even convinced of switching over to Linux after all. From a far the laptop looks similar to the previous XPS 13 but is now a little bit thinner and lighter with a 2. The bezel on this new laptop comes in at just 4mm.
Reports suggest the company will allow its cloud customers to rent access to its new operating system, which it calls Linux 2, but will also allow clients to install the new OS on its own servers.
This open-source, reverse-engineered Vivante graphics driver continues getting better. Besides some basic fixes, the Etnaviv-Next 4. Solus taking a break from their Steam Linux integration improvements and their other open-source desktop innovations has been experimenting with their own Qt Wayland compositor over the holiday period.
The Solus team shared some holiday experiments they were doing with a QtWayland-based Wayland compositor with their Budgie 11 desktop environment. Contrary to the hysteria, the gaming performance was minimally impacted with those open-source Radeon driver tests while today are some tests using the latest NVIDIA driver paired with a KPTI-enabled kernel.
This driver update is notable in that it should have a workaround for the recent vRAM memory leakage. Additionally, the series will be the last supporting bit. For those of you riding the Mesa The release candidate for Mesa So far there is just over one dozen patches queued up but over one dozen more still being reviewed.
Our continued testing through today has found for desktop-type hardware to mostly be impacted on that front with no severe slowdowns in other common desktop workloads.
I provided a summary this afternoon of further analyzing the performance on more systems. As a blogger I take a lot of screenshots and annotate a lot of screenshots. Any app that can help to speed up my workflow is super appreciated.
Writers are fiercely loyal to the tools they use. For years, I swore by the ultra-slimline markdown editor iA Writer. I compose almost all of my articles in it. It is time to share a list of the best 20 Free and Open Source Software I found during the year Tablao is a cross-platform table editor with which you can easily create tables in HTML the way you would create tables in Excel.
These features were initially available on the beta RC version of Opera This is the second beta update in less than two months, which is really damn nice to see!
Are you a fan of games like Rocket League? Ultraball [Steam] might be your game. A free multiplayer sci-fi action sports game with players wearing robotic armour.
The description alone tickled my interested and after watching some early footage, I feel like I need to play it. Want to play Jagged Alliance 2 on Linux and have a good experience?
The JA2-Stracciatella game engine is exactly what you need. Stellar Interface [Steam, itch. The 5th and final bugfix update 5. We have decided to target other Qt areas, too, and make the API easily extensible to any service provider instead of being for embedded only.
This enables developers to use the same API for both mobile and desktop development. So this blog post is also to say that I am not trying to fork MyPaint or anything.
I am just taking a little advance because we cannot wait much longer unfortunately since GIMP now uses libmypaint and we are really looking into releasing GIMP 2.
As you may remember from my last post on fonts, our goal was to support OpenType font variations. The Linux text rendering stack has multiple components: Achieving our goal required a number of features and fixes in all these components.
Getting all the required changes in place is a bit time-consuming, but the results are finally starting to come together. The yearly Red Hat Government Symposium goes beyond demos and new product announcements to explore the best practices to successfully leverage people, process and technology in order to maximize digital transformation and modernization initiatives within the government.
It features a fully functional version, ansible integration, an agentless architecture, and CI integrations. The new year has arrived, but in the TeX world not much has changed — we still get daily updates in upstream TeX Live, and once a month I push them out to Debian.
So here is roughly the last month of changes. This is a continually updated article to inform you about Linux Mint 19 release date, features and everything important associated with it.
Linux Mint 19 codename has just been released. The Linux Mint project turned out to be an early Christmas present, as it usually does, but this release is perhaps more important than usual given that Mint is much more alone in the Linux distro world than it was just one year ago.
The latest release of Linux Mint In a recent blog post, the development team shared some brief updates on the same. The release of Linux Mint Linux Mint 19 is the first significant release of the operating system since June when Linux Mint 17, codename Sarah, was released by the team.
For at least one startup, opened with a thud. On Tuesday, the open source mapping company Mapzen announced it would shut down at the end of the month, with its hosted APIs and support services going dark on February 1.
Our developers will be ready to candidly greet all open source enthusiasts at the Gentoo stand in building K. So far seven developers have specified their attendance, with most-likely more on the way!
With that material updated, we thought it would be nice to complete the documentation with similar guides for Flexbox, and so I updated the existing material to reflect the core use cases of Flexbox.
In order to stop sophisticated modern threats, organizations need to be flexible and scalable with the way they handle their data. Network flows and data need to be collected and examined at cloud scale in order to let defenders identify anomalous behavior, but getting to that stage is a heavy lift.
Henry Sowell, technical director for Hortonworks, spoke with CyberScoop on how open source systems allow for that flexibility and scalability, especially at a time where the onslaught of threats has never been greater.
The Rust team is happy to announce a new version of Rust, 1. Rust is a systems programming language focused on safety, speed, and concurrency. If you go to GitHub, the most popular developer platform today, and search for a piece of code, it is a plain-text search.
Every software development organization today seems to practice the agile software development methodology, or a version of it. Or at least they believe they do. Whether you are new to application development or learned about software development decades ago using the waterfall software development methodology, today your work is at least influenced by the agile methodology.
If you want to experiment with the latest, flashiest technologies, Perl may not be your first choice. An hour a day less spent with friends is an hour a day less spent building social skills, negotiating relationships, and navigating emotions.
Yet, not everyone is thrilled to hear the news. Humans possess six forms of the protein actin, which perform essential functions in the body. Yet these near-twin proteins carry out distinct roles.
A long standing question for biologists has been, how is this possible? When a new undersea communications cable becomes operational late this year, it will break the record for a key metric: In a single second, its six fiber-optic pairs, stretching roughly 13, kilometers 8, miles between Hong Kong and Los Angeles, will be able to send some terabits in both directions.
The new cable is part of an ongoing transformation of the submarine fiber-optic cable network. Originally, that network carried telephone calls and faxes.
Later those subsea conduits served primarily to shuttle data between Internet users and a myriad of service providers. Fast Company briefly described their experience in an August article—a story that quickly went viral.
As a working science fiction novelist, I take a professional interest in how we get predictions about the future wrong, and why, so that I can avoid repeating the same mistakes.
Science fiction is written by people embedded within a society with expectations and political assumptions that bias us towards looking at the shiny surface of new technologies rather than asking how human beings will use them, and to taking narratives of progress at face value rather than asking what hidden agenda they serve.
Long ago, Intel made a design mistake in its bit chips — and now, all Intel-based operating systems and their users must pay the price. The bad news is it will cause at least a 5-percent performance drop.
Applications may see far more serious performance hits. The popular PostgreSQL database is estimated to see at least a percent slowdown. How bad will it really be? It will depend on your hardware and on your load.
I think 5 percent for a load with a noticeable kernel component e. But if you do micro-benchmarks that really try to stress it, you might see double-digit performance degradation.
The Meltdown and Spectre vulnerabilities CVE, CVE, and CVE were publicly disclosed earlier today as critical hardware flaws affecting modern microprocessors made in the last two decades. These can be exploited by an unprivileged attacker to bypass hardware restrictions through three unique attack paths and gain read access to privileged memory.
Red Hat Product Security provided us with several resources to better understand the impact of these hardware bugs on any of their supported Linux-based operating systems from an open source technology perspective.
Google has revealed they uncovered the issue last year and have now provided some technical bits. Google was also able to demonstrate an attack where one VM could access the physical memory of the host machine and in turn read memory of other VMs on the same host.
Using the two major flaws hackers can gain read access to the system memory that may include sensitive data including passwords, encryption keys etc. Because they apparently patch a critical vulnerability called Meltdown.
Some semiconductors from ARM, whose chips are popular with mobile phone makers, are also affected. So we have an attack Meltdown which is arbitrary memory read from unprivileged code, probably on Intel only, fairly easy to set up, mitigated by KPTI.
It even can be run from JavaScript, although Chrome is going to ship mitigations from that to happen. Correcting the vulnerabilities, therefore, comes at a performance price.
More information on this tradeoff is available from this Red Hat post. However, the specific performance impact will be workload dependent. To address Spectre in the short term, Red Hat has modified the kernel by default to not use the performance features that enable the vulnerability.
Their customers do have the option to disable the patch and use the performance features. While Red Hat is working with chip manufacturers and OEMs on a longer-term solution, this option gives customers a way to make their own security and performance decisions.
The two problems, called Meltdown and Spectre, could allow hackers to steal the entire memory contents of computers, including mobile devices, personal computers, servers running in so-called cloud computer networks.
The recent speculative execution CVEs address three potential attacks across a wide variety of architectures and hardware platforms, each requiring slightly different fixes. In many cases, these fixes also require microcode updates from the hardware vendors.
Red Hat has delivered updated Red Hat Enterprise Linux kernels that focus on securing customer deployments. The nature of these vulnerabilities and their fixes introduces the possibility of reduced performance on patched systems.
The performance impact depends on the hardware and the applications in place. A design flaw in all Intel chips produced in the last decade is responsible for a vulnerability that puts Linux, Windows and macOS-powered computers at risk, according to multiple press reports.
The Linux kernel community, Microsoft and Apple have been working on patches to their operating systems to prevent the vulnerability. While these bugs impact a huge number of devices, there has been no widespread attacks so far.
So you should not start panicking just yet. KPTI patches are out from most vendors now. This makes Meltdown essentially like any other localroot security hole ie. Spectre is more difficult. There are two variants; one abuses indirect jumps and one normal branches.
But the indirect one is more interesting, as there are mitigations popping up. The rumored bugs in Intel and beyond processors have now been disclosed: Stay tuned for more.
Furthermore, we are unaware of any successful reproduction of this vulnerability that would allow unauthorized information disclosure on ARM-based Android devices.
Supported Nexus and Pixel devices with the latest security update are protected. Two highly publicized security flaws in the Intel x86 chip architecture have now emerged.
And they may be some of the worst computer bugs in history — if not the worst — because they exist in hardware, not software, and in systems that number in the billions.
These flaws, known as Meltdown and Spectre, are real doozies. They are so serious and far-reaching that the only potential fix in the immediate future is a software workaround that, when implemented, may slow down certain types of workloads as much as 30 percent.
Security researchers have found serious vulnerabilities in chips made by Intel and other companies that, if exploited, could leave passwords and other sensitive data exposed.
A Linux security expert is irked at both Google and Intel. But neither Google nor Intel bothered to tell the operating system vendors until months later.
In addition, word began to leak out about the patches for these problems. This forced Apple, the Linux developers, and Microsoft to scramble to deliver patches to fundamental CPU security problems.
The result has been fixes that degrade system performance in many instances. You may have heard about Meltdown, an exploit that can be used against modern processors CPUs to maliciously gain access to sensitive data in memory.
This vulnerability is serious, and can expose your secret data such as passwords. The Project Zero researcher, Jann Horn, demonstrated that malicious actors could take advantage of speculative execution to read system memory that should have been inaccessible.
Testing also showed that an attack running on one virtual machine was able to access the physical memory of the host machine, and through that, gain read-access to the memory of a different virtual machine on the same host.
Technology companies are working to protect their customers after researchers revealed that major security flaws affecting nearly every modern computer processor could allow hackers to steal stored data — including passwords and other sensitive information — on desktops, laptops, mobile phones and cloud networks around the globe.
The scramble to harden a broad array of devices comes after researchers found two significant vulnerabilities within modern computing hardware, one of which cannot be fully resolved as of yet.
Experts say the disclosure of the critical flaws underscores the need to keep up with software updates and security patches and highlights the role independent research plays in prodding tech companies to minimize security weaknesses.
Now, the CEO is left with just, shares which fulfill the minimum requirement to continue his job. Just yesterday, a report from The Register disclosed a massive security screwup on behalf of Intel, which impacted nearly all chips manufactured in the past ten years.
As might be guessed, a fair number of these updates are for the kernel and microcode changes to mitigate Meltdown and Spectre. More undoubtedly coming over the next weeks. Several recently-published research articles have demonstrated a new class of timing attacks Meltdown and Spectre that work on modern CPUs.
Our internal experiments confirm that it is possible to use similar techniques from Web content to read private information between different origins. The full extent of this class of attack is still under investigation and we are working with security researchers and other browser vendors to fully understand the threat and fixes.
Since this new class of attacks involves measuring precise time intervals, as a partial, short-term, mitigation we are disabling or reducing the precision of several time sources in Firefox. This includes both explicit sources, like performance.
Meltdown is specific to x86 processors made by Intel; it does not appear to affect AMD. But virtually every CPU going back decades that has a feature called speculative execution is vulnerable to a variety of the Spectre attack.
Civilians fear to go outside lest they be shot by a sniper or step on a land mine. Both sides of a worsening civil war use Howitzers, Kaytushas, mortars and other missiles to shell the city.
Residents say no neighborhood is safer than another, and human rights groups report appalling violations, including torture of captives. As the new year begins, it is important for the U. But the slayers got a new lease on life with the election of Donald Trump, who, as part of his program of opposing whatever Barack Obama favored and destroying whatever he accomplished, has consistently berated the JCPOA.
Meanwhile, North and South Korea have opened lines of communication, saying they are open to direct negotiations. But is this the real reason for the sudden unanimous decision by the board to end support?
Late Sunday night, just hours after the FBI released a new document that appeared to confirm Swedish sexual assault charges against him were trumped up by the U. The Ecuadorian embassy has spoken out following rampant speculation about the health and whereabouts of Julian Assange after his recent cryptic tweet.
Many wondered why the 46 year old had tweeted the seemingly random string of letters and numbers. For locals — or those who can brave the brisk waters, in any case — the cove is known as one of the best places for an open-water swim, especially favored by triathletes.
Even before Hurricane Harvey hit, Houston was no stranger to devastating rainstorms. The setup involves shifting revenue from one Irish subsidiary to a Dutch company with no employees, and then on to a Bermuda mailbox owned by another Ireland-registered company.
The amount of money Google moved through this tax structure in was 7 percent higher than the year before, according to company filings with the Dutch Chamber of Commerce dated Dec.
News of the filings was first reported by the Dutch newspaper Het Financieele Dagblad. Ant Financial, which was one of our 50 Smartest Companies in, is a Chinese tech company that handles mountains of data generated by its mobile payment business and other banking services.
Merrill Lynch financial advisors cannot buy bitcoin-related investments for their clients, The Wall Street Journal reported Wednesday. In we were told that blockchain technology and cryptocurrencies were going to save the world, disrupting just about anything with a digital fingerprint.
But we saw very few tangible examples that justified the hype. In, many of the intriguing pitches we heard will still be around, only now the challenge is going to be finding a way to deliver real products and services.
Here are some of the biggest issues that members of the blockchain world will have to work through if the new year is going to realize the potential that was so highly touted in the last.
And as one goes downward of course from left to right one can only blame the UK for adopting such positions. British government policies to boost income for poorly paying jobs could actually incentivize firms to automate instead.
The retiring senator has always been a shameless tool of billionaire campaign donors and a partisan errand boy for the likes of Donald Trump. This may be the most irresponsible tweet in history.
Julian Sanchez articulated the best-case scenario: The Gimlet Media host P. Vogt asks a key question: Normally, none of this would be Techdirt-worthy, but late last night, a new twist was added.
Not much more needs to be said about him. Or, for that matter, of Michael Wolff, who has a long history of… not being very good at his job. So, if you want to accuse us of bias in this post, consider it spread all around.
It passes all of my sniff tests. It does not move the BS needle on my Truthometer. Putin put Trump in office. All the meetings, the indictments, the lies from Trump and his family and so much more are overwhelming.
Yes, Hillary conspired, unwittingly, with her own iniquitous collusion to bump off Bernie and with her bloodstained foreign policy record. Like so many, I voted for her as a purely defensive and highly emetic act.
We speak with Ahmad Awad, who has graduated from Fordham University and is the lead petitioner, now a law student at Rutgers University. We also speak with Dima Khalidi, director of Palestine Legal.
In August of this year, a white supremacist plowed through a crowd of protesters gathered in downtown Charlottesville, Virginia. The attack injured around 20 people and killed year-old Heather Heyer.
A friend of hers was there, and was attacked and hurt by neo-Nazis. Crose is a former NSA analyst and ex-Reddit moderator who now works at a cybersecurity startup. The end result is a sometimes haphazard system that can still have devastating effects on any service the regime sees as a threat.
Its goal is to force social networks to remove hate speech and certain other unlawful content within 24 hours in obvious cases, otherwise within 7 days upon being notified. The transition period ended on 31 December — meaning the new rules can now be enforced.
Failure to delete content within the given deadlines can result in heavy administrative fines of up to EUR 50m. Unlike hate language, taboo words, dirty words, or fighting words that may cause harm, offense, or incite violence, the dangerous seven are not only surprisingly innocuous, but one might even say necessary to describe the present concerns of modern life and science.
Techno-optimists believed that the internet would ensure a free flow of information and ultimately a democratic society in authoritarian states like China. Thirty years on, however, China has instead built a Great Firewall, a vast hardware and software system that aims to prevent access to undesirable websites and censors sensitive content.
I understand that American companies are somewhat obliged to follow local laws when providing services overseas, but they should not be put in the position of being held criminally and civilly liable for the posts of their users.
Freedom of the press in Venezuela has been threatened by the government for more than a decade. The accumulation of power in the executive branch has enabled the Venezuelan government to intimidate, harass, and criminally prosecute the opposition, human rights defenders, and independent media outlets.
While traditional media outlets are being threatened, social media serves as an alternative tool to transmit and consume news. German brothers Jan and Tim Edler, owners of realities: At issue is LightSpell, a public art installation that would allow users to enter eight characters on a control panel in the station that show up on giant light screens that hang from the ceiling.
Since the Green Movement protests in Iran, internet connections have grown significantly, which is why social media is likely playing an important role in the anti-government demonstrations rocking the country.
Election candidates will be required to register for vote-canvassing on electronic and social media, according to the current draft of the organic law governing the election of MPs.
The National Legislative Assembly NLA committee vetting the bill has finished the first round of deliberation for all sections of the law, said spokesman Taweesak Suthakavatin. Imagine a school administrator telling a high school political science teacher that a whole range of timely topics — for example, medical marijuana, terrorism in the Middle East, gun control, or even politics in general — was off-limits for class discussion.
The pedagogical absurdity of it, not to mention the upending of academic freedom it embodies, would seem obvious to most. In school districts across the country, however, a similar type of censorship takes place in the classroom every day, with little dissent.
The censorship takes place invisibly, through the use of internet filtering programs that block certain categories of websites — or even websites that mention specific words — when students use school computers to access the internet.
Each year, I renew a contract to provide legal services to incarcerated people in an Arizona county jail. I have been doing this for 12 years without complications. Lately, though, there has been some extra paperwork that has nothing to do with my work as an attorney.
Now, in order to renew my contract, I am being asked to promise that I will not participate in a boycott of Israel. I have visited the region previously. I raised a Jewish son. Last spring, he and I traveled together to Israel and Palestine.
We met journalists, human rights advocates, Israelis, and Palestinians living under Israeli occupation in the West Bank. No one we talked to believed that Israel would ever dismantle the more than Israeli settlements peppered through the West Bank.
It was painfully clear to us that Israel will not stop, and in fact has accelerated, its de facto policy of permanent Israeli occupation. On the other hand, it will never allow equal rights for the 2.
Facebook continues to increase its stranglehold on news delivery, reducing pipelines of info to a nonsensically-sorted stream for its billions of users. Despite the responsibility it bears to its users to keep this pipeline free of interference, Facebook is ingratiating itself with local governments by acting as a censor on their behalf.
While Facebook has fought back against government overreach in the United States, it seems less willing to do so in other countries. The reporting tools it provides to users are abused by governments to stifle critics and control narratives.
But recently some third-party apps have been found taking a few more liberties than they should, like a HAL in your pocket. Technology startup Alphonso has caused widespread concern by using smartphones microphones to monitor the TV and media habits of games and apps users.
This kind of social media surveillance can impact people applying for visas from abroad, immigrants in the United States, and U. It is important for small business owners to understand what the GDPR is as well as its application.
The GDPR is the outcome of four years of constant discussions, investigations, and amendments made by the EU to update its data privacy rules and regulations. The GDPR will replace the Data Protection Directive established in, creating a greater territorial scope and stricter penalties for those states members, and business dealing with Personal Data, who fail to keep and handle data according to the new regulation.
I was sitting in the nearly empty restaurant of the Westin Hotel in Alexandria, Virginia, getting ready for a showdown with the federal government that I had been trying to avoid for more than seven years.
Now that war against the intelligence community is impacting American national security. A day after the expose by The Tribune on unauthorised people freely accessing Aadhaar data, the government made no announcement of any formal investigation being launched, and the UIDAI denied there was any breach.
However, multiple security agencies were understood to have got into motion as several made contact with The Tribune to get information. The personal data of almost a billion Indian citizens who have an Aadhaar number could be accessed by paying just a handful amount of money, according to a report by The Tribune.
A login ID and password given by the anonymous agent provides access to personally identifiable information including name, address, postal code PIN, mobile number, photo, and email.
An activist promoting the Tibetan language stood trial Thursday in western China for inciting separatism after he appeared in a documentary video produced by The New York Times, highlighting the risks that Chinese citizens often face when speaking to foreign media.
Capital punishment is legal in Israel but has not been implemented since, when Nazi leader Adolf Eichmann was put to death for his role in the Holocaust. BAR editors have also noted a drastic drop in the number of our own articles that come up in routine Google searches, compared to pre-November, Amazingly, the Democrats attacked Trump from the Right, reprising the McCarthy era of three generations ago.
Trump was soft on the Kremlin, which is depicted as the home of Euro-Asiatic totalitarianism, no matter who is actually in charge. In fact, Comcast argues, without government oversight of an uncompetitive market, investment and jobs will soon be miraculously springing forth from the sidewalks.
It will, the industry argues, be impossible to even measure the incredible innovation that will be created by letting entrenched ISPs and their natural monopoly over the broadband last mile run roughshod over the backs of American consumers and smaller competitors.
Because the net neutrality debate in recent years wandered into more nuanced and quirky areas like interconnection and zero rating, they believe the ultimate impact of the repeal will likely be modest.
After all, these harms like Comcast exempting its own content from usage caps, or Verizon covertly choking interconnection points were murky and out of the intellectual or technical reach of many Luddite consumers.
Of course given that the telecom sector is often the poster child for regulatory capture, this mandate often gets intentionally lost in the weeds. Or worse, by meddling with broadband deployment metrics until the numbers show something decidedly different from the reality on the ground.
The meeting brought together students, lawyers, scientists and different professionals drawn from Africa and other parts of the developing world for a ten-day intensive programme in intellectual property.
Should a company be able to shut down competition by asserting copyright in a collection of software commands? Tech giant Cisco Systems thinks so: Second, any copyright that does exist must be sharply limited, as a matter of law and good practical policy.
Either option will discourage innovation and competition. The latest issue involves EA asking for the latest iteration of the case to be dismissed based on another ruling concerning NCAA basketball players and their publicity rights.
In that ruling from April of this year, the 9th Circuit ruled among other things that federal copyright preempted state-based publicity rights claims. Here, the court said that the state-based publicity rights claims were blocked because of that, as the only issue should be covered under federal copyright law, where they would fail.
Music streaming company Spotify was sued by Wixen Music Publishing Inc last week for allegedly using thousands of songs, including those of Tom Petty, Neil Young and the Doors, without a license and compensation to the music publisher.
Aside from these novel features, the company also has high hopes for artificial intelligence. Posted in News Roundup at 5: What shall we be now? Amazon will rent access to Linux 2 to its cloud customers.
GoDaddy switched back to using IIS 7. Today, Apache still has the largest market share by number of domains, with It also saw the largest gain this month, increasing its total by 1.
This growth was closely followed by nginx, with a gain of 1. While Microsoft leads by overall number of hostnames, it lags in 3rd position when considering the number of unique domains those sites run on, with a total of DevOps is a set of practices that automates the processes between software development and IT teams so they can build, test, and release software more quickly and reliably.
The concept of DevOps is founded on building a culture of collaboration between IT and business teams, which have historically functioned in relative siloes.
The promised benefits include increased trust, faster software releases, and the ability to solve critical issues quickly. That said, implementing a successful DevOps organization requires IT leaders to think more broadly about how to spur a cultural and organizational shift within both their team and the broader organization, as opposed to simply deploying new technologies.
A successful DevOps strategy requires a merged focus from both development teams and operational teams on what the company needs to meet its digital transformation objectives.
Thus, it is about breaking down siloed groups of people and responsibilities, and—in their place—building teams that can multitask on technical issues and goals. Yesterday I posted the first benchmarks of the performance impact of these x86 PTI security changes that landed in the Linux 4.
In most desktop-ish workloads, the impact of enabling x86 PTI is much less like with not seeing much of a change for gaming. Due to the amount of interest in this issue, here are benchmarks of a patched kernel showing the performance impact of the page table isolation patches.
For downloading files directly from the Linux command line, there are two utilities that immediately come to mind: They share a lot of features and can easily get many of the same tasks accomplished.
These programs fit slightly different roles and use cases, and do have traits that make each better for certain situations. A tag has been set and tar balls have been published. There are about two months now that AtCore reached its beta stage and we release it with the test client.
Nevertheless, here we compiled a list of the best open source web browsers for you. The Calamares project as a reminder aims to be the universal installer framework for Linux systems that is distribution-agnostic and already used by Manjaro and KaOS and OpenMandriva.
It has been a full year here at the Fedora Magazine, and now it is over, we are looking back at some of the awesome content from our contributors. Here are some of the best articles from our contributors that are useful for system administrators.
While the Linux world is waiting impatiently for the major Wine 3. I love space, I love how mysterious and dangerous it is and to be able to fly around in a game like Helium Rain [Steam] is fantastic.
Sometimes, late at night, I endlessly browse the internet to find Linux games worth covering. The sad news is that Linux and Mac will see a delayed release. So it seems that the report below was incorrect.
Valve software engineer John McDonald made the statement on the associated Reddit story, and you can read it in full here. Scribble is now available and it has a few Linux games.
After languishing for nearly half a decade, I recently dusted off the code for VWM. Although the original release worked well, it never quite satisfied my technical idealism.
There were lots of things I wanted to implement, fix, or clean-up, but none of them were trivial. But let me digress for a bit…. VWM is a window manager for the console. Coming one and a half months after the KDE Plasma 5.
The bugfixes are typically small but important. Over the second half of, KDE has been going through the ambitious effort of having its community propose and choose goals for the next years.
These goals have been set now, and I was thrilled to learn that my proposal on Streamlined onboarding of new contributors was chosen and many other KDE contributors believed this was a goal worth pursuing in the near future and voted for it.
While many are waiting impatiently for the release of the KDE Plasma 5. A short-lived branch, KDE Plasma 5. One of the new features being worked on by KDE developers in the new year is better desktop integration with web browsers.
Expected to arrive with Plasma 5. Various reports show us that people are already using the master branch in their production environment, as several team members have also done for at least a few months.
BuildStream is the developer-focused project for creating a flexible and extensible framework for modelling of build and continuous integration pipelines in YAML format.
BuildStream itself is written in Python. It has been an engaging year for the Linux and open-source community. Slack OS virtually rewrote its binaries to be Debian-based; Kali Linux became more popular, and Skype finally released a Linux version worth writing home about.
With such an eventful for most Linux distributions, I imagine many of our potential readers are wondering which Linux distributions have been the hottest this year, and probably why.
Linux is known to serve the needs of everyone. You can also install Arch Linux or Debian and use a lightweight desktop environment. There are tons of Linux distributions that are specifically built to cater the needs of such laptops and desktops.
Apart from being lightweight, these operating systems are fast and secure. In their current form, these technologies are relatively new. They bring a lot of useful capabilities to IT operations.
They also require management capabilities to evolve alongside. At the same time, hybrid cloud management needs to fulfill its overarching goal of providing consistency across hybrid infrastructures.
Our journey to OpenShift across multiple clouds has taken three parallel paths: Changing our culture, rethinking the application lifecycle, and evolving our infrastructure.
New instances deployed with Fedora Server 27 now enable SELinux in enforcing mode by default; aligning them to the upstream Fedora defaults. SELinux is a mandatory access control system managed by a set of security policies that the Kernel use to limit what processes and users can do on the system.
In the Juju GUI 2. The GUI is a powerful tool, but at times the command-line is necessary. For instance, the ability to SSH into a unit helps for debugging processes or accessing data directly.
Running debug-hooks is another: However, not all developer situations have the CLI available. In fact, the original developers used to call the operating system Lindows, before changing the name.
About 16 years ago, a for-pay Linux distribution caused quite a stir all because of its name — Lindows. To be honest, from a marketing perspective, it was brilliant — it got tons of free press.
Microsoft eventually killed the Lindows name by use of money and the legal system, however. After losing the Lindows name, the operating system largely fell out of the spotlight, and its 15 minutes of fame ended.
After all, without the gimmicky name, it was hard to compete with free Linux distros. Not to mention, Richard Stallman famously denounced the OS for its non-free ways. The company eventually created a free version of its OS called Freespire, but by, both projects were shut down by its then-owner, Xandros.
And yes, Lindows is rising from the grave — as Freespire 3. Do you remember the Lindows Linux distro, which aimed to make the process of using Linux and running Windows applications on Linux much easier?
Later, Microsoft sued Lindows, Inc. From there on, the theming engine and the APIs are stable. This is a great milestone for GTK3. It also means Linux Mint This should ease development and increase the quality of these components outside of Linux Mint.
With the recent release of Linux Mint The first of the four releases of the new series, simply known as Linux Mint 19, will be dubbed Tara and all subsequent releases of the series should also begin with the letter T with the second letter going further through the alphabet for each release, for example, the Linux Mint 18 releases were called Sarah, Serena, Sonya, and Sylvia.
Unfortunately, was not the much-fabled year of the Linux desktop. Hell, that might not ever happen. With Windows 10 being such a disappointment for many, however, it is definitely a possibility.
Maybe will be the year…. One such desktop operating system that consistently delights users is Linux Mint. Today, we get some information about the upcoming version Last summer the embedded Linux OpenWRT and LEDE projects voted in favor of re-merging their efforts while now in that effort is coming back together now that the logistics have been addressed.
The project will be governed using rules established by LEDE following their creation of that fork in Creating amazing projects is easy with a Raspberry Pi, but first you need to plug it in and set up Raspbian, the default operating system.
The Raspberry Pi is a wonderful microcomputer that brims with potential. With a Raspberry Pi you can build robots, learn to code, and create all kinds of weird and wonderful projects. Hackers and enthusiasts have turned Raspberry Pi boards into fully automated weather stations, internet-connected beehives, motorised skateboards, and much more.
The only limit is your imagination. The old OpenWrt CC We will continue to work on improving stability and release maintenance while aiming for frequent minor releases to address critical bugs and security issues like we did with LEDE The OpenWrt CC Yesterday, OpenMobile, the company behind the ACL app, shut down their operations and switched off their website.
For those that are not familiar with ACL, it stands for Application Compatibility Layer and it essentially enables Android apps to run on non-Android operating systems including Tizen, Linux, and others.
The contract between OpenMobile and Samsung was up for renewal, which Samsung chose not to renew. According to people familiar with the situation, this was the major reason for the company needing to close its doors — as Samsung was a major source of funding for the business.
Since August, when the mysterious Fuchsia OS was discovered as a seemingly random open-source code posted on Github by Google, several experiments have been carried out.
Its been a year since the operating system has been worked on and contributed to by the developer community. All those contributions are leading to growth in open source in general. In its Octoverse report, GitHub, the largest online repository for open source projects, reported that it now has more than 24 million users and more than 25 million public repositories.
Of course, some among those 25 million public repositories are more important than others. In several areas, open source projects have become the dominant technology, and IT professionals who want to keep their skills relevant need to at least be familiar with these projects.
Here are ten open source projects that, in light of current trends, will likely be particularly important for IT pros to know in Each year, when we look back at the top government articles on Opensource.
Instead, they demonstrate how governments and citizens are coming together through open source to solve human problems. It was easy for readers to assume Stallman was referring simply to price, rather than control over source code, but that is what actually mattered to him.
All over the world, snow researchers and snow scientists dig holes in the snow. They look at the snow crystals, feel for strong and weak layers, and take measurements in order to predict and better understand avalanches.
But snow science recently took an about-face, thanks to the open-source software known as SnowPilot. Doug Chabot of the Gallatin National Forest Avalanche Center launched the SnowPilot Project during the winter of after software developer Mark Kahrl wrote the program, hoping to find a way for researchers to collaborate and share their data on snow.
But what Chabot realized in the early s was that a large portion of snow data was being put away in desk drawers, never to be used. So he asked the question, what if we create a platform where researchers can enter their data into a worldwide database?
And what if that database is accessible to everyone? Perhaps the clearest way working on open source projects can assist in your job search is by giving you project experience. If you are a student, you may not have many concrete projects to showcase on your resume.
Either way, scouting out appealing open source projects that allow you to showcase your skills may help in your job search. These projects are great eye-catchers on resumes and can be perfect discussion topics in interviews.
In addition, many open source projects are kept in public repositories, such as GitHub, so accessing the source code is easy for anyone who wants to become involved. Also, it makes your publicly accessible code contributions easy for recruiters and other individuals at potential employers to find.
The fact that these projects are open allows you to demonstrate your skills in a more concrete manner than simply discussing them in an interview. Mapzen, a mapping platform company lauded among developers and civic hackers for its open-source approach, is shutting down.
They have until Feb. But for the admirers of the company, there is still a silver lining: Until February 1, when the company will shut down its APIs and support, users are free to grab all that they require.
Mozilla said last week it would delete all telemetry data collected because of a bug in the Firefox crash reporter. Firefox versions released in that time span did not respect user-set privacy settings and automatically auto-submitted crash reports to Mozilla servers.
The browser maker fixed the issue with the release of Firefox The SFLC was formed in to provide legal services for open-source projects. And in, it helped set up the SFC, so it could provide infrastructure support — including legal services — for open-source developers.
That shared history and similarity of purpose has made the intellectual property dispute between two organizations rather confusing to folks in the open source community.
Song acknowledges and tells of his discussion with noted bitcoin evangelist Andreas Antonopoulos about the best way to put together a book of this kind.
Antonopoulos wrote the publisher, explaining why Mr. Song was the appropriate choice for the project. We just wrote about Babylon Micro-Farms, a remote, hydroponic farm you can keep inside your living room.
The cost of textbooks has risen by 1, per cent since, more than triple the rate of inflation. What is more, these students are more likely to hold a student loan, be working more hours a week and self-identify as a visible minority.
The pre-print database for scientists to test the peer review waters was set up in as a relatively simple electronic bulletin board on a single computer. Twenty-six years later, the site arXiv.
Scientific giants like Stephen Hawking and the physicists of the LIGO facility at Caltech have even debuted some of their latest publications on the site. The organizers of the database, which is housed at the Cornell University Library, said that the pre-print method is helping to push discovery and intellectual cooperation.
Last month, we published a blogpost about our accomplishments in, and the teams have already begun brainstorming goals for next year. Last year, the Rust team started a new tradition: We leveraged our RFC process to solicit community feedback.
As open source software becomes more and more ubiquitous and popular, the Rust team is interested in exploring new and innovative ways to solicit community feedback and participation.
Hello and welcome to another issue of This Week in Rust! Rust is a systems language pursuing the trifecta: This is a weekly summary of its progress and community. Tweet us at ThisWeekInRust or send us a pull request.
Want to get involved? Once upon a time, standards were our friends. They provided industry-accepted blueprints for building homogeneous infrastructures that were reliably interoperable.
Company A could confidently build an application and — because of standards — know that it would perform as expected on infrastructure run by Company B. Standards have somewhat fallen out of favor as the speed of digital innovation has increased.
Today innumerable software applications are created by innumerable developers at an accelerating pace. Standards — once critical for achieving interoperability — have failed to adapt in this brave new world.
The examples above show that by taking a programmatic approach to standards, this degree of interoperability can be achieved even today. Disqus started showing a red notification symbol at the bottom of every post.
The notification is just a distraction aimed at increasing engagement with the comments. This is my primary complaint. Beyond that, there are just small annoyances. An electricity-conducting, environment-sensing, shape-changing machine the size of a human cell?
Is that even possible? With postdoctoral researcher Marc Miskin at the helm, the team has made a robot exoskeleton that can rapidly change its shape upon sensing chemical or thermal changes in its environment.
And, they claim, these microscale machines — equipped with electronic, photonic and chemical payloads — could become a powerful platform for robotics at the size scale of biological microorganisms.
Artificial light is often seen as a sign of progress: But a chorus of scientists and advocates argues that unnaturally bright nights are bad not just for astronomers but also for nocturnal animals and even for human health.
He summed up his skepticism this way: Every time Mississippi made national news, it seemed like the reporters managed to find the one toothless person in the vicinity and shove him or her in front of the camera.
The sheriff had a point. And I had a challenge to conquer. The story I was onto was not going to flatter Mississippi. But I did promise him I would not go searching for the toothless.
Several pallets are piled with boxes of surgical sutures, still in their shrink wrap, each box worth hundreds of dollars. Tubs overflow with diabetes supplies and surgical instruments that may run hundreds of dollars apiece.
There are bins of bandages and gauze and saline and ostomy bags and every other medical supply you can imagine. These materials, unexpired, could easily stock any hospital or clinic.
But each item has actually been thrown away by a local medical facility. The cost of health care has been rising for decades, and Americans are paying the price.
In a recent Gallup poll, people cited the high cost of care as their No. But after reporting for a year on the ways the medical industry blows through our money, I have one idea:
Coments:
No sir...